Report on EDMS Data Analysis: Information Assets Protection Strategies

Verified

Added on  2022/08/26

|18
|414
|23
Report
AI Summary
This report provides a comprehensive analysis of EDMS data, focusing on information assets protection. It details the types of data considered, including e-mails, text documents, orders, invoices, and web pages, and outlines the associated metadata for each. The report covers the document lifecycle, emphasizing data creation, editing, retrieval, and deletion, and discusses the use of local database servers and cloud storage. A significant portion of the report is dedicated to a cybersecurity framework for EDMS, addressing data audit, access control, data retention, and data encryption. Justifications for the framework are provided, highlighting its role in data classification, data elimination, and data storage strategies. The report also outlines data classification levels, including secret, confidential, business application only, and public levels, and provides tools for each level such as data audit, access control monitoring, network traffic analysis, and database authentication. This report is a valuable resource for understanding the crucial aspects of information assets protection within an EDMS environment.
Document Page
Information Assets
Protection
EDMS DATA ANALYSIS
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Type of information considered for
EDMS
e-mail
Text
orders and invoices
web pages
marketing communication
Document Page
The metadata (descriptive
information) for each type of
document
e-mail meta data:
Name of sender
Name of recipient
sent date
Subject
Document Page
The metadata (descriptive
information) for each type of
document
Text meta data:
Type of document
Date of creation
Date modified
Document keyword
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The metadata (descriptive
information) for each type of
document
orders and invoices meta data:
Order id
Order date
Order details
Details of consumers
Date of invoice
Document Page
The metadata (descriptive
information) for each type of
document
web pages meta data:
Title of webpage
Keywords
Language in which webpage is written
Document Page
A document life cycle
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The location of a document's life cycle
Local database server of organization:
Data create
Data edit
Cloud storage:
Data retrieve
Data delete
Document Page
Cyber security framework for EDMS
data audit is essential for document creation, processing, access, retention and
retrieval
Permission has to be taken from data owner to not only store but to retain data as well
access control has to be implemented for retrieving document from EDMS
Document Page
Cyber security framework for EDMS
When a document is deleted from EDMS, it might be retained temporarily if required
Document once eliminated from EDMS, should be communicated to owner of data
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security framework for EDMS
Document has to be encrypted in EDMS to ensure privacy and security of data
illegal access to data has to be restricted through proper authentication
Document Page
Cyber security framework for EDMS
Document Page
Justification for cyber security framework
Identifying type of data- this framework helps in
identifying how data needs to be classified and
therefore effective in document creation and
document processing
procedure to eliminate data- it helps in
identifying how to eliminate data while ensuring
data availability and data integrity as well
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Justification for cyber security framework
strategy to store data- it provides
strategy to store data in system database
Strategy to retain data- it provides
strategy regarding retaining document in
system database
Document Page
Tools for data classification levels
Document Page
Tools for data classification levels
Secret:
Data audit
Access control monitoring
Network traffic analysis
Database authentication
Confidential:
Access control monitoring
Network traffic analysis
Database authentication
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Tools for data classification levels
Business application only:
Data audit
Access control monitoring
Network traffic analysis
Public level:
Access control monitoring
Network traffic analysis
Database authentication
Document Page
Thank you
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]