The Goals of Data Security Activities include: Enabling Compliance with Regulations and Policies for Privacy, Protection, and Confidentiality Ensuring that Stakeholder Requirements for Privacy and Confidentiality are Met Enabling Appropriate …
Data Security – Initiation
Let’s begin Information Security by Classifying an Organization’s Data in order to Identify which Data requires Protection. The Overall Process includes the following steps: Identify and Classify Sensitive Data Assets: …
Data Security – CRUD or CRUDE Matrix
A CRUD or CRUDE matrix is a useful way to capture and display activities and permissions within a system. You can use a CRUD matrix to observe how Processes handle …
ISMS – ISO/IEC-27001:2013 – Annex A
ISO = International Organization for Standardization IEC = International Electrotechnical Commission ISMS = Information Security Management System ISO/IEC-27001:2013 is the International Security Standard and Best Practice Guidelines, which details the …
Digital Learning: The New Era
The New Era is all about gadgets and technologies. In fact, Education has also become Digital. And this will keep increasing in the near future. Digital Learning has gained massive …
Self-Paced Learning Program
Self-Paced Learning Program gives you the freedom to choose the college you like from the comfort of your home, regardless of the place it is located at. Learners are able …
Data Security in Data Management
Rule of Thumb: CIA Triad – Confidentiality, Integrity and Availability. Data Security includes the planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and …
Data Modeling – Metrics and Checklist
There are several ways of measuring a data model’s quality, and all require a standard for comparison. One method that will be used to provide an example of data model …
Data Modeling – Deliverables
The Deliverables of the Data Modeling Process include: Diagram: A data model contains one or more diagrams. The diagram is the visual that captures the requirements in a precise form. …