The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
An Introductory Study on Business Intelligence Security
Abstract
Firstly, the fact that business intelligence (BI) applications are growing in importance, and secondly, the growing and more sophisticated attacks launched by hackers, the concern of how to protect the knowledge capital or databases that come along with BI or in another words, BI security, has thus arisen. In this chapter, the BI environment with its security features is explored, followed by a discussion on intrusion detection (ID) and intrusion prevention (IP) techniques. It is understood through a Web-service case study that it is feasible to have ID and IP as countermeasures to the security threats; thus further enhancing the security of the BI environment or architecture.
Related Content
C. V. Suresh Babu, Sudhir M., George Kishore L., Sanjay Kumar V..
© 2024.
20 pages.
|
Ridhima Sharma, Amrik Singh.
© 2024.
12 pages.
|
Munir Ahmad.
© 2024.
16 pages.
|
Isuf Qabrati, Elhan Tafili.
© 2024.
28 pages.
|
Peterson K. Ozili, Aamir Aijaz Syed.
© 2024.
18 pages.
|
Samra Jusufi.
© 2024.
20 pages.
|
Halim Bajraktari, Valeri Qatani.
© 2024.
13 pages.
|
|
|