Neural object classification by pattern recognition of one dimensional data...naschibo
Pattern
Groups of measurements or observations, defining points in an appropriate multidimensional space.
Pattern recognition
Aims to classify data (patterns) based on either a priori knowledge or on statistical information extracted from the patterns.
My aim is to classify 2-dimensional objects with the help of manipulator and by the use of pattern recognition.
Neural object classification by pattern recognition of one dimensional data...naschibo
Pattern
Groups of measurements or observations, defining points in an appropriate multidimensional space.
Pattern recognition
Aims to classify data (patterns) based on either a priori knowledge or on statistical information extracted from the patterns.
My aim is to classify 2-dimensional objects with the help of manipulator and by the use of pattern recognition.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
This article is all about what AI trends will emerge in the field of creative operations in 2024. All the marketers and brand builders should be aware of these trends for their further use and save themselves some time!
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
This article is all about what AI trends will emerge in the field of creative operations in 2024. All the marketers and brand builders should be aware of these trends for their further use and save themselves some time!
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
2. Candidate Selection
Entity Class
A logical model of
an identifiable
party
• Each instance of an
Domains
entity defined within
the system should be
identified and marked
for drill down
investigation
A logical structure
of attributes
represented within
Attributes
a single entity
• Each instance of a
domain structure as
listed within the
spreadsheet (slides 5- Individual data fields under data type constraints and associated business
8) and being contained
within an identified and integrity rules
Entity should be • Each attribute type as listed within the spreadsheet (slides 5-8) and being contained within
marked for further drill an identified domain is a candidate for data obfuscation based on the data obfuscation
down investigation rules
Data Security Guidelines 2010· Page 2
3. Data Sensitivity
Level 1
• Sensitivity level 1 is a unique identifier in which a party can be identified
without further reference to other sensitive information (High Cardinality),
all instances should be obfuscated or masked
Level 2
• Sensitivity level 2 is information which collectively i.e. more than 1
instance may form a positive identification of a party, in isolation this data,
although deemed sensitive has no direct and unique identification of the
party however the more attributes supplied ultimately form a sensitivity
level 1 without a level 1 being involved (Normal-Cardinality). All combined
instances must be obfuscated
Level 3
• Sensitivity level 3 is data with a Low Cardinality ratio. All combined
instances should be obfuscated although individual instances will not
identify a party
Data Security Guidelines 2010· Page 3
4. Risk of Identification of Parties
Composite
Identifiers –
•∞ Sensitivity Level 2 • n + Composite
• Multiple composites
• High risk, these • n exponent increase identification,
identifiers will uniquely • Becomes an identifier cardinality increases as
identify party and are instances are added
traceable through as multiple instances
various public domain increase cardinality,
based systems exponent based on
cardinality
Low Cardinality
Unique Identifier –
Identifiers –
Sensitivity Level 1
Sensitivity Level 3
Data Security Guidelines 2010· Page 4
5. Attribute Identification
Entity Domain Attribute Data Type (Generic) Classification
Firstname(s) Character 2
Name Surnames / Family Name Character 2
Title / Prefix Denormalised: Character 3
Suffix Denormalised: Character 3
Salutation Denormalised: Character 2
House Number/Name Character 2
Address Line 1 Character 2
Address Address Line 2 Character 2
Address Line 3 Character 2
Client
Address Line 4 Character 2
State / County / Canton / Region etc Denormalised: Character 3
Zip / Post Code Character 2
Country Denormalised: Character 3
Home Telephone Number Character 1
Work Telephone Number Character 1
Cell/Mobile Number Character 1
Contact
Additional Telephone Numbers Character 1
Email1 Character 1
Email2 Character 1
Additional Email Accts Character 1
Data Security Guidelines 2010· Page 5
6. Attribute Identification
Entity Domain Attribute Data Type (Generic) Classification
Date of Birth Date 3
Gender Denormalised: Character 3
Political Persuasion Denormalised: Character 3
Religious or Philosophical Beliefs Denormalised: Character 3
Sexual Persuasion Denormalised: Character 3
Race or Ethnic Origin Denormalised: Character 3
Accusations or Suspicions Denormalised: Character 3
Client Personal Details
Convictions / Judgements /
Criminal Records Denormalised: Character 3
Long Character (Free text could hold
Notes sensitive details) 1
Internet usage & web tracking
information Character / W3C Logs 2
Physical and/or Mental Health Character 3
Long Character (Free text could hold
Source of Wealth sensitive details) 1
Nationality Denormalised: Character 3
Domicile Denormalised: Character 3
Spouse Name Domain 2
Children Name Domain 2
Data Security Guidelines 2010· Page 6
7. Attribute Identification
Entity Domain Attribute Data Type (Generic) Classification
SSN / Tax ID / NI Number Character 1
Passport Number Character 1
Login ID's & Passwords Character 1
Natural Keys Union / Club / Society
Membership Character 1
Bank Account Number(s) Number 1
Sort Code(s) Number 2
Client Account Name(s) Character 1
Residential Address Address Domain 2
Beneficiary Beneficiary Entity 1
IFA IFA Entity 2
Linked Data
Intermediary Intermediary Entity 2
Sub Account Sub Account Entity 1
Accountant Accountant Entity 2
Data Security Guidelines 2010· Page 7
8. Attribute Identification
Entity Domain Attribute Data Type (Generic) Classification
Beneficiary All Client Entity Domains 2
IFA All Client Entity Domains 3
Intermediary All Client Entity Domains 3
Sub Account All Client Entity Domains 1
Sensitivity level 1 is a unique identifier in which a party can be identified without further
Sensitivity Level 1 reference to other sensitive information (High Cardinality), all instances should be
obfuscated
Sensitivity level 2 is information which collectively i.e. more than 1 instance may form a
positive identification of a party, in isolation this data, although deemed sensitive has no
Classification Sensitivity Level 2 direct and unique identification of the party ,however the more attributes supplied
Key ultimately form a sensitivity level 1 without a level 1 being involved (Normal-Cardinality).
All combined instances must be obfuscated
Sensitivity Level 3 Sensitivity level 3 is data with a Low Cardinality ratio. All combined instances should be
obfuscated although individual instances will not identify a party
Note: Normalised data types obfuscated layer at the reference table level
Data Security Guidelines 2010· Page 8
9. Use-Case Example of Composite Identifiers (Sensitivity
Level 2) Data is purely for reference
• Cardinality
First Name
=>1,000,000
• Cardinality =>100,000
Surname
• Cardinality =>10,000
Country
Increase of
positive • Cardinality =>100
identification Region
by a
cumulative of • Cardinality =>5 Obfuscation point
sensitivity 2 Post Code
attributes held
within the
same domain House • Cardinality =<2 Point of probability
Number
Data Security Guidelines 2010· Page 9
10. Use-Case Example of Composite Identifiers (Sensitivity
Level 3) Data is purely for reference
• Cardinality
Gender =>100,000,000
• Cardinality
Country =>10,000,000
Little increase • Cardinality =>1,000,000
of positive Region
identification
by a • Cardinality =>3,000
cumulative of Date of Birth
sensitivity 1
until the
addition of a
• Cardinality =>5 Obfuscation point
Surname
sensitivity
level 2
attribute Post • Cardinality <=2 Point of probability
Code
Data Security Guidelines 2010· Page 10
11. Numeric Obfuscation
Numbers used in aggregate functions and checked to provide accuracy
i.e. holdings, values, transactions, should not be obfuscated if all other
attributes within the domain/entity structure have been obfuscated and
there is no method of reversing the obfuscation layer to identify sensitive
data against the values, barring that:
Fixed point numbers
should be Floating point
Integers should be Ordinal numbers
obfuscated equal to numbers should be
obfuscated equal to Currency/percentage should have the
or less than the obfuscated equal to
or less than the formatting over alphabetic element
original precision or less than the
length of the original numeric values obfuscated in the
and obfuscated but original precision
number but still should be retained same way as an
retain the original and scale number
conform to any for verification alpha data element
scale number but but still conform to
specific business purposes retaining the same
still conform to any any specific
rules two character format
specific business business rules
rules
Data Security Guidelines 2010· Page 11
12. Alpha Obfuscation
Alphabetic and Alphanumeric data types should be
obfuscated retaining the original structure of the underlying
data, however certain exceptions exist for search/view
criteria
SGML/XML/HTML/XHTML/RSS
data formats must retain XML
Embedded Java Code must be
reserved characters in order for
retained but underlying attributes
them to be used in native views,
obfuscated
DTD, XLS, Web based formats
etc.
Data Security Guidelines 2010· Page 12
13. Key Obfuscation
Obfuscation of keys gives rise to the challenge of failure
of Declarative Referential Integrity when presented to
certain applications that rely upon them thus:
Natural keys that are
Natural keys that are
identified as non- Surrogate keys are
identified as sensitive
sensitive are out of out of scope and
data can only be
scope and may be should be retained
anonymised/masked
retained
Data Security Guidelines 2010· Page 13
14. Date Obfuscation 1
Dates should retain the original date format of
the National Character set of the underlying
data
Day names
should be Ordinal numbers
obfuscated as per should have the
Day of the week
the alpha data alphabetic
Day numbers numbers should Month numbers
element, however element
should be be obfuscated but should be
the length of the obfuscated in the
obfuscated but retain the 0-6 or obfuscated but
day must be same way as an
retain the 1-31 1-7 formatting retain the 1-12
changed to a alpha data
format dependent on format
length between 6 element retaining
platform
and 9 but not the the same two
same length as character format
the original day
Data Security Guidelines 2010· Page 14
15. Date Obfuscation 2
Dates should retain the original date format of
the National Character set of the underlying
data
Year numbers should always retain
the century 4-number format in the
range (current year- any validation
Month names should be
criteria) to current year-1 for years
obfuscated as per the alpha data
in the past and current year + 1 to
element, however the length of the Decision support systems relying
(current year +any validation
month must be changed to a length on “roll-forward”/”roll-back” date
criteria) for projected ranges. (This
between 3 and 12 but not the same scenarios and date range queries
potentially could cause problems
length as the original month. must retain the requested period
with date verification functions and
Abbreviated month names should change between two dates
any function code which performs
be obfuscated retaining the 3-
these verifications must utilise the
character format
same seed value as the date value
and must fully enclose within the
same block all other dates)
Data Security Guidelines 2010· Page 15
16. Granularity of Access to Sensitive Data
Business
Users only
Business Users,
Development &
Support
Development
& Support only
Production
• Production environments
must be fully obfuscated
to all Development,
Support, and Non-
UAT Authorised users
• UAT environments must • Business users may see
be fully obfuscated to all sensitive data based on
Development, Support, their individual levels of
and Non-Authorised users authorisation
• Business users may see • Access to data by
sensitive data based on Support users should be
their individual levels of disallowed if possible
Development authorisation • If access is allowed for
• Access to data by Support “fix-on-fail” functionality
• Development environments users should be this must be keystroke
must be fully obfuscated at disallowed if possible logged through an
the data level (not auditing application
obfuscated views) as • If access is allowed for
developers usually hold “fix-on-fail” functionality
higher privileges in these this must be keystroke
environments logged through an auditing
application
Data Security Guidelines 2010· Page 16
17. Deployment Methods
Data Security Guideline Policy
Shared
Full Environment Hybrid
Environment
Access Control Environments
Access
Prod, UAT, SIT &
Dev environment Prod, UAT, & SIT
Data may share different Data is environments may
Prod, UAT, SIT & obfuscation/anonym user types i.e. obfuscated/anonymi be obfuscated at a Data is obfuscated
Dev environments isation/masking is business, sed/masked based user type level but to the same rules
are fully segregated performed through developers, on the authority transfers of data but the deployment
by user type, or ETL tools from one support. The level level of the user into Dev method uses both
privilege level. environment to the of granularity must type or privilege environments may technical methods
next be defined on a per- level be performed
user type or through ETL utilities
privilege level basis.
Data Security Guidelines 2010· Page 17
18. Benefits & Drawbacks of Deployment Methods
Full Shared
Hybrid
Environment Environment
Access Control Environments
Access Control
Benefits Benefits Benefits
• Leverage existing tools • Higher level of access • All prior mentioned
capabilities and vendor support granularity, greater flexibility • Greater flexibility in defining a
• Guaranteed obfuscation • Define the level of encryption to solution which fits with a current
contained within the environment conform to national regulatory “modus operandi”
• User access managed at controls
different layer to data access • No load window issues all users
• Access to environment share same data instance
determines visibility
Drawbacks Drawbacks Drawbacks
•ETL tool license/platform • Development costs • All prior mentioned
costs • Requires clear delineation of • Potential support complexity
•Load window issues user roles and role management issues
•Metadata & cipher security • Proprietary technology solutions
concerns
Data Security Guidelines 2010· Page 18
19. Data Obfuscation Methodology
Full Hybrid
Environmental environment Shared
Access • No access to Environment
Control PROD,
• Data obfuscation
obfuscation in UAT
• No data based on roles
based on roles
obfuscation, none and rules of
and rules, ETL
authorised users sensitivity
obfuscation into
have no access DEV
Data Security Guidelines 2010· Page 19
20. Environmental Control (Access Method)
Informatica Informatica
PROD UAT DEV
ETL ETL
Instance 1 (Apply Instance 2 (Apply Instance 3
Obfuscation Obfuscation
Rules)
(Obfuscated) Rules)
(Obfuscated)
Development & Support
Business Users
Users
Data Security Guidelines 2010· Page 20
21. Environmental Control (Hybrid Method)
Informatica
Periodic Refresh or
Duplex Feed
PROD UAT DEV
ETL
Instance 1 Instance 1 (Apply Instance 3
Obfuscation
or 2 Rules)
(Totally
Obfuscated)
Obfuscation
Layer
Development & Support
Business Users
Users
Data Security Guidelines 2010· Page 21
22. Appendix
Terms of Reference
Dynamic
Lingual Risk Non-Deterministic Monte Carlo Obfuscation
Reference Impact/Probability Obfuscation Method Function
Methods
Data Security Guidelines 2010· Page 22
23. Lingual Reference
To remain unidentified, nameless
i.e. NULL therefore a field that is
Anonymous/Anonymised anonymous would not show any
data at all and you could not verify
the structure of the data
To confuse, scramble i.e. encrypt,
therefore you could verify that a
date was a date albeit the wrong
one, a number is a number albeit
Obfuscate/Obfuscated the wrong one and alpha is alpha in
the same structure so you would
see the structure but the sensitive
data would be indecipherable
To cover, hide, this would normally
be used in password protection
Mask/Masked where the asterisk is displayed as
typed
Anonymous and Obfuscate are used in literature, an anonymous writer is unknown whereas writing under a nom de plume
is obfuscated
Data Security Guidelines 2010· Page 23
24. Risk impact/Probability
Probability - A risk is an event that "may"
occur. The probability of it occurring can
range anywhere from just above 0% to just
below 100%. (Note: It can't be exactly
100%, because then it would be a certainty,
not a risk. And it can't be exactly 0%, or it
wouldn't be a risk.)
Impact - A risk, by its very nature, always
has a negative impact. However, the size of
the impact varies in terms of cost and
impact on some other critical factor.
We apply these rules to determine when to
obfuscate data and when not to
Data Security Guidelines 2010· Page 24
25. Non-Deterministic Obfuscation
A variety of factors can cause an algorithm to
behave in a way which is not deterministic, or
non-deterministic:
• If it uses external state other than the input, such as user input, a
global variable, a hardware timer value, a random value, or stored A major problem with deterministic algorithms is that
disk data. sometimes, we don't want the results to be predictable.
• If it operates in a way that is timing-sensitive, for example if it has For example, if you are playing an on-line game of
multiple processors writing to the same data at the same time. In blackjack that shuffles its deck using a pseudorandom
this case, the precise order in which each processor writes its data
will affect the result. number generator, a clever gambler might guess precisely
• If a hardware error causes its state to change in an unexpected the numbers the generator will choose and so determine
way. the entire contents of the deck ahead of time, allowing
him to cheat. Similar problems arise in cryptography,
where private keys are often generated using such a
generator. This sort of problem is generally avoided using
a cryptographically secure pseudo-random number
generator.
Data Security Guidelines 2010· Page 25
26. The Monte Carlo Methods
Monte Carlo methods are computational algorithms that rely on
repeated random sampling to compute their results one of which is a
stochastic function to create an obfuscation layer
Stochastic programming is a framework for modelling optimization
problems that involve uncertainty.
Because of their reliance on repeated computation of random or
pseudo-random numbers, these methods are most suited and tend to
be used when it is unfeasible or impossible to compute an exact result
with a deterministic algorithm thus ensuring data obfuscation
These are the building blocks to secure obfuscation of highly
sensitive data within the banking environment and will satisfy an
external audit
Data Security Guidelines 2010· Page 26
27. Dynamic Obfuscation Function Methods
This is an example of a high level data
obfuscation function in which a decision
is made based on the previous criteria of
when to obfuscate and the process of
obfuscation for an alpha data type
(simplest form)
Data is obfuscated on the
decision point based on the
underlying technologies info-
gap non-probalistic theory
methods of random number
generation which creates seed
data for ASCII conversion of
real-data
Data Security Guidelines 2010· Page 27