Hi, I'm Alistair!
I Help You Understand Data
If you’re managing a business, you have lots of day to day data. I help you understand what the data tells us about your operation in a fun, visual format.
See some of the projects I've worked on:
No Cleaning or Presentations. Only Queries & Visualizations.
Access Control Anomaly Analysis
NB: All data and insights are purely hypothetical, the data is fake, there are no mentions of any Comapny or Organization, any similarities to any Organization are purely coincidental.
This project focused on looking at Access Control Anomalies in a logistics (FMCG) setting.
To understand our process, let’s quickly walk through it step by step:
- Sit with the client to understand the project and their expectations, get all the questions they want answered and in what format.
- Create a plan to gather all the required tools and information, creating a project dashboard, schedules and sharing all information with relevant parties.
- Gather only relevant data in different formats (CSV, Streams, XML, API, Databases, etc) – Update shared project file.
- Isolate and scan data files for security threats using relevant tools – update shared project file.
- Clean Data (this step we left out in this project, as an example only) – update shared project file.
- Store Data into local and cloud based repositories/Databases to query later – update shared project file.
- Make a Copy of data, clearly labelling each version and documenting each step – update shared project file.
- Write queries in the relevant language, ie Python, SQL or simple Excel commands. Document the queries – update shared project file.
- Create visualizations from results of queries – update shared project file.
- Compile all data insights and visualizations into the required presentation format (Slide Presentation, Video or step by step walkthrough) – update shared project file.
- Deliver presentation to client, getting feedback.
Go through data to find any other recommendations to make outside of their requests, offering more value for money.
Insights Requested From This Data
- Who are the employees moving around?
- Which departments get the most foot traffic?
- Whats the distribution of access numbers between departments?
- Are there any errors being reported by the system, ie: denied access?
- Staff on which shift, move around the most?
I used ChatGPT to help me formulate some data table headers.
I then used Mockaroo to create the fake data and downloaded it in CSV format.
I scanned the downloaded .csv file with my local Spybot softwre to check for any threats, there were none.
The data was saved into my local SQlite database.
I then used ChatGPT to write code and inserted the resulting code into my Jupyter Notebook, running on Annaconda.
The resulting code can be found below, in the embedded PDF.
I also used ChatGPT to write a brief Report about the Analysis, the Report is below.
Let's Help You Understand Data
01.
Understand
You explain your business so we understand what you want to now
02.
Plan
We create a plan to collect the necessary information to do the analysis.
03.
Investigate
We investigate and uncover the sources of data that will be needed to do the analysis
04.
Collect Data
Data is collected from various sources and in multiple formats as necessary
05.
Scanned
Collected data is scanned for viruses and other threats before being moved
06.
Clean, Format
Data is cleaned and refotmatted so that it can be safely stored in a database
07.
Query
We use multiple tools from SQL to excel to query the data and uncover answers
08.
Presentation
A complete presentation is delivered answering questions
Access Control/Log Anomaly Detection Report
Introduction
NB: All data and insights are purely hypothetical, the data is fake, there are no mentions of any Comapny or Organization, any similarities to any Organization are purely coincidental.
This report provides a comprehensive overview of the analyses and queries performed on the AccessLogs database.
The purpose of these queries was to understand, monitor, and visualize various metrics related to Access Control activities, such as:
- Identifyting employees
- Understanding movement patterns
- Understanding traffic to various departments
- Tracking Shift movement
- Tracking errors in Access Systems
- Access numbers over time.
Through structured data queries and subsequent visualizations, I perovided information that you can use gain insights into patterns, trends, and areas of concern within your business access control systems.
Methodology
The methodology for exploring the AccesLogs database involved several steps.
Initially, the database structure was inspected to identify key tables, columns, and data types. Columns such as Employee_ID, Access_Point, Access_Result, Shift and Entry_ID, were noted as critical for analysis.
Subsequent steps involved planning queries that could extract meaningful insights, aggregate metrics by time periods (shifts, daily, monthly), and segment data by relevant dimensions such as entry at location, employee ID, entries through departments, Time and shift, etc.
Queries and Analysis Performed
Several key analyses were designed for the AccessLog database.
The queries included:
1. Employee Activity Monitoring:
– Total accesses per employee: `SELECT Employee_ID, COUNT(*) FROM AccessLogs GROUP BY Employee_ID;`
– Peak access times: `SELECT strftime(‘%H’, Timestamp) AS Hour, COUNT(*) FROM AccessLogs GROUP BY Hour;`
– Identify movement patterns to discern employee movement to optimize access control systems.
2. Location Access:
– Most frequently entered locations:
`SELECT Location, COUNT(*) FROM AccessLogs GROUP BY Location ORDER BY COUNT(*) DESC;`
– Tracking Location access to optimize access control systems.
– Understanding which departments receive the highest foot traffic.
3. Access Success and Failure Analysis:
– Calculate Access Control success rates:
`SELECT Employee_ID, SUM(CASE WHEN Status=’Success’ THEN 1 ELSE 0 END) AS Success_Count FROM AccessLogs GROUP BY Employee_ID;`
– Identify repeated failed attempts to flag potential Access Control deficiencies.
– Monitor unauthorized access patterns to detect insider threats.
4. Temporal Analysis:
– Daily or monthly access summaries:
`SELECT strftime(‘%Y-%m’, Timestamp) AS Month, COUNT(*) FROM AccessLogs GROUP BY Month;`
– Detect seasonal trends, such as increased activity during end-of-month reporting periods or business-critical operations.
– Hourly analysis to determine peak times and plan department work schedules accordingly.
5. Security and Compliance Monitoring:
– Detect access to and from locations with sensitive information or precious cargo.
– Monitor Access through various entry points to enforce controlled compliance policies with security staff.
– Aggregate failed access attempts to proactively address any access point security issues.
These queries were designed to provide both quantitative metrics and categorical insights for management and operational teams.
Additional advanced queries were considered to enhance understanding of employee movement patterns.
These included joins across related tables (such as Employee or AccessLogs) to correlate incidents with access activity, shifts, or operational schedules.
Aggregations by week, quarter, and hour were also performed to detect seasonal or cyclical trends.
We also used filtering and grouping techniques which were applied to focus on high-priority incidents, significant errors, or repeated patterns of concern.
Visualization and Dashboard Design
Following the extraction and aggregation of data, the results were prepared for visualization.
The aim was to present complex datasets in intuitive monthly charts and trend graphs.
Visualizations included line charts for monthly counts, bar charts comparing locations, stacked charts for access statuses, and bar charts highlighting locations or employees associated with high-frequency movement patterns.
These visual dashboards enable you to quickly identify areas of interest, track movement over time, and make data-driven decisions for policy enforcement and preventative measures.
Insights and Practical Applications
The insights we gathered from the AccessLog database are actionable for both operational and strategic purposes.
By identifying recurring patterns, your management staff can refine and improve security policies, enhance employee training, and allocate additional human resources to high-risk locations.
Temporal data patterns revealed interesting periods of increased activity, which in turn can be used by management to guide security staff scheduling and other internal staffing decisions.
By analyzing the financial impact and the efficiency of problem resolution, the findings can help support financial accountability and the prioritization of corrective actions.
Through these analyses, your business can adopt a proactive approach to unauthorized access prevention, reducing financial exposure and fostering a culture of accountability and vigilance.
Conclusion
In summary, the AccessLogs database provided a rich source of structured data to analyze Access Control Systems, employee movement, and procedural adherence within your business environment.
Through a combination of structured queries, aggregation techniques, and visual dashboards, comprehensive insights were obtained without querying live sensitive data for this report.
The methodologies and visualizations outlined provide a framework for continuous monitoring, trend analysis, and decision-making, ensuring that Access Control efforts are data-driven, targeted, and effective in reducing both operational and financial risks.
Powered By EmbedPress
About Me
Your Data, Your Business!
Every second, your business generates data.
To most people, the data is a pile of numbers and letters. To the trained analyst though, the data tells a story.
I help uncover the stories and present it in a fun visual format, that’s easy for anyone to understand.