Company network to support data analytics function

Assignment Help Basic Computer Science
Reference no: EM132899630

Assignment : Information Security

In this assignment you will make recommendations on the network security your client needs to already have or needs to establish on the company network to support the data analytics function you are planning to set up.

Your security requirements in this assignment depend upon the choices you made in each of the prior assignments including choices for the cloud (assignment 2), for Big Data and your database(s) (assignment 3), and your network (assignment 4).

Assume your client already has at least virus-scan software on desktops. If you have chosen to write about a larger company you can assume they have some form of public key infrastructure (PKI).

1. For your chosen business (the business of your client) your prior choices now drive your information security requirements. Most businesses already have some privacy and confidentiality requirements, however, is this new data analytics function introducing additional considerations? (Sarbox? HIPAA?)

2. State the impact on the business in terms of information security that will be caused by the introduction of this new data analytics function. Is your data in the cloud?

3. Compare the new level of InfoSec requirement against the (assumed) initial security precautions already in place at this business. Describe the upgrades required to the security configuration.

4. Note there are security considerations for data "at rest" and for data "in motion".

5. Assume the client already has some minimal form of disaster preparedness (DR) scheme whereby on-site servers (if any) are backed-up to other storage devices and those backups can be retrieved if needed by an offsite DR plan. Is this enough to accommodate your new data analytics design?

6. How vital is the end product of your data analytics function to be to the continued operation of the business? If it produces reports on future trends for instance, then perhaps the new InfoSec requirements are fairly low. If you have recommended a scheme that will become vital to the business's continued operation, then probably the InfoSec and DR precautions increase. There is a measure of appropriateness here for these security precautions.

7. There are significant cost considerations too. If you recommend a whole secondary data center just to support DR, that recommendation must be absolutely essential, or else the costs involved will damage your entire recommendation. Here too is a measure of appropriateness.

8. Similarly, other security-related precautions such as guards at the front door, gated parking lots, etc are huge cost items. Do not add these casually.

9. Your essay must state the (assumed) initial security situation and DR situation (if any) of the client (the "before") and then state the expected upgrades / enhancements required (if any) to support the data analytics function (the "after").

Reference no: EM132899630

Questions Cloud

Despite popularity of cloud computing : Despite the popularity of cloud computing, there are several issues that need to be assessed before making the decision to use the cloud.
Protection of company sensitive information and systems : You are responsible for development and implementation of various security policies to ensure the protection of company sensitive information and systems.
Work vs product breakdown : Compare and contrast the use of a Work Breakdown Structure versus a Product Breakdown Structure.
Computing devices that run different operating systems : Throughout the years, you have used different computing devices that run different operating systems.
Company network to support data analytics function : You will make recommendations on network security your client needs to already have or needs to establish on company network to support data analytics function
Specific tasks would be required to implement strategy : Develop a response strategy for each risk. Describing what specific tasks would be required to implement the strategy.
First based on average housing prices : On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
Distinguish professional from other kinds of workers : What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional?
Redundancy for virtualization for the organization : Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Estimate the percentage of adults

Find the sample needed to estimate the percentage of adults who have consulted fortune tellers. Use a 0.03 margin error

  Derive the transfer function h (z) of the lti-dt system

Derive the transfer function H (z) of the LTI-DT system described by the circuit given in Figure 2.9. Obtain the difference equation relating the input x(n) to the output y(n).

  Typical internet protocols

Describe IN DETAIL the DIFFERENCES AND USE among typical internet protocols.

  Purpose of the boot loader during the boot-up process?

purpose of the boot loader during the boot-up process?

  Electronic ballots

One criticism of electronic ballots for elections is that while intuitive for younger voters who are familiar with using a mouse to point and click,

  Appropriate graphical or other eda techniques

Use appropriate graphical or other EDA techniques to get an indication as to which of these distributions is the more likely source of the sample.

  What are the advantages and disadvantages of this approach

Furthermore, all cost overruns must come out of the functional managers' budgets, whether they be overhead or otherwise, not the project budget. What are the advantages and disadvantages of this approach?

  Construct a properly structured program

Construct a properly structured program that accepts the following input: student last name, student first name, academic major, and GPA.

  Baselines helps to validate correctness of security controls

A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls.

  How does one convert logical data to numerical data

How does one convert logical data to numerical data? And I know it is not the real function, because that just finds the real part of a complex value.

  Cloud computing by using bibliometrics

provide your assessment on whether the United States needs to introduce top talents in the field of big data and cloud computing by using bibliometrics.

  Discuss importance of top management commitment

Discuss the importance of top management commitment and the development of standards for successful project management.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd