Information Security: Application in Business to Maximize the Security and Protect Confidential and Private Data

Information Security: Application in Business to Maximize the Security and Protect Confidential and Private Data

Sofienne Srihi, Farhat Fnaiech, Ala Balti, Habib Hamam
Copyright: © 2016 |Pages: 23
DOI: 10.4018/978-1-4666-8841-4.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this chapter, we define Information Security (IS) and elaborate on the different methods and technology used. We proceed to explain some of the IS tools and risks found in private and confidential data. We detail the latest algorithms and systems of security and discuss how to implement those systems in business to upgrade performances and increase profits.
Chapter Preview
Top

2. Data Management

Data management is the implementation and development of policies, procedures, architectures, and practices in order to optimize the management and assessment of the information lifecycle requirements of the enterprise.

Compliance, biding, and restrictive regulations transformed corporate data and data management output to hold an extreme importance in shaping the strategic aspect of corporations, especially in a turbulent and highly competitive business environment. Thus, the ever growing volume of data that must be processed by organizations has increased remarkably and introduced the notion of “Big Data” (Margaret Rouse, 2003).

Generally, data management can be defined as a set of notions and processes to define, store, maintain, distribute and enforce a comprehensive view; reliably and timely reference data within information system, independent channels, and communication industries as well as occupations or geographical subdivisions.

Figure 1.

Data management

978-1-4666-8841-4.ch013.f01

Complete Chapter List

Search this Book:
Reset