SlideShare a Scribd company logo
1 of 10
Download to read offline
INFORMATION
CLASSIFICATION
• SMELLS LIKE A BUSINESS GLOSSARY,
• TASTES LIKE A BUSINESS GLOSSARY,
• FOR DATA SECURITY AND ASSET MANAGEMENT – THIS IS WHERE YOU START
ABOUT ME
• Contact and Summary Details
• LinkedIn: https://www.linkedin.com/in/howarddiesel-infogovernance?trk=hp-identity-
name
• Twitter: @howarddiesel
• Skype: howarddiesel
• Mail: howard@modelwaresystems.com
CLASSIFICATION: PROBLEM RECOGNITION
• TRUISM: The Requirement to protect information is required by all organizations
• PROTECT
• LOSS
• EXPOSURE
• EFFECT
• LOSS: hampers business operations
• EXPOSURE: affect reputation and advantage
• LOSS
• Complete / Destroyed
• Inability to Find
• CONSEQUENCE: Hoard & Secure Everything (Expensive & Not practical)
CLASSIFICATION: HOW IMPORTANT IS IT?
• Intellectual Property
• Privacy
• Legal Issues
• Sensitivity
CLASSIFICATION: PURPOSE
• Availability, integrity and confidentiality are provided for all identified assets
• Return on investment by implementing controls where they are needed the most
• Map data protection levels with organizational needs
• Mitigate threats of unauthorized access and disclosure
• Comply with legal and regulation requirements
CLASSIFICATION: GOALS
CLASSIFICATION: 4 HUSBANDS AND A WIFE
• WHAT
• Process of organizing data into categories for its most effective and efficient use.
• WHY
• Achieve our Classification Goals
• WHERE
• All data storage locations
• WHEN
• Entire Data Lifecycle until DISPOSED
• HOW
• Written procedures and guidelines for data classification should define what
categories and criteria the organization will use to classify data and specify the roles
and responsibilities of employees & systems within the organization regarding data
stewardship.
SYSTEM OF PROCESSES FOR CLASSIFICATION
Understand Information
• Information Types
• Identify Risks to Information
• Applicable Regulations
Create Classification System
• Classification Scheme
• Standards and Procedures
• Access to data
• Classifying Information
• Creating and Handling Classified Information
• Storing Classified Information
• Transmitting Classified Information
• Receiving Classified information from External
Parties
Implement
• Classification Policy
• Requirement for information classification
• Mandate the use of the classification system
• Highlight RACI for maintain the classification
system
• Security grading documents
• Provide more detailed level of guidance for a
specific area of data
• Classification of existing data
Educate
• Formal training
• Awareness campaigns
• Staff Induction
Maintain
• Not a discrete project
• Cycle of Continuous Improvement
CLASSIFICATION: MODEL STRUCTURE
• Content: Type of information, irrespective of format and medium. What the
information applies to. Typical derived from the related Business Subject Area
• Reg Authority: Reference to the regulatory document which specifies storage
and/or disposal requirements.
• Security Requirement
• C: contains sensitive info – handled CONFIDENTLY
• I: INTEGRITY, specifically protected against unintentional or unauthorised changes
• A: Handled especially with regard to high ACCESSIBILITY
CLASSIFICATION: MODEL STRUCTURE – CONT’D
• Preservation Period
• LEG – legal value
• ENT – Enterprise critical value
• HIST: Historical value
• Archive Index (File Plan)
REFERENCE MATERIAL
• Guidelines for Classification of Information Best Practice Document; Produced by
UNINETT led working group on Information Security
(http://services.geant.net/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4-
ufs136.pdf)
• Tips for creating a data classification policy
(http://searchsecurity.techtarget.com/feature/Tips-for-creating-a-data-classification-
policy)
• Implementing information classification enterprise
(https://www.giac.org/paper/gsec/4198/implementing-information-classification-
enterprise/106714)
• Drafting data classification policies and guidelines
(http://searchfinancialsecurity.techtarget.com/news/1289406/Drafting-data-
classification-policies-and-guidelines)
• Information classification according to ISO 27001
(http://advisera.com/27001academy/blog/2014/05/12/information-classification-
according-to-iso-27001/)

More Related Content

What's hot

Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business EnablerSrinivasan Sankar
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security ManagementAhmed Alorage
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Chapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data AssetsChapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data AssetsAhmed Alorage
 
Data governance - An Insight
Data governance - An InsightData governance - An Insight
Data governance - An InsightVivek Mohan
 
Data catalog
Data catalogData catalog
Data catalogiamtodor
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?Precisely
 
‏‏‏‏‏‏Chapter 10: Document and Content Management
‏‏‏‏‏‏Chapter 10: Document and Content Management ‏‏‏‏‏‏Chapter 10: Document and Content Management
‏‏‏‏‏‏Chapter 10: Document and Content Management Ahmed Alorage
 
Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdfAlan McSweeney
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?Precisely
 
Chapter 5: Data Development
Chapter 5: Data Development Chapter 5: Data Development
Chapter 5: Data Development Ahmed Alorage
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?DATAVERSITY
 
Data Governance
Data GovernanceData Governance
Data GovernanceRob Lux
 
Data Governance Initiative
Data Governance InitiativeData Governance Initiative
Data Governance InitiativeDataWorks Summit
 

What's hot (20)

Information classification
Information classificationInformation classification
Information classification
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business Enabler
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security Management
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Chapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data AssetsChapter 1: The Importance of Data Assets
Chapter 1: The Importance of Data Assets
 
Information classification
Information classificationInformation classification
Information classification
 
Data governance - An Insight
Data governance - An InsightData governance - An Insight
Data governance - An Insight
 
Data catalog
Data catalogData catalog
Data catalog
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
 
‏‏‏‏‏‏Chapter 10: Document and Content Management
‏‏‏‏‏‏Chapter 10: Document and Content Management ‏‏‏‏‏‏Chapter 10: Document and Content Management
‏‏‏‏‏‏Chapter 10: Document and Content Management
 
Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
 
Chapter 5: Data Development
Chapter 5: Data Development Chapter 5: Data Development
Chapter 5: Data Development
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Data Governance Initiative
Data Governance InitiativeData Governance Initiative
Data Governance Initiative
 

Viewers also liked

Chapter 2 classification of business
Chapter 2   classification of businessChapter 2   classification of business
Chapter 2 classification of businessSamantha Yau
 
Business and its future in bangladesh
Business and its future in bangladeshBusiness and its future in bangladesh
Business and its future in bangladeshShawkat Emran Emon
 
2 types of businesses business studies
2 types of businesses business studies2 types of businesses business studies
2 types of businesses business studiesPhoebe Riorden
 
Classification of companies
Classification of companiesClassification of companies
Classification of companiesRADHIKA GUPTA
 
01 business classification
01 business classification01 business classification
01 business classificationshivani param
 
Simple Business Model Classification System: Business Model Pipes, Valleys, a...
Simple Business Model Classification System: Business Model Pipes, Valleys, a...Simple Business Model Classification System: Business Model Pipes, Valleys, a...
Simple Business Model Classification System: Business Model Pipes, Valleys, a...Rod King, Ph.D.
 
Classification, Tagging & Search
Classification, Tagging & SearchClassification, Tagging & Search
Classification, Tagging & SearchJames Melzer
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Descriptive cataloging: Overview
Descriptive cataloging:  OverviewDescriptive cataloging:  Overview
Descriptive cataloging: OverviewJohan Koren
 
Human Rights Presentation
Human Rights PresentationHuman Rights Presentation
Human Rights Presentationellaboi
 
Example of Company background
Example of Company backgroundExample of Company background
Example of Company backgroundfazzuan
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Viewers also liked (15)

International Standard Bibliographic Description: background and recent devel...
International Standard Bibliographic Description: background and recent devel...International Standard Bibliographic Description: background and recent devel...
International Standard Bibliographic Description: background and recent devel...
 
Chapter 2 classification of business
Chapter 2   classification of businessChapter 2   classification of business
Chapter 2 classification of business
 
Classification of the business
Classification of the businessClassification of the business
Classification of the business
 
Business and its future in bangladesh
Business and its future in bangladeshBusiness and its future in bangladesh
Business and its future in bangladesh
 
2 types of businesses business studies
2 types of businesses business studies2 types of businesses business studies
2 types of businesses business studies
 
Classification of companies
Classification of companiesClassification of companies
Classification of companies
 
01 business classification
01 business classification01 business classification
01 business classification
 
Simple Business Model Classification System: Business Model Pipes, Valleys, a...
Simple Business Model Classification System: Business Model Pipes, Valleys, a...Simple Business Model Classification System: Business Model Pipes, Valleys, a...
Simple Business Model Classification System: Business Model Pipes, Valleys, a...
 
Classification, Tagging & Search
Classification, Tagging & SearchClassification, Tagging & Search
Classification, Tagging & Search
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Descriptive cataloging: Overview
Descriptive cataloging:  OverviewDescriptive cataloging:  Overview
Descriptive cataloging: Overview
 
Human Rights Presentation
Human Rights PresentationHuman Rights Presentation
Human Rights Presentation
 
Human rights in_india
Human rights in_indiaHuman rights in_india
Human rights in_india
 
Example of Company background
Example of Company backgroundExample of Company background
Example of Company background
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Information classification

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Peter GEELEN ✔
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Peter GEELEN ✔
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Innovators
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Cloudera, Inc.
 
Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecuritySandra (Sandy) Dunn
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.pptRakesh Kumar
 
DoD Data Quality Challenges
DoD Data Quality ChallengesDoD Data Quality Challenges
DoD Data Quality ChallengesJay j
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)Sam Bowne
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Arrans effective employment spring 2013
Arrans effective employment spring 2013Arrans effective employment spring 2013
Arrans effective employment spring 2013Nigel Targett
 

Similar to Information classification (20)

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
PPD511 Week 3 HIT Strategy and Delivery
PPD511 Week 3 HIT Strategy and DeliveryPPD511 Week 3 HIT Strategy and Delivery
PPD511 Week 3 HIT Strategy and Delivery
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurity
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.ppt
 
DoD Data Quality Challenges
DoD Data Quality ChallengesDoD Data Quality Challenges
DoD Data Quality Challenges
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Arrans effective employment spring 2013
Arrans effective employment spring 2013Arrans effective employment spring 2013
Arrans effective employment spring 2013
 

Recently uploaded

why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...Jack Cole
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfnikeshsingh56
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are successPratikSingh115843
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etclalithasri22
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformationAnnie Melnic
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaManalVerma4
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelBoston Institute of Analytics
 
Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfPratikPatil591646
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfNicoChristianSunaryo
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 

Recently uploaded (17)

why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdf
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are success
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etc
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformation
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in India
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
 
Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdf
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdf
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 

Information classification

  • 1. INFORMATION CLASSIFICATION • SMELLS LIKE A BUSINESS GLOSSARY, • TASTES LIKE A BUSINESS GLOSSARY, • FOR DATA SECURITY AND ASSET MANAGEMENT – THIS IS WHERE YOU START
  • 2. ABOUT ME • Contact and Summary Details • LinkedIn: https://www.linkedin.com/in/howarddiesel-infogovernance?trk=hp-identity- name • Twitter: @howarddiesel • Skype: howarddiesel • Mail: howard@modelwaresystems.com
  • 3. CLASSIFICATION: PROBLEM RECOGNITION • TRUISM: The Requirement to protect information is required by all organizations • PROTECT • LOSS • EXPOSURE • EFFECT • LOSS: hampers business operations • EXPOSURE: affect reputation and advantage • LOSS • Complete / Destroyed • Inability to Find • CONSEQUENCE: Hoard & Secure Everything (Expensive & Not practical)
  • 4. CLASSIFICATION: HOW IMPORTANT IS IT? • Intellectual Property • Privacy • Legal Issues • Sensitivity
  • 5. CLASSIFICATION: PURPOSE • Availability, integrity and confidentiality are provided for all identified assets • Return on investment by implementing controls where they are needed the most • Map data protection levels with organizational needs • Mitigate threats of unauthorized access and disclosure • Comply with legal and regulation requirements CLASSIFICATION: GOALS
  • 6. CLASSIFICATION: 4 HUSBANDS AND A WIFE • WHAT • Process of organizing data into categories for its most effective and efficient use. • WHY • Achieve our Classification Goals • WHERE • All data storage locations • WHEN • Entire Data Lifecycle until DISPOSED • HOW • Written procedures and guidelines for data classification should define what categories and criteria the organization will use to classify data and specify the roles and responsibilities of employees & systems within the organization regarding data stewardship.
  • 7. SYSTEM OF PROCESSES FOR CLASSIFICATION Understand Information • Information Types • Identify Risks to Information • Applicable Regulations Create Classification System • Classification Scheme • Standards and Procedures • Access to data • Classifying Information • Creating and Handling Classified Information • Storing Classified Information • Transmitting Classified Information • Receiving Classified information from External Parties Implement • Classification Policy • Requirement for information classification • Mandate the use of the classification system • Highlight RACI for maintain the classification system • Security grading documents • Provide more detailed level of guidance for a specific area of data • Classification of existing data Educate • Formal training • Awareness campaigns • Staff Induction Maintain • Not a discrete project • Cycle of Continuous Improvement
  • 8. CLASSIFICATION: MODEL STRUCTURE • Content: Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area • Reg Authority: Reference to the regulatory document which specifies storage and/or disposal requirements. • Security Requirement • C: contains sensitive info – handled CONFIDENTLY • I: INTEGRITY, specifically protected against unintentional or unauthorised changes • A: Handled especially with regard to high ACCESSIBILITY
  • 9. CLASSIFICATION: MODEL STRUCTURE – CONT’D • Preservation Period • LEG – legal value • ENT – Enterprise critical value • HIST: Historical value • Archive Index (File Plan)
  • 10. REFERENCE MATERIAL • Guidelines for Classification of Information Best Practice Document; Produced by UNINETT led working group on Information Security (http://services.geant.net/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4- ufs136.pdf) • Tips for creating a data classification policy (http://searchsecurity.techtarget.com/feature/Tips-for-creating-a-data-classification- policy) • Implementing information classification enterprise (https://www.giac.org/paper/gsec/4198/implementing-information-classification- enterprise/106714) • Drafting data classification policies and guidelines (http://searchfinancialsecurity.techtarget.com/news/1289406/Drafting-data- classification-policies-and-guidelines) • Information classification according to ISO 27001 (http://advisera.com/27001academy/blog/2014/05/12/information-classification- according-to-iso-27001/)

Editor's Notes

  1. We have to protect against the loss and inappropriate exposure to external parties of organizational information assets.
  2. There are myriad reasons for protecting information. Examples include1: • Intellectual Property. The compromise of this type of information could result in the loss of a competitive advantage and market share. In a recent example, InstallShield accused a rival software manufacturer of using proprietary information to design software to help customers migrate to their competing product2. • Privacy. Privacy is becoming a significant issue for all companies and increasing legislation in the area requires companies to be aware of their responsibilities for protecting this type of data. • Legal issues. Non-disclosure contracts, archive acts and requirements of taxation law are all examples of external influences on your data classification requirements. It is important that you are aware of all relevant requirements in this area prior to formulating a classification scheme. • Sensitivity. While the release of some information may not damage the company or breach privacy legislation, it may still be desirable to protect sensitive data such as the companies payroll details.
  3. Owner The organizational unit or process which holds ownership of the information Content Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area Regulatory Authority Reference to the regulatory document which specifies storage and/or disposal requirements. Storage Location The name of the system and/or physical archive in which the information object is located in the storage period Unrestricted data Open or Public data (still may include handling requirements Security Classification The degree of protection required for the information object. An object may contain more than one level of classification (Email) Classification Level Definition: Open Internal Sensitive Highly Sensitive   Security requirement Special security considerations based on confidentiality, integrity and/or accessibility of information objects: C – object contains sensitive information and should be handled confidently I – Integrity of information object shall be specifically protected against unintentional or conscious unauthorised changes A – object shall be handled especially with regard to high accessibility Maximum down-time Maximum acceptable time for which electronically stored information object can be inaccessible. Recommended periods are: 1 Hour 1 Day 1 Week 1 Month Preservation Period Preservation period is a criterion which specifies the relative importance the information has for the organization: LEG – legal value ENT – Enterprise Critical value HIST – Historical value Personal Data If the information object contains or may contain personal data: Personal Data (P) – data that can be associated with an individual Sensitive Personal Data (S) – data relating to racial, ethnic, political, religious Archive Index (File Plan) An archive index is a system for organizing documents based on one or more classification principles. Normally use a sorting principle based on Subject areas. The subject groups, and thereby the folders in the physical archive, are organized per the decimal system. Examples: Class 1 is Finance Main Group 13 is Accounting and Auditing Group 133 is Completed Accounts
  4. Owner The organizational unit or process which holds ownership of the information Content Type of information, irrespective of format and medium. What the information applies to. Typical derived from the related Business Subject Area Regulatory Authority Reference to the regulatory document which specifies storage and/or disposal requirements. Storage Location The name of the system and/or physical archive in which the information object is located in the storage period Unrestricted data Open or Public data (still may include handling requirements Security Classification The degree of protection required for the information object. An object may contain more than one level of classification (Email) Classification Level Definition: Open Internal Sensitive Highly Sensitive   Security requirement Special security considerations based on confidentiality, integrity and/or accessibility of information objects: C – object contains sensitive information and should be handled confidently I – Integrity of information object shall be specifically protected against unintentional or conscious unauthorised changes A – object shall be handled especially with regard to high accessibility Maximum down-time Maximum acceptable time for which electronically stored information object can be inaccessible. Recommended periods are: 1 Hour 1 Day 1 Week 1 Month Preservation Period Preservation period is a criterion which specifies the relative importance the information has for the organization: LEG – legal value ENT – Enterprise Critical value HIST – Historical value Personal Data If the information object contains or may contain personal data: Personal Data (P) – data that can be associated with an individual Sensitive Personal Data (S) – data relating to racial, ethnic, political, religious Archive Index (File Plan) An archive index is a system for organizing documents based on one or more classification principles. Normally use a sorting principle based on Subject areas. The subject groups, and thereby the folders in the physical archive, are organized per the decimal system. Examples: Class 1 is Finance Main Group 13 is Accounting and Auditing Group 133 is Completed Accounts