Copyright 2023 Ephyra Networks Inc ©, All Rights Reserved
The amount of raw data stored in corporate databases is exploding. Raw data by itself,
however, does not provide much information. Data Mining (DM), or knowledge discovery,
is the computer-
In today's fiercely competitive business environment, companies need significant
insights into the future trends and behavior of their customers and markets allowing
businesses to make proactive, knowledge-
Security is a major issue for many companies adopting Data Mining technology. To enable an analyst or developer to create and test data mining models, the owner of the data warehouse must give that analyst or developer administrative permissions on the database. As a consequence, the DM analyst or developer can potentially create or delete other objects that are not related to data mining, including data mining objects that were created and are being used by other analysts or developers, or modify the Online Analytical Processing (OLAP) objects that are not included in the data mining solution. Additionally, data mining models often reference data sources that contain sensitive information. If the mining structure and mining model has been configured to allow external vendors or users to drill through from the model to the data in the structure, precautions must be to mask sensitive information, or to limit access to the underlying data.
The knowledge and expertise of our staff in Information security and network security
means protecting information and information systems within networks from unauthorized
access, use, disclosure, disruption, modification, perusal, inspection, recording
or destruction during mining. We conduct stringent testing of networks for security
flaws for clients -
How can we help you?