{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]
    1. QUESTION

    Instructions
    Project Overview
    For this assignment, you will tackle the comprehensive task of conducting the data modeling and database design for the information systems of an organization operating in a domain of your choice. In parallel, you will also create a data governance plan for your organization. You will apply the data management notions in this course to a selected case study for your organization.

    You will first define the scope of your organization, describe its data management needs, and explain how the data support your organization’s critical mission. Next, you will create a detailed data model for a critical information system in your organization. You will start with requirements, then generate logical data modeling decisions which will culminate in an entity-relationship diagram for your organization’s data.

    As a next step, you will use your data model to create a logical database architecture for your organization’s IS. You will then discuss a plan for transforming your logical database architecture to a physical architecture.

    As a last step in your data modeling experience in this course, you will think in terms of creating a temporal database for a data warehouse or a data mart, which are data architecture notions that you will learn about in Week 4. Starting from your logical database, you will create what is referred to as a dimensional logical database well suited for use in a data warehouse or data mart.

    In parallel with your data modeling tasks, you will examine and assess the data management practices in your organization, focusing on key management functions.

    You will be completing this project in five weeks. In each week, you will work on a component of your report.

    Background of Enterprise Data: Selecting Your Case Study
    This week, your task for the project is to research in the the Internet to identify a case study of your choice with a pertinent IT/IS capability with significant data needs, either as an essential asset in support of your case study’s business mission or as an integral part of your case study’s critical mission.

    Some examples could be:

    Healthcare organizations, such as
    Healthcare insurance company
    Major hospital
    Medical laboratory
    Academic institutions, such as
    University or professional institute
    Commerce and transportation center or services, such as
    Major airport or maritime port
    Transportation carriers, such as
    an airline company
    a railroad company
    Network service providers, such as
    Telecommunications service carrier/provider
    Internet and voice digital service provider or Cloud service provider
    Media organizations, such as
    Television network
    Multimedia service operator
    Manufacturing firms, such as
    Computer products manufacturer
    Car manufacturer
    Hardware manufacturer
    Major retailers, such as
    Food retailer
    Home maintenance retailer
    Clothing outlet
    Entertainment complexes, such as
    Hotel
    Vacation resort
    Large recreation and entertainment complex
    Financial institutions, such as
    Banking system
    Credit card service
    Investment trading service
    The above are examples to guide you with your research, but you are not limited to these areas. It is important that you arrive at your own case study, based on your personal interests, and one that is well suited to explore from a data management perspective for this course. Some criteria that you should consider in arriving at your case study are listed below:

    Your case study may be based on an actual company, or organization, using facts from research, or it may be fictional. In either case, you will have to make a number of assumptions about your case study’s organizational system (principles, policies and frameworks, processes, organizational structures, culture, ethics and behavior, information, services, infrastructure and applications, people, skills, and competencies) to complement the facts from your research.
    Your case study must require a nontrivial underlying data management capability as an essential part of its operation. The data management must be reasonably complex. One way to determine whether a data management capability is reasonably complex is to think in terms of entities and relationships for your case study’s model. A reasonable data complexity is at least ten entities and ten relationships. You may have to make assumptions to complement your facts.
    In your research, you may want to think in terms of use cases to define your data needs. Think of use cases as transactions that different end users will invoke when interacting with your case study’s database(s).
    Finally, you must submit your area of study to the professor via e-mail and have your professor’s approval that you may go ahead with your selection.

    Week 1 Tasks
    ACTUAL TASK TO HAVE DONE BY NOVEMBER 7TH 2018.

    Once you have selected your study area and case and have received approval from your professor, you may proceed to the next steps described below. Create a report that focuses on the data used to support the operation of your organization in your case study and answer the following questions.

    Conduct a brief, preliminary review of your case study’s organization. This review should include business mission and general purpose of data in support of mission-critical information systems.
    Produce detailed data requirements to address the data needs of your organization. The following are criteria that you can use to organize your requirements: adaptability, business and organizational policies, change control demands, compatibility, completeness, consistency, currency, ease of use, evolution, extensibility, functional features, maintainability/manageability, performance, reliability, scalability, security, standards, support, testability, and ubiquity. You will produce requirements in at least five of the above criteria.
    Develop a detailed data model as an EER diagram for your case study. Your model will include entity types with attributes, primary keys, and foreign keys as needed, and pertinent relationships with cardinality and integrity constraints as needed. Your data model will also come with a brief description for each entity type, attribute and relationship. Make sure to satisfy yourself that your data model is reasonably complex as explained in the guidelines under Background of Enterprise Data: Selecting your Case Study above.
    Submission Details:
    Create your report in approximately 5 pages in a Microsoft Word document and name your document SU_MIS6211_W1_A3_LastName_FirstInitial.doc.
    Submit the report to the Submissions Area by the due date assigned.
    Cite any sources you use using correct APA format on a separate page.

 

Subject Computer Technology Pages 5 Style APA

Answer

Challenges of Data Security Implementation

Data security implementation is the process that makes sure that every security measure according to the proposed plan is put in place effectively and completely. The process of implementing data security starts with conceptualizing and understanding the business requirements of an enterprise.

Both short and long-term goals of the enterprise have to be keenly evaluated in order to achieve effective data security implementation that is balanced. If not keenly handled, a failure in the implementation of data security can result in catastrophic security breaches. For instance, recently, Google+ (a social media platform owned by Google) was shut down due to a security breach. This was because of a failure in implementing the security standards that made third parties access private user’s information. (Lee, 2018).

According ‘Cybersecurity Frameworks and Foundational Security Controls: A Survey conducted by IT Security Professionals’, it was discovered that most organizations face substantial challenges when it comes to implementing data security frameworks (Watson, 2017). Based on a survey done by 319 IT security decision makers, the challenge was to 95% of the existing organizations (Watson, 2017). 

Failure to effectively implement security standards as defined in the plan can leaded to catastrophic results. Some of these results are irreversible and can completely bring down a well established enterprise. Security implementation should be consider a a top priority and an awareness should be increased to every individual in the enterprise.

 

References

Lee, D. (2018, October 8). Google+ shutting down after users’ data is exposed. Retrieved from BBC NEWS: https://www.bbc.com/news/technology-45792349

Watson, M. (2017, January 10). 95% of organizations face significant challenges when implementing cyber security frameworks. Retrieved from IT Governance: https://www.itgovernance.co.uk/blog/95-of-organisations-face-significant-challenges-when-implementing-cyber-security-frameworks

Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science48, 204-209.

Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.

Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?