Final Project: Implementing Data Masking the Coca-Cola
Company
DeVry Keller Graduate School of Management
MIS
540
Dr. Evan Escobedo
June 23, 2019
Running head: FINAL PROJECT: IMPLEMENTING DATA
MASKING THE 1
FINAL PROJECT: IMPLEMENTING DATA MASKING THE 2
Table of Contents
Executive summary3
Introduction4
Project plan5
Project sponsor5
Steering committee5
Project manager5
Project team members6
Skills required by the project manager6
Reasons that could lead to project failure6
Planned work that might be outsourced7
Coca-Cola Company organizational background7
Business problems for Coca-Cola Company8
Overview of technology solution category9
Alternative solutions and recommendations10
Blancco Drive Eraser10
Technical specifications for Blancco Drive Eraser11
WipeDrive12
When to use WipeDrive12
Performance Measurement plan13
Organizational Impact of the solution14
Summary15
References17
Final Project: Implementing Data Masking the Coca-Cola
Company
Executive summary
This paper elaborates on data masking as one of the
techniques used by corporations to protect their data from
access by malicious entities. The technique is described as
attempts to obfuscate the data by applying a series of encryption
processes so that one cannot easily decrypt the data unless they
have special pass codes enabling them to do so. This process
will be implemented by The Coca-Cola Company to prevent
data insecurity that is a challenge in the online world we are
living in.
To make sure that the implementation works, there must
be a proper working project plan. The project plan outlines the
various stakeholders for the project including; the project
steering committee, project sponsor, project leader, and others
with their roles clearly stated. There are qualities that must be
possessed by the project manager for them to lead a successful
project from beginning to end within the cost and time frame. A
successful implementation of the data masking project by The
Coca-Cola Company will help them in improving their decision
making. Additionally, the implemented solution will lead to new
business innovations. This is because, when the company’s
information will be utterly protected, it will not be used by
competing companies or other malicious individuals for their
own gains (Dhar et al., 2005). As a result, The Coca-Cola
Company will be able to use their private data for market
analysis and hence come up with innovative ideas that have not
been discovered by competitors in the market. This shows that
data masking will indeed go a long way in ensuring The Coca-
Cola Company gets greater advantage in the long run as far as
competitiveness in the market is concerned.
Introduction
The purpose of this report is to show how our selected
technology will be implemented effectively in our selected
company so that it guarantees maximum success and becomes an
effective tool for data security. As we already know, our
selected company is The Coca-Cola Company and our selected
technology is data masking which is mainly aimed at protecting
the company’s data against malicious cyber security attempts.
Data masking is one of the effective technologies applied by
large companies in the corporate world to help them protect
their data. It usually comprises of processes meant to obfuscate
data by hiding the data and modifying its content by a process
that will create a series of decryption processes for one to get
access to the data. The whole paper will be revolving around
how the technology will be implemented by The Coca-Cola
Company.
The various parts that will make the paper include the
overall project plan which mainly discusses elements such as
the number of individuals who will be involved in the project
implementation. These individuals will be identified briefly and
their roles in the project outlined. Another section under this
will elaborate on the skills that the project manager will need
and the potential reasons that will lead to project failure. Going
forward, the organizational background will be outlined. In this
section, the company’s overview and its history are explained.
Other sections that are succinctly explained include business
problems and opportunities, overview in regard to the data
masking technology, overview of the technology solution
category that data masking falls to, alternative
recommendations and solutions, performance measurement plan,
and the organizational impact that the technology has brought
with it concluding with a summary of major findings.
Project plan
For the project to be implemented in a successful
manner, a clear project plan must be in place. Project planning
helps in the identification of the major stakeholders in the
project, outlining their specific role in ensuring the whole
process becomes a success after the end of the speculated
period. The project members that will be on board will be the
project sponsor (in this case the Coca-Cola Company
management), the project manager, project team members,
project steering committee and the company’s executive team.
Project sponsor
This is the projects financer and is tasked with the role
of providing the necessary finances that will be required in the
whole project process. In case of any shortages, they must be
told in advance so that they can find means of processing
channeling of finances to the project. However, the project
sponsor must be careful not to waste resources just because they
are needed by the project team.
Steering committee
The steering committee makes sure that the whole
process is running smoothly and ensure that the finances
channeled to the project and the time allocated are being
utilized in the right manner. Again, they are responsible for
pointing out the major parts of concern during the project
implementation so that corrections can be made prior.
Project manager
The project manager oversees the project team and he
or she assigns duties to each project member and follows to see
that their role is being carried out in an effective manner. They
are the leader in charge of the project implementation and must
make sure that project deliverables are attained at the specified
times.
Project team members
Project team members involve a wide scope of
individuals with different skills and knowledge from diverse
specializations. This category will bring on board people such
as the network administrator, data analyst, cyber security
specialist and resource manager among other specialists. Their
main tasks revolve around their expertise and they report
directly to the project manager.
Skills required by the project manager
In order to carry out the project from start to end
successfully within the time frame and the cost allocated, a
project manager must possess a number of skills. First, the
project manager must possess excellent communication skills
because through this they will be able to control the project
team effectively as well as report project details concisely to
the executive team and the project steering committee. Second,
the project manager must have good team management skills
because through this they will be able to lead the team well and
ensure that there are no conflicts among the various project
teams. Third, they must possess the essential skill of personal
organization. If the project manager themselves is organized, it
becomes easy to organize and manage all project team members.
Finally, they must possess the overall skill of excellent
leadership. A good leader can guarantee project success because
of the various skills that are embedded in them.
Reasons that could lead to project failure
In the course of the project, all the stakeholders must be
careful to ensure that the project becomes a success. There are
various reasons that lead to project failure. First, the project can
fail if there is inadequate cooperation among the various project
team members. Cooperation among the various stakeholders is
essential for the purpose of information sharing as far as the
project process is concerned. Second, the project can fail if the
project steering committee does not make sure that project team
members follow the outlined formal methods and procedures. If
the project activities are just carried out any which way with no
direction, the project may fail in the process. Third, the project
may fail if one or several of the key project stakeholders leave
in the middle of project implementation. Fourth, the project may
fail due to ineffective leadership from the top management
stakeholders. Poor leadership can be in terms of poor personnel
management or poor resource management among other issues
(Saleh & Hu, 2016).
Planned work that might be outsourced
During the project implementation, there are various
services that may need to be outsourced. For the Coca-Cola
Company, the planned service that we will outsource will be
data storage facilities from companies that provide cloud
storage services. We will outsource data storage facilities to
Oracle cloud servers.
Throughout the project implementation, we will make
sue of the waterfall system development methodology. It is a
stepwise methodology that involves finishing one stage of the
project completely before going to the subsequent stage. In the
data masking project, The Coca-Cola Company, waterfall
methodology will be applied in dividing the processes of the
project such as data finding, situation assessment, masking
implementation, among others into processes that should be
completed sequentially. This methodology was selected because
of its simple sequential manner that ensures that prior processes
are succinctly addressed before the proceeding ones are started.
Coca-Cola Company organizational background
The Coca-Cola Company is headquartered here in the
United States in the city of Atlanta, Georgia but incorporated in
Wilmington, Delaware. The company deals in the manufacture
and sale of concentrate for a carbonated beverage that has its
content sweetened by mixing it with other ingredients. The
company widely known thanks to its flagship product Coca-Cola
that came to be in 1886 when it was invented by pharmacist
John Stith Pemberton in Atlanta. In 1889, the company was
bought by Asa Griggs Candler for a total of $2,300 and who
incorporated the company in 1892 in Atlanta. The Coca-Cola
Company history indicates that the product, Coca-Cola, was
first sold as a medicinal tonic by the original founder before it
was advanced and sold as a carbonated beverage drink. The
name of the product was derived by the two constituent
elements that made it (coca leaves and kola nuts).
Business problems for Coca-Cola Company
Security of data is one of the major problems that
individuals and corporations face in the modern technological
era. Just like any other company in the contemporary
technological world, Coca-Cola faces challenges in protecting
the company’s and client data from unauthorized access and
manipulation by malicious persons. In this informational era,
attempts by cyber criminals to get access to company data has
been on a constant rise and this is the reason behind Coca-
Cola’s effort to protect its data. This was after the company
experienced a massive breach in its databases leading to their
client’s information being accessed by unauthorized individuals.
As a result of the security breach, the company experienced a
drop in its stock in the last quarter of the financial year and in
the process suffered massive losses that amounted to millions.
The main problem that lies ahead for Coca-Cola is to carry out a
successful project on data masking so that they can guarantee
the security of the company’s data against unauthorized access.
Overview of technology solution category
The Coca-Cola Company succeed in its attempt to
protect the company’s data if it can successfully integrate
several data-securing technologies. An example of data
protection technology that the company can apply is data
masking which is an advanced way through which a company
can protect its data by using a 12-digit passcode that has data
masked on it. A malicious individual will be forced to enter the
12-digit passcode for them to have access into the data for any
purpose. This protects the company’s data from unauthorized
access either internally or externally by individuals who are not
authorized. The other method that the company can apply is
data encryption to ensure that data through their communication
channels or over the shared internet cannot be tapped by
unauthorized personnel. Again, the company can make use of
resilient database facilities, like outsourcing the services of
cloud data storage facilities provided by recognized companies
like Oracle or Microsoft (Chen & Zhao, 2012).
With the collection of data protection technologies,
Coca-Cola can be sure that the data insecurity issue has been
done away with and hence dedicate its resources that were
meant for data security to other critical components of the
company daily operations. Based on their problem, I believe the
above-mentioned data protection techniques can help the
company achieve a long-lasting solution ensuring that the
company’s stock can be maintained at its previous status.
Data masking ensures business innovation is attained by
the companies that practice it. Information Technology (IT)
leaders know that data is the essential element that enables the
creation of data-driven applications giving the company a better
competitive advantage. This is the reason behind the heavy
investments aimed at protecting the corporation’s data. Each
day, the security of data across its channels within and from the
organization to the outside world, is always protected to ensure
that its privacy and security is not compromised.
Protection of client data against unnecessary intrusion
from unauthorized individuals is a Corporate Social
Responsibility (CSR) for any company. The Coca-Cola
Company can demonstrate CSR with the implementation of data
masking technology that is aimed at protecting the company’s
and client data. CSR can be demonstrated by having the
company encourage the efforts of innovative individuals in the
society who may have brilliant ideas on how the protection of
client and company data can be done effectively through data
masking or any other data protection techniques.
Alternative solutions and recommendations
The solutions to data security beside data masking
(encryption) include data erasure and copy data management
(backups). All the methods are aimed at protecting the
company’s data from loss or access by unauthorized persons.
The data security technology that I recommend being used by
The Coca-Cola Company is data erasure. This is an effective
software-based method that is used to overwrite data in hard
disks and other digital media and hence destroying the data
located in these devices. The method is accomplishing a simple
procedure where binary numbers (zeros and ones) are used to
replace data in all the sectors of the electronic device. Data
erasure is done by a number of products but in our case, we are
only going to touch on two products. The products are Blancco
Drive Eraser and WipeDrive
Blancco Drive Eraser
Blancco Data Eraser provides a certified data erasure
process that has helped organizations get rid of data in their
storage devices. The technology works regardless of the
underlying technology the client company is using in a cost
effective, reliable, secure and environmentally friendly way.
This ensures that the company data is permanently erased from
the servers, desktops, laptops and drives and this makes it hard
for malicious person to get access to it and use it in a manner
that could affect the company in terms of revenue creation and
most of all its public reputation.
When performing data erasure with Blancco, each
erasure is accompanied by a tamper-proof Certificate of Erasure
to show that indeed the erasure is certified and verified, and it
is complying with the local, national and international
regulations of data protection.
Technical specifications for Blancco Drive Eraser
· Remote or local erasure of data through the Blancco
Management Console
· Fast and simultaneous erasure of data from multiple
drives
· RAID dismantling and access of underlying physical
drives directly
· SSD detection and Secure erasure of data with the SSD
method that is patented
· Automating unlocking after detection of freeze locked
drives
· Compliance with the wide list of global erasure standards
including NIST, HMG/CESG and DoD among others.
· Support for commands for internal erasure including the
common erasure using cryptographic technology, etc.
There are several benefits that a company derives when erasing
data using Blancco’s Disk Erasure Software: they are;
· Solid-state drive (SSD) erasure that is patented (Patent
No. 9286231).
· Erasure of the data permanently from SSDS and HDDs
simultaneously.
· Automation of the hard drive erasure process to get rid
of the BIOS freeze locks.
· Deployment that is local and remote
· Identifies false positives when carrying out internal
processes of data erasure
· Provision of a digitally signed Certificate of Erasure that
puts the company at par with auditing and compliance.
· Automatic detection, notification and erasing of areas
that were hidden (DCO, HPA) as well as sectors that were
remapped.
· Compliance with the state, federal and international
regulations and guidelines of data privacy and security.
WipeDrive
WipeDrive is also one of the best globally used hard
drive wiping software. The technology ensures that an
individual’s or organization’s data is completely erased and
unrecoverable by even the most sophisticated technologies
available. WipeDrive uses military-grade technology for wiping
data that is able to overwrite the existing data in a drive a
number of times using the Department of Defense (DoD)
approved patterns of wiping making sure that the data cannot be
recovered by any means available.
When to use WipeDrive
· Any situation where one wants to completely erase data
from their storage facilities including the operating system, data
and programs
· When one needs to sell or donate their computer,
WipeDrive can be of great help in completely and safely wiping
the persons data
· When a computer is virus infected WipeDrive can help
remove the viruses, malware and other computer infections
· When one wants to re-use their computer for another
person or purpose, the technology will help in erasing data,
programs and the operating system so that the person can start
over again
Before one can chose to use WipeDrive to carry out data erasure
from their computers, they are advised to note that there is no
way they can recover the data after the erasure process has been
completed. As a result, they are advised to back up any data that
they feel they may want in the future or else they will have to
lose it forever.
Comparing the two products; Blancco and WipeDrive, in terms
of their similarities and differences, it is apparent that the two
products have more similarities than differences. Both products
guarantee a certified erasure reporting. Again, they all have the
basic feature of RAID dismantling and access of underlying
physical drives directly. Most importantly is that both products
comply with state, federal and global standards including NIST,
HMG/CESG and DoD among others. Their major difference lies
on the fact that Blancco is the most comprehensive and trusted
software tool for erasing data available in the market.
If asked to choose between the above two data erasure software
products, Blancco would be the preferable choice. The features
that it has will be a better solution that can be applied by an
individual or a corporate organization in its data erasure needs.
Performance Measurement plan
After implementation of the data masking technology to ensure
security of client and company data from unauthorized access
and manipulation, it is also important to understand how the
solution is performing to achieve its desired outcomes. An
elaborate plan of how the success of the solution is measured
must be developed by a company. For Coca-Cola, this is the
plan that will be utilized to measure the performance of the
strategy in protecting client data.
· Step 1: Involve the important stakeholders to the company to
take their views concerning the state of data security
· Step 2: bring other stakeholders to get their views too
· Step 3: Compare the success of the company in terms of data
security in relation to the past
· Step 4: Contrast the company with other companies based on
data security
As already hinted by the performance measurement plan, the
data for measuring the success of the solution will be mainly
from the company stakeholders. The data therefore will be
collected using methods such as interview, questionnaires, and
observation among other methods.
The metrics that we will use as the Key Performance Indicators
to measure the success of the data masking solution will be
Mean Time Between Failures (MTBF), Mean Time to Repair
(MTTR) and the difference in the MTBF. The above KPIs are
selected because of their applicability especially in detecting
the mean of failures in the solution and hence determining if it
is good or bad.
Organizational Impact of the solution
It is with no doubt that the intended solution in data
protection will have an impact for Coca-Cola. The integration
of the technology will call for change in organizational
structure, especially in the IT department. Specialists who have
skills in data masking will have to be added to the IT team and
their presence will be dully felt in the whole organization.
Another impact that will be brought by the technology
is improvement and support of decision making in the whole
organization. With the company’s information protected against
malicious persons, the company can be sure that its information
asset can be fully utilized in making critical decisions that
affect the business in a positive manner. Protected company
information helps the company make decisions that ensures
their continued competitiveness in the market. In the recent
data-driven decision making, company’s data remain one of the
corporate assets that should be guarded by any means. A method
of data protection such as data masking that Coca-Cola would
implement will help secure this corporate asset that will help
them make critical decisions concerning the business, decisions
that ensure they continue being one of the largest global
companies
In addition to data protection, business intelligence (BI) can be
of help in support or improve decision making by the
management of Coca-Cola. Through BI, the company can
collect market information and do analysis on it to aid on its
important decisions.
Summary
Data security is a critical aspect for any corporation
that wants to survive in a competitive business environment.
There are various data protection tools including data masking,
back up plans and data erasure that a company can use when
trying to protect its data from unauthorized access and
manipulation. Data masking is what Coca-Cola will be
implementing to help curb the increased threat posed on its
client data. To make sure that the project becomes a success, it
is important for the stakeholders to be known and their roles in
the project understood. Again, a project manager must possess a
given set of qualities including leadership skills for them to
steer a successful project. Protecting company’s data aids in
supporting or improving the overall decision making by the
company management team.
References
Chen, D., & Zhao, H. (2012, March). Data security and privacy
protection issues in cloud computing. In 2012 International
Conference on Computer Science and Electronics
Engineering(Vol. 1, pp. 647-651). IEEE.
Dhar, T., Chavas, J. P., Cotterill, R. W., & Gould, B. W. (2005).
An Econometric Analysis of Brand‐Level Strategic Pricing
Between Coca‐Cola Company and PepsiCo. Journal of
Economics & Management Strategy, 14(4), 905-931.
Saleh H. G A., & Hu, W. (2016). Dark side of leadership impact
on project failure: towards a model. Innovation and
management.

More Related Content

PDF
9 things every project manager should take into account
PPTX
Project management and Success Criteria
DOCX
Drs 255 project management skills
DOC
projectsuccesswhitepaper (10)
DOC
Project Management
PDF
Project Management Report
DOCX
Role andresponsiblities in project management
PDF
Projects Management in Reality: Lessons from Government Projects
9 things every project manager should take into account
Project management and Success Criteria
Drs 255 project management skills
projectsuccesswhitepaper (10)
Project Management
Project Management Report
Role andresponsiblities in project management
Projects Management in Reality: Lessons from Government Projects

Similar to Final Project Implementing Data Masking the Coca-Co.docx (20)

PDF
DOCX
Running head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docx
PPTX
Session 4: Implementing & Closing out
PDF
Project management – standard for today´s modern company
PPTX
Stakeholder Project Management System Demo
PPTX
This is Project on Stakeholder Which is included in Business
PPTX
Stakeholders are individuals, groups, or entities with an interest in the var...
PPS
Project Management How To
PPTX
An introduction to project management
DOCX
Pearson HND BTEC Level 5 HNDManaging a Successful Business Pr.docx
PDF
Project Management Tools & Techniques by Susan W. Carey
PPT
NCV 3 Project Management Hands-On Support Slide Show - Module 1
PPTX
Lec 02 project management
PDF
project managementUnit 1.pdf
PDF
Pm600 1103 a-02-schwappach-loren-p1-t2
PDF
Project Management Project Manager Project
PDF
Why do large projects fail to deliver?
PPT
Project success post_implementation & management
DOCX
Effective Project Manager
PDF
Project management lecture 1
Running head IMPLEMENTATION STRATEGIESIMPLEMENTATION STRATEGIES.docx
Session 4: Implementing & Closing out
Project management – standard for today´s modern company
Stakeholder Project Management System Demo
This is Project on Stakeholder Which is included in Business
Stakeholders are individuals, groups, or entities with an interest in the var...
Project Management How To
An introduction to project management
Pearson HND BTEC Level 5 HNDManaging a Successful Business Pr.docx
Project Management Tools & Techniques by Susan W. Carey
NCV 3 Project Management Hands-On Support Slide Show - Module 1
Lec 02 project management
project managementUnit 1.pdf
Pm600 1103 a-02-schwappach-loren-p1-t2
Project Management Project Manager Project
Why do large projects fail to deliver?
Project success post_implementation & management
Effective Project Manager
Project management lecture 1
Ad

More from tjane3 (20)

DOCX
Final Project OverviewIn the final project, you play the role of.docx
DOCX
Final Project Milestone #5 StakeholdersRead Stakeholder Managem.docx
DOCX
Final Project on the surveillance state consists of two parts1 .docx
DOCX
Final Project Milestone #2 The Three SpheresRead Corporate So.docx
DOCX
Final Project Multimedia PresentationThe assignment is to creat.docx
DOCX
Final Project Instructions this is a 2 part assignment D3204 FIN M.docx
DOCX
Final Project Instructions Develop a projectpresentation of 750 to.docx
DOCX
Final Project Implementation Assessment of Electronic Health .docx
DOCX
FINAL PROJECT Case Study This project is a 10-12 page paper; doub.docx
DOCX
Final Project Biopsychological Analysis of a Neuropsychological D.docx
DOCX
Final Project (Objectives 1 – 8) (30 of final grade)Select o.docx
DOCX
Final Project Guidelines The Final Project for this course.docx
DOCX
Final Project Guidelines The Final Project for this course is a .docx
DOCX
Final Presentation – Interpersonal Communication, Managing Conflict,.docx
DOCX
Final PaperYour good friends have just adopted a four-year-o.docx
DOCX
Final PaperYour final paper should discuss similarities and diff.docx
DOCX
Final Project (due 121718)Whereas the midterm asked you to be .docx
DOCX
Final PaperSection Two[Of the five sections of a political sci.docx
DOCX
Final PaperScaffold your paper around the following outline.docx
DOCX
Final Term Project Requirements For this project you will .docx
Final Project OverviewIn the final project, you play the role of.docx
Final Project Milestone #5 StakeholdersRead Stakeholder Managem.docx
Final Project on the surveillance state consists of two parts1 .docx
Final Project Milestone #2 The Three SpheresRead Corporate So.docx
Final Project Multimedia PresentationThe assignment is to creat.docx
Final Project Instructions this is a 2 part assignment D3204 FIN M.docx
Final Project Instructions Develop a projectpresentation of 750 to.docx
Final Project Implementation Assessment of Electronic Health .docx
FINAL PROJECT Case Study This project is a 10-12 page paper; doub.docx
Final Project Biopsychological Analysis of a Neuropsychological D.docx
Final Project (Objectives 1 – 8) (30 of final grade)Select o.docx
Final Project Guidelines The Final Project for this course.docx
Final Project Guidelines The Final Project for this course is a .docx
Final Presentation – Interpersonal Communication, Managing Conflict,.docx
Final PaperYour good friends have just adopted a four-year-o.docx
Final PaperYour final paper should discuss similarities and diff.docx
Final Project (due 121718)Whereas the midterm asked you to be .docx
Final PaperSection Two[Of the five sections of a political sci.docx
Final PaperScaffold your paper around the following outline.docx
Final Term Project Requirements For this project you will .docx
Ad

Recently uploaded (20)

PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
20th Century Theater, Methods, History.pptx
PDF
Complications of Minimal Access-Surgery.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
IGGE1 Understanding the Self1234567891011
PDF
International_Financial_Reporting_Standa.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Introduction to pro and eukaryotes and differences.pptx
TNA_Presentation-1-Final(SAVE)) (1).pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Hazard Identification & Risk Assessment .pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Empowerment Technology for Senior High School Guide
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
History, Philosophy and sociology of education (1).pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
20th Century Theater, Methods, History.pptx
Complications of Minimal Access-Surgery.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
IGGE1 Understanding the Self1234567891011
International_Financial_Reporting_Standa.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...

Final Project Implementing Data Masking the Coca-Co.docx

  • 1. Final Project: Implementing Data Masking the Coca-Cola Company DeVry Keller Graduate School of Management MIS 540 Dr. Evan Escobedo June 23, 2019 Running head: FINAL PROJECT: IMPLEMENTING DATA MASKING THE 1 FINAL PROJECT: IMPLEMENTING DATA MASKING THE 2 Table of Contents Executive summary3 Introduction4 Project plan5 Project sponsor5 Steering committee5 Project manager5 Project team members6 Skills required by the project manager6 Reasons that could lead to project failure6 Planned work that might be outsourced7 Coca-Cola Company organizational background7
  • 2. Business problems for Coca-Cola Company8 Overview of technology solution category9 Alternative solutions and recommendations10 Blancco Drive Eraser10 Technical specifications for Blancco Drive Eraser11 WipeDrive12 When to use WipeDrive12 Performance Measurement plan13 Organizational Impact of the solution14 Summary15 References17 Final Project: Implementing Data Masking the Coca-Cola Company Executive summary This paper elaborates on data masking as one of the techniques used by corporations to protect their data from access by malicious entities. The technique is described as attempts to obfuscate the data by applying a series of encryption processes so that one cannot easily decrypt the data unless they have special pass codes enabling them to do so. This process will be implemented by The Coca-Cola Company to prevent data insecurity that is a challenge in the online world we are living in. To make sure that the implementation works, there must be a proper working project plan. The project plan outlines the various stakeholders for the project including; the project steering committee, project sponsor, project leader, and others with their roles clearly stated. There are qualities that must be possessed by the project manager for them to lead a successful project from beginning to end within the cost and time frame. A successful implementation of the data masking project by The Coca-Cola Company will help them in improving their decision making. Additionally, the implemented solution will lead to new
  • 3. business innovations. This is because, when the company’s information will be utterly protected, it will not be used by competing companies or other malicious individuals for their own gains (Dhar et al., 2005). As a result, The Coca-Cola Company will be able to use their private data for market analysis and hence come up with innovative ideas that have not been discovered by competitors in the market. This shows that data masking will indeed go a long way in ensuring The Coca- Cola Company gets greater advantage in the long run as far as competitiveness in the market is concerned. Introduction The purpose of this report is to show how our selected technology will be implemented effectively in our selected company so that it guarantees maximum success and becomes an effective tool for data security. As we already know, our selected company is The Coca-Cola Company and our selected technology is data masking which is mainly aimed at protecting the company’s data against malicious cyber security attempts. Data masking is one of the effective technologies applied by large companies in the corporate world to help them protect their data. It usually comprises of processes meant to obfuscate data by hiding the data and modifying its content by a process that will create a series of decryption processes for one to get access to the data. The whole paper will be revolving around how the technology will be implemented by The Coca-Cola Company. The various parts that will make the paper include the overall project plan which mainly discusses elements such as the number of individuals who will be involved in the project implementation. These individuals will be identified briefly and their roles in the project outlined. Another section under this will elaborate on the skills that the project manager will need and the potential reasons that will lead to project failure. Going forward, the organizational background will be outlined. In this
  • 4. section, the company’s overview and its history are explained. Other sections that are succinctly explained include business problems and opportunities, overview in regard to the data masking technology, overview of the technology solution category that data masking falls to, alternative recommendations and solutions, performance measurement plan, and the organizational impact that the technology has brought with it concluding with a summary of major findings. Project plan For the project to be implemented in a successful manner, a clear project plan must be in place. Project planning helps in the identification of the major stakeholders in the project, outlining their specific role in ensuring the whole process becomes a success after the end of the speculated period. The project members that will be on board will be the project sponsor (in this case the Coca-Cola Company management), the project manager, project team members, project steering committee and the company’s executive team. Project sponsor This is the projects financer and is tasked with the role of providing the necessary finances that will be required in the whole project process. In case of any shortages, they must be told in advance so that they can find means of processing channeling of finances to the project. However, the project sponsor must be careful not to waste resources just because they are needed by the project team. Steering committee The steering committee makes sure that the whole process is running smoothly and ensure that the finances channeled to the project and the time allocated are being utilized in the right manner. Again, they are responsible for pointing out the major parts of concern during the project implementation so that corrections can be made prior. Project manager The project manager oversees the project team and he or she assigns duties to each project member and follows to see
  • 5. that their role is being carried out in an effective manner. They are the leader in charge of the project implementation and must make sure that project deliverables are attained at the specified times. Project team members Project team members involve a wide scope of individuals with different skills and knowledge from diverse specializations. This category will bring on board people such as the network administrator, data analyst, cyber security specialist and resource manager among other specialists. Their main tasks revolve around their expertise and they report directly to the project manager. Skills required by the project manager In order to carry out the project from start to end successfully within the time frame and the cost allocated, a project manager must possess a number of skills. First, the project manager must possess excellent communication skills because through this they will be able to control the project team effectively as well as report project details concisely to the executive team and the project steering committee. Second, the project manager must have good team management skills because through this they will be able to lead the team well and ensure that there are no conflicts among the various project teams. Third, they must possess the essential skill of personal organization. If the project manager themselves is organized, it becomes easy to organize and manage all project team members. Finally, they must possess the overall skill of excellent leadership. A good leader can guarantee project success because of the various skills that are embedded in them. Reasons that could lead to project failure In the course of the project, all the stakeholders must be careful to ensure that the project becomes a success. There are various reasons that lead to project failure. First, the project can fail if there is inadequate cooperation among the various project team members. Cooperation among the various stakeholders is essential for the purpose of information sharing as far as the
  • 6. project process is concerned. Second, the project can fail if the project steering committee does not make sure that project team members follow the outlined formal methods and procedures. If the project activities are just carried out any which way with no direction, the project may fail in the process. Third, the project may fail if one or several of the key project stakeholders leave in the middle of project implementation. Fourth, the project may fail due to ineffective leadership from the top management stakeholders. Poor leadership can be in terms of poor personnel management or poor resource management among other issues (Saleh & Hu, 2016). Planned work that might be outsourced During the project implementation, there are various services that may need to be outsourced. For the Coca-Cola Company, the planned service that we will outsource will be data storage facilities from companies that provide cloud storage services. We will outsource data storage facilities to Oracle cloud servers. Throughout the project implementation, we will make sue of the waterfall system development methodology. It is a stepwise methodology that involves finishing one stage of the project completely before going to the subsequent stage. In the data masking project, The Coca-Cola Company, waterfall methodology will be applied in dividing the processes of the project such as data finding, situation assessment, masking implementation, among others into processes that should be completed sequentially. This methodology was selected because of its simple sequential manner that ensures that prior processes are succinctly addressed before the proceeding ones are started. Coca-Cola Company organizational background The Coca-Cola Company is headquartered here in the United States in the city of Atlanta, Georgia but incorporated in Wilmington, Delaware. The company deals in the manufacture and sale of concentrate for a carbonated beverage that has its content sweetened by mixing it with other ingredients. The company widely known thanks to its flagship product Coca-Cola
  • 7. that came to be in 1886 when it was invented by pharmacist John Stith Pemberton in Atlanta. In 1889, the company was bought by Asa Griggs Candler for a total of $2,300 and who incorporated the company in 1892 in Atlanta. The Coca-Cola Company history indicates that the product, Coca-Cola, was first sold as a medicinal tonic by the original founder before it was advanced and sold as a carbonated beverage drink. The name of the product was derived by the two constituent elements that made it (coca leaves and kola nuts). Business problems for Coca-Cola Company Security of data is one of the major problems that individuals and corporations face in the modern technological era. Just like any other company in the contemporary technological world, Coca-Cola faces challenges in protecting the company’s and client data from unauthorized access and manipulation by malicious persons. In this informational era, attempts by cyber criminals to get access to company data has been on a constant rise and this is the reason behind Coca- Cola’s effort to protect its data. This was after the company experienced a massive breach in its databases leading to their client’s information being accessed by unauthorized individuals. As a result of the security breach, the company experienced a drop in its stock in the last quarter of the financial year and in the process suffered massive losses that amounted to millions. The main problem that lies ahead for Coca-Cola is to carry out a successful project on data masking so that they can guarantee the security of the company’s data against unauthorized access. Overview of technology solution category The Coca-Cola Company succeed in its attempt to protect the company’s data if it can successfully integrate several data-securing technologies. An example of data protection technology that the company can apply is data masking which is an advanced way through which a company can protect its data by using a 12-digit passcode that has data masked on it. A malicious individual will be forced to enter the 12-digit passcode for them to have access into the data for any
  • 8. purpose. This protects the company’s data from unauthorized access either internally or externally by individuals who are not authorized. The other method that the company can apply is data encryption to ensure that data through their communication channels or over the shared internet cannot be tapped by unauthorized personnel. Again, the company can make use of resilient database facilities, like outsourcing the services of cloud data storage facilities provided by recognized companies like Oracle or Microsoft (Chen & Zhao, 2012). With the collection of data protection technologies, Coca-Cola can be sure that the data insecurity issue has been done away with and hence dedicate its resources that were meant for data security to other critical components of the company daily operations. Based on their problem, I believe the above-mentioned data protection techniques can help the company achieve a long-lasting solution ensuring that the company’s stock can be maintained at its previous status. Data masking ensures business innovation is attained by the companies that practice it. Information Technology (IT) leaders know that data is the essential element that enables the creation of data-driven applications giving the company a better competitive advantage. This is the reason behind the heavy investments aimed at protecting the corporation’s data. Each day, the security of data across its channels within and from the organization to the outside world, is always protected to ensure that its privacy and security is not compromised. Protection of client data against unnecessary intrusion from unauthorized individuals is a Corporate Social Responsibility (CSR) for any company. The Coca-Cola Company can demonstrate CSR with the implementation of data masking technology that is aimed at protecting the company’s and client data. CSR can be demonstrated by having the company encourage the efforts of innovative individuals in the society who may have brilliant ideas on how the protection of client and company data can be done effectively through data masking or any other data protection techniques.
  • 9. Alternative solutions and recommendations The solutions to data security beside data masking (encryption) include data erasure and copy data management (backups). All the methods are aimed at protecting the company’s data from loss or access by unauthorized persons. The data security technology that I recommend being used by The Coca-Cola Company is data erasure. This is an effective software-based method that is used to overwrite data in hard disks and other digital media and hence destroying the data located in these devices. The method is accomplishing a simple procedure where binary numbers (zeros and ones) are used to replace data in all the sectors of the electronic device. Data erasure is done by a number of products but in our case, we are only going to touch on two products. The products are Blancco Drive Eraser and WipeDrive Blancco Drive Eraser Blancco Data Eraser provides a certified data erasure process that has helped organizations get rid of data in their storage devices. The technology works regardless of the underlying technology the client company is using in a cost effective, reliable, secure and environmentally friendly way. This ensures that the company data is permanently erased from the servers, desktops, laptops and drives and this makes it hard for malicious person to get access to it and use it in a manner that could affect the company in terms of revenue creation and most of all its public reputation. When performing data erasure with Blancco, each erasure is accompanied by a tamper-proof Certificate of Erasure to show that indeed the erasure is certified and verified, and it is complying with the local, national and international regulations of data protection. Technical specifications for Blancco Drive Eraser · Remote or local erasure of data through the Blancco Management Console · Fast and simultaneous erasure of data from multiple drives
  • 10. · RAID dismantling and access of underlying physical drives directly · SSD detection and Secure erasure of data with the SSD method that is patented · Automating unlocking after detection of freeze locked drives · Compliance with the wide list of global erasure standards including NIST, HMG/CESG and DoD among others. · Support for commands for internal erasure including the common erasure using cryptographic technology, etc. There are several benefits that a company derives when erasing data using Blancco’s Disk Erasure Software: they are; · Solid-state drive (SSD) erasure that is patented (Patent No. 9286231). · Erasure of the data permanently from SSDS and HDDs simultaneously. · Automation of the hard drive erasure process to get rid of the BIOS freeze locks. · Deployment that is local and remote · Identifies false positives when carrying out internal processes of data erasure · Provision of a digitally signed Certificate of Erasure that puts the company at par with auditing and compliance. · Automatic detection, notification and erasing of areas that were hidden (DCO, HPA) as well as sectors that were remapped. · Compliance with the state, federal and international regulations and guidelines of data privacy and security. WipeDrive WipeDrive is also one of the best globally used hard drive wiping software. The technology ensures that an individual’s or organization’s data is completely erased and unrecoverable by even the most sophisticated technologies available. WipeDrive uses military-grade technology for wiping data that is able to overwrite the existing data in a drive a number of times using the Department of Defense (DoD)
  • 11. approved patterns of wiping making sure that the data cannot be recovered by any means available. When to use WipeDrive · Any situation where one wants to completely erase data from their storage facilities including the operating system, data and programs · When one needs to sell or donate their computer, WipeDrive can be of great help in completely and safely wiping the persons data · When a computer is virus infected WipeDrive can help remove the viruses, malware and other computer infections · When one wants to re-use their computer for another person or purpose, the technology will help in erasing data, programs and the operating system so that the person can start over again Before one can chose to use WipeDrive to carry out data erasure from their computers, they are advised to note that there is no way they can recover the data after the erasure process has been completed. As a result, they are advised to back up any data that they feel they may want in the future or else they will have to lose it forever. Comparing the two products; Blancco and WipeDrive, in terms of their similarities and differences, it is apparent that the two products have more similarities than differences. Both products guarantee a certified erasure reporting. Again, they all have the basic feature of RAID dismantling and access of underlying physical drives directly. Most importantly is that both products comply with state, federal and global standards including NIST, HMG/CESG and DoD among others. Their major difference lies on the fact that Blancco is the most comprehensive and trusted software tool for erasing data available in the market. If asked to choose between the above two data erasure software products, Blancco would be the preferable choice. The features that it has will be a better solution that can be applied by an individual or a corporate organization in its data erasure needs. Performance Measurement plan
  • 12. After implementation of the data masking technology to ensure security of client and company data from unauthorized access and manipulation, it is also important to understand how the solution is performing to achieve its desired outcomes. An elaborate plan of how the success of the solution is measured must be developed by a company. For Coca-Cola, this is the plan that will be utilized to measure the performance of the strategy in protecting client data. · Step 1: Involve the important stakeholders to the company to take their views concerning the state of data security · Step 2: bring other stakeholders to get their views too · Step 3: Compare the success of the company in terms of data security in relation to the past · Step 4: Contrast the company with other companies based on data security As already hinted by the performance measurement plan, the data for measuring the success of the solution will be mainly from the company stakeholders. The data therefore will be collected using methods such as interview, questionnaires, and observation among other methods. The metrics that we will use as the Key Performance Indicators to measure the success of the data masking solution will be Mean Time Between Failures (MTBF), Mean Time to Repair (MTTR) and the difference in the MTBF. The above KPIs are selected because of their applicability especially in detecting the mean of failures in the solution and hence determining if it is good or bad. Organizational Impact of the solution It is with no doubt that the intended solution in data protection will have an impact for Coca-Cola. The integration of the technology will call for change in organizational structure, especially in the IT department. Specialists who have skills in data masking will have to be added to the IT team and their presence will be dully felt in the whole organization. Another impact that will be brought by the technology
  • 13. is improvement and support of decision making in the whole organization. With the company’s information protected against malicious persons, the company can be sure that its information asset can be fully utilized in making critical decisions that affect the business in a positive manner. Protected company information helps the company make decisions that ensures their continued competitiveness in the market. In the recent data-driven decision making, company’s data remain one of the corporate assets that should be guarded by any means. A method of data protection such as data masking that Coca-Cola would implement will help secure this corporate asset that will help them make critical decisions concerning the business, decisions that ensure they continue being one of the largest global companies In addition to data protection, business intelligence (BI) can be of help in support or improve decision making by the management of Coca-Cola. Through BI, the company can collect market information and do analysis on it to aid on its important decisions. Summary Data security is a critical aspect for any corporation that wants to survive in a competitive business environment. There are various data protection tools including data masking, back up plans and data erasure that a company can use when trying to protect its data from unauthorized access and manipulation. Data masking is what Coca-Cola will be implementing to help curb the increased threat posed on its client data. To make sure that the project becomes a success, it is important for the stakeholders to be known and their roles in the project understood. Again, a project manager must possess a given set of qualities including leadership skills for them to steer a successful project. Protecting company’s data aids in supporting or improving the overall decision making by the company management team.
  • 14. References Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In 2012 International Conference on Computer Science and Electronics Engineering(Vol. 1, pp. 647-651). IEEE. Dhar, T., Chavas, J. P., Cotterill, R. W., & Gould, B. W. (2005). An Econometric Analysis of Brand‐Level Strategic Pricing Between Coca‐Cola Company and PepsiCo. Journal of Economics & Management Strategy, 14(4), 905-931. Saleh H. G A., & Hu, W. (2016). Dark side of leadership impact on project failure: towards a model. Innovation and management.