Business Analytics Report: Data Management and Security at Google

Verified

Added on  2020/10/22

|8
|2052
|300
Report
AI Summary
This report provides an in-depth analysis of data management practices within Google. It begins with an introduction to business analytics and the critical role of data management, followed by an overview of Google's data storage and security infrastructure. The report details Google's methods for securing user data, including data encryption, access control mechanisms, protection against threats, and physical security measures. It then examines the impacts of data management on Google's business operations, such as reputation building and disaster recovery. The report also outlines the requirements Google must meet to maintain effective data management, including cloud updates, data protection expertise, and specific skills related to data storage security policies, access control, encryption, data loss prevention, network security, endpoint security, redundancy, and backup and recovery. The conclusion emphasizes the importance of data management and security for business organizations. The report is a valuable resource for understanding Google's approach to data management and its implications for business analytics.
Document Page
Business Analytics
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................2
TASK 1 (1500)................................................................................................................................3
1. Data management:..............................................................................................................3
2. Background to data storage and security in Google:..........................................................4
3. Analysis of impacts, requirement to meet criteria and expected skills:.............................5
CONCLUSION................................................................................................................................7
REFRENCES...................................................................................................................................8
Document Page
INTRODUCTION
Business analytics includes technologies abilities, usual procedures and technical skills
for regular constant analysis and observation of subsequent performance of business tin order to
establish monitoring system and planning framework. It emphasises towards developing an
observation process and analysing performance of business by using various statistical and
scientific methods (Chen, Chiang and Storey, 2012). For business analytics, data management is
vital aspect for a business organisation and ensuring proper management of data assist
organisation to conduct business analytics effectively. This report describes various major
aspects of data analytics such as definition of data management, background, required skills for
data management and business skills, Statistics techniques and decision tree in the context of
Google.
TASK 1 (1500)
1. Data management:
Data management refers to administrative process that includes obtaining, approving,
classifying, safeguarding and transforming significant data in order to provide proper access of
data, reliable data and timely data to users. For establishing proper control and providing a
framework for decision making, entities or organisations are using data at a large scale. In order
to understand large amount of data or complex data that organisations are collecting from
different sources companies are moving towards platforms related to data management solutions
(Acito and Khatri, 2014). Data management solutions assists in classifying, safeguarding and
transforming vital data. Data management simply is an organization's management of
information and data in order to secure and structured access and storage. Data management
functions include development of data governance policies, segregation and storage, analysis and
architecture, data security and data source identification, database management system (DMS)
integration. Data management Includes various techniques that expedite and ensure data control
and flow from development to processing, addition, deletion and utilization. Data management is
carried out by using a adhesive fundamental infrastructure of various technological resources
and a governing structured that characterize administrative processes used throughout whole
processing cycle. Data management is necessary because data and informations of organization
Document Page
is very precious resource. Organisation should spend time and resources for gathering data and
business excellence.
2. Background to data storage and security in Google:
For ensuring proper storage and security Google has secure data storage system. Google
has huge data storage centers all over the world. These data center stores all data uploaded by
users on google and data or information provided by company through its search engine. In order
to protect data of millions user company has both physical and technical security. Secure data
storage is necessary for business organizations which are mainly concerned with sensitive data
to avoid data loss and for uninterrupted activities and operations in entity. Following are the
major way through which Google secures data and information of its user, as follows:
Data Encryption: Data stored in data centres by google is encrypted. In case of hacking
of data it is very difficult to decode encrypted data. Company is using latest encryption
methods to encrypt data and a process is introduced by company that each and every
terminal through which data is transferred or received, would be secured by multiple
encryption in order to prevent intruders (Cosic, Shanks and Maynard, 2012).
Access control mechanism at each data storage device/software: Company has strong
access control mechanism in order to secure data or information. Each access point is
secured in a way that no one can access data without proper authentication and
authorisation levels are increased to enhance the data security. These authorisation
levels are decided by owners or founders of company and also an contract of data
security signed by these authorised persons.
Protection against viruses, worms and other data corruption threats: Some times data
can be affected by viruses, worms and other technical threats. In Google data is stored in
data centers after scanning and any identified threats or viruses are removed by
troubleshooting programs and antivirus programs.
Physical storage device and infrastructure security: Company has high level of physical
security at data centers in order to safeguarding of devices and infrastructure. Physical
security has same importance as non physical security. Role of responsible person is
decided in order to ensure proper security and in case of any damage such person would
be responsible for acts.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Enforcement and implementation of layered/tiered storage security architecture:
Security at data centers are divided in different layers to define and ensure responsibility
of concerned personnels. Google has divided security in different layers which acts as
internal check for security and back plan. Main purpose of dividing security into levels
is that in case of any failure in one level of security and alternate plan or layer can
support other layer.
Carry out a data risk assessment: Google conducts regular risk assessments for
identification of any probable hazards to organisation’s data. Under risk assessment
procedure company analyse all possible risk identified such find reason for any sudden
power cut.
3. Analysis of impacts, requirement to meet criteria and expected skills:
Google have a wide impact of data management on its business operations as well as on
other activities (Hofmann and Klinkenberg, 2013). Followings are the some impacts of data
management with viewpoint of data security and storage as follows:
Helps in build reputation: A high data security and data storage brings a upliftment in
the reputation of a google, because consumers attracted more towards the organization
due to high data security and storage. They have no fear to loose their data in any
contingency situation.
Helps in maintaining records: A well managed data provides a great help in
maintaining proper records of the organization. A secure and stored data can be used any
time when it is required.
Assists in Disaster recovery system: Properly managed data provides a framework for
Disaster recovery like loss of data by cyber attacks, hacking and other cyber related
issues. Backup through data provided under data management is easy and compatible
with security system.
Organization have required to do something as follows for meeting requirements of
Google's data management:
Updating in google cloud: Google have to do the proper and time to time update in the
existing version of google cloud. Which provide the safe and secure updated version to
consumer and enhance their trust regarding google products and services.
Document Page
Data protection expertise: Google have to hire the data security and protection experts
whop have deep knowledge of data management. Google employs security and privacy
professionals that include some of the world’s foremost experts in information,
application, and network security. This expert team is tasked with maintaining the
company’s defence systems, developing security review processes, building stronger
security infrastructure, and precisely implementing Google’s security policies. Google
also employs an extensive team of lawyers, regulatory compliance experts, and public
policy specialists who look after privacy and security compliance for Google Cloud.
These teams work with customers, industry stakeholders, and supervisory authorities to
ensure our G Suite and Google Cloud Platform services can help customers meet their
compliance needs (Holsapple, Lee-Post and Pakath, 2014).
Skills are expected in order to implement the data security and data storage in google:
Followings are the various skills which required to implement the respective perspectives:
Skill related to framing of data storage security policy: Company should frame
appropriate policies that clearly define various levels related to security for data or
information company has because conman data that require less security than vital and
sensitive data, and company require considerable security structure or model, processes
and method to establish proper security system on data center. Framed policies should
also contain informations on security structure that is necessary for security on storage
equipments.
Access control skills: Company is required to establish role-based access control in order
to secure data storage system and a multi-factor authorisation is also significant.
Administrators in company must be definite to modify any passwords on storage
equipments.
Encryption: It is an set of activities which includes encoding a message or information
in such manner that only authorized person or individual can access it and those who are
not authorized cannot access it. Encryption dose not stops interferences, but prevent
intelligible data or content to a potential interceptor. In company administrator of data
security and storage should enhance their sills of data encryption to encrypt data in
terminals and other part of storage system. Administrator of data security and storage also
required to implement a secure key management systems in order to trace their
Document Page
encryption keys. Under encryption process information or message called as plaintext, is
encrypted using an encryption algorithm that can be read only if decrypted. In case of
technical reasons, encryption process normally uses a pseudo-random encryption key
obtained through algorithm.
Data loss prevention: Encryption alone doest not ensure proper security in company.
Business organizations required to frame data loss prevention solutions that assists in
prevention of cyber attacks.
Strong network security: In data centers storage structure don't exist in a vacuum it
should be encompassed with powerful network security systems like firewalls, intrusion
detection systems, anti-malware protection, advanced analytics and machine learning
based security solutions and security gateways. These techniques prevent most hacking
activities in data centers of Google (Laursen and Thorlund, 2016).
Strong endpoint security: Company should ensure strong security on all computers,
smartphones and other devices in company and these endpoints specially mobile devices,
act as main loophole in an organization's cyber security system
Redundancy: Redundant storage, including RAID technology, not only helps to improve
availability and performance, in some cases, it can also help organizations mitigate
security incidents.
Backup and recovery: Sometimes malware, bugs, ransomware etc. affects entities data
and corporate networks so badly that only way to recover such data or information is to
restore from backups. Storage managers required to setup backup systems plans to
recover such data and for disaster recovery purposes, and also establish proper security in
backup systems.
CONCLUSION
From above report it has been concluded that in business analytics data management and
statistical techniques are vital aspect of business organisation. Data management has its own
importance for entities and data security is important in order to prevent data loss or theft.
Business organisation should establish proper control over security control mechanism.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFRENCES
Books and Journals
Acito, F. and Khatri, V., 2014. Business analytics: Why now and what next?.
Chen, H., Chiang, R. H. and Storey, V. C., 2012. Business intelligence and analytics: From big
data to big impact. MIS quarterly. 36(4).
Cosic, R., Shanks, G. and Maynard, S., 2012, January. Towards a business analytics capability
maturity model. In ACIS 2012: Location, Location, Location: Proceedings of the 23rd
Australasian Conference on Information Systems 2012(pp. 1-11). ACIS.
Hofmann, M. and Klinkenberg, R. eds., 2013. RapidMiner: Data mining use cases and business
analytics applications. CRC Press.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]