• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Today's competitive global business environment, understanding and managing enterprise wide information is crucial for making timely decisions and responding to changing business conditions.

Extracts from this document...

Introduction

1. Introduction Today's competitive global business environment, understanding and managing enterprise wide information is crucial for making timely decisions and responding to changing business conditions. Many companies are realizing a business advantage by leveraging one of their key assets - business data. There is a tremendous amount of data generated by day-to-day business operational applications. In addition there is valuable data available from external sources such as market research organizations, independent surveys and quality testing labs. Studies indicate that the amount of data in a given organization doubles every five years. Data Warehousing has emerged as an increasingly popular and powerful concept of applying information technology to turn this huge islands of data into meaningful information for better business decisions. 1.1. Data Warehousing A data warehouse is a subject-oriented, integrated, time-variant, non-volatile collection of data in support of management decisions. * Subject-oriented means that all relevant data about a subject is gathered and stored as a single set in a useful format; * Integrated refers to data being stored in a globally accepted fashion with consistent naming conventions, measurements, encoding structures, and physical attributes, even when the underlying operational systems store the data differently; * Non-volatile means the data warehouse is read-only: data is loaded into the data warehouse and accessed there; * Time-variant data represents long-term data--from five to ten years as opposed to the 30 to 60 days time periods of operational data. Data warehousing is a concept. It is a set of hardware and software components that can be used to better analyze the massive amounts of data that companies are accumulating to make better business decisions. Data Warehousing is not just data in the data warehouse, but also the architecture and tools to collect, query, analyze and present information. 1.2. Concepts 1.2.1. Operational / informational data: Operational data is the data you use to run your business. This data is what is typically stored, retrieved, and updated by your Online Transactional Processing (OLTP) ...read more.

Middle

Hackers fall quite specifically into these categories, in order of increasing threat: * Security experts * Script kiddies * Unemployed adults * Ideological hackers * Criminal hackers * Corporate spies * Disgruntled employees 2.3. Vectors that Hackers exploit There are only four ways for a hacker to access network, by: * connecting over the internet * using a computer on your network directly * dialling in via a Remote Access Server (RAS) * connecting via a non-secure wireless network There are no other possible vectors and this small number of possible vectors defines the boundaries of the security problem quite well. 2.4. Hacking techniques Hacking attacks progress in a series of stages, using various tools and techniques. A hacking session consists of the following stages: * Target selection o DNS lookup o Network address scanning o Port scanning o Service scanning * Information gathering o SNMP data gathering o Architecture probes o Directory service lookups o Sniffing * Attack o Denial of service o Floods o Forged e-mails o Automated password guessing o Trojan horses o Buffer overruns o Source Routing o Session Hijacking o Man-in-the-middle attacks The hacker will attempt to find out more about your network through each successive attack, so the stages above actually feedback into the process as more information is gathered from failed attacks. 3. Computer Security 3.1. What is Computer Security? A computer security system protects buildings, terminals, printers, CPUs, cable, and other hardware, and software in an organization. A computer security system includes hardware, software, procedures, and personnel that collectively protect a computer system and keep intruders and hackers at bay. Computer security is broken down into three important aspects: 1) A secret system must not allow information to be disclosed to any one who is not authorized to access it. In highly secure government agencies, secrecy ensures that only the users that are supposed to have access be given that access. ...read more.

Conclusion

* Data encryption - data encryption transforms original information called plain text or clear text into transformed information, called cipher text or cipher, which usually has the appearance of random, non-readable data. The transformed information is called the cryptogram. The rules selected for encryption, known as the encryption algorithm, determine how simple or how complex the transformation process should be. (Hossein Bidgoli(1999), Handbook of Management Information Systems, Academic Press) 3.3.3. Firewalls * Packet-level firewalls - Analyze incoming and outgoing packets at the network and transport layers and filter them based on the source and destination IP addresses * Proxy firewalls - Establish the connection with the remote host, hiding and protecting individual computers on the network behind the firewall by acting on their behalf and making all packet-forwarding decisions. * Stateful inspection firewalls - Work at the network layer, tracking each connection traversing the firewall to make sure it is valid. By examining not just the header information but also the contents of a packet up through the application layer, the firewall can make filtering decisions based on context that has been established by prior packets. (Marty Jost and Michael Cobb(2002),IIS Security, The McGraw-Hill Companies.) 4. Conclusion Data Warehousing provides the means to change raw data into information for making effective business decisions--the emphasis on information, not data. The data warehouse is the hub for decision support data. A good data warehouse will... provide the RIGHT data... to the RIGHT people... at the RIGHT time: RIGHT NOW! While data warehouse organizes data for business analysis, Internet has emerged as the standard for information sharing. So the future of data warehousing lies in their accessibility from the Internet. Successful implementation of a data warehouse requires a high-performance, scaleable combination of hardware and software which can integrate easily with existing systems, so customers can use data warehouses to improve their decision-making--and their competitive advantage. Therefore, in order for effective use of data warehousing, good security measures are to be implemented to protect the systems to protect data against various kinds of threats. 5. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    This is all done in a notebook. 1.3. Describe the problems The current system has a lot of forms, some containing the same data or information. These have to be hand written by Luki which can take a long time to complete fully.

  2. Computing Project

    var FMLogin: TFMLogin; implementation uses Umenu; {$R *.dfm} procedure TFMLogin.BtnLoginClick(Sender: TObject); begin ADOUandPSetup.Open;//open the adouandpsetup if ADOUandPSetup.locate('username',(edusername.text),[]) and //if the contents of the field in the edusername is identical to that in the usernames and password table in the field named 'usernames' and ADOUandPSetup.locate('password',(edpass.text),[])// if the contents of the field

  1. The impact of the availability of electric information on individuals and society

    Therefore doctors can concentrate more on other patients, who might be much more sick than you are.

  2. Stace & Dunphy (2001) identify five dilemmas of change

    a more general trend in industrial relations systems towards what may be called a "multilevel model of regulated autonomy", involving social partners in co-producing rules at most interlinked levels of work regulation, from the European level to the workplace one.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    * If one breaks down then a wider space is not being covered. If a stationary one broke down then there would be only a little space that wouldn't be covered. Fireproof Doors and Gas looding Riverside also uses fireproof doors to prevent damage to the computer systems in case of a fire.

  2. Computer Architecture

    Cache (Level 1 and Level 2) Cache is a portion of memory made of high-speed static RAM (SRAM). As a result Cache memory is much more efficient than the main memory (RAM) which is dynamic RAM (DRAM) that runs slower but also cheaper.

  1. Discuss the relationship that exists in the UK between the legal rules that govern ...

    may just mean that the company has a different way of dealing with the matter, shareholders and stakeholders have the right to question any explanations of non compliance if they don't sound convincing. A revised combined code was issued in January 2003 which replaced the old Combined Code which came into use on 1 November 2003.

  2. Ilford Cricket Team Data Analysis Project.

    use the system to analyse data from a match and pass the information to his captain to act upon it. The coach will need full access to the system because he will need to input information into every part of the system.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work