article thumbnail

Examples and uses of GIS

IBM Big Data Hub

Urban planning Governments use GIS data and GIS-based solutions for urban planning: zoning and land use projects, natural disaster and health event response, roadway system and building design, utility distribution, energy production, and waste and resource management.

article thumbnail

What Is Data Minimisation? Definition & Examples

IT Governance

For example, if you’re processing the information to meet your legal obligations or contractual requirements, you can identify specific activities within those terms. In another example, the ICO describes a group of individuals who set up a club. Definition & Examples appeared first on IT Governance UK Blog.

GDPR 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Example: peframe file_name. Pdf-parser.

Libraries 107
article thumbnail

What is Tailgating? Definition, Examples & Prevention

IT Governance

For example, phishing is a type of social engineering, with the attacker appearing to be a legitimate person or organisation who is emailing the target. Tailgating attack examples In the most basic form of tailgating, the fraudster simply waits by a door until someone with legitimate access opens it, then follows them into the building.

article thumbnail

Partner Webinar: A Framework for Building Data Mesh Architecture

Speaker: Jeremiah Morrow, Nicolò Bidotti, and Achille Barbieri

In this session, you will learn: How the silos development led to challenges with data growth, data quality, data sharing, and data governance (an example of datamesh paradigm adoption). Leveraging Dremio for data governance and multi-cloud with Arrow Flight.

article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

For example, The Health Insurance Portability and Accountability Act (HIPAA) requires security features such as encryption to protect patients’ health information. For example, the Hypertext Transfer Protocol Secure (HTTPS) protocol enables secure web connections that provide both security and integrity for connections.

article thumbnail

Climate change examples

IBM Big Data Hub

Here are a few examples: Sea ice loss and melting ice sheets: Declining levels of Arctic sea ice threaten the habitats of species such as polar bears and walruses. Poor air quality from wildfire smoke can exacerbate asthma and heart disease, for example, while heat waves can cause heat exhaustion.