How can we build good software / IM systems?
By better understanding the users
How many users GICHD provides for IMSMA Core under basic license?
50 Creators and 150 Viewers
How do you store your data?
Files and folders
Databases
Information lifecycle
Creation, Storage, Processing & usage, Destruction or archival
Persona Profile
name & characteristics, behaviour, objectives & needs, involved in?
What is the best way of sharing content?
Groups
SQL
Structured Query Language
Pillars of information security
Confidentiality, Integrity, Availability
Purpose of the process map
Mapping real activities, showing all steps and decision points. Main objective: gain understanding
Roles by user type
Viewer -> Viewer
Creator -> Data Editor, User, Publisher, Administrator
What is a database schema?
Describes how data is organised within the relational database
Name three major risk categories
Theft & Physical
Data Loss
Social Engineering
Unauthorized access or modification of data
Malware, Hacking, Ransomware
List 4 symbols used in process mapping.
Start/End, Activity, Decision, Document, Subprocess, Flow
What to do before deleting a user?
1. User Must not own any content. Request user
deletes content or changes ownership.
2. User accounts can be disabled to prevent logins.
3. Administrator can delete user.
File Geodatabase VS Enterprise Geodatabase
File Geodatabase: single-user, single project, easy to set-up and use, smaller amounts of data
Enterprise Geodatabase: multi-user, multiple projects, larger datasets, versioning/archiving, SQL queries
Mitigation for risks in the Information/Data Loss category
Mitigations:
• Backup everything often, check backups!
• Limit who has access
• Keep track of changes and modifications
• Store backups in different location with different access permissions
• Really, actually check that the backups can be restored!