Session 9 - 5th Apr
Session 9 - 5th Apr
Classification Schemes
Data classification typically follows standard schemes that categorize data based on
its importance and sensitivity. Some common classification schemes include:
1. Based on Confidentiality:
1. Public: Data that can be shared freely.
2. Internal: Data that should remain within the organization but isn't highly sensitive.
3. Confidential: Sensitive information that could cause harm if disclosed.
4. Restricted: Extremely sensitive data that could have serious consequences if compromised (e.g., trade secrets).
2. Based on Integrity: Classifies data by its need for accuracy and trustworthiness.
Critical systems (like financial databases) may require higher levels of protection for
integrity.
3. Based on Availability: Data needed for daily operations may require higher
availability and resiliency, especially for businesses that rely on continuous access
to their data.
Automation
In cloud environments, manually classifying large amounts of data can be
time-consuming and prone to human error. To address this, organizations
use data classification tools and machine learning to automate the
process. These tools scan and label data based on pre-defined classification
rules, improving speed, accuracy, and efficiency.
Quantum-Resistant Encryption
Trend: With the eventual arrival of quantum computing, current encryption methods may become obsolete. Research into
quantum-resistant encryption algorithms is gaining momentum.
Future Direction: In the coming years, we will see cloud providers begin to adopt quantum-resistant cryptographic
methods, ensuring long-term protection of sensitive data from quantum computing attacks.