Cc
The cloud, or cloud computing, is a type of storage that uses a network of physical locations to store software, hardware and services that run on the internet rather than on your device. The cloud is an all-encompassing term that includes Read more
Cognitive Analytics is intelligent technology that covers multiple analytical techniques to analyze large data sets and give structure to the unstructured data. To put it simply, a cognitive analytics system searches through the data that exists in its knowledge base Read more
Build the Reports That You Need When You Need Them Data Modeling & Management Orbit’s data modeling functionality achieves highly-tuned queries by identifying the objects needed from multidimensional data relationships. You can build reports as per your business requirements to Read more
Simple, Intuitive, and Powerful Dashboards Data Visualization: Dashboards Orbit Reporting and Analytics brings all of your data together in real-time and interactive dashboards, so you can gain a clear view of your business – at a glance. View Data from Read more
Ee
Edge analytics is a method of data collection and analysis that uses an automated analytical data computation that is performed at a sensor or other device. This is performed before the data is sent to a centralized store. This process Read more
Ff
Financial statements are reports on companies’ spending and fiscal positions. These statements can be audited by the government to prevent tax fraud and other illegal activities. Financial analysts use these statements to analyze a company’s performance, then use that information Read more
Hh
These are the methods which use parent-child relationship to drill up/down the data. Hierarchies use parent-child relationships within the data, so that a user can go deeper in order to gain a better insight into the information they are responsible Read more
Hybrid cloud infrastructure is a combination of at least two cloud infrastructures, such as private, public or community, that remain individual but are connected by standardized technologies that allow data portability. On its most basic level, this means that hybrid Read more
Jj
JD Edwards is a suite of enterprise resource planning (ERP) software from Oracle. Focused on a modern and simplified user experience, the purpose-built applications are aligned to create a seamless experience for end users that’s integrated with digital technologies. JD Read more
Kk
A measure of key business objectives of an organization. A Key Performance Indicator (KPI) is a measure that determines how effectively, or ineffectively, organizations, projects or individuals achieve their key business objectives compared to their strategic objectives and targets. With Read more
Mm
Metadata is data that contains information about other data. Metadata, in general, is used almost everywhere. The most common example is the use of meta tags in a web page. Search engines use these meta tags to identify a web Read more
Mobile Business Intelligence (Mobile BI) is software that allows BI data to be viewed on a mobile device. Mobile BI has just recently become popular among BI users, and is helpful for remote workers that need information but do not Read more
OLTP is an initialism for Online Transaction Processing. This is a type of software program that is designed to support transaction-oriented application processing. Online transaction processing systems are used in business for handling processes like financial transactions, order entries, customer Read more
On-premises architecture is comprised of data, software and applications that are installed and operated from an in-house server and computing infrastructure. It utilizes the organization’s native computing resources. It is the traditional method for storing data and running enterprise applications, Read more
Pp
Pivot tables and crosstabs are ways to display and analyze sets of data. Both are similar to each other, with pivot tables having just a few added features. Pivot tables and crosstabs present data in tabular format, with rows and Read more
Pixel perfect describes reports where the user can manipulate the size and layout with precision. This includes allowing the user to change the size of the report, the size of the printed page, and the position of the different elements Read more
A part of advanced analytics to make future forecasts. Predictive analytics are a part of advanced analytics that provide a probable picture of what might happen in the future. Considering the previous behaviors from the descriptive analytics, predictive analytics might Read more
It provides a best course of action taking a clue from predictive and descriptive analytics. Prescriptive Analytics is the final stage of Business Analytics (BA) that takes insights from descriptive and predictive analytics to identify the best course action for Read more
Qq
A database query is a means for extracting data from a database and formatting it in a readable form. When you’re searching for data from a database, you can submit a query to request specific information. However, a query needs Read more
An automated process of refreshing the jobs or reports on a regular basis. Scheduling is a process of planning any event or a job at a required time. Similarly, on the technical front, scheduling helps in automating the required procedure Read more
An initial level of Enterprise Data Model (EDM), which provides a structure for organizing EDM by Subject Areas. A Subject Area Model, together with a Conceptual Model and a Conceptual Entity Model forms the complete structure of the Enterprise Data Read more
Tt
The term “tabular” refers to data that is displayed in columns or tables, which can be created by most BI tools. These tools find relationships between data entries in one or more database, then use those relationships to display the Read more
The Oracle Talent Acquisition Cloud (Taleo) is a data-enriched talent management software suite that helps organizations find, develop and retain prime talent. Taleo History Oracle acquired this cloud-based talent management software in 2012, though it was founded in 1999 by Read more

Data Security

Data security means protecting data in a database, personal computer or network from unauthorized users. In general, data can range from personal files to any corporate analytics information. Though some information is intended for general use, there might be some data that needs to be confidential. This is where data security steps in. The idea behind providing data security is to shield or restrict the corporate and personal data from the external unauthorized sources.

The most pragmatic use of data security is for financial transactions, because internet financial details are most vulnerable to security breaches.

Data Security Techniques

The most commonly used data security techniques include:

  • Data Masking
  • Data Erasure
  • Data Encryption Techniques
  • Backup

Data Masking

As the name suggests, data masking is the process of camouflaging the essential data so that it is not leaked to unauthorized users.

For example, software testers, who need real-time data to test the product or software, do not get access to sensitive customer data as this can lead to a security breach of customer’s information. Hence, they are only given mock data to perform their testing.

Data Erasure

Data Storage helps to store the data efficiently for future reporting and analysis.

Data Encryption Techniques

Public key encryption, symmetric key encryption, hashing, and digital signatures are the predominantly used data encryption techniques currently. Encryption converts data or information into a unique code so that only authorized personnel can access it. Authorized persons are given a “key” to decrypt the data, and only those with the key can access the information.

Backup

Data can be backed up in case of emergencies where the data would be lost. This is done by storing the data in a separate database from the main database. This data is often kept in a physical storage device, such as a hard drive. This provides security in case of the main database being hacked or malfunctioning. In this case, the secondary database will still have the data available to load back up.

Related Links

PII Data Masking

Optimized Data Management

Connectors: Establish Data Source Connections

Legacy Data Reporting For EBS

Turn Your Data Challenges Into Opportunities. Get Started TODAY.


    Featured Resources / Insights

    Fact Sheet

    GLSense: Integrated Financial Reporting for Excel Users

    Whitepaper

    Your Guide to Choosing the Right GL Reporting Solution for Oracle Fusion Cloud ERP

    Webinar

    Unified Reporting from Oracle EBS, Oracle Cloud and Beyond

    Blogs