An Introductory Study on Business Intelligence Security

An Introductory Study on Business Intelligence Security

Chan Gaik Yee (Multimedia University, Malaysia)
DOI: 10.4018/978-1-60566-056-1.ch019
OnDemand PDF Download:
No Current Special Offers


Firstly, the fact that business intelligence (BI) applications are growing in importance, and secondly, the growing and more sophisticated attacks launched by hackers, the concern of how to protect the knowledge capital or databases that come along with BI or in another words, BI security, has thus arisen. In this chapter, the BI environment with its security features is explored, followed by a discussion on intrusion detection (ID) and intrusion prevention (IP) techniques. It is understood through a Web-service case study that it is feasible to have ID and IP as countermeasures to the security threats; thus further enhancing the security of the BI environment or architecture.

Complete Chapter List

Search this Book: