Академический Документы
Профессиональный Документы
Культура Документы
Collection, Availability
and
Security of Business-Data
Network-, Hardware- and
Software- Requirements
An Introduction about
Business-Operations-Security and Data-Availability
using certifiable DATA-MANAGEMENT Methods
DATA-MANAGEMENT (I)
Data-management is a very broad topic if it comes down to:
Getting all the information of your business (data-sourcing)
Organized
Reliable
Continuously Available
Secure and
Last but not least: Recoverable in case of a Disaster
(data-adjustment)
Automated processed
Statistically evaluated
Of trustworthy use for taking strategical and tactical Business-decisions
DATA-MANAGEMENT (II)
Keep it in shape for: (data-maintenance)
Maintaining: (metadata-maintenance)
Documentation
Guaranteed product quality
Good Customer- and Provider Relationships
Verifiable business-process guidelines
Legal and financial requirements of your operations
DATA-MANAGEMENT (III)
All those points are of crucial importance for your business
Why? > this data represents lots of money if its in the right hands
How? -> in this presentation you will learn it
What is the Result?
DATA-MANAGEMENT (IV)
Guidelines for basic DATA-MANAGEMENT (Handling and Security)
DATA-Access must be planned, prove-read and accurate implemented
DATA-Accuracy has to be established
DATA-Availability has to be assured
Where
Where
Where
Where
Administrative information
(external)
Financial information
(external)
Legal information
(external)
Basic Provider and Supplier information
(external)
Basic Client and Functional Intermediary information
(external)
You are wasting TIME and MONEY which is for free to be reclaimed
Repeat these steps until you are sure there is nothing missing (End of recursion)
The result will be an incredible amount of information about the business
Until you reach affirmative the point where nothing changes any longer
Then observe and assure that the gathered information is accurate
Enhance the time to max. every 12 weeks for the second year
If you find additional or changed information: shorten back to 4 weeks of
DATA ASSESMENT
Quantity
Quality
Consistency
Reliability and
Availability
Operations Management
(internal)
(integral)
Ask yourself and your Staff what are the internal requirements
Information which is only known to department internal level is lost for
Administrative and higher Management
Remains within limited usability and exploitation
Keeps in worst case scenario your business vulnerable to:
Extortion
Loss of profits
Reliability-incidents
Repeat this process of interviews with each and every department separately. Do not miss
a single one!
This is the base for your business-data classification
It is the complementary part to data-mining
It is required to organize and evaluate your Business-Information and Data Base
Find an agreement with all involved about the found business-data model
Keep a written and signed record of this agreement for
Documentation and
Further processing in later DATA-ASSESSMENTS
(hence Availability)
(SPF)
(Bad IT-Design)
(Bad SW-Design)
Assure that the data-processing is (machines are more human than you think):
Consistent and proven before it will be implemented
Modifiable as if later adjustments in the work-flow may be required.
Data-Access (I)
Access to your DATA how ??
Data can be accessed in two general ways:
From INSIDE of your business
From OUTSIDE of your business
Inside Access:
Whomever who has physical access to your INTERNAL NETWORK
is generally enabled to access ALL of your DATA. Even the supposed protected
data
This implies:
Data-Access (II)
Outside Access:
Whomever who has wired or wireless access to your INTERNAL
NETWORK
is generally enabled to access ALL of your DATA. Even the supposed
protected data.
It is the same as to have physical access to the network.
Data-Accuracy (I)
What is Data-Accuracy?
Data-Accuracy is the term which describes the overall quality of data
a company or a business is dealing with. This includes basically:
Completeness
Correctness
Consistency
Completeness:
Every piece of data which is required to accomplish a business-task needs to
be identified before the actual capturing starts
The data has to be sufficient and reliable
Meet the requirements for automated processing
Data-Accuracy (II)
Correctness:
Wrong or inefficiently captured data is the worst enemy of automation of data
Avoiding the capture of unnecessary data is the best way to keep it free from Errors
Data captured at hand and automated data-imports must be counterchecked
Consistency: