From the course: Protecting Data for Analysis and Machine Learning
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Audit trails
From the course: Protecting Data for Analysis and Machine Learning
Audit trails
- Like it or not, things will happen to your data that you would never expect to happen. Corruption, loss, modification, or you can't read it anymore because somehow it just turned into the Wingdings font. But the good thing about data is that everything and anything that happens to it can be tracked. Yeah, it's kind of like "Big Brother," but I promise it's for good. Let's explore how together. It's a good idea to implement logging and monitoring to capture activities related to your data. These logs are referred to as audit trails and are typically set up by the security team. While most companies are legally obligated to have an audit trail, they can also be extremely helpful to protect against internal and external threats. These logs should be detailed enough to answer questions about your data, including who, what, when, and from where data is involved. In order to answer these questions easily, there are certain activities that should be captured. These are any and all…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.