The second step include using an etl extract

This preview shows page 4 - 6 out of 11 pages.

The second step include using an ETL (extract, transform and Load) tool such as Informatica (Michael Moran, 2018). This tool sits on multiple servers is used to extract raw data from sources, multiple databases and applications. The tool then transforms the data and final load on end servers, so it can be used by multiple business units (Michael Moran, 2018). These hardware (servers) that Informatica software sits on are located at the data center at CareFirst and the access to the company’s application will only be granted using the company’s intranet to protect unsupported access. The software has assigned administrator and developers, password protected at server and application end. The interesting part of this process is the management of data. When the raw data are pulled from the sources, they are loaded into a development server known as metadata manager. Data in form of xml files are then moved from development servers to integration and testing servers respectively using Informatica repository manager to confirm, transform and test to avoid blunders before loading. Finally, if there are no issues found after testing and integration, the transformed data in form of xml files are moved to production servers where the data are readily available for all the enterprise business units such as billing department, medical practitioners, government,
Image of page 4

Subscribe to view the full document.

INFORMATION SYSTEMS AND IDENTITY MANAGEMENT 5 pharmacies and other customers. The data is not available for all CareFirst associates but employees that uses the tool or needs the transformed data. Threats and Remediation As an organization which possess hundreds of servers, websites and thousands of employees with different backgrounds and intentions. CareFirst is open to different kind of threats. Insider threat is likely the biggest threats, because employees need access to information to do their job right and this information can also be used illegally by current and old employees with access, offshore contractors or disgruntled employees. Insider threats can take many forms, but threats can be categorized as either malicious or accidental. Accidental threats refer to situations in which damage or data loss occurs because of an insider who has no malicious intent. For example, an employee might accidentally delete an important file, fall victim to a phishing attempt or inadvertently share more data with a business partner than is consistent with company policy or legal requirements. ( Rouse, 2017) Malicious threats refer to deliberate attempts by an insider to access and potentially harm an organization's data, systems or IT infrastructure. These types of insider threats are often attributed to disgruntled employees or ex-employees who believe that the organization wronged them in some way, and therefore feel justified in seeking revenge. Insiders may also become threats when they are subverted by malicious outsiders, either through financial incentives or through extortion. ( Rouse, 2017)
Image of page 5
INFORMATION SYSTEMS AND IDENTITY MANAGEMENT 6 Hackers are constantly looking for loopholes, flaws and using sophisticated programs to invade and attack companies such as CareFirst with enormous information. This information can be sold in black market for cash gains. While its tough to understand every hacker’s intentions, here is a few motivations of a cyber attacker.
Image of page 6
You've reached the end of this preview.
  • Winter '17
  • Password cracking, LM hash, CareFirst

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern