Hello, the paper is ready and well done. It was great working with you. All the best and welcome again.
Running Head: COMPUTER SCIENCE
Security Architecture and Design
Question 1: Business Analytics Logical Data Flow Diagram
Mainly, the figure shows the business analytics logical data flow diagram from business
analysis architecture. In that regard, the data elements in this diagram should be secured in line
with enterprise components that are not integrated directly with the intelligence system and
business analytics. The architecture used in the data flow diagram should enhance the protection
of data elements to access and interact with other components.
The first approach of gathering data for the business analytics system is by storing the
credentials for each of the secured data components. Thus, the storage of data components in a
secure manner will enhance the accessibility of data records that are protected by themselves.
The approach will be a significant thing that the business analytics system will have the power
and the right to gather data from various sources (Aleryani, 2016). Secondly, the analytics
system will gather data from various sources in a secure manner to prevent other users from
logging into the system. However, the approach will expose analytic data systems into a difficult
situation when storing the credentials to a secure place. Thus, if it is possible to log into the
system, then it will be easy to gather data from these sources, thereby allowing business analytics
to perform almost any of the operations using business analytics logical flow diagram.
The analysis system used in gathering data from various sources is another fundamental
15 Million Students Helped!
Sign up to view the full answer