SlideShare a Scribd company logo
1 of 7
Discussion 1
Knowledge-centric organizations have incorporated modern
technological systems in their creation and management of
knowledge. In a business organization, the knowledge-centric
department is dedicated to creating and updating knowledge as
part of strategic thinking and business operations. It is possible
to achieve knowledge centricity when there are sufficient
systems associated with its creation and management embedded
in the organization’s structure (Eini, 2018). Modern
technological systems for data storage and management have
played a critical role in the success of knowledge-centric
organizations. Provide a suitable database is chosen, the
organization involved can do well their routine operations
related to knowledge acquisition, utilization, and storage.
While databases in knowledge-centric organizations
have been of paramount importance in improving efficiency,
some challenges accompany the process. Poor choice and
implementation of a database can pose a severe setback to the
organizational operations. One of the most significant
challenges facing modern database systems is data security.
Over a hundred thousand systems have been hacked in the last
two years because their databases are vulnerable to malicious
groups on the public internet. The vulnerability in most of these
database’s stems from poor normalization. Eini (2018) states
that there are databases designed on the fly without paying
close attention to the basic rules of normalization. Without the
third normal form, the end-user may delete records instead of
querying or inserting them.
Similarly, several databases are subject to an improper
performance criterion. Sometimes the incoming data might be
exponentially rising in capacity and continue satisfying user
needs; there is a need for high-speed processing without taking
through hoops. Performance facing many knowledge-centric
organizations stems from deploying a poor default and
recognizing the operational environment. Therefore, in practice,
some databases are not flexible enough to adapt dynamics of
rapidly changing atmosphere. According to Eini (2018), a
database should be designed for high-performance regardless of
the hardware. A database that works well in older machines and
small-sized systems such as Raspberry Pie implies good default
performance.
Date safety is another challenge facing modern database
systems in knowledge-centric organizations. Some databases
can quickly lose data for reasons related to poor user -interface,
software- or hardware-related issues. Some databases do not
guarantee ACID, especially when a fully transactional operation
is involved (Eini, 2018). Whenever losses occur, the
organizations may lose critical information leading to an
extended downtime while seeking to recover the loss.
Sometimes, customers may shun the organization’s services and
migrate to other companies. Therefore, while databases promise
data security, others may fail to meet this expectation through
data losses.
Reference
Eini, O. (2018). How to overcome five common database
challenges - JAXenter. Retrieved 22 February 2021,
from https://jaxenter.com/overcome-5-common-database-
challenges-149559.html
Discussion 2
Database is one of the most important pieces of technology and
it is implemented in every organization. All the business data is
stored and archived for several years. There are only few named
vendors in market who provides this Database services and
software’s. The primary target for the hackers would be
breaching the database to collect the business information. So,
it is critical tool that effects the functionalities of overall
business.
One of my personal experience in dealing a poor database is
with my previous client. They have chosen to use an open-
source database client and customize it according to their needs.
They Plan to end the contract with one of the big companies
like Oracle who was providing this service for an amount. Due
to different and multiple developments in technologies the
database became a simple open source. Using an open-source
software is a good option in client budget perspective but at the
same the number of risks is grater when compared to vendor
supported platforms. Our infrastructure architect used this open
source and customized it according to business needs. After
few we started noticing how poorly this was customized and
found some security vulnerabilities. Due to the poor
configurations, the data stored was unorganized and became
unresponsive for every 24 hrs. The tables stored were saved
with different file permissions and allowing other users to
easily access this data. The stored data was not fully encrypted
and stored with easy password in one file. The connection
pools set are very less and takes lot of time to respond.
All this issue would have been resolved if the open source is
properly customized. The other solutions would be a proper
planning, peer analysis before implementing and a strong team
with enough Database knowledge. Any changes to Database
showed be tested thoroughly and reviewed multiple time before
implementing the change.
References:
Berg, K. L., Seymour, T., & Goel, R. (2012). History of
databases. International Journal of Management & Information
Systems (IJMIS), 17(1), 29–
36. https://doi.org/10.19030/ijmis.v17i1.7587
Garcia-Molina, H. (1992). Main Memory Database Systems: An
Overview. Retrieved
from, http://pages.cs.wisc.edu/~jhuang/qual/main-memory-db-
overview.pdf
Kraleva, R. S., Kralev, V. S., Sinyagina, N., Koprinkova-
Hristova, P., & Bocheva, N. (2018). Design and analysis of a
relational database for behavioral experiments data processing.
International Journal of Online Engineering (IJOE), 14(02),
117. https://doi.org/10.3991/ijoe.v14i02.7988
Discussion 3
Poor Database design and its impact on the organization:
Data plays a very important role in every organization. It is
very important for every company to store the data in a safe and
secure way. All the hackers would eventually target the data
when they are trying to enter any system without proper
authentication. So, it is very vital to store the data in a very safe
way. (Pascal, 2020)
The definition of well-defined data is that it maintains
all the encryption for storing any sensitive information. Every
organization should make sure that they are not storing any
unnecessary data. If so, it will cause an extra burden on the
company to store and retrieve that information. It also should
make sure that the data is well normalized before storing.
Analysis on Cause of the Problem and a Potential
Solution
:
The cause of the problem that I am discussing has occurred
because it has failed to comply with some basic rules of data
storage. It tried to store some confidential information and it
also did not encrypt the data before storing it. So, when the
hackers entered into the system via SQL injection, they noticed
that the data is not so secured in storing and got hold of much
confidential information. (Khanuja, Adane, 2018)
The cause for this problem is that there are no proper
validations for the application they designed in, so this made
the hackers enter the system. After entering the system, the
second cause for the data loss is the way they stored the data
and they also have not maintained a secured connection between
the database server and the application server. So, this is the
second cause. (Shelly, Pradeep, 2019)
References:
Pascal, F. (2020, March). What First Normal Form really means
and means not? Retrieved Oct 1, 2019, from Database
Debunkings: http://www.dbdebunk.com/page/page/629796. html
Khanuja HK, Adane DS. Database security threats and
challenges in database forensic: A survey. In Proceedings of
2018 International Conference on Advancements in Information
Technology (AIT 2011), available at http://www. pics.
com/vol20/33-ICAIT2011-A4072. pdf 2018.
Shelly Rohilla, Pradeep Kumar Mittal, Database Security:
Threats and Challenges, International Journal of Advanced
Research in Computer Science and Software Engineering,
Volume 3, Issue 5, May 2019.
Discussion 4
Poorly implemented database
Poor database refers to the problems faced while
constructing the database in the project environment. According
to our requirement, database type can be changed, and the
procedure for building can be designed. The front end helps to
decide the back-end requirement, and that plays a significant
role. Back end is also called a database, and connections can be
established to store data from front end to back end. The poor
database describes the problems and challenges involved in the
database. According to my experience, problems of the database
include poor Normalization (Durga & Jeyaprakash, 2019, July).
Normalization is defined as a systematic approach of
decomposing large tables to smaller and eliminates the data
redundancy. Here redundancy refers to the reputation of data. It
carries some undesirable characteristics like deleting anomalies,
inserting, and updating. So, here Normalization plays a major
role in database design. It has different forms according to the
form requirement table designing can be utilized. Poor
Normalization refers to the implementation of normal forms in
the database that are not procedural and not up to the best.
Decomposing the large tables into smaller ones helps to better
understand, and storage capacity will be reduced. Data loss can
mean huge losses for any company. Even though the company
follows a lot of data storage practices, there is a big possibility
that mistakes will occur. Without utilizing it properly, it will
create a lot of problems in the database, like the repetition of
data can cause primary key issues. It also lost its uniqueness.
For example, a website accepts registration forms and providing
a user account to the user, and that website not implemented
normal forms properly. Here the problems will appear like they
will register with user id as ‘111’, and other users also
registered with the same id. Therefore, the first user id can
upload his personnel data, and the second user id also accesses
the same data, sharing their data without securing their
accounts. It will create many problems while dealing with
different transactions. So, Normalization plays a major role in
building the database (Walach, et al., 2018).
References
Durga, V. S., & Jeyaprakash, T. (2019, July). An Effective Data
Normalization Strategy for Academic Datasets using Log
Values. In 2019 International Conference on Communication
and Electronics Systems (ICCES) (pp. 610-612). IEEE.
Walach, J., Filzmoser, P., & Hron, K. (2018). Data
Normalization and Scaling: Consequences for the Analysis in
Omics Sciences. In Comprehensive Analytical Chemistry (Vol.
82, pp. 165-196). Elsevier.

More Related Content

Similar to Discussion 1Knowledge-centric organizations have incorporated mo

big data Big Things
big data Big Thingsbig data Big Things
big data Big Thingspateelhs
 
A Review on Classification of Data Imbalance using BigData
A Review on Classification of Data Imbalance using BigDataA Review on Classification of Data Imbalance using BigData
A Review on Classification of Data Imbalance using BigDataIJMIT JOURNAL
 
A REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATA
A REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATAA REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATA
A REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATAIJMIT JOURNAL
 
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxWeek 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxjessiehampson
 
Database Management System ( Dbms )
Database Management System ( Dbms )Database Management System ( Dbms )
Database Management System ( Dbms )Kimberly Brooks
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data Shallote Dsouza
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Angie Jorgensen
 
Building Smarter, Faster, and Scalable Data-Rich Application
Building Smarter, Faster, and Scalable Data-Rich ApplicationBuilding Smarter, Faster, and Scalable Data-Rich Application
Building Smarter, Faster, and Scalable Data-Rich ApplicationRobert Bira
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEijsptm
 
Business_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanBusiness_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanLuke Caratan
 
Comparing and analyzing various method of data integration in big data
Comparing and analyzing various method of data integration in big dataComparing and analyzing various method of data integration in big data
Comparing and analyzing various method of data integration in big dataIRJET Journal
 
Identifying and analyzing the transient and permanent barriers for big data
Identifying and analyzing the transient and permanent barriers for big dataIdentifying and analyzing the transient and permanent barriers for big data
Identifying and analyzing the transient and permanent barriers for big datasarfraznawaz
 
6. ijece guideforauthors 2012_2 eidt sat
6. ijece guideforauthors 2012_2 eidt sat6. ijece guideforauthors 2012_2 eidt sat
6. ijece guideforauthors 2012_2 eidt satIAESIJEECS
 
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docxRunning head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docxtodd271
 

Similar to Discussion 1Knowledge-centric organizations have incorporated mo (20)

E018142329
E018142329E018142329
E018142329
 
Database Essay
Database EssayDatabase Essay
Database Essay
 
Research paper on big data and hadoop
Research paper on big data and hadoopResearch paper on big data and hadoop
Research paper on big data and hadoop
 
big data Big Things
big data Big Thingsbig data Big Things
big data Big Things
 
A Review on Classification of Data Imbalance using BigData
A Review on Classification of Data Imbalance using BigDataA Review on Classification of Data Imbalance using BigData
A Review on Classification of Data Imbalance using BigData
 
A REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATA
A REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATAA REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATA
A REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATA
 
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxWeek 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
 
Database Management System ( Dbms )
Database Management System ( Dbms )Database Management System ( Dbms )
Database Management System ( Dbms )
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
Building Smarter, Faster, and Scalable Data-Rich Application
Building Smarter, Faster, and Scalable Data-Rich ApplicationBuilding Smarter, Faster, and Scalable Data-Rich Application
Building Smarter, Faster, and Scalable Data-Rich Application
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCE
 
Business_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_CaratanBusiness_Analytics_Presentation_Luke_Caratan
Business_Analytics_Presentation_Luke_Caratan
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Comparing and analyzing various method of data integration in big data
Comparing and analyzing various method of data integration in big dataComparing and analyzing various method of data integration in big data
Comparing and analyzing various method of data integration in big data
 
Identifying and analyzing the transient and permanent barriers for big data
Identifying and analyzing the transient and permanent barriers for big dataIdentifying and analyzing the transient and permanent barriers for big data
Identifying and analyzing the transient and permanent barriers for big data
 
1
11
1
 
6. ijece guideforauthors 2012_2 eidt sat
6. ijece guideforauthors 2012_2 eidt sat6. ijece guideforauthors 2012_2 eidt sat
6. ijece guideforauthors 2012_2 eidt sat
 
database ppt(2)
database ppt(2)database ppt(2)
database ppt(2)
 
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docxRunning head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
Running head DATABASE AND DATA WAREHOUSING DESIGNDATABASE AND.docx
 

More from VinaOconner450

Learning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxLearning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxVinaOconner450
 
Learning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxLearning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxVinaOconner450
 
Learning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxLearning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxVinaOconner450
 
Learning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxLearning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxVinaOconner450
 
Learning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxLearning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxVinaOconner450
 
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxLearning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxVinaOconner450
 
Learning ModulesCh. 11 Corrections History and Institutions His.docx
Learning ModulesCh. 11 Corrections History and Institutions  His.docxLearning ModulesCh. 11 Corrections History and Institutions  His.docx
Learning ModulesCh. 11 Corrections History and Institutions His.docxVinaOconner450
 
Learning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxLearning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxVinaOconner450
 
Learning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxLearning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxVinaOconner450
 
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxLEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxVinaOconner450
 
Lead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxLead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxVinaOconner450
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxVinaOconner450
 
Learning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxLearning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxVinaOconner450
 
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management  Rost (1991) reinterpreted Burns mode.docxLeadership versus Management  Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management Rost (1991) reinterpreted Burns mode.docxVinaOconner450
 
Laura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxLaura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxVinaOconner450
 
Leadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxLeadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxVinaOconner450
 
Leadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxLeadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxVinaOconner450
 
Leaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxLeaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxVinaOconner450
 
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxLaws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxVinaOconner450
 
Law Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxLaw Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxVinaOconner450
 

More from VinaOconner450 (20)

Learning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxLearning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docx
 
Learning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxLearning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docx
 
Learning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxLearning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docx
 
Learning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxLearning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docx
 
Learning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxLearning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docx
 
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxLearning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
 
Learning ModulesCh. 11 Corrections History and Institutions His.docx
Learning ModulesCh. 11 Corrections History and Institutions  His.docxLearning ModulesCh. 11 Corrections History and Institutions  His.docx
Learning ModulesCh. 11 Corrections History and Institutions His.docx
 
Learning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxLearning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docx
 
Learning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxLearning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docx
 
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxLEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
 
Lead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxLead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docx
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docx
 
Learning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxLearning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docx
 
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management  Rost (1991) reinterpreted Burns mode.docxLeadership versus Management  Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
 
Laura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxLaura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docx
 
Leadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxLeadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docx
 
Leadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxLeadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docx
 
Leaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxLeaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docx
 
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxLaws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
 
Law Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxLaw Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Discussion 1Knowledge-centric organizations have incorporated mo

  • 1. Discussion 1 Knowledge-centric organizations have incorporated modern technological systems in their creation and management of knowledge. In a business organization, the knowledge-centric department is dedicated to creating and updating knowledge as part of strategic thinking and business operations. It is possible to achieve knowledge centricity when there are sufficient systems associated with its creation and management embedded in the organization’s structure (Eini, 2018). Modern technological systems for data storage and management have played a critical role in the success of knowledge-centric organizations. Provide a suitable database is chosen, the organization involved can do well their routine operations related to knowledge acquisition, utilization, and storage. While databases in knowledge-centric organizations have been of paramount importance in improving efficiency, some challenges accompany the process. Poor choice and implementation of a database can pose a severe setback to the organizational operations. One of the most significant challenges facing modern database systems is data security. Over a hundred thousand systems have been hacked in the last two years because their databases are vulnerable to malicious groups on the public internet. The vulnerability in most of these database’s stems from poor normalization. Eini (2018) states that there are databases designed on the fly without paying close attention to the basic rules of normalization. Without the third normal form, the end-user may delete records instead of querying or inserting them. Similarly, several databases are subject to an improper performance criterion. Sometimes the incoming data might be exponentially rising in capacity and continue satisfying user needs; there is a need for high-speed processing without taking through hoops. Performance facing many knowledge-centric organizations stems from deploying a poor default and
  • 2. recognizing the operational environment. Therefore, in practice, some databases are not flexible enough to adapt dynamics of rapidly changing atmosphere. According to Eini (2018), a database should be designed for high-performance regardless of the hardware. A database that works well in older machines and small-sized systems such as Raspberry Pie implies good default performance. Date safety is another challenge facing modern database systems in knowledge-centric organizations. Some databases can quickly lose data for reasons related to poor user -interface, software- or hardware-related issues. Some databases do not guarantee ACID, especially when a fully transactional operation is involved (Eini, 2018). Whenever losses occur, the organizations may lose critical information leading to an extended downtime while seeking to recover the loss. Sometimes, customers may shun the organization’s services and migrate to other companies. Therefore, while databases promise data security, others may fail to meet this expectation through data losses. Reference Eini, O. (2018). How to overcome five common database challenges - JAXenter. Retrieved 22 February 2021, from https://jaxenter.com/overcome-5-common-database- challenges-149559.html Discussion 2 Database is one of the most important pieces of technology and it is implemented in every organization. All the business data is stored and archived for several years. There are only few named vendors in market who provides this Database services and software’s. The primary target for the hackers would be breaching the database to collect the business information. So, it is critical tool that effects the functionalities of overall business. One of my personal experience in dealing a poor database is
  • 3. with my previous client. They have chosen to use an open- source database client and customize it according to their needs. They Plan to end the contract with one of the big companies like Oracle who was providing this service for an amount. Due to different and multiple developments in technologies the database became a simple open source. Using an open-source software is a good option in client budget perspective but at the same the number of risks is grater when compared to vendor supported platforms. Our infrastructure architect used this open source and customized it according to business needs. After few we started noticing how poorly this was customized and found some security vulnerabilities. Due to the poor configurations, the data stored was unorganized and became unresponsive for every 24 hrs. The tables stored were saved with different file permissions and allowing other users to easily access this data. The stored data was not fully encrypted and stored with easy password in one file. The connection pools set are very less and takes lot of time to respond. All this issue would have been resolved if the open source is properly customized. The other solutions would be a proper planning, peer analysis before implementing and a strong team with enough Database knowledge. Any changes to Database showed be tested thoroughly and reviewed multiple time before implementing the change. References: Berg, K. L., Seymour, T., & Goel, R. (2012). History of databases. International Journal of Management & Information Systems (IJMIS), 17(1), 29– 36. https://doi.org/10.19030/ijmis.v17i1.7587 Garcia-Molina, H. (1992). Main Memory Database Systems: An Overview. Retrieved from, http://pages.cs.wisc.edu/~jhuang/qual/main-memory-db- overview.pdf Kraleva, R. S., Kralev, V. S., Sinyagina, N., Koprinkova- Hristova, P., & Bocheva, N. (2018). Design and analysis of a relational database for behavioral experiments data processing.
  • 4. International Journal of Online Engineering (IJOE), 14(02), 117. https://doi.org/10.3991/ijoe.v14i02.7988 Discussion 3 Poor Database design and its impact on the organization: Data plays a very important role in every organization. It is very important for every company to store the data in a safe and secure way. All the hackers would eventually target the data when they are trying to enter any system without proper authentication. So, it is very vital to store the data in a very safe way. (Pascal, 2020) The definition of well-defined data is that it maintains all the encryption for storing any sensitive information. Every organization should make sure that they are not storing any unnecessary data. If so, it will cause an extra burden on the company to store and retrieve that information. It also should make sure that the data is well normalized before storing. Analysis on Cause of the Problem and a Potential Solution : The cause of the problem that I am discussing has occurred because it has failed to comply with some basic rules of data storage. It tried to store some confidential information and it also did not encrypt the data before storing it. So, when the hackers entered into the system via SQL injection, they noticed that the data is not so secured in storing and got hold of much confidential information. (Khanuja, Adane, 2018)
  • 5. The cause for this problem is that there are no proper validations for the application they designed in, so this made the hackers enter the system. After entering the system, the second cause for the data loss is the way they stored the data and they also have not maintained a secured connection between the database server and the application server. So, this is the second cause. (Shelly, Pradeep, 2019) References: Pascal, F. (2020, March). What First Normal Form really means and means not? Retrieved Oct 1, 2019, from Database Debunkings: http://www.dbdebunk.com/page/page/629796. html Khanuja HK, Adane DS. Database security threats and challenges in database forensic: A survey. In Proceedings of 2018 International Conference on Advancements in Information Technology (AIT 2011), available at http://www. pics. com/vol20/33-ICAIT2011-A4072. pdf 2018. Shelly Rohilla, Pradeep Kumar Mittal, Database Security: Threats and Challenges, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2019. Discussion 4 Poorly implemented database
  • 6. Poor database refers to the problems faced while constructing the database in the project environment. According to our requirement, database type can be changed, and the procedure for building can be designed. The front end helps to decide the back-end requirement, and that plays a significant role. Back end is also called a database, and connections can be established to store data from front end to back end. The poor database describes the problems and challenges involved in the database. According to my experience, problems of the database include poor Normalization (Durga & Jeyaprakash, 2019, July). Normalization is defined as a systematic approach of decomposing large tables to smaller and eliminates the data redundancy. Here redundancy refers to the reputation of data. It carries some undesirable characteristics like deleting anomalies, inserting, and updating. So, here Normalization plays a major role in database design. It has different forms according to the form requirement table designing can be utilized. Poor Normalization refers to the implementation of normal forms in the database that are not procedural and not up to the best. Decomposing the large tables into smaller ones helps to better understand, and storage capacity will be reduced. Data loss can mean huge losses for any company. Even though the company follows a lot of data storage practices, there is a big possibility that mistakes will occur. Without utilizing it properly, it will create a lot of problems in the database, like the repetition of
  • 7. data can cause primary key issues. It also lost its uniqueness. For example, a website accepts registration forms and providing a user account to the user, and that website not implemented normal forms properly. Here the problems will appear like they will register with user id as ‘111’, and other users also registered with the same id. Therefore, the first user id can upload his personnel data, and the second user id also accesses the same data, sharing their data without securing their accounts. It will create many problems while dealing with different transactions. So, Normalization plays a major role in building the database (Walach, et al., 2018). References Durga, V. S., & Jeyaprakash, T. (2019, July). An Effective Data Normalization Strategy for Academic Datasets using Log Values. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 610-612). IEEE. Walach, J., Filzmoser, P., & Hron, K. (2018). Data Normalization and Scaling: Consequences for the Analysis in Omics Sciences. In Comprehensive Analytical Chemistry (Vol. 82, pp. 165-196). Elsevier.