Tag: Security

Security Approaches in Data Modeling. Part 4

This is the fourth in our multi–part series on data modeling for information security as well as data characteristics. A simple data model for a fictional website that supports shared–interest organizations (bird–watching clubs, etc.) has provided us with content for exploring data modeling from a security viewpoint. In Oscar Wilde’s play Lady Windermere’s Fan, Lord Darlington tags a cynic as “somebody who knows the price of everything, and the value of nothing.

Security Approaches in Data Modeling. Part 3

This is the third of our multi-part series on applying information security approaches to data modeling. The series uses a simple data model, something to manage social clubs and interest groups, to provide the content we look to secure. Later we will address modeling for authorization and user management, as well as other parts of a secure database implementation. In social situations, it’s common to “read between the lines” – deducing the unspoken assumptions and assertions in a conversation.

“Is It Secret? Is It Safe?” Handling Sensitive Data in Your Data Modeling

.KeyLearning { max-width: 90%; padding: 20px 20px 30px 30px; margin: 40px auto; background-color: #643296; color: #ffffff; border: 0px solid #360063; border-radius: 8px; -webkit-border-radius: 8px; -moz-border-radius: 8px; -khtml-border-radius: 8px; } .KeyLearning .KeyLearningTitle { font-size: 1.125em; font-weight: bold; margin-top: 0px; } Early in the movie “The Fellowship of the Ring”, the wizard Gandalf asks the hero Frodo this question: “Is it secret? Is it safe?” We may not have a magic ring to protect, but we’re asking the same question.

Applying Simple Access Control to a Small Data Model

.KeyLearning { max-width: 90%; padding: 20px 20px 30px 30px; margin: 40px auto; background-color: #643296; color: #ffffff; border: 0px solid #360063; border-radius: 8px; -webkit-border-radius: 8px; -moz-border-radius: 8px; -khtml-border-radius: 8px; } .KeyLearning .KeyLearningTitle { font-size: 1.125em; font-weight: bold; margin-top: 0px; } “Information is the lifeblood of any organization…” We hear a lot of statements like this, or about an “information age,” or an “information economy.” When we agree with belief that amplifies the importance of information in the world today, we have to consider how to make that all-important information secure.