Big Data Bijan Barikbin Denisa Teme Matthew Joseph.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
9 - 1 Computer-Based Information Systems Control.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 8-1 BUSINESS DRIVEN TECHNOLOGY Chapter Eight: Viewing and Protecting Organizational.
Chapter 19: Network Management Business Data Communications, 4e.
Barracuda Backup Service Data Backup and Disaster Recovery.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Computer Security: Principles and Practice
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Network security policy: best practices
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
John Graham – STRATEGIC Information Group Steve Lamb - QAD Disaster Recovery Planning MMUG Spring 2013 March 19, 2013 Cleveland, OH 03/19/2013MMUG Cleveland.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
New Data Regulation Law 201 CMR TJX Video.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Information Security Technological Security Implementation and Privacy Protection.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Systems Security Operational Control for Information Security.
1 Nassau Community CollegeProf. Vincent Costa Session 7 Infrastructures Sustainable Technologies CMP 117 Business Computing: Concepts &Applications.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Small Business Security Keith Slagle April 24, 2007.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
HalFILE 2.1 Network Protection & Disaster Recovery.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
UNIT V Security Management of Information Technology.
Information Security and Privacy in HRIS
Chapter 19: Network Management
Avenues International Inc.
Transaction processing systems
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Data and database administration
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Managing the IT Function
IS4550 Security Policies and Implementation
Chapter 1 Database Systems
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Computer Science and Engineering
AWS S3 Cloud Backup Licensing per system Starting at $79 per year.
6. Application Software Security
Presentation transcript:

Big Data Bijan Barikbin Denisa Teme Matthew Joseph

Background Definition: ●“Data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process the data within a tolerable elapsed time” ●Defining characteristic ○ Real time information delivery

Gartner’s 3 V’s

How it Works... ●Requires “massively parallel software running on tens, hundreds, or even thousands of servers.” ○ Inductive statistics ○ Regression ○ Nonlinear relationships ○ Causal Effects

What Big Data Reveals ●Reveal relationships ●Find dependencies ●Predict outcome and behavior of large data sets

Benefits ●Individual ○ Netflix, ISP ●Community ○ Crash reports ●Organization (Business, etc…) ○ Distribution methods, fight fraud, etc... ●Society ○ optimal energy resources, etc...

Skepticism ●Framework and skills ○ Less than 40% of companies have the framework, tools, and skills to effectively analyze big data ●Biased results ○ Scientist choosing which information is “big data” ●Too focused on choosing the big data sets and analyzing the vast amounts of data leads to biased or inaccurate results ●Security

Risk #1: Loss of Security ●Increased number of way to get into system ●Results in data breach ■ Fines ■ Reputation loss ■ Increase in expense ■ loss in competitive advantage

Risk #2: Lack of Cybersecurity ●Increased number of transactions and data online ●Great incentives for cyber criminals ●Cyber criminals are better, more professional, and have powerful tools and capabilities to use

Risk #3: Loss of Agility ●Data housed on multiple platforms ●Management needs to be able to locate, analyze, and make decisions quickly ●If data is not evaluated, organized and stored properly, critical information can be difficult to find ○ Slows down business when speed and timing is essential

Risk #4: BYOD ●Growth of big data ●Need to secure employee’s personal devices in workplace ●If not monitored, devices could be exposed to hacking ●Ensure employees of the acceptable use policy

Risk #5: Increase in Expenses ●Increasing amount of data=increasing amount of expenses ●Might need more servers or cloud storage capacity ●Additional security ●Disaster Recovery

Risk #6: Data Stored in the Cloud ●Relies on another company for protection of data ●Highly attractive target for cyber criminals

Big Data Risk Mitigation No clear Understanding of Big data Traditional roles of data producers - changed Sensitivity Volume <>Traditional control are less relevant

Controls Employee Laptops Encryption Remote tracking Automatic Update Report lost/stolen Laptops Authorization

Controls Portable Devices - Small Size - Ease of use Training Updated acceptable use policy Blocking access Encryption Audit trail Labelling Report if lost/stolen

Controls Transportation of Data Encryption algorithms Copy Record details of Transfer

Controls s sent over the companys network: Training security system Periodic notifications Encryption

Controls Firewall List of services & ports Permissible traffic Protocols Traffic monitoring Review

Controls In an event that leads to loss or compromise of an organization's data - the Backup and Restore process should be implemented. Data backups Secure location Authorized personnel Test CIA

Controls Big Data if not properly utilized could outweigh the benefits Retention Sanitization Protection of log files Approval Regulated temperature Server door

Controls Controls to mitigate internal risk Terminated employees Fire suppression system Assigning access Database Administrator - Decoy

References ● ● ● ● ● ehttp://books.google.com/books?id=Wu_xeGdU4G8C&pg=PA3#v=onepage&q&f=fals e ● ● ● Safeguards.pdfhttp://scitechconnect.elsevier.com/wp-content/uploads/2013/09/Controls-and- Safeguards.pdf ● Associated-With-Data-Transfers.aspxhttp:// Associated-With-Data-Transfers.aspx ● Controls-Over-Data.aspxhttp:// Controls-Over-Data.aspx ●Book - Big Data Computing - Edited by Rajendra Akerkar