Cyber Basics and Big Data. 2 Semantic Extraction Sentiment Analysis Entity Extraction Link Analysis Temporal Analysis Geospatial Analysis Time Event Matrices.

Slides:



Advertisements
Similar presentations
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Advertisements

University of Illinois Visualizing Text Loretta Auvil UIUC February 25, 2011.
Big Data Management and Analytics Introduction Spring 2015 Dr. Latifur Khan 1.
Frank Yu Australian Bureau of Statistics Unstructured Data 1.
Big Data Workflows N AME : A SHOK P ADMARAJU C OURSE : T OPICS ON S OFTWARE E NGINEERING I NSTRUCTOR : D R. S ERGIU D ASCALU.
DSS: Decision Support Systems and AI: Artificial Intelligence
Mobile Online Intelligent Decision Support System Rick Smith, Dr. Stacey Lyle and Dr. Patrick Michaud-Division of Nearshore Research Conrad Blucher Institute.
Integration and Insight Aren’t Simple Enough Laura Haas IBM Distinguished Engineer Director, Computer Science Almaden Research Center.
Evolution in Coming 10 Years: What's the Future of Network? - Evolution in Coming 10 Years: What's the Future of Network? - Big Data- Big Changes in the.
Introduction to Data Science Kamal Al Nasr, Matthew Hayes and Jean-Claude Pedjeu Computer Science and Mathematical Sciences College of Engineering Tennessee.
WHT/ HPCC Systems Flavio Villanustre VP, Products and Infrastructure HPCC Systems Risk Solutions.
Amadeus Travel Intelligence ‘Monetising’ big data sets
Chapter 2: Business Intelligence Capabilities
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
1 Enterprise Search More relevant now than ever Mike Davis Principal Analyst 4 December 2012 © All images acknowledged © msmd advisors 2012 responsive,
The Operating System. Operating Systems (F) What you need to know about –operating system as a program; –directory/folder.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Richard J Self - University of Derby 1 Governance Strategies for the Cloud, Big Data and other Technologies in Education Richard J Self BA LLM MBCS FHEA.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
© 2013 IBM Corporation Version 1.0 The New Eye Insight through Big Data and Analytics: A Case Study on Citizen Sentiment Analysis Sandipan Sarkar, Executive.
Understanding Computer Basics. Computer Case- The part of a computer system that houses the microprocessor, the RAM (Random Access Memory), and the Motherboard.
Intelligence in National Security Association of Former Intelligence Officers Banquet 2 May 2014 Dr. John M. Poindexter
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
E M A S Third Party Administrator. Introduction  An integrated solution for complete computerization of TPA functions, build on the most futuristic and.
TC2-Computer Literacy Mr. Sencer February 3, 2010.
Big Data. What is Big Data? Big Data Analytics: 11 Case Histories and Success Stories
Charles Tappert Seidenberg School of CSIS, Pace University
© 2014 Advanced Performance Institute, BWMC Ltd. All rights reserved. To get a better understanding of what Big Data is, it is often described using Five.
Big Data: A definition Big data is the realization of greater intelligence by storing, processing, and analyzing data that was previously ignored due to.
Corporate Information Reconnaissance Cell (CIRC).
Subtask 1.8 WWW Networked Knowledge Bases August 19, 2003 AcademicsAir force Arvind BansalScott Pollock Cheng Chang Lu (away)Hyatt Rick ParentMark (SAIC)
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Copyright © 2012, SAS Institute Inc. All rights reserved. ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY,
Big Data Analytics Large-Scale Data Management Big Data Analytics Data Science and Analytics How to manage very large amounts of data and extract value.
+ Big Data IST210 Class Lecture. + Big Data Summary by EMC Corporation ( More videos that.
Frontline Enterprise Security
Cloud Computing & Big Data Group 9 Femme L H Sabaru | Aditya Gisheila N P | Aninda Harapan | Harry | Andrew Khosugih.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
Big Data – Big Opportunity Mohammad Khansari ITRC President Jan 2015 ITRC, Tehran, Iran.
What we know or see What’s actually there Wikipedia : In information technology, big data is a collection of data sets so large and complex that it.
IoT Meets Big Data Standardization Considerations
BUSINESS INTELLIGENCE & ADVANCED ANALYTICS DISCOVER | PLAN | EXECUTE JANUARY 14, 2016.
Machine Learning. Definition Machine learning is a subfield of computer science that evolved from the study of pattern recognition and computational.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Real-time Ingestion of telemetry into Hadoop to respond to Zero-Day Attacks Vipul Sawant, Pallav Jakhotiya.
B IG D ATA : S TORAGE, A NALYSIS AND I MPACT Justinas Bisikirskas 1.
Course : Study of Digital Convergence. Name : Srijana Acharya. Student ID : Date : 11/28/2014. Big Data Analytics and the Telco : How Telcos.
BIG DATA. The information and the ability to store, analyze, and predict based on that information that is delivering a competitive advantage.
Big Data Javad Azimi May First of All… Sorry about the language  Feel free to ask any question Please share similar experiences.
© David L. Wells Integrating Analytics into Business Intelligence Dave Wells
What is the Big Data Challenge? Organizations are seeking solutions that combine the real-time analytics capabilities of SAP HANA and accessibility to.
Business/Data Analytics Organizational & Strategic Opportunities
Big Data in Technical and Vocational Education (TVE)
Big Data Analysis / Analytics
Big Data Enterprise Patterns
Big Data.
Ramesh Jain Events in Data Science Ramesh Jain
Uses and Limitations of ICT
DSS: Decision Support Systems and AI: Artificial Intelligence
Governance, Risk, and Compliance Bill Greene Senior Industry Director
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Journey of Quality Analysts towards Data Analytics
Introduction Data Mining for Business Analytics.
Wavestore Integrates…
TRANSFORMATION OF INFORMATION TECHNOLOGY IN INSURANCE BUSINESS MODELS
Analytics Organizational & Strategic Opportunities
Big Data Overview.
Business/Data Analytics Organizational & Strategic Opportunities
Presentation transcript:

Cyber Basics and Big Data

2 Semantic Extraction Sentiment Analysis Entity Extraction Link Analysis Temporal Analysis Geospatial Analysis Time Event Matrices Predictive Pattern Analysis Video/Imagery Analytics Machine Created - logs Video – Predator Surveillance Audio – Phone recordings Sensor - Weather Social Media - Twitter Databases – Structured Text Reports – Semi-Structured Text Documents – Unstructured Text Graphs – Graph Dbs Data Analytics A new world of analytical possibilities is opened. Data and Complexity

Big Data Is Not New………So why the Hype now? – physical disk formats: hard-sectored 90 KB and soft-sectored 110 KB single-sided media, with formatted capacities of 360 KB 1984 – double-sided media, with formatted capacities of 720 KB What became the most common format, the double-sided, high-density (HD) 1.44 MB disk drive. Unprecedented ability to store Data Unprecedented amounts and types of data Unprecedented Computing Power Unprecedented Ability to reach data and information from anywhere in the world in Near Real Time

Milliseconds Actionable Intelligence Forensic Big Data Repositories Real-Time Network Sensors Domain Expertise Threat Vectors Data Derived Information Knowledge – Data in Motion Intelligence Near Real-Time Forensics Decision Maker Automate Screening Results in Display Analyst Interface Bring computing power to correlate vast amounts of data and create derived information Intuitive, comprehensive, analyst and decision maker interface Instantaneous time to value from data to actionable intelligence Ingest volume, velocity variety and veracity of data Data to Knowledge to Intelligence – the Process

The Basics to Next Generation – Risk Management 5

The Cyber Basics Simplified 6 Cyber Readiness – all about establishing trust to manage risk of uncertain world Now Virtual Trust, no longer face-to-face How do we establish trust ‘virtually’? First step is Identity Management CAC cards, PIV Certificates, Trusted data base Second Step is Authentication Two Factor, SSL, username and password, biometrics Third step is Access control Rules Based Access Control tied to identity management Last step is verification and analytics of the business process Audit and trace of all of the above steps Time matters to the above process for the person at the keyboard, mouse, mobile device, etc.

Time to value matters Just because you can build a solution from scratch doesn’t mean you should!

Thank You!