Chat with us, powered by LiveChat UC Data Warehousing Big Data and Green Computing Research Paper | Credence Writers
+1(978)310-4246 [email protected]

Question Description

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt. (I am attaching the sourced papers, please only use those.)

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words’ current key trends in data warehousing.

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you have seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?

Prompt 3 “Green Computing” (1-2 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library (I have attached these).

Conclude your paper with a detailed conclusion section.

The paper needs to be approximately 6-8 pages long, excluding both a title page and a references page. Be sure to use proper APA formatting and citations to avoid PLAGIARISM.

Your paper should meet the following requirements:

  • Be approximately 6-8 pages in length, not including the required cover page and reference page.
  • Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Strictly adhere to ZERO PLAGIARISM.
  • To continue, in Internet Explorer, select FILE then SAVE AS from your browser’s toolbar above. Be sure to save as a plain
    text file (.txt) or a ‘Web Page, HTML only’ file (.html). In FireFox, select FILE then SAVE FILE AS from your browser’s
    toolbar above. In Chrome, select right click (with your mouse) on this page and select SAVE AS
    EBSCO Publishing Citation Format: APA (American Psychological Assoc.):
    NOTE: Review the instructions at http://support.ebsco.com/help/?int=eds〈=&feature_id=APA and make any
    necessary corrections before using. Pay special attention to personal names, capitalization, and dates. Always
    consult your library resources for the exact formatting and punctuation guidelines.
    References
    Warigon, S. (1998). Data warehouse control & security. Internal Auditor, 55(1), 54.
    DATA WAREHOUSE CONTROL & SECURITY
    With this seven-step program, you can have it all: empowered information processing and
    prudent security.
    IMAGINE YOUR ORGANIZATION HAS JUST built its data warehouse. It’s fabulous! You can access
    corporate data when you want it, in whatever form you desire, and where you need it. As a result, you
    can solve dynamic organizational problems or make important decisions. You’re no longer frustrated
    with the inability of the information systems department to respond quickly to your diverse needs for
    information. In the new data warehouse environment, you have the information processing world by the
    tail, and you’re exceedingly thrilled by it all!
    Suddenly, a paranoid thought creeps into your head: What is your organization doing to identify, classify,
    quantify, and protect its valuable information assets? You pose this question to the data warehouse
    architects and administrators. They tell you not to worry, because the built-in security measures of your
    data warehouse environment could put U.S. Department of Defense systems to shame. Somewhere
    along the line, however, you sense that they may not be completely objective. As a respectable auditor,
    you put on your hacking hat and go about the process of finding the answers to your questions.
    As a general user, you easily manage to access some powerful user tools that were presumably
    restricted to those users given unlimited access privileges. The tools allow you to issue complex queries
    that access numerous data, consume enormous resources, and slow system response time
    considerably. Your trusted friend, a reformed hacker, is also able to access sensitive corporate data
    through the Internet without much ado. He reports to you your exact salary, birth date, social security
    number, and the date of your last performance evaluation–among other things.
    It’s obvious. Your organization, like most, is doing little or nothing to protect its strategic information
    assets! Your data warehouse administrators could not pinpoint the causes of recent system problems
    and security breaches until you showed them the shocking results of your efforts. Only then did they
    admit that security was not a priority during the development of the data warehouse. Inebriated with the
    need to complete the data warehouse project on time and within budget–not to mention getting
    impatient users off their backs–they hardly gave security requirements a passing thought.
    Poof! Your euphoric excitement about the new data warehouse vanishes into the thick air of security
    concerns hovering over your valuable corporate data. As a diligent corporate steward, you realize that it
    is high time for a data warehousing reality check.
    WHAT IS DATA WAREHOUSING?
    A data warehouse (DW) is a collection of integrated databases designed to support managerial
    decision-making and problem-solving functions. It contains both highly detailed and summarized
    historical data related to various categories, subjects, or areas. All units of data correspond to specific
    time frames, such as October 1995 data, 1995 data, or 1990-1998 data.
    The DW is an integral part of the enterprise-wide decision support system. It does not ordinarily involve
    data updating, but empowers end-users to access data and perform analyses. The g eliminates the
    need for the is department to perform informational processing for end-users. It also provides other
    competitive advantages for the organization, such as fostering a culture of information-sharing; enabling
    employees to effectively and efficiently solve dynamic organizational problems; minimizing operating
    costs and maximizing revenue; attracting and maintaining market shares; and minimizing the impact of
    employee turnovers.
    For instance, the internal audit functions of the multi-campus University of California have built a DW to
    facilitate the sharing of strategic data, best audit practices, and expert insights on a variety of control
    topics. Auditors can analyze the DW data to make well-reasoned decisions, such as those involving
    cost-effective solutions to various internal control problems. Marrying DW architecture to artificial
    intelligence or neural applications also facilitates highly unstructured decision-making by the auditors.
    This capacity promotes timely completion of audit projects, improved quality of audit services, lower
    operating costs, and minimal impact from staff turnover. “Progress through sharing” is implicit in the DW
    design.
    The security requirements of the DW environment are not unlike those of other distributed computing
    systems. Therefore, having an internal control mechanism to assure the confidentiality, integrity, and
    availability of data in a distributed environment is of paramount importance.
    Unfortunately, as underscored in the introductory scenario, little consideration may be given to security
    during the development phase of data warehouses. Achieving proactive security requires a sevenphase process that involves: (1) identifying data, (2) classifying data, (3) quantifying the value of data,
    (4) identifying data security vulnerabilities, (5) identifying data protection measures and their costs,(6)
    selecting cost-effective security measures, and (7) evaluating the effectiveness of security measures.
    These phases make up the enterprise-wide vulnerability assessment and management program.
    1 IDENTIFYING THE DATA
    The identification of all digitally stored data placed in the DW is an often ignored, yet critical, step in
    providing DW security, especially since this process forms the foundation upon which subsequent
    phases depend. A complete inventory should be taken of all the data available to DW end-users. The
    installed data monitoring software–an important component of the DW–can provide accurate
    information about all databases, tables, columns, rows, and profiles of data residing in the DW. It also
    shows who is using the data and how often.
    Identifying the data manually requires preparing a checklist of this information. Whether the required
    information is gathered through an automated or a manual method, the collected information needs to
    be organized, documented, and retained for the next phase.
    2 CLASSIFYING THE DATA
    Classifying all the data in the DW environment is requisite to prudently satisfy security requirements for
    data confidentiality, integrity, and availability. In some cases, data classification is a legally mandated
    requirement. Performing this task requires the involvement of data owners, custodians, and end-users.
    Data is generally classified into the following three classes, based on criticality and sensitivity to
    disclosure, modification, and destruction.
    PUBLIC, OR LEAST SENSITIVE DATA, is usually unclassified and subject to public disclosure by laws,
    common business practices, or company policies. DW end-users at all levels can access this data,
    which might include audited financial statements, admission information, and phone directories, for
    example.
    CONFIDENTIAL, OR MODERATELY SENSITIVE DATA, is not subject to public disclosure. The
    principle of “least privilege” applies to this data classification category, and access to the data is limited
    on a need-to-know basis. Users can access this data only if it is needed to perform their work
    successfully. Examples of confidential data might include personnel/payroll information, medical history,
    and investments.
    TOP SECRET, OR MOST SENSITIVE DATA, is highly sensitive and mission-critical. The principle of
    “least privilege” also applies here, with access requirements much more stringent than those regarding
    confidential data. Only high-level DW users, such as those with unlimited access, can view this data,
    and then only with proper security clearance. Users can access only the data needed to accomplish
    their critical job duties. Top Secret Data might address research and development, new product lines,
    trade secrets, and recruitment strategies, for example.
    Some have suggested that the use of military classifications, such as confidential and top secret, should
    be avoided since many problems are associated with adapting these words to other purposes. Military
    classification rules carry several access control implications that rarely apply to the commercial
    information security environment. Military classification levels leverage data control against the judged
    trust of specific individuals. No true analog to this activity exists in the business environment.
    The universal goal of data classification is to rank data by increasing degrees of sensitivity so that
    different protective measures can be used for different categories. This task may not be so simple as it
    seems, however. Certain data represents a mixture of two or more categories depending on the context
    used; and time, location, and laws may be factors. Determining how to classify such ambiguous data is
    both challenging and interesting.
    In addition, organizations should not classify data unless they can really control access to it. Labels may
    make an attacker’s job easier by pointing directly to the most valuable information. Also, poorly designed
    systems may force data with different classifications into different storage areas, making sensitive data
    easier to lose and more difficult for busy users to find when needed.
    3 QUANTIFYING THE VALUE OF DATA
    In most organizations, senior management demands to see the “smoking gun”–cost versus benefit
    figures or hard evidence of committed frauds–before committing corporate funds for security initiatives.
    Cynical managers will be quick to point out that they deal with “hard reality,” not soft variables concocted
    by radical paranoids. Quantifying the value of sensitive data that warrants protective measures may be
    as close to the smoking gun as one can get for triggering senior management’s support and
    commitment to DW security initiatives.
    In the quantification phase, a “street value” is assigned to data grouped under different sensitivity
    categories. By itself, data has no intrinsic value. However, the value of data is often measurable by the
    cost to (1) reconstruct lost data, (2) restore the integrity of corrupted, fabricated, or intercepted data, (3)
    not make timely decisions due to denial of service, or (4) pay financial liability for public disclosure of
    confidential data. The data value may also include lost revenue due to leakage of trade secrets to
    competitors and advance use of secret financial data by rogue employees in the stock market.
    Measuring the value of sensitive data is often a Herculean task, but some organizations rely on simple
    procedures. They build a spreadsheet application utilizing both qualitative and quantitative factors to
    estimate the “annualized loss expectancy” (ale) of data at risk. For instance, if it costs $10,000 annually,
    based on labor hours, to reconstruct top secret data with an assigned risk factor of 4, then the company
    should expect to lose at least $40,000 a year if this top secret data is not adequately protected.
    Similarly, if it’s possible for an employee to sue the company and recover $250,000 in punitive damages
    for public disclosure of privacy-protected personal information, then the liability cost plus legal fees paid
    to the lawyers can be used to calculate the value of the data. The risk factor, or probability of
    occurrence, can be determined arbitrarily or quantitatively. The higher the likelihood a particular unit of
    data will be attacked, the greater the risk factor assigned to that data set.
    By measuring the value of strategic information based on the accepted classifications, organizations can
    determine how much they can save by properly protecting the assets, or how much could be lost
    annually if no protective action is taken.
    4 IDENTIFYING VULNERABILITIES
    The fourth phase requires that vulnerabilities associated with the DW environment be identified and
    documented. Common vulnerabilities of a DW might include:
    BUILT-IN DBMS SECURITY Most data warehouses rely heavily on built-in security that is primarily
    view-based. View-based security requires the database administrator to define the specific data that can
    be seen and manipulated by end-users only through a “view” or “window” established by the
    administrator. View-based security is inadequate for the DW, because it can be easily bypassed by a
    “direct dump” of data outside the controlled perimeter of the established view or window. It also does not
    protect data during the transmission from servers to clients, thus exposing the data to potential
    unauthorized access. Furthermore, the security feature is ineffective because the activities of end-users
    are largely unpredictable in the DW environment.
    DBMS LIMITATIONS Not all database systems housing DW data are capable of concurrently handling
    data of different sensitivity levels. Most organizations, for instance, use one DW server to process both
    top secret and confidential data at the same time. However, the programs handling top security data
    may not prevent leakage of the data to the programs handling the confidential data. Such breaches may
    allow DW users to access top secret data, even though the users are only authorized to access
    confidential data.
    DUAL SECURITY ENGINES Some data warehouses combine the built-in DBMS security features with
    the operating system access control package to satisfy their security requirements. Using dual security
    engines tends to present opportunity for security lapses and exacerbates the complexity of security
    administration in the DW environment.
    INFERENCE ATTACKS Different access privileges are granted to different DW users. All users can
    access public data, but only a select few would presumably be able to access confidential or top secret
    data.
    Unfortunately, general users can obtain protected data by inference without having direct access to the
    protected data. Sensitive data is typically inferred from seemingly non-sensitive data. For example, if an
    individual does not appear on the non-confidential Dean’s List, that person’s GPA, which is confidential
    data, can be inferred to be less than the qualifying 3.4. Carrying out direct and indirect inference attacks
    is a common vulnerability in the DW environment.
    AVAILABILITY FACTOR Availability is critical to the shared access philosophy of the DW architecture.
    However, if not carefully considered, the availability requirement can conflict with or compromise the
    confidentiality and integrity of DW data.
    HUMAN FACTORS Accidental and intentional acts, such as errors, omissions, modifications,
    destruction, misuse, disclosure, sabotage, fraud, and negligence, account for most of the costly losses
    incurred by organizations. These acts adversely affect the integrity, confidentiality, and availability of the
    DW data.
    INSIDER THREATS As DW users, employees represent the greatest threat to valuable data.
    Disgruntled employees with legitimate access can leak secret data to competitors and publicly disclose
    confidential human resources data. Rogue employees can also profit by using strategic corporate data
    in stock market exchanges before such information is released to the public. These activities cause
    strained relationships with business partners or government entities; loss of money due to financial
    liabilities; loss of public confidence in the organization; and loss of competitive edge.
    OUTSIDER THREATS Competitors and other outside parties pose threats similar to those of unethical
    insiders. Outsiders can engage in electronic espionage and other hacking techniques to steal, buy, or
    gather strategic corporate data from the DW environment. Risks from these activities include negative
    publicity, which decimates the ability of a company to attract and retain customers or market shares, and
    loss of continuity of DW resources, which negates user productivity. The resulting losses from outside
    attacks tend to be higher than those from inside threats.
    NATURAL FACTORS Fire, water, and air damage can render both the DW servers and clients
    unusable. Risks and losses vary from organization to organization, depending mostly on location and
    contingency factors.
    UTILITY FACTORS Interruption of electricity and communication services causes costly disruption to
    the DW environment. These factors have a lower probability of occurrence, but they tend to result in
    excessive losses.
    A comprehensive inventory of the vulnerabilities inherent in the DW environment should be documented
    and categorized as major or minor threats. Such cataloging enables efficient completion of the next
    phase.
    5 IDENTIFYING PROTECTIVE MEASURES AND THEIR COSTS
    Vulnerabilities identified in phase four must be evaluated so that appropriate, cost-effective protection
    can be established. Protective measures for DW data might include:
    THE HUMAN WALL Employees represent the front-line of defense against security vulnerabilities in
    any decentralized computing environment, including the DW. Addressing employee hiring, training in
    security awareness, periodic background checks, transfers, and termination as part of the security
    requirements helps create a security-conscious DW environment. This approach effectively treats the
    root causes, rather than the symptoms, of security problems.
    USER ACCESS CLASSIFICATION DW users should be classified as General Access Users, Limited
    Access Users, or Unlimited Access Users. These classifications will facilitate effective access control
    decisions.
    ACCESS CONTROLS An access controls policy based on principles of “least privilege” and “adequate
    data protection” should be developed. Effective and efficient access control restrictions should be
    enforced, so that end-users can access only the data or programs for which they have legitimate
    privileges.
    Corporate data must be protected to the degree consistent with its value. Users need to obtain security
    clearance before they are granted access to sensitive data. Also, access to sensitive data should
    require more than one authentication mechanism. These access controls minimize damage from
    accidental and malicious attacks.
    INTEGRITY CONTROLS A control mechanism should be used to (1) prevent all users from updating
    and deleting historical data in the DW; (2) restrict data “merge access” to authorized activities only; (3)
    immunize the DW data from power failures, system crashes, and corruption; (4) enable rapid recovery
    of data and operations in the event of disasters; and (5) ensure the availability of consistent, reliable,
    and timely data to the users. These goals are achieved through os integrity controls and well tested
    disaster recovery procedures.
    DATA ENCRYPTION Encrypting sensitive data in the DW ensures that the data is accessed on an
    authorized basis only. This nullifies the potential threat of data interception, fabrication, and modification.
    It also inhibits unauthorized dumping and interpretation of data, and it enables the secure authentication
    of users. In short, encryption ensures the confidentiality, integrit…
    Purchase answer to see full
    attachment