ITS 835 UC Week 4 Writing Enterprise Risk Management Paper

User Generated

cnaqhcenfunagutb

Writing

ITS 835

University of the Cumberlands

ITS

Description

Subject-  Enterprise Risk Management (ITS-835-A02) -

Week 4 Research Paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?


Explanation & Answer:
6 Pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

1

Data Science & Big Data Analytics

Name
Institution Affiliation
Date

2
Table of Contents
Background ................................................................................................................................................... 3
Data handling techniques ............................................................................................................................ 4
Algorithm-based approaches ........................................................................................................................ 5
Architecture-based approach......................................................................................................................... 7
6.1 Overview of the selected architecture-based approaches.................................................................... 7
Research questions ........................................................................................................................................ 9
Research Methodology ................................................................................................................................. 9
Data analysis ................................................................................................................................................. 9
Conclusion .................................................................................................................................................. 10
References ................................................................................................................................................... 11

3
Background
A city that makes use of technology to support successful progressive practices, handle
urban difficulties and construct infrastructure that is technologically enabled and maintained is
referred to as a smart city. It makes excellent use of the information that is connected and already
available to carry out and regulate its activities and operations and to increase the utilization of
insufficient resources. (Babar et al., 2019). To provide the necessary services to the local
populace, smart cities make use of a wide variety of software; in addition to the Internet of
Things, these cities also use physical borders and various communication networks (IoT). When
it comes to enabling the transfer of data, the Internet of Things is without a doubt the most
crucial component of any communication system. The gathering and storage of data on cloud
servers make it possible for further modifications and enhancements to be made, which
ultimately helps to make people's lives better. A gadget connected to the internet of things
guarantees that accurate communication is made available.
Furthermore, the safety mechanism is in place to safeguard, control, monitor, and
distribute information; it prevents hackers from gaining access to a city-operated network (Esch
et al., 2018). A smart city makes use of numerous cutting-edge technologies by combining
computerization, machine knowledge, and the internet of things (IoT). The capabilities include
energy management and environmental awareness, and cutting-edge technology may help
operations develop in terms of their ability to sustain and plan power supply. Manufacturing,
urban farming, and energy consumption may all be made more efficient, as can the provision of
effective safety measures, the management of health sector services, and the conservation of
natural resources. Intelligent city data management strategies are geared on analyzing and acting
on data in a manner that improves the lives of city citizens and stimulates economic growth

4
(Babar et al., 2019). Excel can't handle the volume of data that Big Data generates because there
are too many rows and columns. A wide range of manufacturers, as well as other types of
entities, are responsible for the production of data. The term "big data" refers to the
advancement, propagation, manipulation, and utilization of data across a variety of scopes. The
prose covers a wide range of topics, making it busy. Data in intelligent cities may be managed in
a variety of ways, such as via the use of techniques, algorithms, or even architectural research.
Data handling techniques

It entails the collecting of data, in which intelligent gadgets are used to capture real data.
An insight into municipal services and operations may be gained via the examination of data.
The re...


Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags