When data collects in one place, it is called data at rest. Data at rest can be archival or reference files that are changed rarely or never; data at rest can also be data that is subject to regular but not constant change.
1. Discovery Using Data at Rest
By
Dr. Sanjeev Kumar
Professor
Department of Computer Application
2. Contents
• Introduction
• Discovery Data at Rest
• Big Data Discovery
• Data Protection: Data At Rest
• Role of Encryption In Data Protection
• Best Practices for Protection Data in Rest
• Conclusion
2
Real-time Big Data Architectures, Dr. Sanjeev Kumar
3. What is Data Rest
When data collects in one place, it is called data at rest. Data at rest can
be archival or reference files that are changed rarely or never; data at
rest can also be data that is subject to regular but not constant change.
Data at rest in information technology
means inactive data that is stored
Physically in any digital form. Data
at rest is subject to threats from hackers.
Real-time Big Data Architectures, Dr. Sanjeev Kumar
4. Data at Rest Includes:
Real-time Big Data Architectures, Dr. Sanjeev Kumar
Data stored in an online database
Data stored on disk
Data stored online or offline database extracts
Backups transferred to disk, tape, or optical (CD/DVD)
media
5. Discovery Data at Rest
Real-time Big Data Architectures, Dr. Sanjeev Kumar
Data discovery allows to find, explore,
transform, and analyze data, and thus gain deeper
insight from all kinds of information. Data at rest
is information stored. The most valuable
information doesn’t necessarily get channeled –
it is often fixed.
6. Real-time Big Data Architectures, Dr. Sanjeev Kumar
Big Data Discovery
It’s the logical combination
of three of the hottest trends
of the last few years in
analytics: Big Data, Data
Discovery, and Data
Science.
7. Data Protection: Data At Rest
Data protection at rest aims to secure inactive data stored on any device
or network. While data at rest is sometimes considered to be less
vulnerable than data in transit, attackers often find data at rest a more
valuable target than data in motion. The risk profile for data in transit
or data at rest depends on the security measures that are in place to
secure data in either state.
Protecting sensitive data at rest is imperative for modern enterprises as
attackers find increasingly innovative ways to compromise systems and
steal data.
Real-time Big Data Architectures, Dr. Sanjeev Kumar
8. Role of Encryption In Data Protection
Encryption plays a major role in data
protection and is a popular tool for
securing data both in transit and at
rest.
For protecting data at rest, enterprises
can simply encrypt sensitive files
prior to storing them and/or choose to
encrypt the storage drive itself.
Real-time Big Data Architectures, Dr. Sanjeev Kumar
9. Best Practices for Protection Data in Rest
Real-time Big Data Architectures, Dr. Sanjeev Kumar
•Implement robust network security controls to help protect data in transit.
Network security solutions like firewalls and network access control will
help secure the networks used to transmit data against malware attacks or
intrusions.
•Don’t rely on reactive security to protect your valuable company data.
Instead, use proactive security measures that identify at-risk data and
implement effective data protection for data in transit and at rest.
10. Best Practices for Protection Data in Rest
Real-time Big Data Architectures, Dr. Sanjeev Kumar
•Choose data protection solutions with policies that enable user
prompting, blocking, or automatic encryption for sensitive data in
transit, such as when files are attached to an email message or moved
to cloud storage, removable drives, or transferred elsewhere.
•Create policies for systematically categorizing and classifying all
company data, no matter where it resides, in order to ensure that the
appropriate data protection measures are applied while data remains at
rest and triggered when data classified as at-risk is accessed, used, or
transferred.
11. Conclusion:
Real-time Big Data Architectures, Dr. Sanjeev Kumar
Finally, if you utilize a public, private, or hybrid cloud provider for storing
data or applications, carefully evaluate cloud vendors based on the security
measures they offer – but don’t rely on the cloud service to secure your data.
Who has access to your data, how is it encrypted, and how often your data is
backed up are all imperative questions to ask.