Information Security: Application in Business to Maximize the Security and Protect Confidential and Private Data

Information Security: Application in Business to Maximize the Security and Protect Confidential and Private Data

Sofienne Srihi (University of Tunis, Tunisia), Farhat Fnaiech (University of Tunis, Tunisia), Ala Balti (University of Tunis, Tunisia) and Habib Hamam (University of Moncton, Canada)
Copyright: © 2016 |Pages: 23
DOI: 10.4018/978-1-4666-8841-4.ch013
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

In this chapter, we define Information Security (IS) and elaborate on the different methods and technology used. We proceed to explain some of the IS tools and risks found in private and confidential data. We detail the latest algorithms and systems of security and discuss how to implement those systems in business to upgrade performances and increase profits.
Chapter Preview
Top

2. Data Management

Data management is the implementation and development of policies, procedures, architectures, and practices in order to optimize the management and assessment of the information lifecycle requirements of the enterprise.

Compliance, biding, and restrictive regulations transformed corporate data and data management output to hold an extreme importance in shaping the strategic aspect of corporations, especially in a turbulent and highly competitive business environment. Thus, the ever growing volume of data that must be processed by organizations has increased remarkably and introduced the notion of “Big Data” (Margaret Rouse, 2003).

Generally, data management can be defined as a set of notions and processes to define, store, maintain, distribute and enforce a comprehensive view; reliably and timely reference data within information system, independent channels, and communication industries as well as occupations or geographical subdivisions.

Figure 1.

Data management

Complete Chapter List

Search this Book:
Reset