All
All

Protecting Aggregated Data

865 KB | 3 files |  DOC, PDF

Large databases bring large risks. U.S. CERT examines the issues and strategies inherent in managing such data.

In their ongoing quest for improved operational efficiency, organizations have come to rely on the ability to collect, access, and process large volumes of electronic data (aggregated data). This reliance has evolved with the development of sophisticated database software and the growing availability of hardware with storage capacity measured in terabytes. By possessing such large volumes of data, however, organizations assume certain risks and responsibilities.

The purpose of this paper is to discuss the security issues, business impacts, and potential strategies of U.S. industry, government, and academic organizations that create and maintain large aggregations of data, such as digital repositories, databases, data warehouses, and aggregated information systems. The paper first examines characteristics of data and information with respect to how they create security management challenges when information is compiled and aggregated. The paper highlights consequences, negative impacts and ramifications to organizations, partners, and users due to data compromise including manipulations, disruptions, disclosures, thefts, and loss. Finally, the paper discusses effective security management approaches and strategies to address the issues and to mitigate risks.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Protecting Aggregated Data.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »

Related IT Downloads

CLoud1a Managing Risk and Security in Outsourcing IT Services

The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail. ...  More >>

Security5TN A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications. ...  More >>

Security4TN Framework for Improving Critical Infrastructure Cybersecurity

The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophistication – to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data