Data Governance and Management: An Overview of ICT Services

Verified

Added on  2025/04/23

|8
|1208
|261
AI Summary
Desklib provides past papers and solved assignments for students. This report explores data governance and management.
Document Page
Contents
Introduction:....................................................................................................................................2
Define different terminologies:........................................................................................................3
1) Machine to Machine terminology.........................................................................................3
2) Big Data Analytic.................................................................................................................3
3) Cloud computing and cloud security....................................................................................3
4) Occupational fraud................................................................................................................4
5) Botnets and spare phishing...................................................................................................4
6) Social engineering and BYOD.............................................................................................4
Differentiate among 3G, 4G and 5G................................................................................................5
Study Textbook ("U.S. Military Uses Data Mining Spy Machine for Cultural Intelligence”).......6
1) What is Nexus 7?..................................................................................................................6
2) How does data mining help I2O achieve its mission?..........................................................6
3) What are Nexus 7’s data sources?........................................................................................6
4) According to DARPA, what benefits does Nexus 7 provide that could not be realized
without it?....................................................................................................................................6
Conclusion:......................................................................................................................................7
References:......................................................................................................................................8
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction:
This assessment is defining about data governance and data management which will elaborate
Different terminologies like Machine to machine, big data analytic, cloud computing, botnets
and spear phishing, occupational fraud, cloud security, Social engineering, and BYOD. It will
describe 3G, 4G, and 5G. It will also describe the book “U.S Military Uses data mining Spy
Machine for cultural Intelligence”. In this book, it will elaborate nexus 7, How Data mining help
to achieve missions, what are different sources in Nexus 7, what are the benefits of Nexus 7
according to DARPA. These points will clear the impact of new and latest ICT services in an
organization.
2
Document Page
Define different terminologies:
1) Machine to Machine terminology.
M2M terminology describes various interactions among several machines, available in all over
the world and connected to each other. This technique allows these machine to gather data from
all over the world and share with other connected machines.
M2M technology used in several areas these are:
a) Help in travel from one place to another.
b) Help human to stay healthy and fit by providing a diet chart according to human’s health.
c) Smart houses provide control of temperature, door and window remote lock. Etc. (Clark,
2016).
2) Big Data Analytic.
Big data analytics helps in business like in revenue opportunities, effective marketing, enhancing
operation efficiency, better customer services. It includes prediction in business which is known
as business intelligence. It predicts the future for particular business-like share market, Revenue
etc.
Big data systems were very famous in a different business in previous time to identify a huge
amount of data but cloud platforms like Amazon web services, Microsoft Azure has made their
easier setups to manage their huge amount of data in cloud.
Example:
In health Industry.
In government industry
In Media and entertainment industry.
In weather patterns (Rouse, 2019)
3) Cloud computing and cloud security
Cloud computing helps to transfer IT services. Resources are retrieved from IT services with the
help of internet. This technique is done with the help of web-based applications. It is available
3
Document Page
everywhere all over the world. It provides the facility to store and access data remotely with the
help of internet.
Cloud security is protecting the data, files which are present in cloud platform. Cloud security
includes DR/BC planning, Identify management, Availability, compliance, data security,
governance (FRANKENFIELD, 2019).
4) Occupational fraud.
Occupational fraud is the utilization of one’s profession in self-betterment with the help of
international misapplication of employing organization’s assets.
It has some categories in this:
Corruption: A scheme which is unhelpful for a person and he or she get influenced by
others and help him or her to get benefits.
Assets thieving: Misuse of assets of any organization.
Illegal financial reporting: manipulation of an organization’s financial reports, which
make it less or more profitable (Berkman 2018).
5) Botnets and spare phishing
Botnets are kind of group of devices which are connected over internet, these are PCs, servers
and mobile devices. These devices are affected by malware software. This attack is totally
hidden from user. Botnets are used to send email spam etc.
Spare phishing is also known as mail-spoofing attack. This attack target organizations or
individuals to crack sensitive data from devices for financial purpose (Rouse, 2019).
6) Social engineering and BYOD
Centralize planning to manage a social change and adjust future development. This is totally
non-technical. It is the way of cracking information security. It applies duplicity for the single
purpose of collecting information, false. Several schemes may use:
Advantage of human kindness.
Searching for sensitive data which is not in the computer system.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Gaining password with the help of different methods.
BYOD is Bring your own devices, it is also known as Bring your own technology (BYOT).
This the policy applied by organization on employee to bring their own devices at their
workplace to get their work done in fast and easy mode.
Differentiate among 3G, 4G, and 5G.
Table 1: difference 3G, 4G, and 5G
Source: (Majeed, 2015)
Category 3G 4G 5G
1. Generation Third Generation Fourth Generation Fifth Generation
2. Technology UMTS (Universal
mobile
telecommunications
system.). It can
transfer data at a
faster rate compared
to 2G. video, email,
downloading and
image sharing is
included in this
High speed, high
quality, and capacity
to users Multimedia
and internet over IP.
MIMO (Multiple
inputs multiple
outputs) OFDM
(Orthogonal
frequency division
multiplexing) has
included in this.
Technologies looking
for massive MIMO
3. Frequency
range
Speed is 2Mbps and
mobile speed is 384
kbps. 21.6 Mbps is
for HSPA.
1800Mhz frequency
band. When device is
moving, frequency is
100 Mbps or 1Gbps.
Supposing for
10Gb/s
4. Cost Data transmission at
Lower Cost
Lower cost for data
transmission.
Not decided.
5
Document Page
Study Textbook ("U.S. Military Uses Data Mining Spy Machine for Cultural
Intelligence”)
1) What is Nexus 7?
U.S military use Nexus 7 as spy machine, this is developed by Defense Advanced Research
Projects Agency which is known as (DARPA). U.S. military used this nexus 7 in Afghanistan to
study the underground activity in Afghan society.
2) How does data mining help I2O achieve its mission?
Data mining helps to achieve mission by following model in which certain steps are followed
like:
1) Understanding of business.
2) Understanding of data.
3) Data preparation.
4) Modeling.
5) Evaluation.
6) Deployment.
It follows some technique which is an association, classification, clustering, and regression. It
helps in understanding user or customer and earn profit in business.
3) What are Nexus 7’s data sources?
They use 100’s of existing data sources.
One imagines there was some heap of secrete data which can be utilized in future.
4) According to DARPA, what benefits does Nexus 7 provide that could not be
realized without it?
The headquarters in the US tackle the bulk of the data crunching. These data, are handle by great
computer scientist side-by-side, provide useful understanding in ways that might not have
otherwise been realized.
6
Document Page
Conclusion:
This document has completed its survey over data governance and data management. It has told
about different terminology like M2M, Big data, Cloud computing and security, occupation
fraud, social engineering. It has also told the differences among 3G, 4G, and 5G. It has also told
about the use of Nexus 7 in U.S military.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References:
Clark, J. (2016). What is M2M technology? Retrieve From
https://www.ibm.com/blogs/internet-of-things/what-is-m2m-technology/
Rouse, M. (2019). Big data analytics. Retrieve From
https://searchbusinessanalytics.techtarget.com/definition/big-data-analytics.
FRANKENFIELD, J. (2019). Cloud Computing. Retrieve From
https://www.investopedia.com/terms/c/cloud-computing.asp.
Berkman, O. (2018). The 3 Major Types of Occupational Fraud and How to Prevent
Them. Retrieve From https://peoriamagazines.com/ibi/2007/aug/occupational-fraud-and-
abuse
Rouse, M. (2019). Botnets and spear phishing. Retrieve From
https://searchsecurity.techtarget.com/definition/spear-phishing
Majeed, A. (2015). Comparative Studies of 3G, 4G & 5G Mobile Network & Data
Offloading Method a Survey. Retrieve From
https://www.researchgate.net/publication/277817220_Comparative_Studies_of_3G_4G_
5G_Mobile_Network_Data_Offloading_Method_a_Survey

8
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]