Unit 5
Dr. SHUBHRA GOYAL
SECURITY MODULE OUTLINE
Data security
 Data security is about keeping data safe.
 If the data on a computer system is damaged, lost, or stolen, it can lead to
disaster.
 Data security is a set of processes and practices designed to protect your
critical information technology (IT) ecosystem.
 This included files, databases, accounts, and networks.
 Effective data security adopts a set of controls, applications, and techniques
that identify the importance of various datasets and apply the most appropriate
security controls.
 Thus, data security is one of many critical methods for evaluating threats and
reducing the risk associated with data storage and handling.
Why is Data Security Important?
Data security is critical to public and private sector organizations.
Companies have to protect their user and customer data from
falling into the wrong hands.
Ex: Payment Card Industry Data Security Standard (PCI DSS)
forces companies to take all reasonable measures to protect user
data.
There is the reputational risk of a data breach or hack.
Methods/Types of Data Security
 ACCESS CONTROLS
 AUTHENTICATION
 BACKUPS AND RECOVERY
 DATA ERASURE
 DATA MASKING
 DATA RESILIENCY
 ENCRYPTION
Main Elements of Data Security
There are three core elements
to data security :
 Confidentiality
 Integrity
 Availability
These concepts are also
referred to as the CIA Triad.
Data Security Technologies
 Data Auditing
 Data Real-Time Alerts
 Data Risk Assessment
 Data Minimization
 Purge Stale Data
Best Practices for Ensuring Data Security
 Quarantine Sensitive Files
 Behavior-Based Permissions
 Prepare for Cyber Threats
 Delete Unused Data
FAQs
Are there different types of data security?
 Yes. While data security refers to the general practice of protecting sensitive
information, it can take various forms. Firewalls, password protection, and multi-
factor authentication are all types of data security measures typically employed.
What is the role of data security?
 Data security functions to prevent data breaches, reduce risk of data exposure,
and for regulatory compliance purposes. Within any organization, data security’s
role is to ensure the ongoing safe and secure use of private data while minimizing
exposure risk.
What does data security include?
 Data security encompasses an array of technology, business, or organizational
practices. This includes things like a comprehensive data security policy,
cybersecurity software, and thorough data sanitization business processes.
Methods for managing and securing
data
 Train the Workforce
 Embrace a Data-Centric Security Strategy
 Implement Multi-Factor Authentication (MFA)
 Set Strict Permissions for the Cloud
 Exercise Vigilance for Patch Management
 Knowing where data lives
 Tracking user access
 Blocking high risk activities
Data Security Management
 Data security management involves a variety of techniques, processes
and practices for keeping business data safe and inaccessible by
unauthorized parties.
 Data security management systems focus on protecting sensitive
data, like personal information or business-critical intellectual
property.
 Ex: Data security management can involve creating information
security policies, identifying security risks, and spotting and assessing
security threats to IT systems.
DATA MANAGEMENT
 It is strategic control of data
 It is concerned with:
 Data quality
 Data architecture
 Database management
 Database security
 Data analytics
 Data integration
Common Data Management Techniques
Customer Data Management Data Attribute
Data Availability Data Cleansing
Data Consumer Data Control
Data Corruption Data Custodian
Data Entity Data Escrow
Data Integration Data Liberation
Data Lineage Data Loss
Data Masking Data Message
Data Owner Data Profiling
Data Purging Data Quality
Customer Data Management
 It is processes and tools for managing customer data including every
interaction with the customer such as
 Contact information
 Quotes
 Purchase history
 Product details
 Feedback
 Customer service tickets
 Many organizations centers only about customer data, including every
process, practice and decisions.
 In some organizations, it is a subset of relationship management.
Data Attribute
 Data Entity is an object in a data model. Ex. Customer or
address.
 Entities are containers of attributes and relationships.
 Data Attribute are properties of data entity.
Data Availability
 It is termed as UPTIME of data services, infrastructure and
hardware.
 High availability data services are achieved with
reliability engineering and service management
techniques that minimizes failure and mean time to
repair.
Data Cleansing
 It is a process of detecting and correcting data quality issues.
 It includes automatic steps such as queries designed to detect broken data.
 It also includes manual steps such as Data Wrangling.
 Data Wrangling is a process of cleaning and transforming data so that it can be
consumed by information technology.
 Data Wrangling is associated with large, messy sets of raw unstructured data.
 Corrupt data
 Inconsistent data
 Inaccurate data
 Irrelevant data
 Dirty data
Data Cleansing Examples
Data Consumer
 A data producer is a user interface, system or device that
collects data that’s relevant to an organization.
 A data consumer is a user interface, system or tools that
uses data.
 Data producer creates data and data consumers uses it.
Data Control
 It is a process of governing and managing data.
 Examples include:
 Data Quality – to ensure accuracy, completeness, credibility and
timeliness of data.
 Audit trail – capturing data logs such that data access’s doesn’t
get unnoticed.
 Information Security – protecting data from unauthorized access.
 Data Custodian – the technical owner of collection of data
responsible for its administration.
Data Escrow
It is a practice of storing data with neutral third
party.
A data escrow service takes deposit of data on a
regular basis.
Data Integration
 It is a process of moving data.
 This can occur between data sources that create copies or view of the same data
for different purposes. Ex, Data warehouse
 It can also occur between data sources and systems that simply use the data or
display it to a person.
Data Liberation
 It is a process of allowing users to view and export the data.
 It can be used as a legal principle
 It reduces privacy concerns as it allows users to see what
we know about them.
Data Lineage
 It is a metadata that explains where data came from and
how it was calculated.
 In big data environment, such information can be difficult to
research manually as data flows across large number of
systems.
 Various examples include
 Trading
 Risk management
 Marketing
Data Masking
 It is a process of replacing real data with similar fake data for the
purpose of training and testing.
 Creating test data from scratch is extremely resource intensive.
 It is used to remove anything personally identifiable or confidential in
data.
Data Profiling
 It is a process of analysing a dataset.
 It is done to support data governance, data management or to make
decisions.
 Common data profiling examples are:
 Data Quality
 Data credibility
Data Purging
 It is a method of permanently deleting data such that it can’t be recovered
by standard methods.
Unit 5 v2
Why Data Management is
Important
 1. Increases productivity: It reduces the time that people spend looking for
information.
 It ensures that they can do their job efficiently.
 Employees will also be able to understand and communicate information to
others.
 It makes it easy to access past correspondence and prevent miscommunication
due to messages lost in transit.
 2. Smooth operations: A seamless operating system is every business’ dream and
data management can make that a reality.
 It is one of the determining factors in ensuring the success of an organisation; if
one takes too long to respond to their customers or to the changing trends
around them, they run the risk of falling behind.
 3. Reduce security risk
 4. Cost effective: It will spend less money trying to fix problems that shouldn’t have
occurred in the first place.
 It also prevents spending time-and money- duplicating information that already exists.
 5. Minimal chance of data loss: It will reduce the chances of losing important company
information.
 It also ensures that your data is backed up and in case of a sudden glitch or system
failure, any data that is lost can be retrieved easily, limiting the repercussions of the
same.
 6. Better decision making: The quality of your decisions improve drastically.
 A centralised system ensures a framework to plan, organise and delegate.
 Additionally, a good system will ensure good feedback,
which in turn will lead to necessary updates to the process that will only benefit your
company in the long run.
Why Data Management is
Important
THANK YOU!!!

More Related Content

PDF
Opteamix_whitepaper_Data Masking Strategy.pdf
PDF
Cyber Resilience - Welcoming New Normal - Eryk
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PDF
Model of solutions for data security in Cloud computing
PDF
Data Sheet - Manage unstructured data growth with Symantec Data Insight
PPT
Data Loss During Downsizing
PDF
Boosting Cybersecurity with Data Governance (peer reviewed)
PDF
Bridging the Data Security Gap
Opteamix_whitepaper_Data Masking Strategy.pdf
Cyber Resilience - Welcoming New Normal - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Model of solutions for data security in Cloud computing
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Loss During Downsizing
Boosting Cybersecurity with Data Governance (peer reviewed)
Bridging the Data Security Gap

What's hot (20)

PDF
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PDF
The Art of Cloud Auditing - ISACA ID
PDF
Extending Information Security to Non-Production Environments
PDF
Data_Protection_WP - Jon Toigo
PDF
Data-Centric Security for the Extended Enterprise
DOC
Challenges in implementing effective data security practices
PDF
Protecting Data Privacy Beyond the Trusted System of Record
PPT
Lkm 2011
PPT
Transaction processing system
PDF
A Study on Big Data Privacy Protection Models using Data Masking Methods
PPTX
Data privacy how do you protect and delete data in the cloud
PDF
Privacy Management System: Protect Data or Perish
PPTX
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
DOCX
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
PDF
Cybersecurity in Oil & Gas Company
PPT
2009 iapp-the corpprivacydeptmar13-2009
PDF
Information Rights Management (IRM)
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
The Rise of Data Ethics and Security - AIDI Webinar
The Art of Cloud Auditing - ISACA ID
Extending Information Security to Non-Production Environments
Data_Protection_WP - Jon Toigo
Data-Centric Security for the Extended Enterprise
Challenges in implementing effective data security practices
Protecting Data Privacy Beyond the Trusted System of Record
Lkm 2011
Transaction processing system
A Study on Big Data Privacy Protection Models using Data Masking Methods
Data privacy how do you protect and delete data in the cloud
Privacy Management System: Protect Data or Perish
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf
Cybersecurity in Oil & Gas Company
2009 iapp-the corpprivacydeptmar13-2009
Information Rights Management (IRM)
Ad

Similar to Unit 5 v2 (20)

PPTX
L1-Introduction to Data Security.pptx models
PPTX
Data Security Management - Data Analytics
PPTX
Data Quality+Security
PPTX
Data security
PPTX
Data Governance without AI Course Week 2.pptx
PDF
Data+Management+Masterclasssdfsdfsdfsd.pdf
PDF
Data_Security_Guide_Everything_You_Need_to_Know.pdf
PPTX
EFFECTIVE DATA MANAGEMENT IN THE WORKPLACE-1.pptx
PPTX
Data security
PPTX
Data Security.pptx
PDF
chapter2-220725121543-2788abac.pdf
PPTX
Chapter 2: Data Management Overviews
PDF
top data management service in India that make you more systematic
PDF
9 Best Enterprise Data Security and Privacy Practices in 2025_compressed (1).pdf
PDF
Bagesh_Data Privacy and Security.pdf
PPTX
دورة ادارة و حوكمة البيانات دورة ادارة وحوكمة البيانات
PPTX
Data security
PPTX
CDMP SLIDE TRAINER .pptx
PDF
Data Security.pdf
L1-Introduction to Data Security.pptx models
Data Security Management - Data Analytics
Data Quality+Security
Data security
Data Governance without AI Course Week 2.pptx
Data+Management+Masterclasssdfsdfsdfsd.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdf
EFFECTIVE DATA MANAGEMENT IN THE WORKPLACE-1.pptx
Data security
Data Security.pptx
chapter2-220725121543-2788abac.pdf
Chapter 2: Data Management Overviews
top data management service in India that make you more systematic
9 Best Enterprise Data Security and Privacy Practices in 2025_compressed (1).pdf
Bagesh_Data Privacy and Security.pdf
دورة ادارة و حوكمة البيانات دورة ادارة وحوكمة البيانات
Data security
CDMP SLIDE TRAINER .pptx
Data Security.pdf
Ad

Recently uploaded (20)

PPTX
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
PPT
statistic analysis for study - data collection
PDF
©️ 01_Algorithm for Microsoft New Product Launch - handling web site - by Ale...
PPTX
IMPACT OF LANDSLIDE.....................
PPTX
CYBER SECURITY the Next Warefare Tactics
PPTX
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
PPTX
Business_Capability_Map_Collection__pptx
PDF
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
PPTX
recommendation Project PPT with details attached
PPTX
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
PPTX
Caseware_IDEA_Detailed_Presentation.pptx
PDF
Session 11 - Data Visualization Storytelling (2).pdf
PPT
statistics analysis - topic 3 - describing data visually
PPT
DU, AIS, Big Data and Data Analytics.ppt
PPTX
Statisticsccdxghbbnhhbvvvvvvvvvv. Dxcvvvhhbdzvbsdvvbbvv ccc
PPTX
1 hour to get there before the game is done so you don’t need a car seat for ...
PDF
Global Data and Analytics Market Outlook Report
PDF
Tetra Pak Index 2023 - The future of health and nutrition - Full report.pdf
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PPTX
chrmotography.pptx food anaylysis techni
Lesson-01intheselfoflifeofthekennyrogersoftheunderstandoftheunderstanded
statistic analysis for study - data collection
©️ 01_Algorithm for Microsoft New Product Launch - handling web site - by Ale...
IMPACT OF LANDSLIDE.....................
CYBER SECURITY the Next Warefare Tactics
sac 451hinhgsgshssjsjsjheegdggeegegdggddgeg.pptx
Business_Capability_Map_Collection__pptx
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
recommendation Project PPT with details attached
Copy of 16 Timeline & Flowchart Templates – HubSpot.pptx
Caseware_IDEA_Detailed_Presentation.pptx
Session 11 - Data Visualization Storytelling (2).pdf
statistics analysis - topic 3 - describing data visually
DU, AIS, Big Data and Data Analytics.ppt
Statisticsccdxghbbnhhbvvvvvvvvvv. Dxcvvvhhbdzvbsdvvbbvv ccc
1 hour to get there before the game is done so you don’t need a car seat for ...
Global Data and Analytics Market Outlook Report
Tetra Pak Index 2023 - The future of health and nutrition - Full report.pdf
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
chrmotography.pptx food anaylysis techni

Unit 5 v2

  • 3. Data security  Data security is about keeping data safe.  If the data on a computer system is damaged, lost, or stolen, it can lead to disaster.  Data security is a set of processes and practices designed to protect your critical information technology (IT) ecosystem.  This included files, databases, accounts, and networks.  Effective data security adopts a set of controls, applications, and techniques that identify the importance of various datasets and apply the most appropriate security controls.  Thus, data security is one of many critical methods for evaluating threats and reducing the risk associated with data storage and handling.
  • 4. Why is Data Security Important? Data security is critical to public and private sector organizations. Companies have to protect their user and customer data from falling into the wrong hands. Ex: Payment Card Industry Data Security Standard (PCI DSS) forces companies to take all reasonable measures to protect user data. There is the reputational risk of a data breach or hack.
  • 5. Methods/Types of Data Security  ACCESS CONTROLS  AUTHENTICATION  BACKUPS AND RECOVERY  DATA ERASURE  DATA MASKING  DATA RESILIENCY  ENCRYPTION
  • 6. Main Elements of Data Security There are three core elements to data security :  Confidentiality  Integrity  Availability These concepts are also referred to as the CIA Triad.
  • 7. Data Security Technologies  Data Auditing  Data Real-Time Alerts  Data Risk Assessment  Data Minimization  Purge Stale Data
  • 8. Best Practices for Ensuring Data Security  Quarantine Sensitive Files  Behavior-Based Permissions  Prepare for Cyber Threats  Delete Unused Data
  • 9. FAQs Are there different types of data security?  Yes. While data security refers to the general practice of protecting sensitive information, it can take various forms. Firewalls, password protection, and multi- factor authentication are all types of data security measures typically employed. What is the role of data security?  Data security functions to prevent data breaches, reduce risk of data exposure, and for regulatory compliance purposes. Within any organization, data security’s role is to ensure the ongoing safe and secure use of private data while minimizing exposure risk. What does data security include?  Data security encompasses an array of technology, business, or organizational practices. This includes things like a comprehensive data security policy, cybersecurity software, and thorough data sanitization business processes.
  • 10. Methods for managing and securing data  Train the Workforce  Embrace a Data-Centric Security Strategy  Implement Multi-Factor Authentication (MFA)  Set Strict Permissions for the Cloud  Exercise Vigilance for Patch Management  Knowing where data lives  Tracking user access  Blocking high risk activities
  • 11. Data Security Management  Data security management involves a variety of techniques, processes and practices for keeping business data safe and inaccessible by unauthorized parties.  Data security management systems focus on protecting sensitive data, like personal information or business-critical intellectual property.  Ex: Data security management can involve creating information security policies, identifying security risks, and spotting and assessing security threats to IT systems.
  • 12. DATA MANAGEMENT  It is strategic control of data  It is concerned with:  Data quality  Data architecture  Database management  Database security  Data analytics  Data integration
  • 13. Common Data Management Techniques Customer Data Management Data Attribute Data Availability Data Cleansing Data Consumer Data Control Data Corruption Data Custodian Data Entity Data Escrow Data Integration Data Liberation Data Lineage Data Loss Data Masking Data Message Data Owner Data Profiling Data Purging Data Quality
  • 14. Customer Data Management  It is processes and tools for managing customer data including every interaction with the customer such as  Contact information  Quotes  Purchase history  Product details  Feedback  Customer service tickets  Many organizations centers only about customer data, including every process, practice and decisions.  In some organizations, it is a subset of relationship management.
  • 15. Data Attribute  Data Entity is an object in a data model. Ex. Customer or address.  Entities are containers of attributes and relationships.  Data Attribute are properties of data entity.
  • 16. Data Availability  It is termed as UPTIME of data services, infrastructure and hardware.  High availability data services are achieved with reliability engineering and service management techniques that minimizes failure and mean time to repair.
  • 17. Data Cleansing  It is a process of detecting and correcting data quality issues.  It includes automatic steps such as queries designed to detect broken data.  It also includes manual steps such as Data Wrangling.  Data Wrangling is a process of cleaning and transforming data so that it can be consumed by information technology.  Data Wrangling is associated with large, messy sets of raw unstructured data.
  • 18.  Corrupt data  Inconsistent data  Inaccurate data  Irrelevant data  Dirty data Data Cleansing Examples
  • 19. Data Consumer  A data producer is a user interface, system or device that collects data that’s relevant to an organization.  A data consumer is a user interface, system or tools that uses data.  Data producer creates data and data consumers uses it.
  • 20. Data Control  It is a process of governing and managing data.  Examples include:  Data Quality – to ensure accuracy, completeness, credibility and timeliness of data.  Audit trail – capturing data logs such that data access’s doesn’t get unnoticed.  Information Security – protecting data from unauthorized access.  Data Custodian – the technical owner of collection of data responsible for its administration.
  • 21. Data Escrow It is a practice of storing data with neutral third party. A data escrow service takes deposit of data on a regular basis.
  • 22. Data Integration  It is a process of moving data.  This can occur between data sources that create copies or view of the same data for different purposes. Ex, Data warehouse  It can also occur between data sources and systems that simply use the data or display it to a person.
  • 23. Data Liberation  It is a process of allowing users to view and export the data.  It can be used as a legal principle  It reduces privacy concerns as it allows users to see what we know about them.
  • 24. Data Lineage  It is a metadata that explains where data came from and how it was calculated.  In big data environment, such information can be difficult to research manually as data flows across large number of systems.  Various examples include  Trading  Risk management  Marketing
  • 25. Data Masking  It is a process of replacing real data with similar fake data for the purpose of training and testing.  Creating test data from scratch is extremely resource intensive.  It is used to remove anything personally identifiable or confidential in data.
  • 26. Data Profiling  It is a process of analysing a dataset.  It is done to support data governance, data management or to make decisions.  Common data profiling examples are:  Data Quality  Data credibility
  • 27. Data Purging  It is a method of permanently deleting data such that it can’t be recovered by standard methods.
  • 29. Why Data Management is Important  1. Increases productivity: It reduces the time that people spend looking for information.  It ensures that they can do their job efficiently.  Employees will also be able to understand and communicate information to others.  It makes it easy to access past correspondence and prevent miscommunication due to messages lost in transit.  2. Smooth operations: A seamless operating system is every business’ dream and data management can make that a reality.  It is one of the determining factors in ensuring the success of an organisation; if one takes too long to respond to their customers or to the changing trends around them, they run the risk of falling behind.
  • 30.  3. Reduce security risk  4. Cost effective: It will spend less money trying to fix problems that shouldn’t have occurred in the first place.  It also prevents spending time-and money- duplicating information that already exists.  5. Minimal chance of data loss: It will reduce the chances of losing important company information.  It also ensures that your data is backed up and in case of a sudden glitch or system failure, any data that is lost can be retrieved easily, limiting the repercussions of the same.  6. Better decision making: The quality of your decisions improve drastically.  A centralised system ensures a framework to plan, organise and delegate.  Additionally, a good system will ensure good feedback, which in turn will lead to necessary updates to the process that will only benefit your company in the long run. Why Data Management is Important