Verified Document

Database And Data Mining Security Essay

In addition to these two Director-level positions, the roles of the users of the databases and data mining applications also need to be taken into account. The sales, marketing, product management, product marketing, and services departments all need to have access to the databases and data mining applications. In addition, branch offices that access the company's applications over the shared T1 line will also need to have specific security roles assigned, especially if application and data are being accessed over the Web (Maheshwari, 1999). All of these roles must also be coordinated through the enterprise-wide security strategy (Yang, Li, Deng, Bao, 2010). Once this is accomplished, MMC will be able to more effectively attain its strategic plans with more secured systems. Products for Ensuring Database and Data Mining Security

Given how distributed the company's offices are and the heavy reliance, they have on the use of their T1 lines and the Internet for VoIP, it is crucial for MMC to invest in networking routing and packet detection equipment in addition to firewalls and individualized system network security. For the databases and data mining software, suing biometrics to secure them at the administrator level is highly advisable (Amoruso, Brooks, Riley, 2005). In addition, the defining of IPSec protocols configuration options for the dedicated lines to the branches is advisable (Mattsson, 2009). For the 15 laptops in use, it is highly advisable that SSL-based VPN configurations also be included on them as well. The VoIP connections throughout the company also need to be benchmarked and audited for security to see how they can be improved. With audit and benchmark data the VoIP systems of a company can be significantly improved (Marsanu, 2006). In conclusion, MMC needs to start with an assessment of its most potentially threatening areas of the distributed network, analyzed and monitor network traffic and also secure the access points of the network using firewalls and role-based authentication. The use...

The integration of all the strategies mentioned in this paper needs to be accomplished so that the accounting, customer and financial reporting databases and data mining tools are secured to the role level. Once enterprise-wide security architecture is put into place MMC will also be able to grow more efficiently than before as well. The use of an enterprise-wide security architecture as the catalyst for future business growth has been proven by reducing costs of lost productivity due to lack of security (Bertino, Sandhu, 2005).

Sources used in this document:
References:

Anthony J. Amoruso, Richard C. Brooks, & Richard a Riley Jr. (2005). Biometrics and Internal Control: An Emerging Opportunity. The Journal of Government Financial Management, 54(2), 40-44.

Elisa Bertino, & Ravi Sandhu. (2005). Database Security-Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing, 2(1), 2-19.

Shuchih Ernest Chang, & Chienta Bruce Ho. (2006). Organizational factors to the effectiveness of implementing information security management. Industrial Management + Data Systems, 106(3), 345-361.

Harris, Duncan, & Sidwell, David. (1994). Distributed database security. Computers & Security, 13(7), 547.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now