Sensitivity of data
Some database contains what is called sensitive data. As a working definition sensitive data are data which cannot be made public. Determining which field and entities are sensitive based on individual database and underlying meaning of data. There are two category of databases nothing sensitive and completely sensitive. Some of the example of nothing sensitive database is public library digest, Movies database and many more. However, there are very few databases completely sensitive such as financial database, defence database and partial co-operate databases.
This Blog mainly focus on financial database so let’s investigate some simple entity relation diagram just related to customer account. Basic Customer account table entities carries name, Address, type of account, Account Number and many more sensitive fields. Which can be used to grant access to credit card or health details from authorized stakeholders.
ER Diagram of Simple Financial Database |
Strategic Plan to Manage Financial Database
Data Life Cycle |
Above display graphics is a standard data life cycle every industry should follow. Financial firm also follow similar data management cycle. Each stage has their own functionality and uniqueness. We will also discuss on security threats, strategy to avoid certain threats and possible outcomes on certain data life cycle stage.
Collect
Let’s starts with Collection of data, Collection of data starts right before you were not a member of any institute. Do you know how? When you schedule and appointment for opening bank account, they ask your name, email, phone number and purpose of appointment right. But every institute and province have their own law and regulations regarding the collection of information worldwide, especially on personal information (PII or PHI). But next question is how institute is going to use information you provided to institute is totally underlying on institute. But personal information must be collected fairly and accurately and used only for authorized purposed by the owner. Information owner need to be kept data private and destroyed after the completion of purpose.
Potential Security threats for Data capture stage are data breach on 3rd party software’s such as Appointment scheduler application used by financial branch to notify customer and adviser and local system webpages not hosted on secure connection such as HTTPS which allows external users to snip the traffic.
Preventions or strategy for Collection of data stage are in-person form filled up and data entry should be done within secure environment. Avoid taking appointment via emails, phones or voice mail system which may be tapped in between. System should be well pen tested before deploying on site.
Possible Outcome of Strategy we followed for collection of data is Significant drop on phishing attack and almost zero data tampering.
Store
Potential information stealing threats for this stage are SQL Injection or database injections, buffer overflow because of in-proper assigning of data types while defining schema and ransomware attack because it’s an important data so they will request for releasing the encrypted data.
Preventions or strategy for storing data stage are don’t trust any form of string, don’t construct dynamic queries with user input, define sensitivity of data and accordingly take periodically backups of systems, construct solid firewalls which allows only internal network users, Modularize Network infrastructure.
Possible outcome of Strategy we followed for storing data is decrease in DoS (Denial of Service), Maintain reliability and credibility of data and based on sensitivity of data optimization of backups which leads to reductions of redundancy.
Process
Raw data is like a crude oil. To make use of that data and derive some insights from data, Data needs to refine or proceeds. Most import thing while processing the data is originality of data should not be lost. There should be Quality control to check internal standard and monitor data quality. Also, Quality Assurance is an external standard to assure the data presented meets the agreed quality standards. In Banking sector, Credit card is being used in different time zone by your family member than which transaction time should be posted under the transaction history. To mange this kind of situation developer need to show current time zone time on instance of page from where page is being accessed by converting original time from different time zone.
Potential Security threats for this stage are in-campus data breach means intentionally installation of bugs into system by current employees, Low Confidence means Impaired decision-making and planning as a result of low quality, inaccurate or incomplete data and not intentional Human Errors leads to data breach like compromise of private keys.
Preventions or strategy to avoid cyber threats of this stage are in-depth background check of employee before hiring, Whistleblowers should be promoted, should develop software with certain requirement and lastly, data quality improvement plans should be implemented within institute.
Possible outcome after implementing preventions are Decreases in-campus fraud, decreases in Human errors, Increase in Confidentiality and credibility of data and decrease in data tampering and outsourcing without agreement.
Share
Data is Accessed, Used, Shared and published to the agreed 3rd party vendors. But it is important to identify the policy of data sharing between the stakeholder and 3rd party vendors. Questions comes how and on what medium data is being shared and what amount of data? Answer to this is data custodian is responsible for the data access, the data owner is the largest stakeholder of data and should have the ultimate sign-off on how data is shared. Stakeholder of data and 3rd party vendor mutually agrees on how and through what medium they need to share the data usual method is over the cloud by sharing keys and giving the access to instance or resource.
Potential security threats for this stage are loss of control over sensitive data, data leakage over cloud, loss or misplaced private key allows access to resource by unauthorized user who can install backdoor plugin and gain persistency over the resource.
Prevention or strategy to avoid security threats for this stage are always use secure protocols while sharing data along the side its always recommended to implement end-to-end encryptions connections while data shared over cloud or different medium. Another main strategy is implementing key management policy and periodic change of cloud credentials.
Potential outcome after implementing strategy mention above is it will decreases in probability of data loss over the cloud which leads to significant drop or almost zero data leakage guaranty. After successfully implementation of key management and periodically changing cloud services credentials its significantly decreases in access to resources from intruders.
Archive
Most common and best practice all the co-operates generally does is backup and recovery of data if they have lost or data is being corrupted during the other process. But there is always backup policy and archive policy followed by all institutes. For example, financial firms usually keep the record of lost credit cards and broken magnetic card record but where does they store those data which is not frequently queried, so usually they store not frequently used details either in HDD instead of SSD’s which drop their recovery pricing. But Question here is for how long financial firm keeps the data under less expensive devices? Answer is The retention periods is the time frame after which the data is expired and will be of no use this period is regulated by firm and mentioned under their policy such as CRA carries last seven years of individual files after that Agency dump or destroy the past data.
Potential Cyber threats during backing up and recovering data are Attacker may encrypt the backup drives using some encryption algorithm which won’t allow the admin to boot the system and access the important file system also known as ransomware attack. During those kinds of attack, Intruders may corrupt or delete the golden image of resource which impact the complete stop of services provided by compony.
Preventions or Strategy implemented by malware analyst for this stage are define sensitivity of data and define periodic backup on different network cloud or services. moreover, it’s always recommended to keeps backup separate network or completely offline. Network admins should always keep multiple golden images stored at different locations.
Potential outcome after strategy implemented by malware analyst are Don’t need to pay to Attacker who encrypted the backup data, Service never stopped for long time span because one can always get started with non-infected golden image.
Destroy
After Expiring of data, according to the company policy they need to destroy data such a way that there should be zero percentage (0%) data remanence. Data Remanence is the residual data that remains after data destruction. Because with certain amount of data remanence it is possible to extract and reconstruct a partial or full set of original data. So, the question is how to destroy the presence of data? Answer is There are certain 3rd party vendor provides certified services of destroying the fingerprints of original data on request. They usually used mechanical and software tools to destroy the hard drive (SSD/HDD).
Potential data recovery threats are lost or misplacement of physical drive and Electronically retrieval of data from formatted hard drive.
Preventions and strategy used by institute are they hire 3rd party vendor to destroy the presence of data. Technology used by them are robust data wiping by multiple pass and random array approach to sanitizing data. Physical on-site or off-site destruction of HDD/SDD. To maintain Count of Assets compony should also implement asset management tools which may use to track or log the events.
Potential outcome of strategy implemented for destroy stage are No fingerprints of expired data and decreases in loss of physical assets.
Even after Implementing solid data management
strategy. Is there any probability to loss or compromise the data? Answer is
Yes because there is no solid Guideline to prevent data from hackers.
Credit:
Charvik Patel
Great work!!
ReplyDeleteVery useful
ReplyDeleteThanks
DeleteYou've written a fantastic article about Secure Hard Drive Disposal. This article provided me with some useful knowledge. Thank you for providing this information.
ReplyDeleteDigital transformation is the need of the hour. Additionally, organizations can leverage no-code Data Management Solution to seamlessly build innovative end-to-end enterprise solutions in minutes.
ReplyDeleteslot deposit via dana, slot online, judi online, slot deposit dana, slot deposit dana 10000 tanpa potongan, slot deposit dana 10000
ReplyDeleteNice. I absolutely appreciate how you explain everything. Thank you for sharing this article. erp customer service
ReplyDelete