{"id":8167,"date":"2021-04-05T00:16:59","date_gmt":"2021-04-05T00:16:59","guid":{"rendered":"https:\/\/wealthrevelation.com\/data-science\/2021\/04\/05\/data-security-for-data-scientists-co-infographic\/"},"modified":"2021-04-05T00:16:59","modified_gmt":"2021-04-05T00:16:59","slug":"data-security-for-data-scientists-co-infographic","status":"publish","type":"post","link":"https:\/\/wealthrevelation.com\/data-science\/2021\/04\/05\/data-security-for-data-scientists-co-infographic\/","title":{"rendered":"Data Security for Data Scientists &amp; Co. \u2013 Infographic"},"content":{"rendered":"<div>\n<p>Data becomes information and information becomes knowledge. For this reason, companies are nowadays also evaluated with regard to their data and their data quality. Furthermore, data is also the material that is needed for management decisions and artificial intelligence. For this reason, <strong>IT Security<\/strong> is very important and special consulting and auditing companies offer their own services specifically for the security of IT systems.<\/p>\n<p>However, every <strong>Data Scientist<\/strong>, <strong>Data Analyst<\/strong> and <strong>Data Engineer<\/strong> rarely only works with open data, but rather intensively with customer data. Therefore, every expert for the storage and analysis of data should at least have a basic knowledge of <strong>Data Security<\/strong> and work according to certain principles in order to guarantee the security of the data and the legality of the data processing.<\/p>\n<p>There are a number of rules and principles for data security that must be observed. Some of them \u2013 in our opinion the most important ones \u2013 we from <a href=\"https:\/\/www.datanomiq.io\">DATANOMIQ<\/a> have summarized in an infographic for Data Scientists, Data Analysts and Data Engineers. <strong>You can download the infographic here: <\/strong><a href=\"https:\/\/data-science-blog.com\/en\/wp-content\/uploads\/sites\/4\/2021\/03\/DataSecurity_Infographic.pdf\"><strong>DataSecurity_Infographic<\/strong><\/a><\/p>\n<div id=\"attachment_5472\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/data-science-blog.com\/en\/wp-content\/uploads\/sites\/4\/2021\/03\/Data_Security_for_Data_Scientists_Data_Analysts_Data_Engineers_Infographic.png\" target=\"_blank\" rel=\"noopener\"><img aria-describedby=\"caption-attachment-5472\" loading=\"lazy\" class=\"wp-image-5472 \" src=\"https:\/\/data-science-blog.com\/en\/wp-content\/uploads\/sites\/4\/2021\/03\/Data_Security_for_Data_Scientists_Data_Analysts_Data_Engineers_Infographic.png\" alt=\"Data Security for Data Scientists, Data Analysts and Data Engineers\" width=\"585\" height=\"2338\"><\/a><\/p>\n<p id=\"caption-attachment-5472\" class=\"wp-caption-text\">Data Security for Data Scientists, Data Analysts and Data Engineers<\/p>\n<\/div>\n<h3><strong>Download Infographic as PDF<\/strong><\/h3>\n<div id=\"attachment_3613\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/data-science-blog.com\/en\/wp-content\/uploads\/sites\/4\/2021\/03\/DataSecurity_Infographic.pdf\" target=\"_blank\" rel=\"noopener\"><img aria-describedby=\"caption-attachment-3613\" loading=\"lazy\" class=\"wp-image-3613 \" src=\"https:\/\/data-science-blog.com\/wp-content\/uploads\/2015\/07\/pdf-file.jpg\" alt=\"Infographic - Data Security for Data Scientists, Data Analysts and Data Engineers\" width=\"96\" height=\"119\"><\/a><\/p>\n<p id=\"caption-attachment-3613\" class=\"wp-caption-text\">Infographic \u2013 Data Security for Data Scientists, Data Analysts and Data Engineers<\/p>\n<\/div>\n<div id=\"author-bio-box\">\n<h3><a href=\"https:\/\/data-science-blog.com\/en\/blog\/author\/aunkofer2\/\" title=\"All posts by Benjamin Aunkofer\" rel=\"author\">Benjamin Aunkofer<\/a><\/h3>\n<div class=\"bio-gravatar\"><img loading=\"lazy\" src=\"https:\/\/data-science-blog.com\/en\/wp-content\/uploads\/sites\/4\/2015\/05\/foto2-1-1-80x80.jpg\" width=\"70\" height=\"70\" alt=\"Benjamin Aunkofer\" class=\"avatar avatar-70 wp-user-avatar wp-user-avatar-70 alignnone photo\"><\/div>\n<p><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"http:\/\/www.datanomiq.de\" class=\"bio-icon bio-icon-website\"><\/a><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/WIngenieur\" class=\"bio-icon bio-icon-twitter\"><\/a><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.linkedin.com\/in\/benjamin-aunkofer-98710714\" class=\"bio-icon bio-icon-linkedin\"><\/a><\/p>\n<p class=\"bio-description\">Benjamin Aunkofer is Lead Data Scientist at <a href=\"http:\/\/www.datanomiq.de\">DATANOMIQ<\/a>, a consulting company for applied data science in Berlin. He is lecturer for Data Science and Data Strategy at <a href=\"http:\/\/www.htw-berlin.de\">HTW Berlin<\/a> and gives trainings for Business Intelligence, Data Science and Machine Learning for companies.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/data-science-blog.com\/en\/blog\/2021\/03\/09\/data-security-for-data-scientists-co-infographic\/<\/p>\n","protected":false},"author":0,"featured_media":8168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/posts\/8167"}],"collection":[{"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/comments?post=8167"}],"version-history":[{"count":0,"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/posts\/8167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/media\/8168"}],"wp:attachment":[{"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/media?parent=8167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/categories?post=8167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wealthrevelation.com\/data-science\/wp-json\/wp\/v2\/tags?post=8167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}