Processing
When the data forensics or incident response team isolates potentially compromised data, the data is collected in a forensically sound way and uploaded into Canopy’s system.
When the data is uploaded, Canopy’s data mining software processes it by removing duplicates, filtering out irrelevant data, extracting text and metadata from various file formats, and classifying data that may contain personal information. This step reduces the volume of data requiring assessment, increasing efficiency and reducing cost.
In data mining, the data processor plays a crucial role in handling and preparing the collected electronic compromised data for assessment and review.
Key roles for data Processing include:
- Significant data volume reduction by removing duplicates and filtering out irrelevant data required for Assessment.
- Extraction of text and metadata from a wide array of file formats.
- Detection and classification of data that may contain Personally Identifiable Information (PII).
Below are typical steps in the Processing workflow:
-
Create a Processing Template
- By default, if users do not create or select a Processing Template, Canopy will apply the Canopy Default Template.
- If any Processing files require a Password, create or update the Password Bank in the Processing Template with a
.csv
file containing the necessary passwords.
-
Data Upload: Users can upload data into Canopy’s system using multiple methods. During the upload process, users must select a Processing Template to apply to the uploaded data.
-
After Processing, check for any Failed files. Follow Failed to troubleshoot and resolve the failed processing.