SlideShare a Scribd company logo
1 of 1
Download to read offline
Data
Human Generated
Example : Document, Reports, Videos,
Social Media data
Attribute : behavioral, Discretionary.
Often as a result of an action (event).
Experience
To Play with : Is easier to handle.
Already human decisions are
incorporated in the events. Relatively
lesser noise. Mostly Business
influences.
Dimensions : Very wide but mostly
demographics, Likings, relationship,
experience.
Processing Frequency : On demand.
Situational. Continuous
Example : Logs, Scanners, Events,
Alerts
Attribute : Configurable, Repetitive,
not discretionary.
To Play with : mostly data (not
information). Does not involve any
decisions and is more factual. High
level of noise. Mostly operational
Influence.
Dimensions : System, Security,
Network and Business Application
Backbone.
Processing Frequency : Mostly Daily.
Or weekly and definitely on periodic
basis.

More Related Content

Viewers also liked (6)

Sinergi Lintas Sektor dan Politik Anggaran dalam Mendukung Pembangunan Sumber...
Sinergi Lintas Sektor dan Politik Anggaran dalam Mendukung Pembangunan Sumber...Sinergi Lintas Sektor dan Politik Anggaran dalam Mendukung Pembangunan Sumber...
Sinergi Lintas Sektor dan Politik Anggaran dalam Mendukung Pembangunan Sumber...
 
Data mining: Classification and prediction
Data mining: Classification and predictionData mining: Classification and prediction
Data mining: Classification and prediction
 
Clarissa usando un collar de Guau re miau by maria trapos
Clarissa usando un collar de Guau re miau by maria traposClarissa usando un collar de Guau re miau by maria trapos
Clarissa usando un collar de Guau re miau by maria trapos
 
Herramientas crowsourcing mapa mental
Herramientas crowsourcing mapa mentalHerramientas crowsourcing mapa mental
Herramientas crowsourcing mapa mental
 
Contenido VS Calidad
Contenido VS CalidadContenido VS Calidad
Contenido VS Calidad
 
Jean Fares Couture on the Most Popular US Entertainment Shows!-Newsletter May...
Jean Fares Couture on the Most Popular US Entertainment Shows!-Newsletter May...Jean Fares Couture on the Most Popular US Entertainment Shows!-Newsletter May...
Jean Fares Couture on the Most Popular US Entertainment Shows!-Newsletter May...
 

Similar to Classification of data handling

Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Crew
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
7wounders
 
Lecture9 Systems The Systems Perspective Of A Dss
Lecture9 Systems The Systems Perspective Of A DssLecture9 Systems The Systems Perspective Of A Dss
Lecture9 Systems The Systems Perspective Of A Dss
Kodok Ngorex
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
Revolucion
 
Belnet events management
Belnet events managementBelnet events management
Belnet events management
Xavier Mertens
 
Articulation
Articulation Articulation
Articulation
butest
 

Similar to Classification of data handling (20)

Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf
 
Logs vs Insiders
Logs vs InsidersLogs vs Insiders
Logs vs Insiders
 
Evidence-Based Risk Management
Evidence-Based Risk ManagementEvidence-Based Risk Management
Evidence-Based Risk Management
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
IM Introduction.ppt
IM Introduction.pptIM Introduction.ppt
IM Introduction.ppt
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
Lecture9 Systems The Systems Perspective Of A Dss
Lecture9 Systems The Systems Perspective Of A DssLecture9 Systems The Systems Perspective Of A Dss
Lecture9 Systems The Systems Perspective Of A Dss
 
State of on call report 2014
State of on call report 2014State of on call report 2014
State of on call report 2014
 
InfoSecConcepts.ppt
InfoSecConcepts.pptInfoSecConcepts.ppt
InfoSecConcepts.ppt
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
 
Events Management or How to Survive Security Incidents
Events Management or How to Survive Security IncidentsEvents Management or How to Survive Security Incidents
Events Management or How to Survive Security Incidents
 
Belnet events management
Belnet events managementBelnet events management
Belnet events management
 
Articulation
Articulation Articulation
Articulation
 

Classification of data handling

  • 1. Data Human Generated Example : Document, Reports, Videos, Social Media data Attribute : behavioral, Discretionary. Often as a result of an action (event). Experience To Play with : Is easier to handle. Already human decisions are incorporated in the events. Relatively lesser noise. Mostly Business influences. Dimensions : Very wide but mostly demographics, Likings, relationship, experience. Processing Frequency : On demand. Situational. Continuous Example : Logs, Scanners, Events, Alerts Attribute : Configurable, Repetitive, not discretionary. To Play with : mostly data (not information). Does not involve any decisions and is more factual. High level of noise. Mostly operational Influence. Dimensions : System, Security, Network and Business Application Backbone. Processing Frequency : Mostly Daily. Or weekly and definitely on periodic basis.