CIS Big Data
Black-hat hacker
Break into other people's computer systems
Cracker
Break into other people's computer with criminal intent
Three types of users
Business users, business analyst, data scientist
Datacosm Wave
Enable organization to exploit abundant and fast growing data
Unstructured Data
Everything else, words, imagines, and video
Defining security measures
Identify threats, identify assets, set controls
Business Drivers
Increase revenue, reduce risk, improve customer relations
Trojans
Listen to conversations on computers and monitor all activities
Big Data
More and different data then in easily handled by a typical database software
What is the potential of Big Data?
New class of economic asset, like currency or gold. Our decisions will increasingly be based on data and analysis rather than on experience and intuition
Structured Data
Organized data in seamless and readily searchable by simple search engine algorithms
First line of defense
People: organizations must enable employees, customers, and partners to access information electronically
IT Drivers
Reduce storage cost, reduce data movement, faster time-to-market
Future of technology
Social entrepreneurship (going green), virtual worlds (whole new world), social networks, mobile world
Hadoop
Technology used to analyze structured and unstructured data. It is a framework that enables the analysis of vast amounts of structured and unstructured data on a cluster of commodity servers
Predictive analytics
The "so what" and "now what", optimization, predictive modeling, forecasting/ extrapolation, statistical analysis
Descriptive analytics
The "what", alerts, query. drill down, Ad hoc reports, standard reports
Second line of defense
There are 3 primary information technology areas (1) authentication and authorization, (2) prevention and resistance, (3) detection and response
What is the goal of Global Pulse
To use digital early-warning signals to guide assistance programs in advance to, for example, prevent a region from slipping back into poverty
Cyber terrorist
Use the Internet as a weapon of mass destruction
Business analyst
Uses BI tools and analytic applications to understand business conditions
Data scientist
Uses advances algorithms and interactive exploration tools to uncover non-obvious patterns in data
White-hat hacker
Work at the request of the system owners to find system vulnerabilities and plug the holes
Global Pulse
A new initiative by the UN, wants to leverage Big Data for global development. The group will conduct so-called sentiment analysis of messages in social messages in social networks and text messages- using natural-language.
Business users
Access BI related information to perform their jobs, strongest in terms of business domain knowledge
4 V's of Big Data
(1) High volume, (2) High velocity, (3) High variety, (4) High value