Lecture Business intelligence - Chapter 10: The future of business intelligence

Lecture Business intelligence: Practices, technologies, and management – Chapter 10: The future of business intelligence. This chapter presents the following content: Insuring the security of internal and external information, creating security safeguards for corporate data, future directions for BI, holy grail in analytics, mobile applications for BI | Chapter 10: The Future of Business Intelligence Introduction Insuring the security of internal and external information Creating security safeguards for corporate data Future directions for BI (Web and Enterprise ) Holy Grail in analytics Mobile applications for BI Technologies, like those used for real-time streaming data analytics Security Standards for Corporate Data Data/Information, both structured/unstructured are building blocks of the organization Data/Information have gone digital Data theft is increasingly becoming common in an organization Theft detection can be done by banks monitoring unusual data transactions Detection of data breach should be reported to Secret Services Understanding the Possible Vulnerabilities in the Data Chain Card readers could be hacked at payment counters Data lines can be tapped while in transmission Data in the company’s software might be diverted to remote location due to presence of malicious code Brand-restoration strategy has to be . | Chapter 10: The Future of Business Intelligence Introduction Insuring the security of internal and external information Creating security safeguards for corporate data Future directions for BI (Web and Enterprise ) Holy Grail in analytics Mobile applications for BI Technologies, like those used for real-time streaming data analytics Security Standards for Corporate Data Data/Information, both structured/unstructured are building blocks of the organization Data/Information have gone digital Data theft is increasingly becoming common in an organization Theft detection can be done by banks monitoring unusual data transactions Detection of data breach should be reported to Secret Services Understanding the Possible Vulnerabilities in the Data Chain Card readers could be hacked at payment counters Data lines can be tapped while in transmission Data in the company’s software might be diverted to remote location due to presence of malicious code Brand-restoration strategy has to be launched Notification to customers and setting up toll-free lines Offering credit-monitoring services Loyalty discounts Certain Recommended Safeguards in Keeping the Organization Data Secure Appoint a high-ranking corporate official in charge of information protection Develop a comprehensive strategy for risk management Develop policies, procedures, and training protocols Become fully PCI compliant; PCI = Payment Card Industry Data Security Standard Principles and Requirements Build and maintain a secure network Protect cardholder data Maintain a vulnerability management program Implement strong access control measures Regularly monitor and test networks Maintain an information security policy Protection of Cardholder Payment Data PCI Data Security Standard Social Media- WEB It was coined by Tim O’Reilly in 2004 Definition: A living term describing changing trends in the use of World Wide Web technology and web design that aims to enhance creativity, information sharing, .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.