Advertisment

Standardization helps preserving data integrity

author-image
CIOL Bureau
Updated On
New Update

The benefits of data standardization benefits the organization in various counts including facilitating information exchange and having uniform audit mechanisms, Ravi Raman, Chief Risk Officer, Infosys BPO in an interaction with CIOL's B.V.Shiva Shankar. According to him standardization brings down the data maintenance cost. Excerpts:

Advertisment

CIOL: Being business transparency the watchword, keeping data available for anybody, anywhere, anytime, how do you ensure integrity of data?

Ravi Raman: Information integrity refers to the correctness of information. For example:

o We need assurance that the information we use is true and factual.

o We need assurance that information that we receive is what the sender dispatched to us. Information can be classified as basic or verifiable depending on the impact that a breach in its integrity can have, and the privileges that individuals need to be given to process the information.

To ensure integrity of data all the clients networks are extension of their own logical network i.e. each client area is physically and logically segregated and subsequently no modification of the data is possible as it flows in. To ensure that the correct data flows out, audit mechanisms in the form of transaction monitoring, random checks, four-eye procedures besides system verification process ensure that the integrity of the data is not compromised.

CIOL: Do you think that the time has come to rethink about storage system, and would mirroring of data help?

RR:
Data mirroring is the act of copying data from one location to a storage device in real-time. As the data is copied in real-time, the information stored from the original location is always an exact copy of the data from the production device. Data mirroring is useful in the speedy recovery of critical data after a disaster. Data mirroring can be implemented locally or offsite at a completely different location. In the current environment of data having to be available at any point in time, mirroring could be a good albeit a costly option.

Advertisment
 

CIOL: What role you see for standardization in preserving data integrity?

RR:
Standardization will help in the process of preserving data integrity.

The benefits of data standardization include:

  •  facilitating information exchange,
  •  having uniform audit mechanisms,
  •  reducing data maintenance costs,
  •  providing "rich" data and information,
  •  allowing easy access to information, and
  •  improving communication and coordination
Advertisment

CIOL: In what way the concepts like data center and intelligence information network (IIN) are helpful in this regard?

RR:
A data center is usually maintained by an organization for the purpose of handling the data necessary for its operations. A data center therefore keeps high standards for assuring the integrity and functionality of its hosted computer environment. This is depicted in its physical and logical layout. The main purpose of a data center is running the applications that handle the core business and operational data of the organization.

Data centers are also used for off site backups. Larger companies may also send their backups off site for added security. This can be done by backing up to a data center. Encrypted backups can be sent over the internet to data center where they can be stored securely.

Now INI, intelligence can be any source of information, suitably assessed and processed according to established methods. The information so gathered is processed by one or more analysts and turned into an intelligence product. Information is conveyed between nodes of the network by a variety of secure/clandestine means, be they physical or electronic.

Advertisment

An intelligence network is a system through which information about a particular entity is collected for the benefit of another through the use of more than one, inter-related source. Intelligence is a military and/or governmental term referring to the information used in making decisions.

 

CIOL: How do you differentiate data security from data integrity?

RR:
Data Integrity refers to the validity of data. There are many ways to minimize these threats to data integrity. These include:

Advertisment
  •  backing up data regularly,
  •  controlling access to data via security mechanisms,
  •  designing user interfaces that prevent the input of invalid data, and
  •  using error detection and correction software when transmitting data,

Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy.

  •  It also helps in protecting personal data.
  •  It refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
  •  Most security measures involve data encryption and passwords.
Advertisment

CIOL: What are the challenges for preserving data integrity?

RR:
Data integrity can be compromised in a number of ways:

  •  Human errors when data is entered,
  •  Errors that occur when data is transmitted from one computer to another,
  •  Software bugs or viruses,
  •  Hardware malfunctions, such as disk crashes, and
  •  Natural disasters, such as fires and floods.
 
Advertisment

CIOL: What are the current trends in data security and data integrity?

RR:
Data security solutions include encryption, strong authentication, policy compliance enforcement and identity management.

1. Laptop Security:

Laptop security requires both encryption and strong authentication to deliver data protection of information stored on and communicated from laptop computers. Implement strong laptop security policies with automated full disk encryption.

2. Desktop Security

Deploying an enterprise-wide desktop security platform for Windows desktops allows organizations to enable strong authentication, encryption and digital signature capabilities to enable data protection and other security applications such as email security.

3. File Encryption

File encryption enables protection of specific files and folders. Transparent and automated data security can also include policy enforcement. Get file encryption with or without PKI.

4. Removable Media Security

USB key chains, Fire wire memory cards and other removable media are commonly used at all levels of your organization. Protect your intellectual property; make sure these devices are secured with automated data protection software.

5. PDA and Mobile Device Security

Protect applications and confidential data with data protection solutions for PocketPCs, other PDAs and smart phones. Get email encryption on Blackberry devices.

6. Secure File Transfer

FTP, email, Internet transactions - information is constantly in motion and in need of protection. Secure file transfer can be achieved in many ways. Integrate secure file transfer with other data security solutions.

7. Adobe PDF Security

Digital signatures applied to Adobe PDF help verifies the authenticity and history of the document. Automate and integrate Adobe PDF security with data security software that can perform file encryption, email security and lifecycle management of digital IDs.

Data Integrity

· Integrated documentation

· Change tracking

· Integrity audits

· Relationship management

· Faster disaster recovery

· Integrated visualization

· Minimized systems maintenance support costs

· Reduction in human error related maintenance incidents

· Ensure application integrity for environmental, safety, and production controls

· Increased productivity, safety, and reliability performance

· Improved operator effectiveness

· Improved automation systems' utilization