logo

Security and Privacy Issues in Analytics - Dumnonia Corporation

Write a 2,500-3,000 word technology assessment report for Dumnonia corporation, including an implementation guide.

14 Pages3749 Words188 Views
   

Added on  2023-06-04

About This Document

This report discusses security and privacy issues in analytics at Dumnonia Corporation, an Australian insurance company. It explores the implementation of k-anonymity to protect confidential data and the technologies used for deployment. The report also examines the costs and areas of application of anonymity processes.

Security and Privacy Issues in Analytics - Dumnonia Corporation

Write a 2,500-3,000 word technology assessment report for Dumnonia corporation, including an implementation guide.

   Added on 2023-06-04

ShareRelated Documents
Running head: SECURITY AND PRIVACY ISSUES IN ANALYTICS
Security and Privacy Issues in Analytics
(Dumnonia Corporation)
Name of the student:
Name of the university:
Author Note
Security and Privacy Issues in Analytics - Dumnonia Corporation_1
1SECURITY AND PRIVACY ISSUES IN ANALYTICS
Executive summary
Dumnonia Corporation is a very popular insurance company situated in Australia. The company
sells different insurances. It includes medical, death and travel insurances. It has held various
medical data for customers. This is highly confidential, and the company has required to share-
person to person records so that they can find out who gets subjected to data that are not found out. It
has also released records adhering to k-anonymity. It shows that the document issued comprises if k-
1 additional records for releasing values. These values are no different over sectors that are being
found to appearing external data ever. It is also found out that methods of k-anonymity have been
dealing with problems of privacy that are acquired by Dumnonia. K-anonymity method has ensured
preservations of data and processes that are to be considered by Dumnonia. Further, the report is
useful to find out operational and related issues and expenses for implementing k-anonymity.
Moreover, the report also highlights whether the costs are once-off or ongoing. At last, the report
also examines the areas of applications of anonymity process that is helpful to share data sets taking
place between different organisational entities and governments with the current organisation at
Australia.
Security and Privacy Issues in Analytics - Dumnonia Corporation_2
2SECURITY AND PRIVACY ISSUES IN ANALYTICS
Table of Contents
1. Introduction:......................................................................................................................................3
2. Discussion on organizational drivers for Dumnonia:........................................................................3
3. Understanding organisational drivers at Dumnonia related to the deployment of k-anonymity:......4
4. Analysis of Technology Solution:.....................................................................................................6
5. Technologies utilised to deploy k-anonymity as a model:................................................................7
6. K-anonymity Implementation Guide:................................................................................................8
7. Conclusion:......................................................................................................................................10
8. References:......................................................................................................................................11
Security and Privacy Issues in Analytics - Dumnonia Corporation_3
3SECURITY AND PRIVACY ISSUES IN ANALYTICS
1. Introduction:
Different issues regarding privacy and security are found to be originating from controlling,
storing and examining data that are gathered from probable and available sources. In this study, a
demonstration is made on organisational drivers that related to implementing k-anonymity of the
organisation named Dumnonia. Here technologies are outlined, and different methods to achieve k-
anonymity for protecting privacies are also investigated.
2. Discussion on organizational drivers for Dumnonia:
Different cyber-security threats are been faced through big-data systems of the company.
Specifically, Ransomware attacks has left deployment of big data that is subjected towards different
Ransom demands. Further, there are issues regarding unauthorized users who have been gaining
access for big data that is gathered through organization and then selling those precious information.
Vulnerability of the system gives rise to fraud information generation (Prasser et al. 2014).
Moreover, attackers are deliberately undermining quality of big data analysis. It is done by
fabricating information and placing those to various systems of big data systems. Further corrupting
of information in medical department of the Australian company created reports. This was
comprised of different mistaken information that has been trending. Moreover, a distinct lack of
perimeters of cybersecurity is also found for big data. These have ensured that all the points towards
entry and exit for big data systems are been secured. Failure to perimeter-based security is comprised
of networks of big data. This has also been admitted that challenges in cybersecurity and different
other individuals have been aware of those concerns. Besides, there are problems regarding how to
deploy encryptions within Dumnonia’s systems of big data (Dubovitskaya et al. 2015). Apart from
this, encodings from big systems have also been involved in calculating and processing a high
Security and Privacy Issues in Analytics - Dumnonia Corporation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and Privacy Issues in Analytics - Dumnonia Corporation
|13
|3421
|360

Security and Privacy Issues in Analytics
|19
|5166
|277

Secondary and Primary Issues in Analytics - Dumnonia Corporation
|16
|4692
|53

Secondary and Primary Issues in Analytics - Dumnonia Organization
|15
|4341
|418

Security and Privacy Issues in Analytics
|10
|2861
|187

Privacy/Security Issues Report for the Victorian Privacy Commissioner Project
|9
|2616
|418