Let’s begin Information Security by Classifying an Organization’s Data in order to Identify which Data requires Protection. The Overall Process includes the following steps: Identify and Classify Sensitive Data Assets: …
Data Security – CRUD or CRUDE Matrix
A CRUD or CRUDE matrix is a useful way to capture and display activities and permissions within a system. You can use a CRUD matrix to observe how Processes handle …
ISMS – ISO/IEC-27001:2013 – Annex A
ISO = International Organization for Standardization IEC = International Electrotechnical Commission ISMS = Information Security Management System ISO/IEC-27001:2013 is the International Security Standard and Best Practice Guidelines, which details the …
Data Security in Data Management
Rule of Thumb: CIA Triad – Confidentiality, Integrity and Availability. Data Security includes the planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and …
Data Modeling – Metrics and Checklist
There are several ways of measuring a data model’s quality, and all require a standard for comparison. One method that will be used to provide an example of data model …
Data Modeling – Deliverables
The Deliverables of the Data Modeling Process include: Diagram: A data model contains one or more diagrams. The diagram is the visual that captures the requirements in a precise form. …
Normalization
Normalization is a Systematic Approach, which is used to design a Relational Database table up to higher normal form. The basic goal of normalization is to keep each attribute in …
Data Modeling – De-Normalization and Canonical Model
De-Normalization is the deliberate transformation of normalized logical data model entities into physical tables with redundant or duplicate data structures. In other words, de-normalization intentionally puts one attribute in multiple …