CIS Big Data

¡Supera tus tareas y exámenes ahora con Quizwiz!

Black-hat hacker

Break into other people's computer systems

Cracker

Break into other people's computer with criminal intent

Three types of users

Business users, business analyst, data scientist

Datacosm Wave

Enable organization to exploit abundant and fast growing data

Unstructured Data

Everything else, words, imagines, and video

Defining security measures

Identify threats, identify assets, set controls

Business Drivers

Increase revenue, reduce risk, improve customer relations

Trojans

Listen to conversations on computers and monitor all activities

Big Data

More and different data then in easily handled by a typical database software

What is the potential of Big Data?

New class of economic asset, like currency or gold. Our decisions will increasingly be based on data and analysis rather than on experience and intuition

Structured Data

Organized data in seamless and readily searchable by simple search engine algorithms

First line of defense

People: organizations must enable employees, customers, and partners to access information electronically

IT Drivers

Reduce storage cost, reduce data movement, faster time-to-market

Future of technology

Social entrepreneurship (going green), virtual worlds (whole new world), social networks, mobile world

Hadoop

Technology used to analyze structured and unstructured data. It is a framework that enables the analysis of vast amounts of structured and unstructured data on a cluster of commodity servers

Predictive analytics

The "so what" and "now what", optimization, predictive modeling, forecasting/ extrapolation, statistical analysis

Descriptive analytics

The "what", alerts, query. drill down, Ad hoc reports, standard reports

Second line of defense

There are 3 primary information technology areas (1) authentication and authorization, (2) prevention and resistance, (3) detection and response

What is the goal of Global Pulse

To use digital early-warning signals to guide assistance programs in advance to, for example, prevent a region from slipping back into poverty

Cyber terrorist

Use the Internet as a weapon of mass destruction

Business analyst

Uses BI tools and analytic applications to understand business conditions

Data scientist

Uses advances algorithms and interactive exploration tools to uncover non-obvious patterns in data

White-hat hacker

Work at the request of the system owners to find system vulnerabilities and plug the holes

Global Pulse

A new initiative by the UN, wants to leverage Big Data for global development. The group will conduct so-called sentiment analysis of messages in social messages in social networks and text messages- using natural-language.

Business users

Access BI related information to perform their jobs, strongest in terms of business domain knowledge

4 V's of Big Data

(1) High volume, (2) High velocity, (3) High variety, (4) High value


Conjuntos de estudio relacionados

Astronomy 112 Homework 4 - Chapter 6

View Set

Pre-Algebra Combining Like Terms

View Set

MTA 98-367 Understanding Security Policies

View Set

3. Ο Κυκλαδικός Πολιτισμός

View Set