Answer To: SIT719 Security and Privacy Issues in Analytics Assessment 2: Technology Assessment Report Key...
Ritu answered on Sep 17 2021
SIT719 Issues in the security and Privacy Issues in Analytics
11
SIT719 Issues in the security and Privacy Issues in Analytics
Assessment 2: Technology Assessment Report
[Type the author name]
9/17/2019
Executive Summary
Dumnonia is one of Australia's leading insurance companies that not only provides a variety of insurance services to people, but also provides healthcare as well as various types of health insurance, as well as has information about people as big data on machines. The CEO of Dumnonia is very concerned not only about issues in the security threats but also about issues in the security threats. Because it contains information about medical issues as well as people, it is very sensitive information, so to provide complete trust to customers as well as employees, there is a specific aspect of the data as well as issues in the security issues discussed in this report to clarify the relevant issues. Dumnonia has legacy issues in the security systems, such as firewalls as well as IDS, as well as includes issues in the security organization technologies such as passwords, encryption, as well as malware protection. However, they were not sure about the issues in the security aspect to protect the big data system, as well as they called it SDM which was regarded as an emergency management solution with a mechanism set to implement the issues in the security of the big data system. This is a new area set up to capture timely analysis of various data standards, as well as to manage datasets that exceed the ability to use software tools for management. Big data is extended in the public cloud with traditional issues in the security solutions for private computing infrastructures, as well as is then limited to well-defined issues in the security boundaries, such as areas where firewalls as well as issues in the security issues are not effectively handled.
Contents
Executive Summary 1
Organisational Drivers 3
Discussion of the organisational drivers for Dumnonia relating to the implementation of k anonymity Technical Solution Assessment 3
Technology Solution Assessment 4
Detailed technology to implement k anonymity while protecting privacy 6
K Anonymous Implementation Guide 7
Comparison of two publically available implementations 8
References 10
Organisational Drivers
Currently, Dumnonia's organizational momentum is the cloud-based technology they are using, as described in the assessment tasks that only perform the initial pilot on cloud services as well as AWS use. Therefore, it depends heavily on the results of the pilot study. And after the survey, you may be migrating to other cloud data big platforms, depending on your requirements.
With respect to issues in the security issues, Dumnonia's organizational momentum is now focused on perimeter issues in the security. Therefore, Dumnonia has legacy issues in the security systems such as firewalls as well as IDS, as well as uses issues in the security organization technologies such as passwords, encryption, as well as malware protection. But they're not sure about the issues in the security aspect of protecting big data systems.
With respect to database as well as data processing, Dumnonia's organizational momentum is a traditional organization-based (organization data warehouse) that can now link to customers via the Web as well as access mobile apps. Interested in cloud-based approaches, but concerned about operational limitations, issues in the security, as well as privacy issues for cloud-based big data systems.
With respect to the customer's point of view, Dumnonia has a policy that customers need to be healthy, so that when assessed accordingly, they are less sick. If you know that a customer with a specific postal code has a specific lifestyle problem, you can advertise the new product to the customer. A new fitness plan for Dumnonia. The idea is that not only will customers become healthy, but they will be less likely to get sick.
Discussion of the organisational drivers for Dumnonia relating to the implementation of k anonymity Technical Solution Assessment
In the three interviews provided, the organizational factors involved in implementing k anonymity can be implemented as follows:
Interview 1: Dumnonia is considered to be a major insurance company in Australia. Dumnonia HQ is located in Melbourne, Australia, as well as is located in all the capitals of Australia. There is also an office in Wellington, Oakland as well as New Zealand. Therefore, you must comply with Australian, New Zealand domestic as well as state laws. Ensuring data anonymity helps you understand privacy as well as issues in the security issues. The concern is to implement an anonymous approach in which data is extracted throughout the organization. The concern is that the organization is not aware of implementation because it implements a point of view or other ongoing system operations.
Interview2: This section reports that k-anonymity may be used without support as well as some updates. This allows Guinevere to support the implementation of a new strategy for Dumnonia, as well as the k-anonymous approach. When releasing a version of private data, the problem is that you cannot identify who is the target of the data, which is a key driver of the Dumnonia big data strategy. Guinévia discussed the issue of holding customer personal health information, as well as was constantly concerned about the privacy or issues in the security breach of that data, as well as wanted the k-anonymous approach to be the best way to implement in order to ensure full support for Dumnonia: Guinevere suggests that some of the k-anonymity-related algorithms that can provide issues in the security, especially the p-sensitive k-anonymity approach, is a simple version or extension of the k-anonymity approach, but she does not. She fully understands the strengths as well as weaknesses of these different k-anonymity extensions.
Interview3: In this section, the main focus of Constantine (CSO) is to provide support documentation as well as policies related to the k-anonymity privacy approach. In previous Dumnonia data systems, the primary concern for providing issues in the security is handling big data as well as transferring big data from one location to another, so the main feature of this section is to maintain or add k-anonymity to provide full authentication as well as further enhancement to issues in the security issues. Discussions are about a wide range of ways to effectively model privacy...