Protection and defense against sensitive data leakage problem within organiza...
My slide presentation
1. GROUP MEMBERS :
NOR AINI (MAS)
SITI NADIA (MAS)
YUHAN (THA)
PISEY (CAM)
REZZA (MAS)
MILA (VIE)
2. Information, as we know it today, includes both electronic
and physical information. The organizational structure must
be capable of managing this information throughout the
information lifecycle regardless of source or format for
delivery through multiple channels that may include cell
phones and web interfaces.
Information management (IM) is also the collection and
management of information from one or more sources and
the distribution of that information to one or more audiences.
This sometimes involves those who have a stake in, or a right
to that information. Management means the organization of
and control over the structure, processing and delivery of
information.
5. The solution is an effective
enterprise content management
system (ECM).
6. Handle both structured and unstructured
content, integrating them into a single,
centralized repository
Share content across the enterprise,
regardless of contribution( web browser, desk
top application and so on.
Manage content throughout its lifecycle,
applying control and support to each phase
from creation through distribution.
7. Information is stored in
different computers and
managed by different
information management
system .
8. We can use various well-established
solutions . They include data
warehousing, data integration,
application integration, integrated
content management and so on .
9. The data is semi-structure
data and multimedia data.
10. Solution
There are commercial product for
automatically matching images, such as
fingerprints and faces ; matching audio,
including voice, music and sound and so
on .
11.
12.
13. There are a lot of books in library.
Do you think people can control them?
14. Of course people can control the books, but
how do they control them?
Solution
1. By using a program which is called Virtua.
2. We also need some machine such as self-check
machine, security system, and web side.