SlideShare a Scribd company logo
1 of 31
Download to read offline
Unit 5
Dr. SHUBHRA GOYAL
SECURITY MODULE OUTLINE
Data security
 Data security is about keeping data safe.
 If the data on a computer system is damaged, lost, or stolen, it can lead to
disaster.
 Data security is a set of processes and practices designed to protect your
critical information technology (IT) ecosystem.
 This included files, databases, accounts, and networks.
 Effective data security adopts a set of controls, applications, and techniques
that identify the importance of various datasets and apply the most appropriate
security controls.
 Thus, data security is one of many critical methods for evaluating threats and
reducing the risk associated with data storage and handling.
Why is Data Security Important?
Data security is critical to public and private sector organizations.
Companies have to protect their user and customer data from
falling into the wrong hands.
Ex: Payment Card Industry Data Security Standard (PCI DSS)
forces companies to take all reasonable measures to protect user
data.
There is the reputational risk of a data breach or hack.
Methods/Types of Data Security
 ACCESS CONTROLS
 AUTHENTICATION
 BACKUPS AND RECOVERY
 DATA ERASURE
 DATA MASKING
 DATA RESILIENCY
 ENCRYPTION
Main Elements of Data Security
There are three core elements
to data security :
 Confidentiality
 Integrity
 Availability
These concepts are also
referred to as the CIA Triad.
Data Security Technologies
 Data Auditing
 Data Real-Time Alerts
 Data Risk Assessment
 Data Minimization
 Purge Stale Data
Best Practices for Ensuring Data Security
 Quarantine Sensitive Files
 Behavior-Based Permissions
 Prepare for Cyber Threats
 Delete Unused Data
FAQs
Are there different types of data security?
 Yes. While data security refers to the general practice of protecting sensitive
information, it can take various forms. Firewalls, password protection, and multi-
factor authentication are all types of data security measures typically employed.
What is the role of data security?
 Data security functions to prevent data breaches, reduce risk of data exposure,
and for regulatory compliance purposes. Within any organization, data security’s
role is to ensure the ongoing safe and secure use of private data while minimizing
exposure risk.
What does data security include?
 Data security encompasses an array of technology, business, or organizational
practices. This includes things like a comprehensive data security policy,
cybersecurity software, and thorough data sanitization business processes.
Methods for managing and securing
data
 Train the Workforce
 Embrace a Data-Centric Security Strategy
 Implement Multi-Factor Authentication (MFA)
 Set Strict Permissions for the Cloud
 Exercise Vigilance for Patch Management
 Knowing where data lives
 Tracking user access
 Blocking high risk activities
Data Security Management
 Data security management involves a variety of techniques, processes
and practices for keeping business data safe and inaccessible by
unauthorized parties.
 Data security management systems focus on protecting sensitive
data, like personal information or business-critical intellectual
property.
 Ex: Data security management can involve creating information
security policies, identifying security risks, and spotting and assessing
security threats to IT systems.
DATA MANAGEMENT
 It is strategic control of data
 It is concerned with:
 Data quality
 Data architecture
 Database management
 Database security
 Data analytics
 Data integration
Common Data Management Techniques
Customer Data Management Data Attribute
Data Availability Data Cleansing
Data Consumer Data Control
Data Corruption Data Custodian
Data Entity Data Escrow
Data Integration Data Liberation
Data Lineage Data Loss
Data Masking Data Message
Data Owner Data Profiling
Data Purging Data Quality
Customer Data Management
 It is processes and tools for managing customer data including every
interaction with the customer such as
 Contact information
 Quotes
 Purchase history
 Product details
 Feedback
 Customer service tickets
 Many organizations centers only about customer data, including every
process, practice and decisions.
 In some organizations, it is a subset of relationship management.
Data Attribute
 Data Entity is an object in a data model. Ex. Customer or
address.
 Entities are containers of attributes and relationships.
 Data Attribute are properties of data entity.
Data Availability
 It is termed as UPTIME of data services, infrastructure and
hardware.
 High availability data services are achieved with
reliability engineering and service management
techniques that minimizes failure and mean time to
repair.
Data Cleansing
 It is a process of detecting and correcting data quality issues.
 It includes automatic steps such as queries designed to detect broken data.
 It also includes manual steps such as Data Wrangling.
 Data Wrangling is a process of cleaning and transforming data so that it can be
consumed by information technology.
 Data Wrangling is associated with large, messy sets of raw unstructured data.
 Corrupt data
 Inconsistent data
 Inaccurate data
 Irrelevant data
 Dirty data
Data Cleansing Examples
Data Consumer
 A data producer is a user interface, system or device that
collects data that’s relevant to an organization.
 A data consumer is a user interface, system or tools that
uses data.
 Data producer creates data and data consumers uses it.
Data Control
 It is a process of governing and managing data.
 Examples include:
 Data Quality – to ensure accuracy, completeness, credibility and
timeliness of data.
 Audit trail – capturing data logs such that data access’s doesn’t
get unnoticed.
 Information Security – protecting data from unauthorized access.
 Data Custodian – the technical owner of collection of data
responsible for its administration.
Data Escrow
It is a practice of storing data with neutral third
party.
A data escrow service takes deposit of data on a
regular basis.
Data Integration
 It is a process of moving data.
 This can occur between data sources that create copies or view of the same data
for different purposes. Ex, Data warehouse
 It can also occur between data sources and systems that simply use the data or
display it to a person.
Data Liberation
 It is a process of allowing users to view and export the data.
 It can be used as a legal principle
 It reduces privacy concerns as it allows users to see what
we know about them.
Data Lineage
 It is a metadata that explains where data came from and
how it was calculated.
 In big data environment, such information can be difficult to
research manually as data flows across large number of
systems.
 Various examples include
 Trading
 Risk management
 Marketing
Data Masking
 It is a process of replacing real data with similar fake data for the
purpose of training and testing.
 Creating test data from scratch is extremely resource intensive.
 It is used to remove anything personally identifiable or confidential in
data.
Data Profiling
 It is a process of analysing a dataset.
 It is done to support data governance, data management or to make
decisions.
 Common data profiling examples are:
 Data Quality
 Data credibility
Data Purging
 It is a method of permanently deleting data such that it can’t be recovered
by standard methods.
Why Data Management is
Important
 1. Increases productivity: It reduces the time that people spend looking for
information.
 It ensures that they can do their job efficiently.
 Employees will also be able to understand and communicate information to
others.
 It makes it easy to access past correspondence and prevent miscommunication
due to messages lost in transit.
 2. Smooth operations: A seamless operating system is every business’ dream and
data management can make that a reality.
 It is one of the determining factors in ensuring the success of an organisation; if
one takes too long to respond to their customers or to the changing trends
around them, they run the risk of falling behind.
 3. Reduce security risk
 4. Cost effective: It will spend less money trying to fix problems that shouldn’t have
occurred in the first place.
 It also prevents spending time-and money- duplicating information that already exists.
 5. Minimal chance of data loss: It will reduce the chances of losing important company
information.
 It also ensures that your data is backed up and in case of a sudden glitch or system
failure, any data that is lost can be retrieved easily, limiting the repercussions of the
same.
 6. Better decision making: The quality of your decisions improve drastically.
 A centralised system ensures a framework to plan, organise and delegate.
 Additionally, a good system will ensure good feedback,
which in turn will lead to necessary updates to the process that will only benefit your
company in the long run.
Why Data Management is
Important
THANK YOU!!!

More Related Content

What's hot

IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoEd Ahl
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordCor Ranzijn
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemuday sharma
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
 
Data privacy how do you protect and delete data in the cloud
Data privacy  how do you protect and delete data in the cloudData privacy  how do you protect and delete data in the cloud
Data privacy how do you protect and delete data in the cloudSalesBabuCRM
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafCompany Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafJessica Graf
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 

What's hot (20)

IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon Toigo
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
Lkm 2011
Lkm 2011Lkm 2011
Lkm 2011
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Task 3
Task 3Task 3
Task 3
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
Data privacy how do you protect and delete data in the cloud
Data privacy  how do you protect and delete data in the cloudData privacy  how do you protect and delete data in the cloud
Data privacy how do you protect and delete data in the cloud
 
Task 2
Task 2Task 2
Task 2
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafCompany Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 

Similar to Data Security Module Outline

Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...TEWMAGAZINE
 
IMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docxIMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docxwrite4
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
9 Benefits OF Effective Data Management | Data Management Services In Delhi
9 Benefits OF Effective Data Management | Data Management Services In Delhi9 Benefits OF Effective Data Management | Data Management Services In Delhi
9 Benefits OF Effective Data Management | Data Management Services In DelhiOdyssey Web Designing Company India
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...Ulf Mattsson
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxtodd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxhealdkathaleen
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 

Similar to Data Security Module Outline (20)

Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...
 
IMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docxIMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docx
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Data Security
Data SecurityData Security
Data Security
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
9 Benefits OF Effective Data Management | Data Management Services In Delhi
9 Benefits OF Effective Data Management | Data Management Services In Delhi9 Benefits OF Effective Data Management | Data Management Services In Delhi
9 Benefits OF Effective Data Management | Data Management Services In Delhi
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Data security
Data securityData security
Data security
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Information security
Information securityInformation security
Information security
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 

Recently uploaded

Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Data Warehouse , Data Cube Computation
Data Warehouse   , Data Cube ComputationData Warehouse   , Data Cube Computation
Data Warehouse , Data Cube Computationsit20ad004
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 

Recently uploaded (20)

Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Data Warehouse , Data Cube Computation
Data Warehouse   , Data Cube ComputationData Warehouse   , Data Cube Computation
Data Warehouse , Data Cube Computation
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
Call Girls In Noida City Center Metro 24/7✡️9711147426✡️ Escorts Service
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 

Data Security Module Outline

  • 3. Data security  Data security is about keeping data safe.  If the data on a computer system is damaged, lost, or stolen, it can lead to disaster.  Data security is a set of processes and practices designed to protect your critical information technology (IT) ecosystem.  This included files, databases, accounts, and networks.  Effective data security adopts a set of controls, applications, and techniques that identify the importance of various datasets and apply the most appropriate security controls.  Thus, data security is one of many critical methods for evaluating threats and reducing the risk associated with data storage and handling.
  • 4. Why is Data Security Important? Data security is critical to public and private sector organizations. Companies have to protect their user and customer data from falling into the wrong hands. Ex: Payment Card Industry Data Security Standard (PCI DSS) forces companies to take all reasonable measures to protect user data. There is the reputational risk of a data breach or hack.
  • 5. Methods/Types of Data Security  ACCESS CONTROLS  AUTHENTICATION  BACKUPS AND RECOVERY  DATA ERASURE  DATA MASKING  DATA RESILIENCY  ENCRYPTION
  • 6. Main Elements of Data Security There are three core elements to data security :  Confidentiality  Integrity  Availability These concepts are also referred to as the CIA Triad.
  • 7. Data Security Technologies  Data Auditing  Data Real-Time Alerts  Data Risk Assessment  Data Minimization  Purge Stale Data
  • 8. Best Practices for Ensuring Data Security  Quarantine Sensitive Files  Behavior-Based Permissions  Prepare for Cyber Threats  Delete Unused Data
  • 9. FAQs Are there different types of data security?  Yes. While data security refers to the general practice of protecting sensitive information, it can take various forms. Firewalls, password protection, and multi- factor authentication are all types of data security measures typically employed. What is the role of data security?  Data security functions to prevent data breaches, reduce risk of data exposure, and for regulatory compliance purposes. Within any organization, data security’s role is to ensure the ongoing safe and secure use of private data while minimizing exposure risk. What does data security include?  Data security encompasses an array of technology, business, or organizational practices. This includes things like a comprehensive data security policy, cybersecurity software, and thorough data sanitization business processes.
  • 10. Methods for managing and securing data  Train the Workforce  Embrace a Data-Centric Security Strategy  Implement Multi-Factor Authentication (MFA)  Set Strict Permissions for the Cloud  Exercise Vigilance for Patch Management  Knowing where data lives  Tracking user access  Blocking high risk activities
  • 11. Data Security Management  Data security management involves a variety of techniques, processes and practices for keeping business data safe and inaccessible by unauthorized parties.  Data security management systems focus on protecting sensitive data, like personal information or business-critical intellectual property.  Ex: Data security management can involve creating information security policies, identifying security risks, and spotting and assessing security threats to IT systems.
  • 12. DATA MANAGEMENT  It is strategic control of data  It is concerned with:  Data quality  Data architecture  Database management  Database security  Data analytics  Data integration
  • 13. Common Data Management Techniques Customer Data Management Data Attribute Data Availability Data Cleansing Data Consumer Data Control Data Corruption Data Custodian Data Entity Data Escrow Data Integration Data Liberation Data Lineage Data Loss Data Masking Data Message Data Owner Data Profiling Data Purging Data Quality
  • 14. Customer Data Management  It is processes and tools for managing customer data including every interaction with the customer such as  Contact information  Quotes  Purchase history  Product details  Feedback  Customer service tickets  Many organizations centers only about customer data, including every process, practice and decisions.  In some organizations, it is a subset of relationship management.
  • 15. Data Attribute  Data Entity is an object in a data model. Ex. Customer or address.  Entities are containers of attributes and relationships.  Data Attribute are properties of data entity.
  • 16. Data Availability  It is termed as UPTIME of data services, infrastructure and hardware.  High availability data services are achieved with reliability engineering and service management techniques that minimizes failure and mean time to repair.
  • 17. Data Cleansing  It is a process of detecting and correcting data quality issues.  It includes automatic steps such as queries designed to detect broken data.  It also includes manual steps such as Data Wrangling.  Data Wrangling is a process of cleaning and transforming data so that it can be consumed by information technology.  Data Wrangling is associated with large, messy sets of raw unstructured data.
  • 18.  Corrupt data  Inconsistent data  Inaccurate data  Irrelevant data  Dirty data Data Cleansing Examples
  • 19. Data Consumer  A data producer is a user interface, system or device that collects data that’s relevant to an organization.  A data consumer is a user interface, system or tools that uses data.  Data producer creates data and data consumers uses it.
  • 20. Data Control  It is a process of governing and managing data.  Examples include:  Data Quality – to ensure accuracy, completeness, credibility and timeliness of data.  Audit trail – capturing data logs such that data access’s doesn’t get unnoticed.  Information Security – protecting data from unauthorized access.  Data Custodian – the technical owner of collection of data responsible for its administration.
  • 21. Data Escrow It is a practice of storing data with neutral third party. A data escrow service takes deposit of data on a regular basis.
  • 22. Data Integration  It is a process of moving data.  This can occur between data sources that create copies or view of the same data for different purposes. Ex, Data warehouse  It can also occur between data sources and systems that simply use the data or display it to a person.
  • 23. Data Liberation  It is a process of allowing users to view and export the data.  It can be used as a legal principle  It reduces privacy concerns as it allows users to see what we know about them.
  • 24. Data Lineage  It is a metadata that explains where data came from and how it was calculated.  In big data environment, such information can be difficult to research manually as data flows across large number of systems.  Various examples include  Trading  Risk management  Marketing
  • 25. Data Masking  It is a process of replacing real data with similar fake data for the purpose of training and testing.  Creating test data from scratch is extremely resource intensive.  It is used to remove anything personally identifiable or confidential in data.
  • 26. Data Profiling  It is a process of analysing a dataset.  It is done to support data governance, data management or to make decisions.  Common data profiling examples are:  Data Quality  Data credibility
  • 27. Data Purging  It is a method of permanently deleting data such that it can’t be recovered by standard methods.
  • 28.
  • 29. Why Data Management is Important  1. Increases productivity: It reduces the time that people spend looking for information.  It ensures that they can do their job efficiently.  Employees will also be able to understand and communicate information to others.  It makes it easy to access past correspondence and prevent miscommunication due to messages lost in transit.  2. Smooth operations: A seamless operating system is every business’ dream and data management can make that a reality.  It is one of the determining factors in ensuring the success of an organisation; if one takes too long to respond to their customers or to the changing trends around them, they run the risk of falling behind.
  • 30.  3. Reduce security risk  4. Cost effective: It will spend less money trying to fix problems that shouldn’t have occurred in the first place.  It also prevents spending time-and money- duplicating information that already exists.  5. Minimal chance of data loss: It will reduce the chances of losing important company information.  It also ensures that your data is backed up and in case of a sudden glitch or system failure, any data that is lost can be retrieved easily, limiting the repercussions of the same.  6. Better decision making: The quality of your decisions improve drastically.  A centralised system ensures a framework to plan, organise and delegate.  Additionally, a good system will ensure good feedback, which in turn will lead to necessary updates to the process that will only benefit your company in the long run. Why Data Management is Important