{"id":2744,"date":"2021-06-11T16:09:00","date_gmt":"2021-06-11T08:09:00","guid":{"rendered":"https:\/\/www.mdis.edu.sg\/blog\/?p=2744"},"modified":"2021-11-17T15:19:25","modified_gmt":"2021-11-17T07:19:25","slug":"importance-of-data-information-security-a-biggest-asset","status":"publish","type":"post","link":"https:\/\/www.mdis.edu.sg\/blog\/importance-of-data-information-security-a-biggest-asset\/","title":{"rendered":"Importance of Data\/Information Security \u2013 A Biggest Asset"},"content":{"rendered":"\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_11 counter-hierarchy counter-decimal ez-toc-grey\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\"><i class=\"ez-toc-glyphicon ez-toc-icon-toggle\"><\/i><\/a><\/span><\/div>\n<nav><ul class=\"ez-toc-list ez-toc-list-level-1\"><li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.mdis.edu.sg\/blog\/importance-of-data-information-security-a-biggest-asset\/#Importance_of_Data\/Information_Security_%E2%80%93_A_Biggest_Asset\" title=\"Importance of Data\/Information\nSecurity \u2013 A Biggest Asset\">Importance of Data\/Information\nSecurity \u2013 A Biggest Asset<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.mdis.edu.sg\/blog\/importance-of-data-information-security-a-biggest-asset\/#Security_Metrics\" title=\"Security Metrics\">Security Metrics<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.mdis.edu.sg\/blog\/importance-of-data-information-security-a-biggest-asset\/#Industries_Experience\" title=\"Industries Experience \">Industries Experience <\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.mdis.edu.sg\/blog\/importance-of-data-information-security-a-biggest-asset\/#Challenges\" title=\"Challenges\">Challenges<\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.mdis.edu.sg\/blog\/importance-of-data-information-security-a-biggest-asset\/#Develop_your_own_Metric\" title=\"Develop your own Metric\">Develop your own Metric<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"h-importance-of-data-information-security-a-biggest-asset\"><span class=\"ez-toc-section\" id=\"Importance_of_Data\/Information_Security_%E2%80%93_A_Biggest_Asset\"><\/span><strong>Importance of Data\/Information\nSecurity \u2013 A Biggest Asset<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Data is \u201cRaw Facts and figures\u201d whereas Information is\n\u201cProcessed Data\u201d. Data is the biggest asset for every organisation, hence its\nsecurity is one of most important and aspect for them.<\/p>\n\n\n\n<h2 id=\"h-security-metrics\"><span class=\"ez-toc-section\" id=\"Security_Metrics\"><\/span><strong>Security Metrics<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Metrics are required to better understand your data.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Various Security Metrics are developed by security professionals to achieve the objective such as: <\/p>\n\n\n\n<ul><li>Risk Metrices<\/li><li>Security Vulnerability\nand incident statistics<\/li><li>Annual Loss Expectancy<\/li><li>Return on Investment <\/li><li>Total Cost of Ownership. <\/li><\/ul>\n\n\n\n<p class=\"has-medium-font-size\">Although these metrices are accepted by various\nindustries, still these metrices hold some disadvantages such as unreliable\ndata processing. Industries are still looking for some good security metrices\nto fulfill their requirements.<\/p>\n\n\n\n<h2 id=\"h-industries-experience\"><span class=\"ez-toc-section\" id=\"Industries_Experience\"><\/span><strong>Industries Experience <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Industries like insurance, manufacturing and design\nteach us the importance of data and its security. <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Insurance<\/strong>&#8211; Teaches us how\nimportant it is to collect, understand, and analyse data accurately and\nprecisely, and their impact on our security metrics and other risk management\nexercises.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Manufacturing- <\/strong>Measurable\nand controlled processes always yield more positive results in terms of\nsecurity.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Design- <\/strong>Successful\nmeasurement security programmes <a>help\nto understand people as well as technology.<\/a><a href=\"#_msocom_1\">[NS1]<\/a>&nbsp;<a href=\"#_msocom_2\">[72]<\/a>&nbsp;<\/p>\n\n\n\n<h2 id=\"h-challenges\"><span class=\"ez-toc-section\" id=\"Challenges\"><\/span><strong>Challenges<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Challenges involved with these metrics are:<\/p>\n\n\n\n<ul class=\"has-medium-font-size\"><li>Risk<\/li><li>Cost<\/li><li>Time<\/li><li>People<\/li><li>Measurement<\/li><\/ul>\n\n\n\n<h2 id=\"h-develop-your-own-metric\"><span class=\"ez-toc-section\" id=\"Develop_your_own_Metric\"><\/span><strong>Develop your own Metric<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-medium-font-size\">A successful metric programme will always look at how\nimportant the qualitative data is, security as a business process and the\nimportance of people involved in the security process. Software Engineering\nteaches us the GQM (Global Question Metric Method) &#8211; one of the methods to\ndevelop our own metrices, it is a simple three-step process of developing a\nsecurity metric. The first step is defining specific goals that the organisation\nexpects to achieve. This will help the organisation to understand their\nbusiness needs. The second step would be to convert the goals into well-formatted\nquestions e.g. \u201cHow to achieve those goals?\u201d After that, the goal can begin at\na data level and metrices can be assigned.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">In conclusion, the better your metric programme, the\nbetter the outcomes will be.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Authored By \u2013 <\/p>\n\n\n\n<p class=\"has-medium-font-size\">Dr. Rama Bhatia Singh \u2013 <a href=\"https:\/\/www.mdis.edu.sg\/school-of-engineering\" target=\"_blank\" aria-label=\"School of Engineering and Technology (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">School of Engineering and Technology<\/a>(MDIS Singapore)<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Importance of Data\/Information Security \u2013 A Biggest Asset Data is \u201cRaw Facts and figures\u201d whereas Information is \u201cProcessed Data\u201d. Data is the biggest asset for every organisation, hence its security is one of most important and aspect for them. Security Metrics Metrics are required to better understand your data. Various Security Metrics are developed by security professionals to achieve the objective such as: Risk Metrices Security Vulnerability and incident statistics Annual Loss Expectancy Return on Investment Total Cost of Ownership. Although these metrices are accepted by various industries, still these metrices hold some disadvantages such as unreliable data processing. Industries [&hellip;]<\/p>\n","protected":false},"author":283,"featured_media":2745,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[25,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2744"}],"collection":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/users\/283"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/comments?post=2744"}],"version-history":[{"count":3,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2744\/revisions"}],"predecessor-version":[{"id":3245,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2744\/revisions\/3245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/media\/2745"}],"wp:attachment":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/media?parent=2744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/categories?post=2744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/tags?post=2744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}