Overview#
Data and message are simply a series of bytes and is considered a resource
Ldapwiki does NOT distinguish Data from message or from information or form content.
Data gathering process is called Data curation
Generally Data may refer to a "larger" amount of information than a message.
For most of our discussions, Data or message is in regards to some Resource
Data Life cycle#
Data Management is the Life cycle for DataData States#
Data and message can only be in one Data State at a time.Data and Data Stores#
Data may be stored in many different types of Data Stores such as:- database
- Distributed Data Store
- Directory Information Base (DIB)
- Big data
- Data-lake
- Data warehouse
- Distributed Data Store
Data may be structured data or unstructured data
Data Metadata#
Ldapwiki also believe Data Metadata MUST be available for proper Data Classification:Data vs Actionable Intelligence#
Data may or may not be useful. Actionable Intelligence is useful Data.Data Valuation#
Data Swamp#
Ldapwiki sees too many Organizational Entities creating Data SwampsMore Information#
There might be more information for this subject on one of the following:- 0-RTT Handshakes
- 2.16.840.1.113730
- ACID
- API Development
- API Economy
- AWS API-Gateway
- AWS CloudWatch
- AWS Elastic File System
- AWS Simple Storage Service
- AWS VPN
- Aadhaar
- Abstract Syntax Notation One
- Abstraction
- Acceptable Use
- Access Control
- Acknowledgement
- Actionable Intelligence
- Active Directory Functional Levels
- Ad Hoc network
- Advance Passenger Information System
- Advanced Message Queuing Protocol
- Advanced Persistent Threat
- Advertising
- Analytics
- Apache Hadoop
- Application Directory Partitions
- Application Shell Architecture
- Application_data
- Applied Cryptography
- Array
- Artificial Neural network
- Assertion Value
- Asynchronous Transfer Mode
- Atomic
- Attack Surface
- Attacker
- Attestation
- Attribute Usage Flags
- Attribute references
- Authentication
- Authentication Challenges
- Automated License Plate Reader
- Automated Targeting System
- Automatic Repeat-reQuest
- BOUNDLESSINFORMANT
- BUS
- Back-end
- Backdoor
- Barcode
- Base 64 Encoding with URL and Filename Safe Alphabet
- Base64
- Behavioral Characteristics
- Behavioral analytics
- Best Practices For Unique Identifiers
- Best Practices for LDAP Security
- BeyondCorp
- Big data
- BigQuery
- Binary
- Binding
- Biometric Passport
- Biometric Sample
- Bit
- Bitcoin block
- Bitcoin network genesis block
- Block
- Block Cipher Mode
- Block storage
- Blockstack
- Bluetooth
- Booting
- By-value
- CBOR Object Signing and Encryption
- CLOUD Act
- Cache
- Cache replacement algorithms
- Calling Number Delivery
- Car Connectivity Consortium
- Chaining
- Changelog
- Circuit switching
- Claim
- Classification
- Classification Trees
- Clearview AI
- Clinical Data
- Cloud Access Security Broker
- Cloud Information Model
- Cloud Native
- Cloud Pricing
- Cloud computing
- Cluster analysis
- Code injection
- Common-channel signaling
- Company Confidential
- Composite data type
- Computer vision
- Computing
- Concise Binary Object Representation
- Confidential
- Confidentiality
- Consent Receipts
- Consistency
- Consolidated Consular Database
- Containerization vs Metadata
- Content
- Content Delivery Network
- ContentCommitment
- Continuity of Care Record
- Controlled Unclassified Information
- Cost function
- Create
- Create Read Update Delete
- Creating an OAuth 2.0 Client Application
- Cryptanalysis and Exploitation Services
- CryptoAPI
- Cryptographic Collision
- Cryptographic Message Syntax
- Cryptographic Primitive
- Customer data
- Cyclic Redundancy Check
- DES
- DID Document
- DISHFIRE
- DIT Chaining
- DNS Privacy Considerations
- DNS Resource Records
- Dat Protocol
- Data Accuracy
- Data At Rest
- Data Breach
- Data Circuit-terminating Equipment
- Data Classification
- Data Controller
- Data Discovery
- Data Disposal
- Data Encapsulation Method
- Data Encryption Standard
- Data Extraction Transformation
- Data In Process
- Data In Transit
- Data Leakage
- Data Loss Prevention
- Data Management
- Data Metadata
- Data Origin
- Data Ownership
- Data Pedigree
- Data Policy
- Data Privacy
- Data Processor
- Data Protection
- Data Provenance
- Data Scraping
- Data Security Analytics
- Data State
- Data Structure
- Data Subject Access Request
- Data Swamp
- Data Taxonomy
- Data Terminal Equipment
- Data Valuation
- Data Visibility
- Data aggregator
- Data and Goliath
- Data anonymization
- Data curation
- Data disclosure
- Data entropy
- Data exchange
- Data loss
- Data portability
- Data processing
- Data representation
- Data transparency
- Data type
- Data warehouse
- Data-centric
- Data-lake
- Data-link Layer
- DataEncipherment
- DataStore
- Datagram
- De-anonymization
- Deep Learning
- Deep Neural networks
- Delegation vs Impersonation
- Delete
- Demonstration of Proof-of-Possession
- Derived
- Device
- Device Inventory Service
- Digital Asset
- Digital Identity
- Digital Signature
- Digital Subscriber Line
- DigitalSignature
- Digitally Signed
- DirXML Events and Commands
- DirXML command
- DirXML event
- Directory Information Base
- Directory Information Tree
- Dirty cache
- Disclosure
- DisplayPort
- Distributed-Queue Dual-Bus
- Domain Name System
- Domain of OneS Own
- Durability
- Dynamic Cache Mode
- DynamoDB
- EDirectory Monitor Entry
- EDirectory Synchronization
- ESTABLISHED
- EXtensible Data Interchange
- Edge-Node
- Electronic Communications Privacy Act
- Electronic Data Interchange
- Electronic Fitness Device
- Electronic Health
- Electronic Machine Readable Travel Document
- Electronic Signatures
- Emergency Location Service
- Encapsulation
- EncipherOnly
- Encoding
- Encrypted
- Encrypted File Systems
- Encryption
- Encryption key
- End-to-end Encryption
- Entitlement Example
- Entity
- Equifax
- Event Cache
- Event Transformation Policy Set
- Eventual consistency
- Export Administration Regulations
- Extensible Firmware Interface
- Extract Transform Load
- FIPS 199
- FLAIM
- Fair Information Practices
- Family Educational Rights and Privacy Act
- Federal Information Security and Management Act
- File System
- Filtering for Bit Fields
- Financial API
- Financial-grade API
- Flexible Single Master Operation
- Frame
- Functional Programming
- GCP Multi-Regional
- GCP Storage Products
- General Data Protection Regulation
- General Packet Radio Service
- Global System for Mobile Communications
- Gmail
- Google Cloud DataStore
- Google Cloud Storage
- Google Coldline
- Google Remote Procedure Call
- Graph
- GraphQL
- GraphQL Server
- Ground truth
- HBase
- HTTP Body
- HTTP Method
- HTTP Warn Codes
- Hash Function
- Hashgraph
- Header
- Health Insurance Portability and Accountability Act
- Health information
- Higgins Project
- Home Location Register
- Homomorphic Encryption
- How SSL-TLS Works
- How To Get Your Own OID
- Hybrid cryptosystem
- Hyperledger Indy
- Hyperlinks
- Hyperparameters
- Hypertext
- Hypertext Transfer Protocol
- ICAO Document 9303
- IDM Related Compliance Items
- IDSA Integration Framework
- IEEE 754
- IMA Data Architecture
- ISO 10646
- ISO 15022
- ISO 19944
- ISO 8601
- Identifier
- Identifier for Advertisers
- Identity Aware Proxy
- Identity Broker
- Identity Cube
- Identity Custodian
- Identity Management Architecture
- Identity Relationship Management
- Identity Trust Framework
- Imonitor
- In the Wild
- Information Lifecycle Management
- Information security
- Infrastructure as a Service
- Integrated Services Digital Network
- Intelligence Assessment
- Inter-Planetary File System
- Inter-Process Communication
- Internet of Things
- Investigative Data Warehouse
- Isolation
- Item of Interest
- JLINC
- JML
- JOSE-Cookbook
- JSON Web Signature
- JSON Web Tokens
- JSON-LD
- JWT Authentication
- JWT Data Exchange
- K-Nearest Neighbor
- Key Deletion
- Key Life cycle
- Key Management Service
- Key Reinstallation AttaCKs
- Key-value
- KeyEncipherment
- Know Your Customer
- Knowledge Consistency Checker
- Knowledge-Based Authentication
- Kubernetes Pod
- LDAP Data Interchange Format
- LDAP Overview
- LDAP Schema
- LDAP schema used by autofs
- LDAP_MATCHING_RULE_IN_CHAIN
- LOA 3
- Latency
- Law Enforcement Consideration
- LdapServer
- Legal Entity Identifier
- Libra Blockchain
- Linked Data
- Linked List
- Linux Boot Process
- Logging
- Loss function
- MARINA
- MIT TRUST DATA CONSORTIUM
- Macaroons
- Machine Learning
- Machine Learning Algorithms
- Machine Readable Passport
- Machine Readable Travel Document
- Magnitude of the Potential loss
- Malicious Software
- Manchester code
- Mapping function
- MaxRingDelta
- Meaningless But Unique Number
- Media Access Control
- Media-type
- Merkle DAG
- Message
- Metadata
- Metropolitan Area Network
- Microservice
- Middleware
- MimbleWimble
- Mobile Operator Discovery, Registration & Authentication
- Mobile Switching Center
- Mobile TAN
- Monitor Entry
- Monolithic Architecture
- Motorola Solutions
- Multi-master
- NCP Packet
- NDS Authentication
- NFC
- NIS
- NIS To LDAP Tool
- NIST Privacy Framework
- NIST.SP.800-132
- NISTIR 8112
- NMAS Result Codes
- NSCD
- NT-Sec-Desc
- National Security Agency
- Nationwide Health Information Network
- Near Field Communication
- Network
- Network hub
- Network traffic
- Next Generation 9-1-1
- Node
- NonRepudiation
- Nonimmigrant Information System
- North American Numbering Plan
- OAuth Scope Example
- OPAL Project
- OSI-Model
- Object
- Object storage
- Octet
- OctetString
- Offset Codebook Mode
- Open Identity Exchange
- Open data
- Open-source intelligence
- OpenID Provider Issuer Discovery
- OpenPDS
- Opportunistic TLS
- Organization Layer
- Organizational Censorship
- PCI DATA
- PDCA
- PINWALE
- PRISM
- Packet
- Packet segmentation
- Packet switching
- Padding bit
- Palantir Gotham
- Palantir Metropolis
- Passive attacker
- Password Authentication
- Password-authenticated Key Exchange
- Patient Data
- Patient matching
- Pattern-recognition
- Payload
- Payment Services Directive
- Perception
- PerishableData
- Personal Health Record
- Personal data
- Phantom Token Flow
- Phishing
- Physical Layer
- Plaintext
- Policy Based Management System
- Policy Decision Point
- Poodle
- Presentation Layer
- Privacy
- Privacy Considerations
- Privacy Enhancing Technologies
- Privacy and Economics
- Privacy by Design
- Private data
- Privileged User Management
- Property
- Protected Data
- Protocol
- Protocol Buffers
- Protocol Server
- Provenance
- Provider Configuration URI
- Public Data Network
- Public Key Credential
- Public Wi-Fi
- Public data
- Qbit
- RS-232
- Random
- Read
- Real-Time Bidding
- Record Protocol
- Redis
- Reference Information Model
- Reference data type
- Regression Trees
- Relational Database Management System
- Relative IDentifier
- Releasability
- Reliable protocol
- Remote Procedure Call
- Replication
- Representational State Transfer
- Request-Response
- Residual Sum of Squares
- Resource
- Resource Description Framework
- Resource ReSerVation Protocol
- Right of access
- Rights Expression Language
- Risk Assessment
- Round-Trip Time
- SASDFM key
- SASL
- SHA-1
- SNMP
- SS7 hack
- SSL-TLS Interception
- STORMBREW
- Same Origin Policy
- Schema
- Schema Mapping Policy
- Scopes vs Claims
- Search engine
- Secret
- Secret Files
- Secret-key
- Secure Element
- Secure Enclave
- Security
- Security Domain Infrastructure
- Security Event Manager (SEM)
- Security Incident
- Security Information and Event Management
- Self-Asserted
- Self-Sovereign Identity
- Semantic WEB
- Sensitive Data
- Server Storage Key
- Server-side
- Service Account
- Service Worker
- Session
- Shard
- Sharding
- Shared Memory
- Shared Responsibility Model
- Shared Secret
- Shift Invariant Artificial Neural Network
- Signalling System No. 7
- Single-Page Application
- Smart endpoints and dumb pipes
- SmartMessage Language
- Software design
- Solid
- Sovrin
- Sovrin Steward
- State
- Stateful
- Stateless
- Statistic
- Structured data
- Subscriber Identification Module
- Supervised Learning
- Synchronization
- Synchronous Optical NETworking
- System of Records Notice
- TBSCertificate
- TLS Full Handshake
- TLS Session Resumption
- TRAFFICTHIEF
- TURBINE
- TURMOIL
- Telecommunications
- Telemetry
- The Laws of Relationships
- The Onion Router
- Third-party Risk
- Threat Model
- Time To Live
- Time-Division Multiple Access
- Tokenization
- Tracking
- TransitiveVector
- Translingual Information Detection, Extraction and Summarization
- Transmission Control Protocol
- Transport Layer
- Transport Layer Security
- Triple DES
- Trust
- Trust No One
- Trusted Execution Environment
- Uma-configuration
- Unclassified
- Underfitting
- Unified Extensible Firmware Interface
- Universal Password
- Unstructured data
- Unsupervised Learning
- Update
- Upstream Surveillance
- User and Entity Behavior Analytics
- User mode and Kernel mode
- User-Managed Access
- User-generated content
- Version Control System
- Virtual Directory
- Virtual Private Cloud
- Visitor Location Register
- Vulnerability
- Warp
- Web Blog_blogentry_010117_1
- Web Blog_blogentry_030618_1
- Web Blog_blogentry_031017_1
- Web Blog_blogentry_040817_1
- Web Blog_blogentry_041118_1
- Web Blog_blogentry_071019_1
- Web Blog_blogentry_080220_1
- Web Blog_blogentry_081018_1
- Web Blog_blogentry_090418_1
- Web Blog_blogentry_110718_1
- Web Blog_blogentry_130418_1
- Web Blog_blogentry_160718_1
- Web Blog_blogentry_170120_1
- Web Blog_blogentry_180317_1
- Web Blog_blogentry_200918_1
- Web Blog_blogentry_250719_1
- Web Blog_blogentry_280717_1
- Web Blog_blogentry_290417_1
- Web Blog_blogentry_301018_1
- Web Hypertext Application Technology Working Group
- Web Ontology Language
- Web Storage
- Web scraping
- WebAuthn Attestation
- WebAuthn Authenticator
- WebAuthn Authenticator Model
- WebAuthn Extension Identifiers
- Wendy
- Whistleblower
- Who Owns the Data
- Why Use Tokens
- Windows Authentication Package
- X-NOT-HUMAN-READABLE
- X.690
- XKEYSCORE
- XMLHttpRequest
- YAML
- Z-Wave
- Zero Trust