Ba501 Week 1 Assignment

Improved Essays
BA501 Overview of Business Intelligence
Week 1 Assignment
David Nagus
Grantham University
Professor Jackson
May 6, 2015

I
Introduction
With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.
II
Abstract
Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.
…show more content…
These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of.
The key decision makers in a security project would include:
Chief Executive Officer: The most senior corporate officer reports to the board of directors.
Chief Information Officer: Is a senior executive in charge of information technology and computer systems that support the organization.
Chief Security Officer: Is a senior executive in charge of security of personnel, physical and information assets within the organization.
The rest of the decision makers would be members of the security team and administrators.
(Cost-effectiveness Modeling for a Decision Support System in Computer Security. Web. 9 May 2015.)

III

Related Documents

  • Decent Essays

    Pb2 Week 2 Assignment

    • 230 Words
    • 1 Pages

    PB2 Date: 08.06.2017 Project Category: WISE Community Mental Health - PHaMs. Support Description: N/A Session: N/A Information and Reminders: 1.- Well-being: Penny informed the writer that last Saturday was admitting to the emergency department due a psychotic episode. On that week she went to see her GP and he recommended reducing her anti-depression tables from 150grs of prastrke to 50grs. Penny believed that this is the reason why she felt terrible sick and suicidal.…

    • 230 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Macy’s Inc. relies extensively on technology and on its information systems to process transactions, compile results and operate its business. As an advantage, Macy’s Systems and Technology, Inc. engages in creating, collecting, and directing pieces of data to form management tools. The company implements integrated retail, e-commerce, and data warehouse systems. As a disadvantage, the information systems can be subject to interruption from power outages, damage from viruses, cyber-attack or other security breaches. In these cases, companies like Macy’s may experience the loss of critical data and delays in its processes.…

    • 111 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Chip Security Services

    • 1801 Words
    • 8 Pages

    It is a fact that security plays a major role in welfare of an organization. Security services is a group bund by goal to protect any organization that includes the employees, equipment, infrastructure and most importantly delicate information. So as a team of two individuals we decided to propose a security consulting firm and decided to launch it as Chip Security Services. Statement of Compliance: The Chip Security Services hereby declare that it will abide with State and Federal laws preventing segregation and with all the requirements imposed to regulations of the United States Federal Law. It is the policy of Chip Security Services that no biased practices based on height, weight, religion, colour, religion, nationality, sex, disability,…

    • 1801 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    I have chosen Oklahoma Baptist University as my university and chief financial officer as my career. A chief financial officer, commonly seen as CFO, is responsible for monitoring and working to improve the financial status of a business. They are also responsible for record-keeping, financial reporting to higher management, and financial planning. A CFO typically reports to a board of directors and the chief executive officer, commonly seen as COO. Usually with most corporations, a CFO will assist a COO and reports on all tactical and strategic matters that pertain to cost budget analysis.…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Security as a service (SECaaS) is a business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis more cost effectively than most individuals or corporations can provide on their own when the total cost of ownership is considered. SecaaS has great benefits for a small to medium size company, such as integrating security services without on-premises hardware or a huge budget. Continued protection as databases is constantly being updated to provide up-to-date security coverage. It also alleviates the issue of having separate infrastructures, instead of combining all elements into one manageable system. Greater security expertise than is typically available within an organization.…

    • 203 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Henry And Mea Case Study

    • 645 Words
    • 3 Pages

    Loss or compromisation of these servers and information systems could not only cripple the day to day operations at Henry and Mea and all of their franchise restrounts, but could also lead to financial losses for the organization • Corporate office computers - All of the office computers at Henry and Mea’s corporate head courters are used by employees for task and functions that are essential to the daily operations. Many of these computers are also able to access information on systems that could be sensitive. Loss or compromisation of these systems would severely cripple Henry and Mea’s daily operation and result in some losses or financial implication. • Firewalls and other network and system security devices – All of the firewalls and other system and network security devices are important to the protection of all of the systems and critical information that is crucial to Henry and Mea’s operation. Though loss of these assets themselves may not cause great impact on the organizations, they may provide opportunity for a cyber-attack to occur that could result in great loss for the…

    • 645 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    While there are many methods to reduce risk, the CLN project team failed to identify the need of a having software legal expert team member, who would have been able to give input during the planning phase about the protection requirements in information security for the Briargrove Investment organization. In addition, the questionnaires used to gather information did not address the requirement of foreign law and protections assigned to information security for both clients and customers. Questionnaires developed for this project needed to address not only associate, administration, education, managerial and corporate needs but also information security. Other areas of concern identified were developing…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Homeland Security Department According to the United States Government, Federal Agencies Department of Homeland Security website, The Homeland Security department was established in 2002 from a collaboration of 22 other departments and agencies. The homeland security is just what is names says it’s an agency that tries to find ways to improve security for America. Everyone knows that the military plays an important role in Homeland security, however there are a few parts to the department that some might now realize are, the following is a list of some of the other departments that are also part of homeland security: Customs, Border, immigration enforcement, emergency response to natural and manmade disasters, antiterrorism, and cybersecurity.…

    • 991 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    1 How are Mulcahy 's turnaround success factors consistent with Kotter 's framework of leading change best practices? In what ways are they distinct? • Kotter’s framework of leading change sets forth 8 stages that lead to successful change. After listening and watching the video on Xerox’s turn-around, it was evident that Mulcahy utilized the following of Kotter’s framework: o Establishing a sense of urgency: As Mulcahy mentioned in the video, Xerox was going through a crisis which she referred to as “early adopters of corporate crisis.” Because of this urgency, Mulcahy was able to dissect the overall problem to bits and pieces and issues related to each department.…

    • 999 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    In the digital age, a huge data security breach or a major power outage can cost a healthcare organization millions in damages. That’s why IT security experts suggest that companies should be up to date with their data security to prevent loss of valuable company data. Data theft and network security breaches are now becoming more prevalent, due to the advancement in technology that’s being used by cybercriminals. IBM Security recently sponsored a survey that revealed massive cyber attacks on the data systems of health organizations cost around $380 per file. It’s 2.5 times more expensive when compared to data breaches affecting other industries.…

    • 255 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Leadership: “You cannot lead if no one follows” – Doug Pflug What led up to the situation? On September 1st, 2013 I began my new role as a Communication Supervisor. As part of my self-initiated training I read a 140 page report entitled “Communications Centre Staff and Scheduling: A Review of Current Practises and Recommendations for Future Practise” that was prepared by the Guelph Police Service Research and Development Unit-March 2013. The document identified: poor morale, complaints of “poor treatment”, inconsistent supervisory decision making, rumours and lack of supervisor fairness as significant Communication Unit problems. One quote stood out that challenged me: “I am floored by how people are treated in here.”…

    • 1969 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    CEO Compare and Contrast A Chief Executive Officer (CEO) of a company is the “boss” and they are responsible for everything, including the success or failure, of the company. They are in a place of legitimate power, “a place were a person in a higher position has control over people in a lower position in an organization” (Giang ). Without a clear understanding of the power that they hold, they may abuse it. A CEO has many individuals counting on them to be successful with every move they make and a CEO must be able to meet the needs of all of those individuals, including employees and customers.…

    • 1284 Words
    • 5 Pages
    Improved Essays