⃞⃞⃞ Big data security management policy system.
For big data security management, policies and systematic processes must be established in advance. To this end, it is important to define the roles between the Chief Information Security Officer (CISO) and the Chief Data Officer (CDO).
The role of CISO must be preceded by an understanding of the company’s intellectual property. You need to know what information your company has and define what confidential information is, so you can devise a plan against leaking and infringing on it.
From this point of view, the CDO should refine the intellectual property of the data and define the importance of the data asset through the inventory data management list.
| Establishment of big data security architecture |
⃞⃞⃞ CISO & CDO Essential Definitions
1. Data value evaluation of big data
2. Strategic direction for safe analysis and utilization of big data
3. Securing big data security strategies, policies, standards, and technologies
4. Big Data Change Manager
⃞⃞⃞ data ownership
Data ownership is an important determinant of data utilization both inside and outside the enterprise.
For the majority of external data, it is not easy to distinguish the ownership of the data, which leads to the ownership issue of a large number of Internet data and is related to the licensing issue between data authors and users.
Big data also requires pre-definition of data ownership, and data ownership management refers to all activities that define and execute overall data quality management procedures or processes centered on owners with responsibility and authority for data.