Introduction To Enterprise Data Management
Introduction To Enterprise Data Management
Introduction To Enterprise Data Management
Learning Outcomes
Define Data Security Management
Identify security threats and how to manage them.
To know the best practices in data protection
Understand the use of security tools.
Time Frame
1 hour
Introduction
Data security has become even more complicated with today’s hybrid
environments. Coordinated security management is essential to a range of critical
tasks, including ensuring that each user has exactly the right access to data and
applications, and that no sensitive data is overexposed.
Analysis
1. In your own understanding define Data Security Management.
2. How to protect your data from data threats?
3. What is your way in securing data?
Abstraction
What is Data Security Management?
Data security management involves a variety of techniques, processes and
practices for keeping business data safe and inaccessible by unauthorized parties. Data
security management systems focus on protecting sensitive data, like personal
information or business-critical intellectual property. For example, data security
management can involve creating information security policies, identifying security
risks, and spotting and assessing security threats to IT systems. Another critical
practice is sharing knowledge about data security best practices with employees
across the organization — for example, exercising caution when opening email
attachments.
There are many different threats to data security, and they are constantly evolving, so
no list is authoritative. But here is the most common threats you need to keep an eye
on and teach your users about:
DDoS attack — Distributed denial of service attacks attempt to make your servers
unusable. To mitigate the risk, consider investing in an intrusion detection system
(IDS) or intrusion prevention system (IPS) that inspects network traffic and logs
potentially malicious activity.
Phishing scams — This common social engineering technique attempts to trick users
into opening malicious attachments in phishing emails. Solutions include establishing
a cybersecurity-centric culture and using a tool to automatically block spam and
phishing messages so users never see them.
Hackers — This is an umbrella term for the actors behind the attacks listed above.
Third parties — Partners and contractors who lack sufficient network security can
leave interconnected systems open to attacks, or they can directly misuse the
permissions they’ve been granted in your IT environment.
Malicious insiders — Some employees steal data or damage systems deliberately, for
example, to use the information to set up a competing business, sell it on the black
market or take revenge on the employer for a real or perceived problem.
Mistakes — Users and admins can also make innocent but costly mistakes, such as
copying files to their personal devices, accidently attaching a file with sensitive
data to an email, or sending confidential information to the wrong recipient.
Data protection best practices
To build a layered defense strategy, it’s critical to understand your cybersecurity risks
and how you intend to reduce them. It’s also important to have a way to measure the
business impact of your efforts, so you can ensure you are making appropriate
security investments.
The following operational and technical best practices can help you mitigate data
security risks:
Classify data based on its value and sensitivity. Get a comprehensive inventory of all
the data you have, both on premises and in the cloud, and classify it. Like most data
security methods, data classification is best when it’s automated. Instead of relying on
busy employees and error-prone manual processes, look for a solution that will accurately
and reliably classify sensitive data like credit card numbers or medical records.
Run vulnerability assessments. Proactively look for security gaps and take steps to
reduce your exposure to attacks.
The following data security tools are necessary for data security management
References
Brooks, R. (2020, February 13). Data Security Management: Where to Start. Retrieved from
NETWRIX: https://blog.netwrix.com/2020/02/13/data-security-management-where-to-start/