SlideShare a Scribd company logo
Running head: SECURITY RISKS IN DATABASE
MIGRATION 1
SECURITY RISKS IN DATABASE MIGRATION 3
Security Risks in Database Migration
Name
Institutional Affiliation
Security Risks in Database Migration
As organizations become more reliant on database
applications, companies may require to migrate their databases
allowing for cheaper running which can then replicated to the
consumers with reduced charges. This can be demonstrated with
the recent move of Apple Inc.’s iCloud user data to Chinese
servers. The move by the company was to reduce the expense of
running the severs “inhouse,” however, brought about questions
regarding data security for people using smart devices.
Nevertheless, data migration can be daunting particularly when
the event is unplanned or unwanted (Fisch, White, & Pooh,
2017). When companies migrate, they experience some risks
and challenges as servers are moved from one location to
another. Among the first issues is the loss of data or
information (Fisch, White, & Pooh, 2017). In a recent study, it
was estimated that this problem accounts for approximately
fifty percent of all problems that occur during this process. The
outcomes of this problem are viewed as damaging for both
businesses and individuals using the services (Fisch, White, &
Pooh, 2017).
Though this problem is common during database
migration, it is not the only one, another issue is semantics risk
(Malik & Patel, 2016). The term semantic risk is given or used
in database security when data or information is imprecisely, or
improperly stored resulting in misinterpretations that quickly
escalate to adverse outcomes due to computation errors.
Therefore, even if the data transfer to the new location was
completely efficient some errors may occur when recompiling
the data. There are possibilities that information can be
unintentionally saved in the wrong location or folder. This can
be especially harmful to organizations that deal with numbers or
currency such as the various stock exchange organizations
globally. In other words, sematic risk can be described as when
misunderstanding results in misallocation (Malik & Patel,
2016). This can allow hackers to easily access data that should
be properly secured by the various protocols in place. The final
security issue with data migration is the risk of incompatibility,
though compatibility can be tested, not all the data being sent
will be compatible in some cases exemplifying them from
security measures thus offering a breach or point of attack
(Yunis, Yunus, Nawi, & Surin, 2017).
Overall, data security is important as demonstrated by
the recent attacks and breaches that resulted in data leaks of
high-profile companies for example Facebook. When migrating
data from one server to another as done by Apple Inc. In the
example offered, corporate data has to be accessed and for this
reason, security cannot be left to chance as the information is
both sensitive and critical (Kumar et al., 2017). The challenges
and risks of insufficient security are as demonstrated in the
prior sections of this paper. The outcomes of such mishaps to
data can be loss of customers and depending on the scale of the
problem, legal action can be taken up (Muslmani, Kazakzeh,
Ayoubi, & Aljawarneh, 2018). For this reason, all data
irrespective of the source should be handled with respect. By
assessing the data being transferred and the costs that may arise
from data breaches can offer a cost-effective means of data
migration. However, this does not affirm that the data being
migrated will be completely secure from breach or other forms
of security issues.
Annotated Bibliography
Fisch, E. A., White, G. B., & Pooch, U. W. (2017). Computer
system and network security. CRC press.
The authors of this publication take into consideration the
complex nature of computer, network and database security. It
therefore offers a step by step approach to the issues whilst
providing the needed solutions. Each issue is handled
independently allowing for easy comprehension.
Kumar, D., Ma, Z., Durumeric, Z., Mirian, A., Mason, J.,
Halderman, J. A., & Bailey, M. (2017). Security challenges in
an increasingly tangled web. In Proceedings of the 26th
International Conference on World Wide Web (pp. 677-684).
International World Wide Web Conferences Steering
Committee.
This article takes the approach to database security
problems from a different perspective. The authors acknowledge
that database security is becoming more necessary as humanity
adapts to the internet-age. They further recognize that in the
past two decades, the internet has become more complex and
interconnected thereby resulting in shared vulnerabilities due to
the complex security architectures implemented.
Malik, M., & Patel, T. (2016). Database security attacks and
control methods. International Journal of Information, 6(1/2),
175-183.
The others to this study began by addressing the
importance of databases in the digital world of today. This is
then followed by the various forms of security issues such
databases undergo from cyber attacks to data leaks. Finally,
they address the various methods of security that can be
implemented.
Muslmani, B. K., Kazakzeh, S., Ayoubi, E., & Aljawarneh, S.
(2018, October). Reducing integration complexity of cloud-
based ERP systems. In Proceedings of the First International
Conference on Data Science, E-learning and Information
Systems (p. 37). ACM.
Though the other sources identified in this reference have
been recognized for offering an understanding to the problem at
hand. The authors of this article take a different approach as the
majority of the information is on creating solutions to the
already complex database security architecture in place.
Yunus, M. A. M., Yunus, S. K. G., Nawi, N. M., & Surin, E. S.
M. (2017). Study on Database Management System Security
Issues. JOIV: International Journal on Informatics
Visualization, 1(4-2), 192-194.
The authors of the journal article conducted various
studies on the security of databases and the methods applied.
They addressed the various unique as well as common
challenges with database security. After the assessment they
offered both simple and complex security measures for various
levels of database security.
References
Fisch, E. A., White, G. B., & Pooch, U. W. (2017). Computer
system and network security. CRC press.
Kumar, D., Ma, Z., Durumeric, Z., Mirian, A., Mason, J.,
Halderman, J. A., & Bailey, M. (2017). Security challenges in
an increasingly tangled web. In Proceedings of the 26th
International Conference on World Wide Web (pp. 677-684).
International World Wide Web Conferences Steering
Committee.
Malik, M., & Patel, T. (2016). Database security attacks and
control methods. International Journal of Information, 6(1/2),
175-183.
Muslmani, B. K., Kazakzeh, S., Ayoubi, E., & Aljawarneh, S.
(2018, October). Reducing integration complexity of cloud-
based ERP systems. In Proceedings of the First International
Conference on Data Science, E-learning and Information
Systems (p. 37). ACM.
Yunus, M. A. M., Yunus, S. K. G., Nawi, N. M., & Surin, E. S.
M. (2017). Study on Database Management System Security
Issues. JOIV: International Journal on Informatics
Visualization, 1(4-2), 192-194.
IHP 510 Module Six Worksheet
First, review the required text readings for Module Six and
revisit your posts and response posts to the Module Five
discussion. In addition, review the website Missouri Department
of Health and Senior Services and complete the following:
· Select three target markets/demographics from the following:
· low-income Hispanic population
· low income African American population
· low income white population
· low income African American population
· middle income Asian American
· middle income Hispanic population
· affluent white population
· Select one department, program, or service from the Missouri
Department of Health and Senior Services.
· Prioritize your target markets/demographics as Priority One,
Priority Two, and Priority Three based on the particular
program or initiative you selected.
· Identify the marketing technique you will use for each priority
(use one traditional, one social media, and one other).
· Briefly discuss your prioritization of the marketing techniques
that you chose. Be sure to address how your communication and
marketing strategies align with the
department’s/program’s/service’s mission, vision, and values.
Please see the example below.
Note: For the follow-up worksheet task in Module Eight, you
will complete a basic budget for implementing the marketing
strategies you develop here.
Example
Priority One
Target Market/Demographic: White, low-income
Department/Program/Service: Oral Health
Marketing Technique: Television
Commercial(s)
Discussion: Within at least three paragraphs, explain why you
selected this particular population as your first priority, why
you selected this particular program, and discuss the marketing
technique you propose to target this particular demographic.
Also, explain how your advertising campaign aligns with the
department’s mission, vision, and values.
Priority One
Target Market and Demographic:
Department/Program/Service:
Marketing Technique:
Discussion:
Priority Two
Target Market and Demographic:
Department/Program/Service:
Marketing Technique:
Discussion:
Priority Three
Target market and demographic:
Department/Program:
Marketing technique:
Discussion:
IHP 510 Module Six Worksheet Guidelines and Rubric
Matching Healthcare Marketing Techniques to Specific Target
Markets
Overview: For this task you will propose marketing and
communication strategies based on the target market and
demographics for a department, program, or
service of the Missouri Department of Health and Senior
Services. This task will help you as you propose similar
marketing and communication strategies for the
final project case organization, Bellevue Hospital, in Final
Project Milestone Three, due in Module Seven.
Prompt: Complete the Module Six Worksheet by addressing the
following critical elements:
markets/demographics from the following:
○ low-income Hispanic population
○ low income African American population
○ low income white population
○ low income African American population
○ middle income Asian American
○ middle income Hispanic population
○ affluent white population
program, or service from the Missouri Department of Health and
Senior Services.
Priority One, Priority Two, and Priority Three based on the
particular program or initiative
you selected.
will use for each priority (use one traditional, one social media,
and one other).
○ Briefly discuss the prioritization and the marketing
techniques that you chose, justifying your choices.
○ Explain how your communication and marketing strategies
align with the department’s/program’s/service’s mission, vision,
and values.
Rubric
Note: For the follow-up worksheet task in Module Eight, you
will complete a basic budget for implementing the marketing
strategies you develop in the Module
Six Worksheet.
Critical Elements Exemplary Proficient Needs Improvement
Not Evident Value
Target Markets/
Demographics
Selects three target
markets/demographics from
the categories listed
(100%)
Does not select three target
markets/demographics from
the categories listed
(0%)
10
https://learn.snhu.edu/d2l/lor/viewer/view.d2l?ou=6606&loIdent
Id=6399
Department/Program
Service
Selects one department,
program, or service from the
Missouri Department of Health
and Senior Services
(100%)
Does not select one
department, program, or
service from the Missouri
Department of Health and
Senior Services
(0%)
10
Prioritization Prioritizes the target
markets/demographics as
Priority One, Priority Two, and
Priority Three, based on the
particular program or initiative
selected
(100%)
Prioritizes the target
markets/demographics as
Priority One, Priority Two, and
Priority Three, based on the
particular program or initiative
selected, but with inaccuracies
or gaps in logic
(70%)
Does not prioritize the target
markets/demographics as
Priority One, Priority Two, and
Priority Three, based on the
particular program or initiative
selected
(0%)
15
Marketing Technique Meets “Proficient” criteria and
selected techniques are
especially well-aligned to the
priorities (100%)
Identifies the marketing
technique that will be used for
each priority (90%)
Identifies the marketing
technique that will be used for
each priority, but strategies are
inappropriate (70%)
Does not identify the
marketing technique that will
be used for each priority
(0%)
15
Discussion:
Prioritization and
Marketing Techniques
Meets “Proficient” criteria and
demonstrates keen insight into
the prioritization and selection
of marketing techniques
(100%)
Discusses the prioritization and
the chosen marketing
techniques, justifying choices
(90%)
Discusses the prioritization and
the chosen marketing
techniques, justifying choices,
but response has gaps in detail,
clarity, or logic (70%)
Does not discuss the
prioritization and the chosen
marketing techniques (0%)
15
Discussion:
Communication and
Marketing Strategies
Meets “Proficient” criteria and
demonstrates keen insight into
the alignment of
communication and marketing
strategies with healthcare
organizations (100%)
Explains how the
communication and marketing
strategies align with the
department’s/program’s/
service’s mission, vision, and
values (90%)
Explains how the
communication and marketing
strategies align with the
department’s/program’s/
service’s mission, vision, and
values, but response has gaps
in detail, clarity, or accuracy
(70%)
Does not explain how the
communication and marketing
strategies align with the
department’s/program’s/
service’s mission, vision, and
values (0%)
30
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented
in a professional and easy-to-
read format (100%)
Submission has no major
errors related to citations,
grammar, spelling, syntax, or
organization (90%)
Submission has major errors
related to citations, grammar,
spelling, syntax, or
organization that negatively
impact readability and
articulation of main ideas
(70%)
Submission has critical errors
related to citations, grammar,
spelling, syntax, or
organization that prevent
understanding of ideas (0%)
5
Total 100%
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx

More Related Content

Similar to Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx

Br36413417
Br36413417Br36413417
Br36413417
IJERA Editor
 
07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed
IAESIJEECS
 
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docxRunning Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
susanschei
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
zmark3
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
michael591
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
healdkathaleen
 
Back to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityBack to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV security
Lilminow
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
VannaSchrader3
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
daniahendric
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
Yolanda Ivey
 
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docxRunning Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
cowinhelen
 
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
IJECEIAES
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
florriezhamphrey3065
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
IRJET Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
AIRCC Publishing Corporation
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
IJNSA Journal
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
IRJET Journal
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
ijitcs
 

Similar to Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx (20)

Br36413417
Br36413417Br36413417
Br36413417
 
07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed
 
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docxRunning Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docxRunning head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
Running head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY2.docx
 
Back to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityBack to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV security
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docxRunning Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
 
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
 

More from jeanettehully

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx
jeanettehully
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
jeanettehully
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx
jeanettehully
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx
jeanettehully
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
jeanettehully
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx
jeanettehully
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx
jeanettehully
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
jeanettehully
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
jeanettehully
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx
jeanettehully
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx
jeanettehully
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docx
jeanettehully
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx
jeanettehully
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docx
jeanettehully
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
jeanettehully
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx
jeanettehully
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
jeanettehully
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx
jeanettehully
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
jeanettehully
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx
jeanettehully
 

More from jeanettehully (20)

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docx
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docx
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 

Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx

  • 1. Running head: SECURITY RISKS IN DATABASE MIGRATION 1 SECURITY RISKS IN DATABASE MIGRATION 3 Security Risks in Database Migration Name Institutional Affiliation Security Risks in Database Migration As organizations become more reliant on database applications, companies may require to migrate their databases allowing for cheaper running which can then replicated to the consumers with reduced charges. This can be demonstrated with the recent move of Apple Inc.’s iCloud user data to Chinese servers. The move by the company was to reduce the expense of running the severs “inhouse,” however, brought about questions regarding data security for people using smart devices. Nevertheless, data migration can be daunting particularly when the event is unplanned or unwanted (Fisch, White, & Pooh,
  • 2. 2017). When companies migrate, they experience some risks and challenges as servers are moved from one location to another. Among the first issues is the loss of data or information (Fisch, White, & Pooh, 2017). In a recent study, it was estimated that this problem accounts for approximately fifty percent of all problems that occur during this process. The outcomes of this problem are viewed as damaging for both businesses and individuals using the services (Fisch, White, & Pooh, 2017). Though this problem is common during database migration, it is not the only one, another issue is semantics risk (Malik & Patel, 2016). The term semantic risk is given or used in database security when data or information is imprecisely, or improperly stored resulting in misinterpretations that quickly escalate to adverse outcomes due to computation errors. Therefore, even if the data transfer to the new location was completely efficient some errors may occur when recompiling the data. There are possibilities that information can be unintentionally saved in the wrong location or folder. This can be especially harmful to organizations that deal with numbers or currency such as the various stock exchange organizations globally. In other words, sematic risk can be described as when misunderstanding results in misallocation (Malik & Patel, 2016). This can allow hackers to easily access data that should be properly secured by the various protocols in place. The final security issue with data migration is the risk of incompatibility, though compatibility can be tested, not all the data being sent will be compatible in some cases exemplifying them from security measures thus offering a breach or point of attack (Yunis, Yunus, Nawi, & Surin, 2017). Overall, data security is important as demonstrated by the recent attacks and breaches that resulted in data leaks of high-profile companies for example Facebook. When migrating data from one server to another as done by Apple Inc. In the example offered, corporate data has to be accessed and for this reason, security cannot be left to chance as the information is
  • 3. both sensitive and critical (Kumar et al., 2017). The challenges and risks of insufficient security are as demonstrated in the prior sections of this paper. The outcomes of such mishaps to data can be loss of customers and depending on the scale of the problem, legal action can be taken up (Muslmani, Kazakzeh, Ayoubi, & Aljawarneh, 2018). For this reason, all data irrespective of the source should be handled with respect. By assessing the data being transferred and the costs that may arise from data breaches can offer a cost-effective means of data migration. However, this does not affirm that the data being migrated will be completely secure from breach or other forms of security issues. Annotated Bibliography Fisch, E. A., White, G. B., & Pooch, U. W. (2017). Computer system and network security. CRC press. The authors of this publication take into consideration the complex nature of computer, network and database security. It therefore offers a step by step approach to the issues whilst providing the needed solutions. Each issue is handled independently allowing for easy comprehension. Kumar, D., Ma, Z., Durumeric, Z., Mirian, A., Mason, J., Halderman, J. A., & Bailey, M. (2017). Security challenges in an increasingly tangled web. In Proceedings of the 26th International Conference on World Wide Web (pp. 677-684). International World Wide Web Conferences Steering Committee. This article takes the approach to database security problems from a different perspective. The authors acknowledge that database security is becoming more necessary as humanity adapts to the internet-age. They further recognize that in the past two decades, the internet has become more complex and interconnected thereby resulting in shared vulnerabilities due to the complex security architectures implemented. Malik, M., & Patel, T. (2016). Database security attacks and control methods. International Journal of Information, 6(1/2),
  • 4. 175-183. The others to this study began by addressing the importance of databases in the digital world of today. This is then followed by the various forms of security issues such databases undergo from cyber attacks to data leaks. Finally, they address the various methods of security that can be implemented. Muslmani, B. K., Kazakzeh, S., Ayoubi, E., & Aljawarneh, S. (2018, October). Reducing integration complexity of cloud- based ERP systems. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems (p. 37). ACM. Though the other sources identified in this reference have been recognized for offering an understanding to the problem at hand. The authors of this article take a different approach as the majority of the information is on creating solutions to the already complex database security architecture in place. Yunus, M. A. M., Yunus, S. K. G., Nawi, N. M., & Surin, E. S. M. (2017). Study on Database Management System Security Issues. JOIV: International Journal on Informatics Visualization, 1(4-2), 192-194. The authors of the journal article conducted various studies on the security of databases and the methods applied. They addressed the various unique as well as common challenges with database security. After the assessment they offered both simple and complex security measures for various levels of database security. References Fisch, E. A., White, G. B., & Pooch, U. W. (2017). Computer system and network security. CRC press. Kumar, D., Ma, Z., Durumeric, Z., Mirian, A., Mason, J., Halderman, J. A., & Bailey, M. (2017). Security challenges in an increasingly tangled web. In Proceedings of the 26th International Conference on World Wide Web (pp. 677-684). International World Wide Web Conferences Steering
  • 5. Committee. Malik, M., & Patel, T. (2016). Database security attacks and control methods. International Journal of Information, 6(1/2), 175-183. Muslmani, B. K., Kazakzeh, S., Ayoubi, E., & Aljawarneh, S. (2018, October). Reducing integration complexity of cloud- based ERP systems. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems (p. 37). ACM. Yunus, M. A. M., Yunus, S. K. G., Nawi, N. M., & Surin, E. S. M. (2017). Study on Database Management System Security Issues. JOIV: International Journal on Informatics Visualization, 1(4-2), 192-194. IHP 510 Module Six Worksheet First, review the required text readings for Module Six and revisit your posts and response posts to the Module Five discussion. In addition, review the website Missouri Department of Health and Senior Services and complete the following: · Select three target markets/demographics from the following: · low-income Hispanic population · low income African American population · low income white population · low income African American population · middle income Asian American · middle income Hispanic population · affluent white population · Select one department, program, or service from the Missouri Department of Health and Senior Services. · Prioritize your target markets/demographics as Priority One, Priority Two, and Priority Three based on the particular program or initiative you selected. · Identify the marketing technique you will use for each priority
  • 6. (use one traditional, one social media, and one other). · Briefly discuss your prioritization of the marketing techniques that you chose. Be sure to address how your communication and marketing strategies align with the department’s/program’s/service’s mission, vision, and values. Please see the example below. Note: For the follow-up worksheet task in Module Eight, you will complete a basic budget for implementing the marketing strategies you develop here. Example Priority One Target Market/Demographic: White, low-income Department/Program/Service: Oral Health Marketing Technique: Television Commercial(s) Discussion: Within at least three paragraphs, explain why you selected this particular population as your first priority, why you selected this particular program, and discuss the marketing technique you propose to target this particular demographic. Also, explain how your advertising campaign aligns with the department’s mission, vision, and values.
  • 7. Priority One Target Market and Demographic: Department/Program/Service: Marketing Technique: Discussion: Priority Two Target Market and Demographic: Department/Program/Service: Marketing Technique: Discussion: Priority Three Target market and demographic: Department/Program: Marketing technique:
  • 8. Discussion: IHP 510 Module Six Worksheet Guidelines and Rubric Matching Healthcare Marketing Techniques to Specific Target Markets Overview: For this task you will propose marketing and communication strategies based on the target market and demographics for a department, program, or service of the Missouri Department of Health and Senior Services. This task will help you as you propose similar marketing and communication strategies for the final project case organization, Bellevue Hospital, in Final Project Milestone Three, due in Module Seven. Prompt: Complete the Module Six Worksheet by addressing the following critical elements: markets/demographics from the following: ○ low-income Hispanic population ○ low income African American population ○ low income white population ○ low income African American population ○ middle income Asian American ○ middle income Hispanic population ○ affluent white population
  • 9. program, or service from the Missouri Department of Health and Senior Services. Priority One, Priority Two, and Priority Three based on the particular program or initiative you selected. will use for each priority (use one traditional, one social media, and one other). ○ Briefly discuss the prioritization and the marketing techniques that you chose, justifying your choices. ○ Explain how your communication and marketing strategies align with the department’s/program’s/service’s mission, vision, and values. Rubric Note: For the follow-up worksheet task in Module Eight, you will complete a basic budget for implementing the marketing strategies you develop in the Module Six Worksheet. Critical Elements Exemplary Proficient Needs Improvement Not Evident Value Target Markets/ Demographics Selects three target markets/demographics from the categories listed
  • 10. (100%) Does not select three target markets/demographics from the categories listed (0%) 10 https://learn.snhu.edu/d2l/lor/viewer/view.d2l?ou=6606&loIdent Id=6399 Department/Program Service Selects one department, program, or service from the Missouri Department of Health and Senior Services (100%) Does not select one department, program, or service from the Missouri Department of Health and Senior Services (0%) 10 Prioritization Prioritizes the target markets/demographics as Priority One, Priority Two, and
  • 11. Priority Three, based on the particular program or initiative selected (100%) Prioritizes the target markets/demographics as Priority One, Priority Two, and Priority Three, based on the particular program or initiative selected, but with inaccuracies or gaps in logic (70%) Does not prioritize the target markets/demographics as Priority One, Priority Two, and Priority Three, based on the particular program or initiative selected (0%) 15 Marketing Technique Meets “Proficient” criteria and selected techniques are especially well-aligned to the priorities (100%) Identifies the marketing technique that will be used for each priority (90%) Identifies the marketing technique that will be used for
  • 12. each priority, but strategies are inappropriate (70%) Does not identify the marketing technique that will be used for each priority (0%) 15 Discussion: Prioritization and Marketing Techniques Meets “Proficient” criteria and demonstrates keen insight into the prioritization and selection of marketing techniques (100%) Discusses the prioritization and the chosen marketing techniques, justifying choices (90%) Discusses the prioritization and the chosen marketing techniques, justifying choices, but response has gaps in detail, clarity, or logic (70%) Does not discuss the prioritization and the chosen marketing techniques (0%)
  • 13. 15 Discussion: Communication and Marketing Strategies Meets “Proficient” criteria and demonstrates keen insight into the alignment of communication and marketing strategies with healthcare organizations (100%) Explains how the communication and marketing strategies align with the department’s/program’s/ service’s mission, vision, and values (90%) Explains how the communication and marketing strategies align with the department’s/program’s/ service’s mission, vision, and values, but response has gaps in detail, clarity, or accuracy (70%) Does not explain how the communication and marketing strategies align with the department’s/program’s/ service’s mission, vision, and values (0%)
  • 14. 30 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to- read format (100%) Submission has no major errors related to citations, grammar, spelling, syntax, or organization (90%) Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas (70%) Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas (0%) 5 Total 100%