Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.
Respond to the following in a minimum of 175 words:
You are an IT leader. Within your organization, you have many dedicated employees who argue they need greater access to company data to do their jobs.
Discuss how you would evaluate this concern for its legitimacy and what official organizational stance you would take in addressing such requests. What big data tools and methodologies would you use to integrate big data systems within the organization, and why?
In your responses to your peers, address any thoughts you have on how the various big data tools can be used in an organizational setting.
Reply to at least 2 of your classmates. Be constructive and professional in your responses.
In this new clouded era the implications of vulnerabilities are magnified. The cyber war is relevant and for this reason every business must consider if they are responsible for data that may impact a population or critical infrastructure. I believe everyone of my employees are trust worthy since I know them, I do not know the people they keep company with and for this reason we have to implement a reasonable system of layers of counter infiltration and early warning. The best practice is isolation and compartmentalization. I would treat access requests on a case by case basis and employ someone to certify user access and also review access every year or as needed. Something else to consider is to make every employee a security officer in theory and encouraging employees to say something if you see something.
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009, November). Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security (pp. 85-90). ACM.
To address the employees concern about granting greater access to the company’s data, I will start by defining their roles and studying their current data access and privileges as different departments may have different objectives that require varying data types, rights, and purposes. After a thorough review of their roles and current data access and privileges, I will grant their request for greater access base on their role and duties to perform. In an organization, employees data access and privileges are often based on their role and duties. This will prevent unauthorized access thus enabling data security and integrity. To integrate big data within the organization, I will deploy Hadoop. Hadoop is a framework for storing and processing a large amount of data sets in a distributed computing environment. It can store and distribute very large data sets across hundreds of servers that operate in parallel. Unlike traditional relational database systems (RDBMS) that can’t scale to process large amounts of data, Hadoop enables businesses to run applications on thousands of nodes involving thousands of terabytes of data. Then run ETL(extract, transform, load) to blend data from multiple sources. Advanced ETL tools can load and convert structured and unstructured data into Hadoop. During this process, data is taken (extracted) from a source system, converted (transformed) into a format that can be analyzed, and stored (loaded). The reason for deploying Hadoop is because of the following;
Hadoop is Scalable, Cost effective as it offers a cost-effective storage solution for big data, Flexible because it enables businesses to easily access new data sources and tap into different types of data (both structured and unstructured) to generate value from that data, Fast and Resilient to failure