DAT250 M6 Journal
.pdf
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
250
Subject
Communications
Date
Apr 3, 2024
Type
Pages
3
Uploaded by mrjwallace
Joshuah Wallace
DAT-250-R2210
2 December 2023
Module 6 Journal
Guiding Principles for Security as a Data Analyst:
1.
“Classify all enterprise data and information products against a simple confidentiality
classification schema” (Earley, 2010).
a.
As a data analyst, it is the responsibility of the role to categorize data and
determine where it will end up being stored. Where it is stored, and how the data
file is classified, will determine who in the organization will have access to the
data file. Where a data analyst may not have a primary function in upholding
security,
classifying
data
into
a
confidentiality schema is fundamental for
maintaining data security internally, and minimize damage from illegal account
access in the event of an account breach.
b.
This role is shared with information security, other direct security roles, and
database administrators. Policy and procedures should dictate the confidentiality
schema that database administrators and data analysts will use to categorize data.
Direct security positions play a role in making sure the policy is being maintained,
determining new policy and seeing the implementation of the confidentiality
schema be applied as changes are made.
2.
“Be a responsible trustee of data about all parties. They own the data. Understand and
respect the privacy and confidentiality needs of all stakeholders, be they clients, patients,
students, citizens, suppliers, or business partners” (Earley, 2010).
a.
A data analyst spends their day interacting with data, and in isolation from the
bigger picture, can become disillusioned that they are simply interacting with
numbers. Data points represent real people, real events, real decisions, and have
real consequences. Data analysts need to keep this in mind to promote the
necessity for maintaining security policy and procedures.
b.
This
responsibility
is
shared
with
every
role
that
handles
data
storage,
computation, transformation, and formatting and is a mindset and ideology that
should be shared across all employees, whether related to security, or to data. This
can include making data collection transparent, secure, for a clear purpose, and
for a definitive amount of time. Data scientists have a more particularly important
role in this aspect to generate data research tasks with a specified type of data
required, the parameters for how that data should be collected and from what
population, the stakeholders will determine what the research project is intended
to accomplish or answer, and ensure that the data is deleted once the project has
been completed.
3.
“Use relational database views to restrict access to sensitive columns and / or specific
rows” (Earley, 2010).
a.
A data analyst is one of few roles that will have the expertise to be able to
accomplish this type of task when it comes to database management and is an
essential part to security while not chiefly responsible for maintaining security.
b.
This responsibility is shared with database administrators / managers in particular
who would oversee enforcing that the specified data points in a table have been
redacted and what conditions the redaction includes. Data analysts play a role in
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help