DAT250 M6 Journal

.pdf

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

250

Subject

Communications

Date

Apr 3, 2024

Type

pdf

Pages

3

Uploaded by mrjwallace

Joshuah Wallace DAT-250-R2210 2 December 2023 Module 6 Journal Guiding Principles for Security as a Data Analyst: 1. “Classify all enterprise data and information products against a simple confidentiality classification schema” (Earley, 2010). a. As a data analyst, it is the responsibility of the role to categorize data and determine where it will end up being stored. Where it is stored, and how the data file is classified, will determine who in the organization will have access to the data file. Where a data analyst may not have a primary function in upholding security, classifying data into a confidentiality schema is fundamental for maintaining data security internally, and minimize damage from illegal account access in the event of an account breach. b. This role is shared with information security, other direct security roles, and database administrators. Policy and procedures should dictate the confidentiality schema that database administrators and data analysts will use to categorize data. Direct security positions play a role in making sure the policy is being maintained, determining new policy and seeing the implementation of the confidentiality schema be applied as changes are made. 2. “Be a responsible trustee of data about all parties. They own the data. Understand and respect the privacy and confidentiality needs of all stakeholders, be they clients, patients, students, citizens, suppliers, or business partners” (Earley, 2010).
a. A data analyst spends their day interacting with data, and in isolation from the bigger picture, can become disillusioned that they are simply interacting with numbers. Data points represent real people, real events, real decisions, and have real consequences. Data analysts need to keep this in mind to promote the necessity for maintaining security policy and procedures. b. This responsibility is shared with every role that handles data storage, computation, transformation, and formatting and is a mindset and ideology that should be shared across all employees, whether related to security, or to data. This can include making data collection transparent, secure, for a clear purpose, and for a definitive amount of time. Data scientists have a more particularly important role in this aspect to generate data research tasks with a specified type of data required, the parameters for how that data should be collected and from what population, the stakeholders will determine what the research project is intended to accomplish or answer, and ensure that the data is deleted once the project has been completed. 3. “Use relational database views to restrict access to sensitive columns and / or specific rows” (Earley, 2010). a. A data analyst is one of few roles that will have the expertise to be able to accomplish this type of task when it comes to database management and is an essential part to security while not chiefly responsible for maintaining security. b. This responsibility is shared with database administrators / managers in particular who would oversee enforcing that the specified data points in a table have been redacted and what conditions the redaction includes. Data analysts play a role in
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help