A Risk Management Approach to Data Preservation
|
|
|
- Valerie Jacobs
- 10 years ago
- Views:
Transcription
1 A Risk Management Approach to Data Preservation Ricardo Vieira*
2 Digital Preservation Digital Preservation (DP) aims at maintaining valuable digital objects accessible over long periods of time» Problem initially triggered by memory institutions where DP is a main concern» Nowadays, widely present as a generalized concern of organizations» How to address it?
3 Risk Management Overview Risk Management defines prevention and control mechanisms to address the risk attached to specific activities and valuable assets
4 Digital Preservation as a Risk Management Activity The goal of DP is to protect digital information against several threats that can affect their proper use and interpretation
5 Risk Management Approach to Data Preservation
6 Establish the Context (1/2)
7 Establish the Context (2/2) Identify strategic objects and define criteria to determine which consequences are acceptable to the specific context. Identify Stakeholders Identify the context (Organisational, Technical and Legal)
8 Context Model The context model is represented as a set of ontologies Ontologies formalize knowledge representation Information can be extracted from ontologies through querying and processing (e.g. reasoning, logical inference) DIO (ArchiMate) DIO-DSO1 Transformation Map DSO-1 DIO-DSO2 Transformation Map DSO-2
9 Risk Assessment
10 Risk Identification Identify. Assets Vulnerabilities Threats Risks
11 Risk-DL Domain Language (1/2) Concepts mapped to ISO Concepts formalized using the relational model Risk-DL to represente concepts Interoperability Sharing, discovery, reuse Alignment between risks and organization artifacts Reduce inconsistencies (formalization of risks) Open specification -> support human-machine and machine-machine communication XML properties: Portability Extensibility Etc.
12 Risk-DL Domain Language (2/2)
13 Risk Analysis (1/2) Impact Likelihood Risk Level
14 Risk Analysis (2/2)
15 Scenario Evaluation
16 Risk Evaluation Based on the outcome of risk analysis, decided which risks need treatment and the priority for treatment implementation Compare level of risk with initial criteria Scenario evaluation: CCCCC = LLLLLLLLLL RRRR i DP mitigates the risk level for 19 risks Costs without DP: 6,316,520 /year Costs with DP: 909,720 /year Risk cost reduction of 5,406,800 /year (=86%) i IIIIII RRRR i
17
18 Risk Treatment 18 timbusproject.net November 2013
19 Conclusions Using risk management we are able to leverage the digital preservation problem Better understanding of the problem Better understanding of the solution This is valid to other concerns!!! Same approach is being applied to Data Management in e-science project Ferreira, F., Coimbra, M., Vieira, R., Proença, D., Freitas, A., Russo, L., Borbinha, J., Risk Aware Data Management in Metagenomics, 5th INForum (INForum 2013), Évora, Portugal, September 5-6, 2013
20 Ricardo Vieira
ESKISP6056.01 Direct security testing
Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being
Sensor Information Representation for the Internet of Things
Sensor Information Representation for the Internet of Things Jiehan Zhou [email protected] University of Oulu, Finland Carleton University, Canada Agenda Internet of Things and Challenges Application
Information Governance Maturity Model
Information Governance Maturity Model Diogo Proença* ([email protected]) Ricardo Vieira ([email protected]) José Borbinha ([email protected] ) 1 Motivation Working group in Portugal developed a set of
INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW
GENERAL OVERVIEW NAT 11852-08.2004 SEGMENT FORMAT PRODUCT ID INFORMATION MANAGEMENT STRATEGIC FRAMEWORK In the context of the Information Management Strategic Framework, information is defined as: information
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD Paulo Gottgtroy Auckland University of Technology [email protected] Abstract This paper is
Overview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
On the relevance of Enterprise Architecture and IT Governance for Digital Preservation
On the relevance of Enterprise Architecture and IT Governance for Digital Preservation Christoph Becker 1,2, Jose Barateiro 1, Goncalo Antunes 1, Jose Borbinha 1, Ricardo Vieira 1 1 INESC-ID - Information
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
OWL Ontology Translation for the Semantic Web
OWL Ontology Translation for the Semantic Web Luís Mota and Luís Botelho We, the Body and the Mind Research Lab ADETTI/ISCTE Av. das Forças Armadas, 1649-026 Lisboa, Portugal [email protected],[email protected]
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
KPMG in India s Software testing services Test consulting case studies
KPMG in India s Software testing services Test consulting case studies 0 Software test consulting case study 1 Key Activities Outcome IT consulting to assess, evaluate the core banking solution and existing
Information Security Management System (ISMS) Policy
Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from
Open Source egovernment Reference Architecture Osera.modeldriven.org. Copyright 2006 Data Access Technologies, Inc. Slide 1
Open Source egovernment Reference Architecture Osera.modeldriven.org Slide 1 Caveat OsEra and the Semantic Core is work in progress, not a ready to use capability Slide 2 OsEra What we will cover OsEra
ESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY)
Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY) Title of Policy: Policy on Open APIs for Government of India Preamble:
Smart Meters Programme Schedule 8.6. (Business Continuity and Disaster Recovery Plan) (CSP North version)
Smart Meters Programme Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Amendment History
FHIM Model Content Overview
FHIM Model Content Overview Federal Health Information Model (FHIM) and Associated Terminology Models Goal Produce a logical, health information model that supports semantic interoperability and that is
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
How To Be An Architect
February 9, 2015 February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 3 Typical Common Responsibilities for the ure Role... 4 Typical Responsibilities for Enterprise ure...
ONEM2M SERVICE LAYER PLATFORM
ONEM2M SERVICE LAYER PLATFORM Roland Hechwartner (Deutsche Telekom) onem2m TP Vice Chair Roland.hechwartner@t mobile.at onem2m www.onem2m.org 2015 onem2m The Partnership Project Over 200 member organizations
Information Technology for KM
On the Relations between Structural Case-Based Reasoning and Ontology-based Knowledge Management Ralph Bergmann & Martin Schaaf University of Hildesheim Data- and Knowledge Management Group www.dwm.uni-hildesheim.de
How To Understand The Difference Between Terminology And Ontology
Terminology and Ontology in Semantic Interoperability of Electronic Health Records Dr. W. Ceusters Saarland University Semantic Interoperability Working definition: Two information systems are semantically
A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS
A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS Ionela MANIU Lucian Blaga University Sibiu, Romania Faculty of Sciences [email protected] George MANIU Spiru Haret University Bucharest, Romania Faculty
ArchiMate and TOGAF. What is the added value?
ArchiMate and TOGAF What is the added value? Why use TOGAF next to ArchiMate? ArchiMate provides a (visual) language ArchiMate provides a content framework TOGAF provides a process TOGAF provides a way
Federated, Generic Configuration Management for Engineering Data
Federated, Generic Configuration Management for Engineering Data Dr. Rainer Romatka Boeing GPDIS_2013.ppt 1 Presentation Outline I Summary Introduction Configuration Management Overview CM System Requirements
Modelling, Analysing and Improving an ERP Architecture with ArchiMate
Modelling, Analysing and Improving an ERP Architecture with ArchiMate June 25th, 2014 Heinz-Juergen Scherer, TransWare Tim Vehof, BiZZdesign Agenda Introduction Enterprise Architecture ERP systems and
Business Intelligence
Business Intelligence What is it? Why do you need it? This white paper at a glance This whitepaper discusses Professional Advantage s approach to Business Intelligence. It also looks at the business value
In ediscovery and Litigation Support Repositories MPeterson, June 2009
XAM PRESENTATION (extensible TITLE Access GOES Method) HERE In ediscovery and Litigation Support Repositories MPeterson, June 2009 Contents XAM Introduction XAM Value Propositions XAM Use Cases Digital
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
Basic Unified Process: A Process for Small and Agile Projects
Basic Unified Process: A Process for Small and Agile Projects Ricardo Balduino - Rational Unified Process Content Developer, IBM Introduction Small projects have different process needs than larger projects.
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
Digital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
Experiences from a Large Scale Ontology-Based Application Development
Experiences from a Large Scale Ontology-Based Application Development Ontology Summit 2012 David Price, TopQuadrant Copyright 2012 TopQuadrant Inc 1 Agenda Customer slides explaining EPIM ReportingHub
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Core Enterprise Services, SOA, and Semantic Technologies: Supporting Semantic Interoperability
Core Enterprise, SOA, and Semantic Technologies: Supporting Semantic Interoperability in a Network-Enabled Environment 2011 SOA & Semantic Technology Symposium 13-14 July 2011 Sven E. Kuehne [email protected]
DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy
Not Protectively Marked Item 6 Appendix B DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Management Policy The Dorset & Wiltshire Fire and Rescue Authority () is the combined fire and rescue authority for
Approach to Business Architecture
An Approach to Business Architecture very little coverage of products and services offered, channels through which we reach our markets and financial issues, constraints and opportunities. Our definition
Building Semantic Content Management Framework
Building Semantic Content Management Framework Eric Yen Computing Centre, Academia Sinica Outline What is CMS Related Work CMS Evaluation, Selection, and Metrics CMS Applications in Academia Sinica Concluding
EUROPASS DIPLOMA SUPPLEMENT
EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Administración de Sistemas Informáticos en Red TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in Computer Network Systems
Semantic Interoperability
Ivan Herman Semantic Interoperability Olle Olsson Swedish W3C Office Swedish Institute of Computer Science (SICS) Stockholm Apr 27 2011 (2) Background Stockholm Apr 27, 2011 (2) Trends: from
ChemCloud - Chemical e-science Information Cloud. Adrian Paschke, Freie Universitaet Berlin Stephan Heineke, FIZ CHEMIE
ChemCloud - Chemical e-science Information Cloud Adrian Paschke, Freie Universitaet Berlin Stephan Heineke, FIZ CHEMIE 1 About FIZ CHEMIE 1830 Founding of Pharmaceutisches Centralblatt Reestablished 1981
A generic approach for data integration using RDF, OWL and XML
A generic approach for data integration using RDF, OWL and XML Miguel A. Macias-Garcia, Victor J. Sosa-Sosa, and Ivan Lopez-Arevalo Laboratory of Information Technology (LTI) CINVESTAV-TAMAULIPAS Km 6
COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.
COBIT 5 for Risk CS 3-7: Monday, July 6 4:00-5:00 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected] Disclaimer of Use and Association Note: It is understood that
HP SOA Systinet software
HP SOA Systinet software Govern the Lifecycle of SOA-based Applications Complete Lifecycle Governance: Accelerate application modernization and gain IT agility through more rapid and consistent SOA adoption
Concept of Operations for Line of Business Initiatives
Concept of Operations for Line of Business Initiatives Version 1.0 Office of E-Gov and IT, OMB March 2006 Table of Contents FOREWORD...2 1 OBJECTIVES OF THE LINES OF BUSINESS CONCEPT OF OPERATIONS...3
A Mind Map Based Framework for Automated Software Log File Analysis
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake
SECURITY MANAGEMENT Produce security risk assessments
1 of 6 level: 6 credit: 20 planned review date: March 2007 sub-field: purpose: Security This unit standard is for people who work, or intend to work, as security managers or security consultants, and who
Translation Protégé Knowledge for Executing Clinical Guidelines. Jeong Ah Kim, BinGu Shim, SunTae Kim, JaeHoon Lee, InSook Cho, Yoon Kim
Translation Protégé Knowledge for Executing Clinical Guidelines Jeong Ah Kim, BinGu Shim, SunTae Kim, JaeHoon Lee, InSook Cho, Yoon Kim Agenda 1. 1. Motivation 2. 2. How to to translate 3. 3. Implementation
Microsoft Solutions for Security. Delivering the Windows Server 2003 Security Guide
Microsoft Solutions for Security Delivering the Windows Server 2003 Security Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice.
From Business Process Models to Use Case Models
: A systematic approach Estrela Ferreira da Cruz, Ricardo Machado, Maribel Santos Universidade do Minho, Portugal EEWC, 7 May 2014 Agenda: Contextualization Motivation Approach From BPMN model to use case
Databases & Data Infrastructure. Kerstin Lehnert
+ Databases & Data Infrastructure Kerstin Lehnert + Access to Data is Needed 2 to allow verification of research results to allow re-use of data + The road to reuse is perilous (1) 3 Accessibility Discovery,
Software Development for Medical Devices
Overcoming the Challenges of Compliance, Quality and Cost An MKS White Paper Introduction Software is fast becoming the differentiator for manufacturers of medical devices. The rewards available from software
Securing The Cloud With Confidence. Opinion Piece
Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery
Talend Metadata Manager. Reduce Risk and Friction in your Information Supply Chain
Talend Metadata Manager Reduce Risk and Friction in your Information Supply Chain Talend Metadata Manager Talend Metadata Manager provides a comprehensive set of capabilities for all facets of metadata
Overview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
Know your enemy. Class Objectives Threat Model Express. and know yourself and you can fight a hundred battles without disaster.
Know your enemy and know yourself and you can fight a hundred battles without disaster. Sun Tzu Class Objectives Threat Model Express Create quick, informal threat models 2012 Security Compass inc. 2 1
Ontological Identification of Patterns for Choreographing Business Workflow
University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business
ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE
ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE Omar Elloumi (ALU) onem2m TP Chair (Elect) omar.elloumi@alcatel lucent.com onem2m www.onem2m.org 2014 onem2m The Partnership Project Over 200 member organizations
Semantic Exploration of Archived Product Lifecycle Metadata under Schema and Instance Evolution
Semantic Exploration of Archived Lifecycle Metadata under Schema and Instance Evolution Jörg Brunsmann Faculty of Mathematics and Computer Science, University of Hagen, D-58097 Hagen, Germany [email protected]
Context Capture in Software Development
Context Capture in Software Development Bruno Antunes, Francisco Correia and Paulo Gomes Knowledge and Intelligent Systems Laboratory Cognitive and Media Systems Group Centre for Informatics and Systems
How to avoid building a data swamp
How to avoid building a data swamp Case studies in Hadoop data management and governance Mark Donsky, Product Management, Cloudera Naren Korenu, Engineering, Cloudera 1 Abstract DELETE How can you make
Standards and their role in Healthcare ICT Strategy. 10th Annual Public Sector IT Conference
Standards and their role in Healthcare ICT Strategy 10th Annual Public Sector IT Conference Peter Connolly Oct 2014 What is the Direction of Travel? 1 Understanding the Why- The Data Context 2 Stakeholder
ADMINISTRATION OF ORGANISZATIONAL CHANGES - 103408. Dr. Karthik Mohandoss. chapter I. Introduction to administration of organizational changes
ADMINISTRATION OF ORGANISZATIONAL CHANGES - 103408 chapter I 1 Introduction to administration of organizational changes LEARNING OUTCOMES At the end of this chapter you will be able to understand and have
