Database and Data Mining Security Essay

Total Length: 1199 words ( 4 double-spaced pages)

Total Sources: 2

Page 1 of 4

In addition to these two Director-level positions, the roles of the users of the databases and data mining applications also need to be taken into account. The sales, marketing, product management, product marketing, and services departments all need to have access to the databases and data mining applications. In addition, branch offices that access the company's applications over the shared T1 line will also need to have specific security roles assigned, especially if application and data are being accessed over the Web (Maheshwari, 1999). All of these roles must also be coordinated through the enterprise-wide security strategy (Yang, Li, Deng, Bao, 2010). Once this is accomplished, MMC will be able to more effectively attain its strategic plans with more secured systems.

Products for Ensuring Database and Data Mining Security

Given how distributed the company's offices are and the heavy reliance, they have on the use of their T1 lines and the Internet for VoIP, it is crucial for MMC to invest in networking routing and packet detection equipment in addition to firewalls and individualized system network security. For the databases and data mining software, suing biometrics to secure them at the administrator level is highly advisable (Amoruso, Brooks, Riley, 2005). In addition, the defining of IPSec protocols configuration options for the dedicated lines to the branches is advisable (Mattsson, 2009). For the 15 laptops in use, it is highly advisable that SSL-based VPN configurations also be included on them as well. The VoIP connections throughout the company also need to be benchmarked and audited for security to see how they can be improved.
With audit and benchmark data the VoIP systems of a company can be significantly improved (Marsanu, 2006). In conclusion, MMC needs to start with an assessment of its most potentially threatening areas of the distributed network, analyzed and monitor network traffic and also secure the access points of the network using firewalls and role-based authentication. The use of biometrics to limit access to only those members of the organization that need access to database and data mining data is highly recommended as well (Amoruso, Brooks, Riley, 2005).

Enterprise Security Architecture

For MMC to attain its strategic plans the company needs to create enterprise-wide security architecture. The integration of all the strategies mentioned in this paper needs to be accomplished so that the accounting, customer and financial reporting databases and data mining tools are secured to the role level. Once enterprise-wide security architecture is put into place MMC will also be able to grow more efficiently than before as well. The use of an enterprise-wide security architecture as the catalyst for future business growth has been proven by reducing costs of lost productivity due to lack of security (Bertino, Sandhu, 2005)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Database And Data Mining Security" (2010, May 25) Retrieved May 19, 2024, from
https://www.aceyourpaper.com/essays/database-data-mining-security-10791

Latest MLA Format (8th edition)

Copy Reference
"Database And Data Mining Security" 25 May 2010. Web.19 May. 2024. <
https://www.aceyourpaper.com/essays/database-data-mining-security-10791>

Latest Chicago Format (16th edition)

Copy Reference
"Database And Data Mining Security", 25 May 2010, Accessed.19 May. 2024,
https://www.aceyourpaper.com/essays/database-data-mining-security-10791