Thanks to our guest blogger, Jayanthi Manikandan for her blog this week on Big Data Security Analytics. Jayanthi has an undergrad degree in Computer Science and a Master’s degree in Information Systems with a specialization in Information Assurance from Walsh College, Detroit, MI. She enjoys writing about Java, Information Security and Big Data.
With the innate sense to share across multiple platforms being the norm in today’s Facebook generation, huge volumes of data are being generated. We are part of the data and we are the cause of this data. Nowhere in time has man communicated so much and this much amount of communication been recorded.
The output from all social media platforms such as Facebook, Twitter, and other data like emails, pictures, videos, data from DBMS, etc are all examples of structured, unstructured, and semi-structured data. What we do with this data is the crucial point of Big Data discussions. How will we leverage this data in a reduced span of time to produce desired results is important for businesses, retail, health care, law enforcement, credit card companies, academic institutions, and so on.Just like “Java” revolutionized the 90’s with “write once, run anywhere” reality, “Big Data” and its technologies are revolutionizing the current age with the ability to process structured, unstructured data and semi-structured data without the need for a common schema.This blog post will examine two aspects of Big Data analytics in relation to Information Security:a) The huge volume of data related to Information Securityb) Security aspects when dealing with Big Data
Just like with other disciplines, Big Data technologies are used to tap the huge volume of security-relevant data relating to log files, network traffic, network events, software application events, firewalls, etc. Earlier, all this security data could only be stored for a limited period of time (say 60 days) and not much analysis could be done with them. It wasn’t monetarily feasible to store security data for longer periods of time and it wasn’t easy to perform traditional data mining. Complex queries also took a considerable amount of time to be generated. And the most difficult part of traditional data warehouses was the need for homogenous data formats. Now thanks to the increased processing power of CPUs combined with a lower cost of RAMs, queries can be executed faster without the need for a common schema. This is done by using Big Data technologies.Putting this in relation to a security perspective, security alarms and network statistics are aggregated and presented as information through a dashboard for security analysts. (Big Data Analytics for Security, 2014)This historical security data can be mined to detect:
Illustrating this fact, Zions Bancorporation has stated that by adopting Big data technologies like Hadoop, huge volumes of security data can now be parsed more quickly than traditional tools. Queries that normally took between 20 minutes and an hour now take about a minute, thanks to working with Hive. (Big Data Analytics for Security Intelligence, 2013)Illustrating this fact, Zions Bancorporation has stated that by adopting Big data technologies like Hadoop, huge volumes of security data can now be parsed more quickly than traditional tools. Queries that normally took between 20 minutes and an hour now take about a minute, thanks to working with Hive. (Big Data Analytics for Security Intelligence, 2013)
After having discussed the different security components of Big Data and how Big Data will help predict the future of security environments, we next turn to the obvious aspect of Big Data and Security – what about the security of Big Data itself? For example, is the data mined from different social media interactions really private? As you can guess, it is very easy for privacy violations to occur in the Big Data age. When large data sets are being mined, they will be subject to tampering and hence certain laws are needed to avoid “data reuse”. In the US certain laws (like HIPAA) are present to prevent misuse of the huge amount of data. (Big Data Analytics for Security Intelligence, 2013)
More and more organizations these days are working to make sure that Big Data and security go hand in hand.
Having seen the different aspects of Big Data security analytics, we next see the prospects of Big Data Security in the industry. Some of the job roles relating to Big Data Security are:
Most of these job roles will broadly demand skills pertaining to Big Data technologies like Hadoop, data models and encryption models. Considering all these factors, the future of Big Data Security analytics is bright and interesting and poised to grow stupendously.Interested in a career in Big Data? Check out Jigsaw Academy’s Big Data courses and see how you can get trained to become a Big Data specialist.
Big Data Analytics for Security. (2014, Feb 11). Retrieved Aug 26, 2014, from InfoQ: https://www.infoq.com/articles/bigdata-analytics-for-securityBig Data Analytics for Security Intelligence. (2013, September). Retrieved August 26, 2014, from Cloud Security Alliance: https://www.research.att.com/techdocs/TD_101024.pdfCloudera buys big data encryption outfit Gazzang. (2014, June 5). Retrieved Sept 1, 2014, from zdnet.com: https://www.zdnet.com/cloudera-buys-big-data-encryption-outfit-gazzang-7000030250/IBM Security Intelligence with Big Data. (n.d.). Retrieved Sept 2, 2014, from IBM: https://www-03.ibm.com/security/solution/intelligence-big-data/
Related Articles:Are we Mis-using Big Data?Security is a Big, Big Data IssueHow Important is The Human Element in Big Data?
Fill in the details to know more
How To Use the Pivot Table in Excel ?
May 12, 2023
Role of Cost in Pricing of the Product!
April 18, 2023
What Is Data Visualization in Excel?
April 14, 2023
What Are Databases and Tables in SQL?
March 24, 2023
It’s Raining Opportunities In Cloud Computing!
March 23, 2023
Product Management – With Great Power Comes Great Responsibility!
Add your details:
By proceeding, you agree to our privacy policy and also agree to receive information from UNext through WhatsApp & other means of communication.
Upgrade your inbox with our curated newletters once every month. We appreciate your support and will make sure to keep your subscription worthwhile