Lecture 2 Data Governance
Lecture 2 Data Governance
OBJECTIVES
Data Governance Principles
Data as an Asset
Define Data Governance
Assess Data Quality Dimensions
Describe Data Cleaning Principles
Discuss Security Threats to an Organization’s data
DATA IS A CORPORATE - ASSET
Data is getting bigger, faster, in more shapes and formats, from
more sources and is more complex to control
Data is more important for business, both for operational and
analytical purposes
Data Should be accepted as an enterprise asset
Decreased productivity
Damage to credibility
Data glitches
Typos, multiple formats, missing / default values
Metadata and domain expertise
Field three is Revenue. In dollars or cents?
ELEMENTS OF DATA QUALITY
2
1
DATA CLEANING PRINCIPLES -1
Planning is essential
Develop a vision, a policy and strategy
Total Data Quality Management Cycle
1
DATA CLEANING PRINCIPLES - 2
Organising Data improves efficiency
The organization of data can improve efficiency and
considerably reduce the time and costs of data
cleaning.
For example, by sorting records by collector and
date, it is possible to spot errors where a record may
have been incorrectly recorded by date.
DATA CLEANING PRINCIPLES - 3
Prioritisation
Prioritisation helps reduce costs and improves efficiency. It
is important to concentrate on those records that offers
the most value.
• Ignore data that are not used or for which data quality
cannot be guaranteed
Focus on cleaning lots of data at the lowest cost.
For example, those that can be examined using batch
processing or automated methods, before working on
the more difficult records.
DATA CLEANING PRINCIPLES -7
34
Methods Used by Hackers
Malware
• Viruses
• Rogue software program that attaches itself to other
software programs or data files in order to be executed
• Worms
• Independent computer programs that copy themselves
from one computer to other computers over a network
• Trojan horses
• Software program that appears to be benign but then
does something other than expected.
35
Methods Used by Hackers
Spyware
• Small programs install themselves surreptitiously on
computers to monitor user Web surfing activity and
serve up advertising
Key loggers
• Record every keystroke on computer to steal serial
numbers, passwords, launch Internet attacks
36
Methods used by Hackers
Sniffer
• Eavesdropping program that monitors information
traveling over network
• Enables hackers to steal proprietary information such as
e-mail, company files, and so on
Denial-of-service attacks (DoS)
• Flooding server with thousands of false requests to crash
the network
Distributed denial-of-service attacks (DDoS)
37
• Use of numerous computers to launch a DoS
Methods used by Hackers
Identity theft
• Theft of personal information (social security ID, driver’s
license, or credit card numbers) to impersonate someone
else
Phishing
• Setting up fake Web sites or sending e-mail messages that
look like legitimate businesses to ask users for confidential
personal data
Evil twins
• Wireless networks that pretend to offer trustworthy Wi-Fi 38
connections to the Internet
Internal Threats: Employees
3
9
Mitigating Security Risks
Intrusion detection systems:
• Monitor hot spots on corporate networks to detect and
deter intruders
• Examine events as they are happening to discover attacks
in progress
Antivirus and antispyware software:
• Check computers for presence of malware and can often
eliminate it as well
• Require continual updating
Firewall: Combination of hardware and software that
prevents unauthorized access to network 40
Mitigating Security Risks
A Corporate Firewall
Figure 7-5
The firewall is
placed between
the firm’s
private
network and
the public
Internet or
another
distrusted
network to
protect against 41
unauthorized
traffic.
MITIGATING INFORMATION SECURITY RISK
Cultural barriers
Lack of senior-level sponsorship
Underestimating the amount of work involved
Too much time spent on structure and policies but not
enough on action
Lack of business commitment
Lack of understanding that business definitions vary
Trying to move very fast from no-data-governance to
enterprise-wide- data governance