楼主: oliyiyi
891 1

How Can Data Scientists Mitigate Sensitive Data Exposure Vulnerability? [推广有奖]

版主

泰斗

0%

还不是VIP/贵宾

-

TA的文库  其他...

计量文库

威望
7
论坛币
271951 个
通用积分
31269.3519
学术水平
1435 点
热心指数
1554 点
信用等级
1345 点
经验
383775 点
帖子
9598
精华
66
在线时间
5468 小时
注册时间
2007-5-21
最后登录
2024-4-18

初级学术勋章 初级热心勋章 初级信用勋章 中级信用勋章 中级学术勋章 中级热心勋章 高级热心勋章 高级学术勋章 高级信用勋章 特级热心勋章 特级学术勋章 特级信用勋章

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币

What is sensitive data? How does it affect data science, and what can be done to mitigate data exposure vulnerability? Read on to find out.

By Laurel Brian, Data Recovery Singapore.

What is Sensitive Data Exposure?


Sensitive Data Exposure Vulnerability is one of the most critical security threats that can result in compromising the security of modern- day web applications. It occurs when a web application does not adequately protect sensitive information from being disclosed to unauthorized users. These are typically implementation flaws, which are exploited by the hackers to gain access to sensitive information stored by the application.

How Does Sensitive Data Exposure Vulnerability Affect Data Scientists?


Data scientists typically use several web--based solutions, platforms and applications to process, analyze and visualize the data points. According to Open Web Application Security Project (OWASP) - a worldwide non-profit community focused on improving the security of web environments - issues related to sensitive data exposure vulnerability can adversely affect data mining platforms, data integration solutions, business intelligence suites and other analytics applications that are accessed via internet. As data science projects often deal with mission-critical business data, any unauthorized access may lead to serious information security and data privacy violations.



Image from Credera's blog.
How to Mitigate Sensitive Data Exposure Vulnerability?


Enforce Encryption for Accessing Critical Data:

Business Data can broadly be categorized into two groups - public and protected. Protected data should ideally be kept confidential to a group of authorized users only. First and foremost, you should identify the protected data that are sensitive enough to require extra protection. Once you have identified the sensitive data points, deploy a proven encryption technique to safeguard the data while at rest and during transmission. Key- based encryption enforces the users to provide the corresponding decryption key for gaining access to the encrypted data points.

Safeguard the Authentication Gateways:

Weak authentication function can be a soft target for the hackers to steal sensitive information. For safeguarding critical business data, you should make use of an advanced transport layer security protocol (SSL/TLS). It's a good idea to enforce HTTPS sessions to protect all the authentication gateways. Businesses that deal with sensitive data can make use of two -factor authentication technique to minimize the risk of potential security breaches.

Deploy Strong Password Hashing:

Brute -force attacks can successfully penetrate weak password hashing techniques. There are several hashing algorithms to choose from, but when you are dealing with sensitive information, you should ideally opt for the one that supports cryptographic hashing function.

Simulate Retrospective Hacking Attack:

Penetration testing can be used to identify the weak areas in your environment before a hacker can exploit them. Simulate a real -life hacking attempt on your application to figure out how secure the application is. If the attack succeeds, then investigate further to fix the vulnerable attack vector.

Have a Disaster Recovery Plan in Place:

When a hard drive crashes or gets corrupt, it is pretty easy to recover the data. For a data science project that deals with petabytes of data, however, the procedure of data restoration is far more complex compared to a standalone hard disk recovery. Isn't it better to be safe than sorry? That's why every data science project must have a proper disaster recovery plan in place to retrieve the data in the event of a disaster.

Final Thoughts:


The absence of a proven encryption technique to safeguard the application is the most common root cause for unauthorized data access. Improper key generation, weak password hashing algorithm, broken authentication tokens and brute- force attacks are the other contributing factors that may result in sensitive data exposure. It does make sense to have a well -defined disaster recovery plan when you are dealing with a huge volume of data. Last but certainly not the least, there should be periodic audits to review the security compliance to prevent unauthorized access of sensitive business information.

Bio: Laurel Brian is a content writer and marketing consultant at Data Recovery Singapore. As a tech geek he is continually drawing upon his own talent and skill, and as a marketing consultant he enjoys the business challenges and build relationships.



二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:Scientists Sensitive Scientist exposure Ability disclosed critical security protect science

缺少币币的网友请访问有奖回帖集合
https://bbs.pinggu.org/thread-3990750-1-1.html
沙发
Kamize 学生认证  发表于 2016-8-30 13:57:55 来自手机 |只看作者 |坛友微信交流群
oliyiyi 发表于 2016-8-27 10:08
What is sensitive data? How does it affect data science, and what can be done to mitigate data expos ...
谢谢分享了啊!
已有 1 人评分论坛币 收起 理由
oliyiyi + 20 沙发

总评分: 论坛币 + 20   查看全部评分

使用道具

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
加好友,备注jltj
拉您入交流群

京ICP备16021002-2号 京B2-20170662号 京公网安备 11010802022788号 论坛法律顾问:王进律师 知识产权保护声明   免责及隐私声明

GMT+8, 2024-4-26 13:36