Once one begins to appreciate the power of data, it is important to learn how to protect it. This is the subject of information assurance. Let us use the UK’s National Security Agency definition as a guide for us. Information assurance (IA) consists of five pillars: availability, integrity, authentication, confidentiality, and non-repudiation. Let us use the…
Category: Privacy
Introduction to the Digital World — Part 3 of 5
From Iljimae, a Korean drama. “There are two kinds of sword — one to save others and one to kill others.” The drama series shows us the power of a weapon-master. In the hands of a righteous weapon-master, he saves people from harm. In the hands of a ruthless one, he mows down people with ease….
Introduction to the Digital World — Part 2 of 5
Data is a collection of facts. By itself, data tells no stories. Humans interpret data and craft stories to “explain the data”, hereby providing meaning. This is the heart of data analytics. The digital world has provided the platform where data analytics has driven almost every business, for better or worse. “He who controls data controls…