Page 724 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 724
metrical indicators should include setting mode of search keywords, use the degree of semantic web
technology, detailed rating of datasets.
6.4 Security management
Data security management is a way to maintain the integrity of data and to make sure that the data
50
is not accessible to unauthorized parties or susceptible to corruption of data . Data security is put
in place to ensure privacy in addition or protecting this data. Data itself is stored on network servers,
possible personal computers and in the form of columns and rows. This data can be anything from
personal files to intellectual property and even top‐secret information. Data can be considered as
anything that can be understood and interpreted by humans. Because the internet is a growing
phenomenon, there was and always will be an emphasis on protecting personal or company data.
Computer users, as time goes on, tend to be slightly more aware of their files, but are still
encouraged to use some sort of data security. Data security methods can be acquired by using
51
specific software solutions or hardware mechanisms .
Data can be encrypted or unreadable to a person with no access. When encrypting this data,
mathematical sequences and algorithms are used to scramble data. Encryption allows only an
approved party to decode this unreadable text with a key. Only those that have this key can access
52
any information. Authentication is another form of data security to be used for more daily access .
A sign‐on to an email account, bank account etc., only allows the user with the proper key or
password. The most commonly used method of keeping data protected is with data security
software. This software keeps unauthorized parties from accessing private data and offers a variety
of different options. Some of these options include requiring a sign‐on to email accounts, rewriting
of software, and being able to control security options remotely. Data can also be protected with IP
security. This means that data can be protected from a hacker while in transit.
One of the biggest reasons to keep data protected is because there are many corporations that
hacker want to target and breach. Data security tends to be necessary for large businesses, but the
small ones usually have fewer infrastructures in place, making the information, not a great loss if
breached. Depending on the services and content that is to be protected, there can be preventative
measures to protect the information further. For example Windows Rights Management Services
(RMS) can be set to control whether or not the recipient of an email can be read and viewed, edited,
53
copied or saved; these setting can also set an expiration date of a specific document .
By keeping data secured, it is possible to give different access to different people. For instance, sales
associates can have access to their sales databases but are unable to access another sales associate
information or business information (e.g., accounts payable, accounts receivable). Creating a single
storage location (or server) for the data, and assigning individuals with different access, keeping up
with data is a breeze. It makes it easier to maintain the data and permits a quick transfer to another
storage location if needed. Data security software can also serve as a source to make secure sites
(that give access to data files) can only be accessed by authorized personnel.
____________________
50 Please see: http://research.cs.wisc.edu/wind/Publications/zfs‐corruption‐fast10.pdf .
51 Please see: http://datasecuritymanagement.com/.
52 Please see: http://www.spamlaws.com/data‐security.html.
53 Please see:https://technet.microsoft.com/en‐us/library/dd277323.aspx.
714 ITU‐T's Technical Reports and Specifications