<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BSG (UK) &#187; CIADA</title>
	<atom:link href="http://www.bsgdelivers.com/tag/ciada/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.bsgdelivers.com</link>
	<description>Unlocking potential. Accelerating performance</description>
	<lastBuildDate>Fri, 12 Jun 2015 09:43:32 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.8.41</generator>
	<item>
		<title>Spreadsheets in the enterprise, considering availability (pt 3/5)</title>
		<link>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/</link>
		<comments>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/#comments</comments>
		<pubDate>Tue, 25 Mar 2014 13:36:04 +0000</pubDate>
		<dc:creator><![CDATA[bsgadmin]]></dc:creator>
				<category><![CDATA[bsg insight]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[spreadsheets]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1377</guid>
		<description><![CDATA[<p>This post looks at the perspective of availability &#8211; defined for this purpose as “concerns unwanted withholding of information”. Availability is simply the ability to get what you want from the system when you need it. There should not be any barriers outside of the checks and balances that manage the other security perspectives in the CIADA model. Given that Excel is a fairly robust and prevalent industry application, there are not many software ‘features’ that may deliberately or inadvertently withhold information from its own users; though a side thought would caution against passwords only known by one person which [&#038;hellip</p><p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/">Spreadsheets in the enterprise, considering availability (pt 3/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>This post looks at the perspective of availability &#8211; defined for this purpose as “concerns unwanted withholding of information”.</p>
<p>Availability is simply the ability to get what you want from the system when you need it. There should not be any barriers outside of the checks and balances that manage the other security perspectives in the CIADA model.</p>
<p>Given that Excel is a fairly robust and prevalent industry application, there are not many software ‘features’ that may deliberately or inadvertently withhold information from its own users; though a side thought would caution against passwords only known by one person which is a simple but important risk.</p>
<p>Beyond this, I am slightly at a loss with regards to the specific availability threats in the context of decision support and reporting with Excel. The threats would be largely similar to any system I think… maybe there is something I am missing under this heading.</p>
<p>Appropriateness and alternatives advice is thin on the ground given that the risks cross solutions. So… um… yeah… (tumbleweed).</p>
<p>Contact me if you think of anything deep and meaningful &#8211; tweet me using @stugom or email me using stuart [dot] gomersall at bsguk [dot] co [dot] uk &#8211; and we can revise this post with appropriate credits where due.</p>
<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/">Spreadsheets in the enterprise, considering availability (pt 3/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spreadsheets in the enterprise, considering integrity (pt 2/5)</title>
		<link>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/</link>
		<comments>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/#comments</comments>
		<pubDate>Mon, 17 Mar 2014 18:15:55 +0000</pubDate>
		<dc:creator><![CDATA[bsgadmin]]></dc:creator>
				<category><![CDATA[bsg insight]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[data integrity]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[spreadsheets]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1373</guid>
		<description><![CDATA[<p>Integrity This post looks at the perspective of integrity &#8211; defined for this purpose as “concerning the unwanted modification of data.” Modifying the data in a sensitive data set is a huge risk. Potential ruinous of the result in its entirety and in the context of a decision support system &#8211; it is the kind of thing that people lose jobs, homes and businesses over. Shockingly, people may even want to do this for selfish and malevolent reasons… and in an Excel world they can do this without a trace (almost &#8211; which is a thought for another post). The [&#038;hellip</p><p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/">Spreadsheets in the enterprise, considering integrity (pt 2/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Integrity</p>
<p>This post looks at the perspective of integrity &#8211; defined for this purpose as “concerning the unwanted modification of data.”</p>
<p>Modifying the data in a sensitive data set is a huge risk. Potential ruinous of the result in its entirety and in the context of a decision support system &#8211; it is the kind of thing that people lose jobs, homes and businesses over. Shockingly, people may even want to do this for selfish and malevolent reasons… and in an Excel world they can do this without a trace (almost &#8211; which is a thought for another post).</p>
<p>The threat is multi-dimensional:<br />
1. Altering a data element directly &#8211; like lowering your own sales target in the evaluation sheet<br />
2. Altering referenced data &#8211; linking your sales total to salesman of the year Bob’s total<br />
3. Removing key data points &#8211; deleting Bob’s biggest sales account entirely<br />
4. the list goes on&#8230;</p>
<p>There are complex tools within Excel and, if you speak “formulae” and can trace through multiple sheets simultaneously then you’re all good, you could find the modifications. Which is cool, right? What could possibly go wrong? Well &#8211; how do you know you’ve found them all, how long have you got to do the searching and fixing? And most importantly, how do you even know that there is a data integrity problem in the first place? On top of all this, the “business case” for Excel is usually that it is quicker, but by the time you’ve done all of this digging, that business case no longer stacks up.</p>
<p>Of course, even transactional enterprise systems of any type are vulnerable to data threat. The difference is that an enterprise system is layered: the data source and the reporting are separated which is not the case in Excel.</p>
<p>To repeat the rallying cry. Use common sense, think about the data you are handling, analysing, modelling and use the appropriate systems and countermeasures to make your work simple at the same time minimising risk of breaches. Easy, right?</p>
<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/">Spreadsheets in the enterprise, considering integrity (pt 2/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spreadsheets in the enterprise, considering confidentiality (pt 1/5)</title>
		<link>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/</link>
		<comments>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/#comments</comments>
		<pubDate>Mon, 10 Mar 2014 10:36:40 +0000</pubDate>
		<dc:creator><![CDATA[bsgadmin]]></dc:creator>
				<category><![CDATA[practitioner experience]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[spreadsheets]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1248</guid>
		<description><![CDATA[<p>Confidentiality For the sake of this post, I’ll define confidentiality as “concerns regarding the unwanted disclosure of information.” Confidentiality is complex as it is both role-driven and time-driven, i.e. sensitive data may only be applicable to me in my current role and for a specific timeframe after which it may become stale and elicit invalid results. Without deploying additional layers (e.g. using the file system layer to assign access via login to specific roles) neither angle is covered by Excel (or any Office-style application). Access is blanket applied &#8211; you are in or out of the loop. Hidden sheets help, [&#038;hellip</p><p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/">Spreadsheets in the enterprise, considering confidentiality (pt 1/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Confidentiality</p>
<p>For the sake of this post, I’ll define confidentiality as “concerns regarding the unwanted disclosure of information.”</p>
<p>Confidentiality is complex as it is both role-driven and time-driven, i.e. sensitive data may only be applicable to me in my current role and for a specific timeframe after which it may become stale and elicit invalid results.</p>
<p>Without deploying additional layers (e.g. using the file system layer to assign access via login to specific roles) neither angle is covered by Excel (or any Office-style application). Access is blanket applied &#8211; you are in or out of the loop. Hidden sheets help, but security by obscurity is never a great design choice and is not sustainable. And let’s not get started on the concept of using a tool designed for collaboration with others as a store of sensitive and/or confidential information &#8211; it is certainly paradoxical!</p>
<p>All of the above really depends on the inherent “value” of the data (or asset) you are trying to secure, if it is public information then, by all means, use Excel. For example, the Guardian makes chart data available via Excel for further analysis. Sensitive financial or people data is another matter. It is crucial to apply a set of reasonable countermeasures to data and systems based on the valuation of the asset from each perspective of the CIADA model.</p>
<p>Assessing the alternatives available to maintain data confidentiality may be simple. If the alternatives are very obscure, very expensive or a change management bridge too far then go back to your valuation of the asset. You may be inflating the valuation based on an incorrect view from the relevant stakeholders. Or maybe rudimentary controls are appropriate as countermeasures.</p>
<p>My rallying cry is simple. Excel is fine, in context. Be sure to complete the valuation of the information asset as well assessment and deployment of appropriate countermeasures over the blind use of a collaboration tool.</p>
<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/">Spreadsheets in the enterprise, considering confidentiality (pt 1/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Excel for decision making. What could possibly go wrong?</title>
		<link>http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/</link>
		<comments>http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/#comments</comments>
		<pubDate>Fri, 24 May 2013 13:31:36 +0000</pubDate>
		<dc:creator><![CDATA[Michael Railton]]></dc:creator>
				<category><![CDATA[bsg insight]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1038</guid>
		<description><![CDATA[<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/">Excel for decision making. What could possibly go wrong?</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/">Excel for decision making. What could possibly go wrong?</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: bsgdelivers.com @ 2026-04-29 13:31:48 by W3 Total Cache -->