Kick Off Your Assignment for Just $10* Get Started
  • Subject Name : Management Essay


INPUTS TO DECISION MAKING

Table of Contents
TOC o 1-3 h z u 1. Definition of the problem PAGEREF _Toc3889767 h 32. Process mapping PAGEREF _Toc3889768 h 33. Annotation and decision issues PAGEREF _Toc3889769 h 44. Solution PAGEREF _Toc3889770 h 4Reference List PAGEREF _Toc3889771 h 5

1. Definition of the problemImplementation of database systems in business for centralizing various activities of manufacturing as well as the delivery of products and services, often encounter privilege and access based issues. Maintaining and providing proper access to the users of the applications or website interfaces include a number of problems such as privileged elevation, legitimate usage abuse and unauthorised access to third party users (Singh, Tripathi amp Mishra, 2016). This, therefore, acts as a major part of the security issues which can make the whole system vulnerable to external attack and data loss. Unauthorised use of database platforms in businesses also occur through simple SQL injection codes and can also cause a denial of services to actual registered users working in the company.
2. Process mappingThe process mapping technique allows a person to view the different processes involved in the database management and access system within a company database. The positioning of the separate activities in different stages of access enables the user to identify the areas where the issues are occurring while deployment of the database systems (Yu et al., 2016). The process map for the authentication related issue faced by businesses can be represented in the following manner.
Data warehouse
Knowledge database
Inputs
Money
Technicians
Time
Equipments and tools
User interface
Knowledge inputs
Financial data
Sales data
Internet access
Access to databases
Model management
User
User
Problem
Uncontrolled access
External attack
External attack
Solutions
Query based controls systems SecureSphere
Lack of protection mechanisms

3. Annotation and decision issuesInput
The Inputs included in the centralised Information Technology Software or interface include money, technicians for development and maintenance, development tool kits and time as vital resources.
Information
Required information about the functioning and access of the database is acquired from the managers (Blanco-Mesa, Merig amp Gil-Lafuente, 2017). However, authentication and access denial issues are mainly caused by a lack of information about potential hazards and improper security measures.
Knowledge transfer
The excessive rights to all parts of the database are the main causes behind the privilege based issues arising in business database management systems. Improper monitoring of resources is not added as added features in the software.
Decision issues
The identifiable decision issues in the information system applications include an absence of control over access by the authorities and in most cases, there are no dedicated intrusion prevention systems (IPS) along with other query-level access control mechanisms implemented.
4. SolutionThe solutions to the increasing privilege and access issues in the business software systems include an application of the principle of least privilege which is to be implemented at the database levels. Such measures can prevent SQL injection and other code command based attacks to the systems and therefore minimise threats of external intrusion. Encrypting the authentication procedure is not enough for counteracting potential threats and there legitimate query-based access control systems such as SecureSphere can be used for protective measures.

Reference List
Blanco-Mesa, F., Merig, J. M., amp Gil-Lafuente, A. M. (2017). Fuzzy decision making A bibliometric-based review.Journal of Intelligent amp Fuzzy Systems,32(3), 2033-2050. Retrieved from http//diposit.ub.edu/dspace/bitstream/2445/108220/1/665543.pdf Retrieved on 25th February 2019
Singh, M. S. P., Tripathi, U. N., amp Mishra, M. (2016). Multilevel Hashing based Access Control for Authentication and Security in Relational Database Management System.International Journal on Recent and Innovation Trends in Computing and Communication,4(2), 80-84. Retrieved from https//ijritcc.com/index.php/ijritcc/article/download/1766/1766 Retrieved on 15th February 2019
Yu, D., Li, D. F., Merig, J. M., amp Fang, L. (2016). Mapping development of linguistic decision making studies.Journal of Intelligent amp Fuzzy Systems,30(5), 2727-2736. Retrieved from https//content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs2026 Retrieved on 23rd February 2019

Hey MAS, I need Assignment Sample of

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts

Highlights

  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free
  • Let's Start

Get
500 Words Free
on your assignment today

Browse across 1 Million Assignment Samples for Free

Explore All Assignment Samples

Request Callback

My Assignment Services- Whatsapp Get Best OffersOn WhatsApp

Get 500 Words FREE