Company network to support data analytics function

Assignment Help Basic Computer Science
Reference no: EM132899630

Assignment : Information Security

In this assignment you will make recommendations on the network security your client needs to already have or needs to establish on the company network to support the data analytics function you are planning to set up.

Your security requirements in this assignment depend upon the choices you made in each of the prior assignments including choices for the cloud (assignment 2), for Big Data and your database(s) (assignment 3), and your network (assignment 4).

Assume your client already has at least virus-scan software on desktops. If you have chosen to write about a larger company you can assume they have some form of public key infrastructure (PKI).

1. For your chosen business (the business of your client) your prior choices now drive your information security requirements. Most businesses already have some privacy and confidentiality requirements, however, is this new data analytics function introducing additional considerations? (Sarbox? HIPAA?)

2. State the impact on the business in terms of information security that will be caused by the introduction of this new data analytics function. Is your data in the cloud?

3. Compare the new level of InfoSec requirement against the (assumed) initial security precautions already in place at this business. Describe the upgrades required to the security configuration.

4. Note there are security considerations for data "at rest" and for data "in motion".

5. Assume the client already has some minimal form of disaster preparedness (DR) scheme whereby on-site servers (if any) are backed-up to other storage devices and those backups can be retrieved if needed by an offsite DR plan. Is this enough to accommodate your new data analytics design?

6. How vital is the end product of your data analytics function to be to the continued operation of the business? If it produces reports on future trends for instance, then perhaps the new InfoSec requirements are fairly low. If you have recommended a scheme that will become vital to the business's continued operation, then probably the InfoSec and DR precautions increase. There is a measure of appropriateness here for these security precautions.

7. There are significant cost considerations too. If you recommend a whole secondary data center just to support DR, that recommendation must be absolutely essential, or else the costs involved will damage your entire recommendation. Here too is a measure of appropriateness.

8. Similarly, other security-related precautions such as guards at the front door, gated parking lots, etc are huge cost items. Do not add these casually.

9. Your essay must state the (assumed) initial security situation and DR situation (if any) of the client (the "before") and then state the expected upgrades / enhancements required (if any) to support the data analytics function (the "after").

Reference no: EM132899630

Questions Cloud

Despite popularity of cloud computing : Despite the popularity of cloud computing, there are several issues that need to be assessed before making the decision to use the cloud.
Protection of company sensitive information and systems : You are responsible for development and implementation of various security policies to ensure the protection of company sensitive information and systems.
Work vs product breakdown : Compare and contrast the use of a Work Breakdown Structure versus a Product Breakdown Structure.
Computing devices that run different operating systems : Throughout the years, you have used different computing devices that run different operating systems.
Company network to support data analytics function : You will make recommendations on network security your client needs to already have or needs to establish on company network to support data analytics function
Specific tasks would be required to implement strategy : Develop a response strategy for each risk. Describing what specific tasks would be required to implement the strategy.
First based on average housing prices : On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
Distinguish professional from other kinds of workers : What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional?
Redundancy for virtualization for the organization : Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd