Page 724 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 724

metrical indicators should include setting mode of search keywords, use the degree of semantic web
            technology, detailed rating of datasets.

            6.4  Security management


            Data security management is a way to maintain the integrity of data and to make sure that the data
                                                                                       50
            is not accessible to unauthorized parties or susceptible to corruption of data . Data security is put
            in place to ensure privacy in addition or protecting this data. Data itself is stored on network servers,
            possible personal computers and in the form of columns and rows. This data can be anything from
            personal files to intellectual property and even top‐secret information. Data can be considered as
            anything that can be understood and interpreted by humans. Because the internet is a growing
            phenomenon, there was and always will be an emphasis on protecting personal or company data.
            Computer  users,  as  time  goes  on,  tend  to  be  slightly  more  aware  of  their  files,  but  are  still
            encouraged to use some sort of data security. Data security methods can be acquired by using
                                                               51
            specific software solutions or hardware mechanisms .
            Data  can  be  encrypted  or  unreadable  to  a  person  with  no  access.  When  encrypting  this  data,
            mathematical  sequences  and  algorithms  are  used  to  scramble  data.  Encryption  allows  only  an
            approved party to decode this unreadable text with a key. Only those that have this key can access
                                                                                                          52
            any information. Authentication is another form of data security to be used for more daily access .
            A sign‐on to an email account, bank account etc., only allows the user with the proper key or
            password.  The  most  commonly  used  method  of  keeping  data  protected  is  with  data  security
            software. This software keeps unauthorized parties from accessing private data and offers a variety
            of different options. Some of these options include requiring a sign‐on to email accounts, rewriting
            of software, and being able to control security options remotely. Data can also be protected with IP
            security. This means that data can be protected from a hacker while in transit.

            One of the biggest reasons to keep data protected is because there are many corporations that
            hacker want to target and breach. Data security tends to be necessary for large businesses, but the
            small ones usually have fewer infrastructures in place, making the information, not a great loss if
            breached. Depending on the services and content that is to be protected, there can be preventative
            measures to protect the information further. For example Windows Rights Management Services
            (RMS) can be set to control whether or not the recipient of an email can be read and viewed, edited,
                                                                                              53
            copied or saved; these setting can also set an expiration date of a specific document .
            By keeping data secured, it is possible to give different access to different people. For instance, sales
            associates can have access to their sales databases but are unable to access another sales associate
            information or business information (e.g., accounts payable, accounts receivable). Creating a single
            storage location (or server) for the data, and assigning individuals with different access, keeping up
            with data is a breeze. It makes it easier to maintain the data and permits a quick transfer to another
            storage location if needed. Data security software can also serve as a source to make secure sites
            (that give access to data files) can only be accessed by authorized personnel.






            ____________________
            50   Please see: http://research.cs.wisc.edu/wind/Publications/zfs‐corruption‐fast10.pdf .
            51   Please see: http://datasecuritymanagement.com/.
            52   Please see: http://www.spamlaws.com/data‐security.html.

            53   Please see:https://technet.microsoft.com/en‐us/library/dd277323.aspx.

            714                                                      ITU‐T's Technical Reports and Specifications
   719   720   721   722   723   724   725   726   727   728   729