SlideShare a Scribd company logo
Unit 5
Dr. SHUBHRA GOYAL
SECURITY MODULE OUTLINE
Data security
 Data security is about keeping data safe.
 If the data on a computer system is damaged, lost, or stolen, it can lead to
disaster.
 Data security is a set of processes and practices designed to protect your
critical information technology (IT) ecosystem.
 This included files, databases, accounts, and networks.
 Effective data security adopts a set of controls, applications, and techniques
that identify the importance of various datasets and apply the most appropriate
security controls.
 Thus, data security is one of many critical methods for evaluating threats and
reducing the risk associated with data storage and handling.
Why is Data Security Important?
Data security is critical to public and private sector organizations.
Companies have to protect their user and customer data from
falling into the wrong hands.
Ex: Payment Card Industry Data Security Standard (PCI DSS)
forces companies to take all reasonable measures to protect user
data.
There is the reputational risk of a data breach or hack.
Methods/Types of Data Security
 ACCESS CONTROLS
 AUTHENTICATION
 BACKUPS AND RECOVERY
 DATA ERASURE
 DATA MASKING
 DATA RESILIENCY
 ENCRYPTION
Main Elements of Data Security
There are three core elements
to data security :
 Confidentiality
 Integrity
 Availability
These concepts are also
referred to as the CIA Triad.
Data Security Technologies
 Data Auditing
 Data Real-Time Alerts
 Data Risk Assessment
 Data Minimization
 Purge Stale Data
Best Practices for Ensuring Data Security
 Quarantine Sensitive Files
 Behavior-Based Permissions
 Prepare for Cyber Threats
 Delete Unused Data
FAQs
Are there different types of data security?
 Yes. While data security refers to the general practice of protecting sensitive
information, it can take various forms. Firewalls, password protection, and multi-
factor authentication are all types of data security measures typically employed.
What is the role of data security?
 Data security functions to prevent data breaches, reduce risk of data exposure,
and for regulatory compliance purposes. Within any organization, data security’s
role is to ensure the ongoing safe and secure use of private data while minimizing
exposure risk.
What does data security include?
 Data security encompasses an array of technology, business, or organizational
practices. This includes things like a comprehensive data security policy,
cybersecurity software, and thorough data sanitization business processes.
Methods for managing and securing
data
 Train the Workforce
 Embrace a Data-Centric Security Strategy
 Implement Multi-Factor Authentication (MFA)
 Set Strict Permissions for the Cloud
 Exercise Vigilance for Patch Management
 Knowing where data lives
 Tracking user access
 Blocking high risk activities
Data Security Management
 Data security management involves a variety of techniques, processes
and practices for keeping business data safe and inaccessible by
unauthorized parties.
 Data security management systems focus on protecting sensitive
data, like personal information or business-critical intellectual
property.
 Ex: Data security management can involve creating information
security policies, identifying security risks, and spotting and assessing
security threats to IT systems.
DATA MANAGEMENT
 It is strategic control of data
 It is concerned with:
 Data quality
 Data architecture
 Database management
 Database security
 Data analytics
 Data integration
Common Data Management Techniques
Customer Data Management Data Attribute
Data Availability Data Cleansing
Data Consumer Data Control
Data Corruption Data Custodian
Data Entity Data Escrow
Data Integration Data Liberation
Data Lineage Data Loss
Data Masking Data Message
Data Owner Data Profiling
Data Purging Data Quality
Customer Data Management
 It is processes and tools for managing customer data including every
interaction with the customer such as
 Contact information
 Quotes
 Purchase history
 Product details
 Feedback
 Customer service tickets
 Many organizations centers only about customer data, including every
process, practice and decisions.
 In some organizations, it is a subset of relationship management.
Data Attribute
 Data Entity is an object in a data model. Ex. Customer or
address.
 Entities are containers of attributes and relationships.
 Data Attribute are properties of data entity.
Data Availability
 It is termed as UPTIME of data services, infrastructure and
hardware.
 High availability data services are achieved with
reliability engineering and service management
techniques that minimizes failure and mean time to
repair.
Data Cleansing
 It is a process of detecting and correcting data quality issues.
 It includes automatic steps such as queries designed to detect broken data.
 It also includes manual steps such as Data Wrangling.
 Data Wrangling is a process of cleaning and transforming data so that it can be
consumed by information technology.
 Data Wrangling is associated with large, messy sets of raw unstructured data.
 Corrupt data
 Inconsistent data
 Inaccurate data
 Irrelevant data
 Dirty data
Data Cleansing Examples
Data Consumer
 A data producer is a user interface, system or device that
collects data that’s relevant to an organization.
 A data consumer is a user interface, system or tools that
uses data.
 Data producer creates data and data consumers uses it.
Data Control
 It is a process of governing and managing data.
 Examples include:
 Data Quality – to ensure accuracy, completeness, credibility and
timeliness of data.
 Audit trail – capturing data logs such that data access’s doesn’t
get unnoticed.
 Information Security – protecting data from unauthorized access.
 Data Custodian – the technical owner of collection of data
responsible for its administration.
Data Escrow
It is a practice of storing data with neutral third
party.
A data escrow service takes deposit of data on a
regular basis.
Data Integration
 It is a process of moving data.
 This can occur between data sources that create copies or view of the same data
for different purposes. Ex, Data warehouse
 It can also occur between data sources and systems that simply use the data or
display it to a person.
Data Liberation
 It is a process of allowing users to view and export the data.
 It can be used as a legal principle
 It reduces privacy concerns as it allows users to see what
we know about them.
Data Lineage
 It is a metadata that explains where data came from and
how it was calculated.
 In big data environment, such information can be difficult to
research manually as data flows across large number of
systems.
 Various examples include
 Trading
 Risk management
 Marketing
Data Masking
 It is a process of replacing real data with similar fake data for the
purpose of training and testing.
 Creating test data from scratch is extremely resource intensive.
 It is used to remove anything personally identifiable or confidential in
data.
Data Profiling
 It is a process of analysing a dataset.
 It is done to support data governance, data management or to make
decisions.
 Common data profiling examples are:
 Data Quality
 Data credibility
Data Purging
 It is a method of permanently deleting data such that it can’t be recovered
by standard methods.
Why Data Management is
Important
 1. Increases productivity: It reduces the time that people spend looking for
information.
 It ensures that they can do their job efficiently.
 Employees will also be able to understand and communicate information to
others.
 It makes it easy to access past correspondence and prevent miscommunication
due to messages lost in transit.
 2. Smooth operations: A seamless operating system is every business’ dream and
data management can make that a reality.
 It is one of the determining factors in ensuring the success of an organisation; if
one takes too long to respond to their customers or to the changing trends
around them, they run the risk of falling behind.
 3. Reduce security risk
 4. Cost effective: It will spend less money trying to fix problems that shouldn’t have
occurred in the first place.
 It also prevents spending time-and money- duplicating information that already exists.
 5. Minimal chance of data loss: It will reduce the chances of losing important company
information.
 It also ensures that your data is backed up and in case of a sudden glitch or system
failure, any data that is lost can be retrieved easily, limiting the repercussions of the
same.
 6. Better decision making: The quality of your decisions improve drastically.
 A centralised system ensures a framework to plan, organise and delegate.
 Additionally, a good system will ensure good feedback,
which in turn will lead to necessary updates to the process that will only benefit your
company in the long run.
Why Data Management is
Important
THANK YOU!!!

More Related Content

What's hot

IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
Eryk Budi Pratama
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
LindaWatson19
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoEd Ahl
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
NextLabs, Inc.
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
Cor Ranzijn
 
Lkm 2011
Lkm 2011Lkm 2011
Lkm 2011
Anandavasagan
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
uday sharma
 
Task 3
Task 3Task 3
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
IJECEIAES
 
Data privacy how do you protect and delete data in the cloud
Data privacy  how do you protect and delete data in the cloudData privacy  how do you protect and delete data in the cloud
Data privacy how do you protect and delete data in the cloud
SalesBabuCRM
 
Task 2
Task 2Task 2
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
RSIS International
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafCompany Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafJessica Graf
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
asundaram1
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
Network Intelligence India
 

What's hot (20)

IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon Toigo
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
Lkm 2011
Lkm 2011Lkm 2011
Lkm 2011
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Task 3
Task 3Task 3
Task 3
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
Data privacy how do you protect and delete data in the cloud
Data privacy  how do you protect and delete data in the cloudData privacy  how do you protect and delete data in the cloud
Data privacy how do you protect and delete data in the cloud
 
Task 2
Task 2Task 2
Task 2
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica GrafCompany Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 

Similar to Unit 5 v2

Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...
TEWMAGAZINE
 
IMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docxIMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docx
write4
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
IJERA Editor
 
Data Security
Data SecurityData Security
Data Security
ankita_kashyap
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
9 Benefits OF Effective Data Management | Data Management Services In Delhi
9 Benefits OF Effective Data Management | Data Management Services In Delhi9 Benefits OF Effective Data Management | Data Management Services In Delhi
9 Benefits OF Effective Data Management | Data Management Services In Delhi
Odyssey Web Designing Company India
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
David J Rosenthal
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
Ulf Mattsson
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
todd271
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
healdkathaleen
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Information security
Information securityInformation security
Information security
Sanjay Tiwari
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
Bharath Rao
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
IRJET Journal
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 

Similar to Unit 5 v2 (20)

Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...
 
IMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docxIMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docx
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Data Security
Data SecurityData Security
Data Security
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
9 Benefits OF Effective Data Management | Data Management Services In Delhi
9 Benefits OF Effective Data Management | Data Management Services In Delhi9 Benefits OF Effective Data Management | Data Management Services In Delhi
9 Benefits OF Effective Data Management | Data Management Services In Delhi
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docxRunning head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
Running head DATA INTEGRITY THREATS TO ORGANIZATIONS1DATA INTE.docx
 
Data security
Data securityData security
Data security
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Information security
Information securityInformation security
Information security
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 

Recently uploaded

一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
AlejandraGmez176757
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 

Recently uploaded (20)

一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 

Unit 5 v2

  • 3. Data security  Data security is about keeping data safe.  If the data on a computer system is damaged, lost, or stolen, it can lead to disaster.  Data security is a set of processes and practices designed to protect your critical information technology (IT) ecosystem.  This included files, databases, accounts, and networks.  Effective data security adopts a set of controls, applications, and techniques that identify the importance of various datasets and apply the most appropriate security controls.  Thus, data security is one of many critical methods for evaluating threats and reducing the risk associated with data storage and handling.
  • 4. Why is Data Security Important? Data security is critical to public and private sector organizations. Companies have to protect their user and customer data from falling into the wrong hands. Ex: Payment Card Industry Data Security Standard (PCI DSS) forces companies to take all reasonable measures to protect user data. There is the reputational risk of a data breach or hack.
  • 5. Methods/Types of Data Security  ACCESS CONTROLS  AUTHENTICATION  BACKUPS AND RECOVERY  DATA ERASURE  DATA MASKING  DATA RESILIENCY  ENCRYPTION
  • 6. Main Elements of Data Security There are three core elements to data security :  Confidentiality  Integrity  Availability These concepts are also referred to as the CIA Triad.
  • 7. Data Security Technologies  Data Auditing  Data Real-Time Alerts  Data Risk Assessment  Data Minimization  Purge Stale Data
  • 8. Best Practices for Ensuring Data Security  Quarantine Sensitive Files  Behavior-Based Permissions  Prepare for Cyber Threats  Delete Unused Data
  • 9. FAQs Are there different types of data security?  Yes. While data security refers to the general practice of protecting sensitive information, it can take various forms. Firewalls, password protection, and multi- factor authentication are all types of data security measures typically employed. What is the role of data security?  Data security functions to prevent data breaches, reduce risk of data exposure, and for regulatory compliance purposes. Within any organization, data security’s role is to ensure the ongoing safe and secure use of private data while minimizing exposure risk. What does data security include?  Data security encompasses an array of technology, business, or organizational practices. This includes things like a comprehensive data security policy, cybersecurity software, and thorough data sanitization business processes.
  • 10. Methods for managing and securing data  Train the Workforce  Embrace a Data-Centric Security Strategy  Implement Multi-Factor Authentication (MFA)  Set Strict Permissions for the Cloud  Exercise Vigilance for Patch Management  Knowing where data lives  Tracking user access  Blocking high risk activities
  • 11. Data Security Management  Data security management involves a variety of techniques, processes and practices for keeping business data safe and inaccessible by unauthorized parties.  Data security management systems focus on protecting sensitive data, like personal information or business-critical intellectual property.  Ex: Data security management can involve creating information security policies, identifying security risks, and spotting and assessing security threats to IT systems.
  • 12. DATA MANAGEMENT  It is strategic control of data  It is concerned with:  Data quality  Data architecture  Database management  Database security  Data analytics  Data integration
  • 13. Common Data Management Techniques Customer Data Management Data Attribute Data Availability Data Cleansing Data Consumer Data Control Data Corruption Data Custodian Data Entity Data Escrow Data Integration Data Liberation Data Lineage Data Loss Data Masking Data Message Data Owner Data Profiling Data Purging Data Quality
  • 14. Customer Data Management  It is processes and tools for managing customer data including every interaction with the customer such as  Contact information  Quotes  Purchase history  Product details  Feedback  Customer service tickets  Many organizations centers only about customer data, including every process, practice and decisions.  In some organizations, it is a subset of relationship management.
  • 15. Data Attribute  Data Entity is an object in a data model. Ex. Customer or address.  Entities are containers of attributes and relationships.  Data Attribute are properties of data entity.
  • 16. Data Availability  It is termed as UPTIME of data services, infrastructure and hardware.  High availability data services are achieved with reliability engineering and service management techniques that minimizes failure and mean time to repair.
  • 17. Data Cleansing  It is a process of detecting and correcting data quality issues.  It includes automatic steps such as queries designed to detect broken data.  It also includes manual steps such as Data Wrangling.  Data Wrangling is a process of cleaning and transforming data so that it can be consumed by information technology.  Data Wrangling is associated with large, messy sets of raw unstructured data.
  • 18.  Corrupt data  Inconsistent data  Inaccurate data  Irrelevant data  Dirty data Data Cleansing Examples
  • 19. Data Consumer  A data producer is a user interface, system or device that collects data that’s relevant to an organization.  A data consumer is a user interface, system or tools that uses data.  Data producer creates data and data consumers uses it.
  • 20. Data Control  It is a process of governing and managing data.  Examples include:  Data Quality – to ensure accuracy, completeness, credibility and timeliness of data.  Audit trail – capturing data logs such that data access’s doesn’t get unnoticed.  Information Security – protecting data from unauthorized access.  Data Custodian – the technical owner of collection of data responsible for its administration.
  • 21. Data Escrow It is a practice of storing data with neutral third party. A data escrow service takes deposit of data on a regular basis.
  • 22. Data Integration  It is a process of moving data.  This can occur between data sources that create copies or view of the same data for different purposes. Ex, Data warehouse  It can also occur between data sources and systems that simply use the data or display it to a person.
  • 23. Data Liberation  It is a process of allowing users to view and export the data.  It can be used as a legal principle  It reduces privacy concerns as it allows users to see what we know about them.
  • 24. Data Lineage  It is a metadata that explains where data came from and how it was calculated.  In big data environment, such information can be difficult to research manually as data flows across large number of systems.  Various examples include  Trading  Risk management  Marketing
  • 25. Data Masking  It is a process of replacing real data with similar fake data for the purpose of training and testing.  Creating test data from scratch is extremely resource intensive.  It is used to remove anything personally identifiable or confidential in data.
  • 26. Data Profiling  It is a process of analysing a dataset.  It is done to support data governance, data management or to make decisions.  Common data profiling examples are:  Data Quality  Data credibility
  • 27. Data Purging  It is a method of permanently deleting data such that it can’t be recovered by standard methods.
  • 28.
  • 29. Why Data Management is Important  1. Increases productivity: It reduces the time that people spend looking for information.  It ensures that they can do their job efficiently.  Employees will also be able to understand and communicate information to others.  It makes it easy to access past correspondence and prevent miscommunication due to messages lost in transit.  2. Smooth operations: A seamless operating system is every business’ dream and data management can make that a reality.  It is one of the determining factors in ensuring the success of an organisation; if one takes too long to respond to their customers or to the changing trends around them, they run the risk of falling behind.
  • 30.  3. Reduce security risk  4. Cost effective: It will spend less money trying to fix problems that shouldn’t have occurred in the first place.  It also prevents spending time-and money- duplicating information that already exists.  5. Minimal chance of data loss: It will reduce the chances of losing important company information.  It also ensures that your data is backed up and in case of a sudden glitch or system failure, any data that is lost can be retrieved easily, limiting the repercussions of the same.  6. Better decision making: The quality of your decisions improve drastically.  A centralised system ensures a framework to plan, organise and delegate.  Additionally, a good system will ensure good feedback, which in turn will lead to necessary updates to the process that will only benefit your company in the long run. Why Data Management is Important