By
Mansi H. Bamroliya
(BCA III-A Roll no.02)
9/27/2015 1
Introduction……………………………………………………. 3
Plan around the big data
Lifecycle………………………………………………………………… 6
Leveraging big data with
the right tool…………………………………………….10
9/27/2015 2
9/27/2015 3
Bringing the issue of security into the
big data discussion often produces two
divergent schools of thought from IT
professionals and engineering.
Big data is high velocity and high
variety information that require new
forms of processing to enable decision
making.
9/27/2015 4
These are the four facts that give rise to
challenges but also opportunities:
1} Volume: The amount of data is moving from TB
to ZB(zettabytes) (1 ZB is 100 Crore TB) and
beyond.
2} Velocity: The speed of data (in and out), from
static onetime datasets to ongoing streaming data.
3} Variety: The range of data types and sources
structured , semi structured or raw.
4} Value: The importance of the data in context
9/27/2015 5
9/27/2015 6
Typically, this begins with
securing of collection of
data followed by securing
access to the data.
Performance is a key
consideration when
securing the collected
data and the networks.
In a big data
environment, policy
creation and enforcement
are more critical than
usual because of the
larger volumes of data and
the number of people who
will require access to it.
9/27/2015 7
Data Loss Prevention technologies should
be employed to ensure that information is
not being leaked to unauthorized parties.
Internal detection and data integrity
systems must be used to detect advanced
targeted attacks that have bypassed
traditional protection mechanisms, for
example, anomaly detection in the
collection and aggregation layers.
9/27/2015 8
Big data involves information residing over a
wide area from multiple sources,
organizations also need to have the ability to
protect data wherever it exists.
9/27/2015 9
9/27/2015 10
While big data presents challenges, it also
offers opportunities. With the right tools,
vast amounts of information could be
analyzed, and this allows an organization to
understand normal activities.
This effort is aided by competent IT staff
and efficient deployment of the appropriate
security tools.
These tools include dedicated logging,
analysis and reporting appliances that can
securely aggregate log data from security.
9/27/2015 11
9/27/2015 12
As portable storage and bandwidth continue to
grow, the mobility of these larger data sets will also
increase, resulting in breaches and disclosure of
sensitive datasets.
“Securing big data in the enterprise
requires smart policies
enforcement, thorough analytics
and high performance tools”
-Rajesh Maurya
Country Manager
India & SAARC, Fortinet.
9/27/2015 13
9/27/2015 14

A Little Security For Big Data

  • 1.
    By Mansi H. Bamroliya (BCAIII-A Roll no.02) 9/27/2015 1
  • 2.
    Introduction……………………………………………………. 3 Plan aroundthe big data Lifecycle………………………………………………………………… 6 Leveraging big data with the right tool…………………………………………….10 9/27/2015 2
  • 3.
  • 4.
    Bringing the issueof security into the big data discussion often produces two divergent schools of thought from IT professionals and engineering. Big data is high velocity and high variety information that require new forms of processing to enable decision making. 9/27/2015 4
  • 5.
    These are thefour facts that give rise to challenges but also opportunities: 1} Volume: The amount of data is moving from TB to ZB(zettabytes) (1 ZB is 100 Crore TB) and beyond. 2} Velocity: The speed of data (in and out), from static onetime datasets to ongoing streaming data. 3} Variety: The range of data types and sources structured , semi structured or raw. 4} Value: The importance of the data in context 9/27/2015 5
  • 6.
  • 7.
    Typically, this beginswith securing of collection of data followed by securing access to the data. Performance is a key consideration when securing the collected data and the networks. In a big data environment, policy creation and enforcement are more critical than usual because of the larger volumes of data and the number of people who will require access to it. 9/27/2015 7
  • 8.
    Data Loss Preventiontechnologies should be employed to ensure that information is not being leaked to unauthorized parties. Internal detection and data integrity systems must be used to detect advanced targeted attacks that have bypassed traditional protection mechanisms, for example, anomaly detection in the collection and aggregation layers. 9/27/2015 8
  • 9.
    Big data involvesinformation residing over a wide area from multiple sources, organizations also need to have the ability to protect data wherever it exists. 9/27/2015 9
  • 10.
  • 11.
    While big datapresents challenges, it also offers opportunities. With the right tools, vast amounts of information could be analyzed, and this allows an organization to understand normal activities. This effort is aided by competent IT staff and efficient deployment of the appropriate security tools. These tools include dedicated logging, analysis and reporting appliances that can securely aggregate log data from security. 9/27/2015 11
  • 12.
    9/27/2015 12 As portablestorage and bandwidth continue to grow, the mobility of these larger data sets will also increase, resulting in breaches and disclosure of sensitive datasets.
  • 13.
    “Securing big datain the enterprise requires smart policies enforcement, thorough analytics and high performance tools” -Rajesh Maurya Country Manager India & SAARC, Fortinet. 9/27/2015 13
  • 14.