Presentation is loading. Please wait.

Presentation is loading. Please wait.

Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.

Similar presentations


Presentation on theme: "Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering."— Presentation transcript:

1 Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering University of South Carolina, Columbia 1

2 Who is Impacted by Cyber Attacks? 2

3 3

4 4

5 Risk Assessment Business Policy Decision Communication between technical and administrative employees Internal vs. external resources Legal and regulatory requirements Developing security capabilities Cost Security level 0 %100% Optimal level of security at a minimum cost Security Investment Cost of Breaches 5

6 Understanding Cyber Security Risk Cyber Security Threats Extortion Hacks Attacks That Change or Manipulate Data Attacks That Change or Manipulate Data Chip-and-PIN Innovations The Rise of the IoT Zombie Botnet More Backdoors Source: Wired, http://www.wired.com/2016/01/the- biggest-security-threats-well-face-in-2016/ http://www.wired.com/2016/01/the- biggest-security-threats-well-face-in-2016/ 2016 6

7 Security Objectives Confidentiality: prevent/detect/deter improper disclosure of information Integrity: prevent/detect/deter improper modification of information Availability: prevent/detect/deter improper denial of access to services 7

8 Independent from system and network Database Management System (DBMS) is responsible for protecting data items Main database types: – Enterprise – Statistical Traditional Data Security 8

9 Sensitive Data Inherently sensitive From a sensitive source Declared sensitive Part of a sensitive attribute or record In relation to previously disclosed information 9

10 Types of Disclosures Exact data Range of data Negative results Existence Probable values SSN: 111-22-3333 10

11 Access Control Mechanisms Cryptography Security through Views Stored Procedures Grant and Revoke Query modification 11

12 Goal Goal: provide aggregate information about groups of individuals  E.g., average grade point of students Security risk Security risk: specific information about a particular individual  E.g., grade point of student John Smith Statistical Databases 12

13 Statistical Data Protection Query restriction Data perturbation Output perturbation ? ? 13

14 Database Inference Attacks General Purpose Database: Non-confidential data + Metadata  Undesired Inferences Web Enabled Data: Non-confidential data + Metadata (data and application semantics) + Computational Power + Connectivity  Undesired Inferences 14

15 Source: http://www.cagle.com/2010/05/internet-privacy /http://www.cagle.com/2010/05/internet-privacy / What is Big Data? 15

16 Big Data Characteristics Big Data Characteristics Volume – Simple SQL analytics (data warehouse) – Complex analytics (clustering, trend detection, etc.) Variety – Enterprise data: spreadsheets, documents, web pages – Public data Velocity – Live database – Fast growth Hadoop 16

17 Big Data Security Access Control – Distributed, massively parallel processing – Data at rest, in transit, during processing Inference control – Discovery – Sensitive metadata – Use of discovered knowledge 17

18 Inference Example Latanya Sweeney, Director of Data Privacy Lab, Harvard Only You, Your Doctor, and Many Others May Know, Technology Science, 2015092903. September 29, 2015. 18

19 Data Matching Source: L. Sweeney, http://techscience.org/a/2015092903/http://techscience.org/a/2015092903/ 19

20 Present: Big Data Inferences Private ? Ontology Data Integration and Inferences Web Data Secure ? 20

21 Future: Research Challenges Security for raw data Security for raw data – Flexible access control – Data removal – Data quality Security for metadata Security for metadata – Protection need of novel, new concept – Metadata guided attacks Cross-context attacks Cross-context attacks – Correlate data across multiple contexts SemanticWebTechnologies 21

22 Usability and Visualization Facebook Gmail Online Banking 22

23 Questions? 23

24 National Center of Academic Excellence in Information Assurance Education Information Assurance Education Information Assurance Research Information Assurance Research 24

25 OUTREACH EDUCATION RESEARCH CIAE Mission 25

26 OUTREACH EDUCATION RESEARCH External funding Peer-reviewed publications Ph.D. graduates CIAE Mission 26

27 CIAE Mission OUTREACH EDUCATION IA courses IA specialization Applied Computing Graduate IA Certificate RESEARCH 27

28 CIAE Mission OUTREACH Collaborations Academia Government Industry EDUCATION RESEARCH 28

29 Center for Information Assurance Engineering Csilla Farkas Center for Information Assurance Engineering http://www.cse.sc.edu/isl Csilla Farkas http://www.cse.sc.edu/~farkas farkas@cec.sc.edu http://www.cse.sc.edu/isl http://www.cse.sc.edu/~farkas farkas@cec.sc.edu 29


Download ppt "Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering."

Similar presentations


Ads by Google