The Goals of Data Security Activities include Data Security in an Organization follows these Guiding Principles
Data Security – Initiation
Let’s begin Information Security by classifying an Organization’s Data in order to identify which Data requires Protection. The Overall Process includes the following steps: Identify and Classify Sensitive Data Assets …
Data Security – CRUD or CRUDE Matrix
A CRUD or CRUDE matrix is a useful way to capture and display activities and permissions within a system. You can use a CRUD matrix to observe how Processes handle …
ISMS – ISO/IEC-27001:2013 – Annex A
What Is ISO/IEC 27001:2013 and Why Does It Matter in Information Security ISO/IEC-27001:2013 is the International Security Standard and Best Practice Guidelines, which details the requirements for an ISMS, for …
Data Security in Data Management
Defining Data Security in Information Management Rule of Thumb: CIA Triad – Confidentiality, Integrity, and Availability. Data Security includes the planning, development, and execution of security policies and procedures to …
Data Modeling – Metrics and Checklist
Introduction to Data Model Evaluation There are several ways of measuring a data model’s quality, and all require a standard for comparison. One method that will be used to provide …
Data Modeling – Deliverables
Introduction to Data Modeling Deliverables The deliverables of the data modeling process serve as essential documentation and reference points. These components ensure clarity, accuracy, and traceability throughout the lifecycle of …
Normalization
What Is Normalization in Relational Databases? Normalization is a Systematic Approach that is used to design a Relational Database table up to the higher normal form. The basic goal of …
Data Modeling – De-Normalization and Canonical Model
What Is De-Normalization in Data Modeling? De-Normalization is the deliberate transformation of normalized logical data model entities into physical tables with redundant or duplicate data structures. In other words, de-normalization …