Big Data for Cyber Security @ Big Data DC 7-16-2013
Upcoming SlideShare
Loading in...5
×
 

Big Data for Cyber Security @ Big Data DC 7-16-2013

on

  • 261 views

 

Statistics

Views

Total Views
261
Views on SlideShare
260
Embed Views
1

Actions

Likes
0
Downloads
14
Comments
0

1 Embed 1

https://usnatest.blackboard.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Source :http://static.techspot.com/images/teaser/world%252520network%252520large.jpg&w=330&h=227&ei=TVflUberNOv94APo7oHoDg&zoom=1&iact=hc&vpx=2&vpy=300&dur=8580&hovh=181&hovw=264&tx=152&ty=91&page=1&tbnh=138&tbnw=182&start=0&ndsp=20&ved=1t:429,r:5,s:0,i:9

Big Data for Cyber Security @ Big Data DC 7-16-2013 Big Data for Cyber Security @ Big Data DC 7-16-2013 Presentation Transcript

  • Big Data in Cyber Security Terry L. Janssen, Ph.D. Chief Scientist & Cyber Strategist
  • 1. Identity Management Driver’s Licenses News/ Social Media Credit Reports Criminal Records Physical Addresses Phone #s/ URLs/Email Addresses SSN/Birth/ Marriage Certificates Biometrics PIV
  • 2. Fraud Detection & Prevention Source http://money.cnn.com/2013/07/09/technology/security/cybercrime-bank-robberies/index.html
  • 3. Governance, Risk & Compliance Source National Cybersecurity Center, 2013
  • 4. Security Management Source AT&T 2013
  • Reported Incidents of Data Loss Year Source: DataLossDB.orgOpen Security Foundation
  • Sampling by Attack Type Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013 2012
  • Characteristics of SPAM Source: IBM.comxxxxxxxxx Week # Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
  • SPAM & Phishing Targets Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
  • SPAM Origins Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
  • Drop of SPAM After Botnet Busts Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
  • Reports of Vulnerabilities Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
  • Web Vulnerabilities by Attack Vector Source: IBM.comIBM X-Force 2012 Trend and Risk Report March 2013
  • Big Data for Securing the Future Questions?