Ba501 Week 1 Assignment

Improved Essays
BA501 Overview of Business Intelligence
Week 1 Assignment
David Nagus
Grantham University
Professor Jackson
May 6, 2015

I
Introduction
With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.
II
Abstract
Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.
…show more content…
These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of.
The key decision makers in a security project would include:
Chief Executive Officer: The most senior corporate officer reports to the board of directors.
Chief Information Officer: Is a senior executive in charge of information technology and computer systems that support the organization.
Chief Security Officer: Is a senior executive in charge of security of personnel, physical and information assets within the organization.
The rest of the decision makers would be members of the security team and administrators.
(Cost-effectiveness Modeling for a Decision Support System in Computer Security. Web. 9 May 2015.)

III

Related Documents

  • Improved Essays

    HL 531 Week 1 Assignment

    • 495 Words
    • 2 Pages

    We are writing to provide you with an update to our site cleanup and remediation efforts, specifically as it relates the holdback provision of our Agreement. As you are aware, the site due diligence and soils investigations we completed during our acquisition process confirmed the presence of contaminated and/or impacted soils at 50 Ann St. which require clean-up and removal prior to us being able to advance our residential re-development proposal. Our Agreement with you requires that prior to us advancing clean-up of the site, that we provide you with notice in advance of excavation to allow you the opportunity to retain a third party engineer to evaluate our findings and our proposed remediation program. Please accept this letter as the required formal notice. Our consultant, Trafalgar Environmental, has conducted extensive investigations on Site…

    • 495 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Pb2 Week 2 Assignment

    • 230 Words
    • 1 Pages

    PB2 Date: 08.06.2017 Project Category: WISE Community Mental Health - PHaMs. Support Description: N/A Session: N/A Information and Reminders: 1.- Well-being: Penny informed the writer that last Saturday was admitting to the emergency department due a psychotic episode. On that week she went to see her GP and he recommended reducing her anti-depression tables from 150grs of prastrke to 50grs. Penny believed that this is the reason why she felt terrible sick and suicidal.…

    • 230 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Bsbhs501 Task 2

    • 609 Words
    • 3 Pages

    Work Health and Safety Management Plan Bagavathi Ghanesan BSBWHS501A Task 2 The Worksafe Plan is an assessment process that rates safety and health management systems and directs attention to areas that could be improved. The Worksafe Plan is not intended to prescribe how to manage safety and health, but to provide a systematic way of measuring how well it is being managed. The Worksafe Plan provide information on desirable safety and health management practices to Australian Hardware workers.…

    • 609 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I have chosen Oklahoma Baptist University as my university and chief financial officer as my career. A chief financial officer, commonly seen as CFO, is responsible for monitoring and working to improve the financial status of a business. They are also responsible for record-keeping, financial reporting to higher management, and financial planning. A CFO typically reports to a board of directors and the chief executive officer, commonly seen as COO. Usually with most corporations, a CFO will assist a COO and reports on all tactical and strategic matters that pertain to cost budget analysis.…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Chip Security Services

    • 1801 Words
    • 8 Pages

    It is a fact that security plays a major role in welfare of an organization. Security services is a group bund by goal to protect any organization that includes the employees, equipment, infrastructure and most importantly delicate information. So as a team of two individuals we decided to propose a security consulting firm and decided to launch it as Chip Security Services. Statement of Compliance: The Chip Security Services hereby declare that it will abide with State and Federal laws preventing segregation and with all the requirements imposed to regulations of the United States Federal Law. It is the policy of Chip Security Services that no biased practices based on height, weight, religion, colour, religion, nationality, sex, disability,…

    • 1801 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Security as a service (SECaaS) is a business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis more cost effectively than most individuals or corporations can provide on their own when the total cost of ownership is considered. SecaaS has great benefits for a small to medium size company, such as integrating security services without on-premises hardware or a huge budget. Continued protection as databases is constantly being updated to provide up-to-date security coverage. It also alleviates the issue of having separate infrastructures, instead of combining all elements into one manageable system. Greater security expertise than is typically available within an organization.…

    • 203 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Homeland Security Department According to the United States Government, Federal Agencies Department of Homeland Security website, The Homeland Security department was established in 2002 from a collaboration of 22 other departments and agencies. The homeland security is just what is names says it’s an agency that tries to find ways to improve security for America. Everyone knows that the military plays an important role in Homeland security, however there are a few parts to the department that some might now realize are, the following is a list of some of the other departments that are also part of homeland security: Customs, Border, immigration enforcement, emergency response to natural and manmade disasters, antiterrorism, and cybersecurity.…

    • 991 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    While there are many methods to reduce risk, the CLN project team failed to identify the need of a having software legal expert team member, who would have been able to give input during the planning phase about the protection requirements in information security for the Briargrove Investment organization. In addition, the questionnaires used to gather information did not address the requirement of foreign law and protections assigned to information security for both clients and customers. Questionnaires developed for this project needed to address not only associate, administration, education, managerial and corporate needs but also information security. Other areas of concern identified were developing…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    1 How are Mulcahy 's turnaround success factors consistent with Kotter 's framework of leading change best practices? In what ways are they distinct? • Kotter’s framework of leading change sets forth 8 stages that lead to successful change. After listening and watching the video on Xerox’s turn-around, it was evident that Mulcahy utilized the following of Kotter’s framework: o Establishing a sense of urgency: As Mulcahy mentioned in the video, Xerox was going through a crisis which she referred to as “early adopters of corporate crisis.” Because of this urgency, Mulcahy was able to dissect the overall problem to bits and pieces and issues related to each department.…

    • 999 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    CEO Compare and Contrast A Chief Executive Officer (CEO) of a company is the “boss” and they are responsible for everything, including the success or failure, of the company. They are in a place of legitimate power, “a place were a person in a higher position has control over people in a lower position in an organization” (Giang ). Without a clear understanding of the power that they hold, they may abuse it. A CEO has many individuals counting on them to be successful with every move they make and a CEO must be able to meet the needs of all of those individuals, including employees and customers.…

    • 1284 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    In the digital age, a huge data security breach or a major power outage can cost a healthcare organization millions in damages. That’s why IT security experts suggest that companies should be up to date with their data security to prevent loss of valuable company data. Data theft and network security breaches are now becoming more prevalent, due to the advancement in technology that’s being used by cybercriminals. IBM Security recently sponsored a survey that revealed massive cyber attacks on the data systems of health organizations cost around $380 per file. It’s 2.5 times more expensive when compared to data breaches affecting other industries.…

    • 255 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Leadership: “You cannot lead if no one follows” – Doug Pflug What led up to the situation? On September 1st, 2013 I began my new role as a Communication Supervisor. As part of my self-initiated training I read a 140 page report entitled “Communications Centre Staff and Scheduling: A Review of Current Practises and Recommendations for Future Practise” that was prepared by the Guelph Police Service Research and Development Unit-March 2013. The document identified: poor morale, complaints of “poor treatment”, inconsistent supervisory decision making, rumours and lack of supervisor fairness as significant Communication Unit problems. One quote stood out that challenged me: “I am floored by how people are treated in here.”…

    • 1969 Words
    • 8 Pages
    Great Essays