SlideShare a Scribd company logo
1 of 6
Download to read offline
Revving data engines to chase cyber criminals 
By Kishore Jethanandani 
Banks are recognizing that speed is of the essence in nabbing cyber criminals. They need to ferret out lurking dangers on computers and corner criminals before their plots inflict damage. 
Big-data enabled anomalous pattern detection is widely recognized as the best practice for fraud prevention. The legacy data-warehouses and relational databases, however, were never designed for rapid storage and querying that is needed for real-time responses to criminal activity. Data-warehouses are batch processes and they take so long that most companies wait till after hours to transfer and load data into them. 
Relational databases were designed for structured data with an existing schema for organizing data in columns and rows. As the size of storehouses grows, the queries get larger and take ever more time to process. Paul Zolfaghar of ParAccel, speaking during a panel discussion, “Big Data: New Database Paradigms” at the Jefferies Global Technology, Internet, Media & Telecom Conference, said that some of his clients on Wall Street write 20,000 line SQL statements. In the time that it would take to process a query like that, the criminals would not only bolt but would be in hiding! 
Fraud detection is most effective when it parses both structured and unstructured information, including video, audio, images, social media feeds, email and more, to construct a rounded view of events and their relationships. While structured data volumes are growing slower than unstructured data, the utilization rates of unstructured data are much lower according to a survey by Freeform Dynamics in late 2012. Experts believe that unstructured data from social media sites provides a great deal more of insights. 
Banks are seeking to greatly increase the speed of data processing with a broader range of queries to extract information on criminal activity with Hadoop. The cornerstone of the Hadoop architecture is the use of a cluster of commodity servers and storage devices that house data without a pre-defined schema. Zion Bancorp, for example, formed a cluster of
30 nodes of servers and switches to process petabytes of data according to a report by Banktech. The time for queries has been drastically reduced with Big Data from four days to eight minutes according to Paul Zolfaghar at the conference cited above. 
Hadoop clusters are meant for simultaneous processing of multiple queries on as many data stores. These systems are akin to the Mapreduce architecture, used by search engines like Google, which sub-divide a larger repository according to a report by The Banker. Each of these data stores has a category of data that can be queried independent of other data stores. Since no specific schema is applied when the data is stored, it is possible to store and query both structured and unstructured data. 
Some early data suggests that the emerging architecture for fraud detection and response to cyber-criminals is effective. According to a survey by Financial Services Information Sharing and Analysis Center (FS-ISAC), there were an estimated 2.11 cyber-attacks per 1,000 commercial banking customers that compromised computers used for electronic bank transfers in 2012 compared to 3.42 in 2011. What’s more, in only 9% of the cyber- attacks the thieves were able to steal money compared to 70% in 2009 and 12% in 2011. One of the reasons attributed by the survey for the decline in losses from cyber-crime was the effort that banks are making to continuously track anomalous activity. 
The pressure for scrapping legacy bank systems is only going to grow as criminals become more adept at penetrating them. Banks can benefit from lower losses from crime but also other payoffs from the analysis of data for product development and customer retention. Big Brother’s all-seeing eyes for fraud By Kishore Jethanandani Big Data will save banks the embarrassment of being informed about security breaches much too late for their customers! They can now anticipate security vulnerabilities and respond in real time to prevent a potential loss of data with help from analytics.
Security analyst Bernt Ostergaard, of industry analyst firm Current Analysis, reports in an interview to InfoRisk Today that those companies which have shifted to the new paradigm of security management experienced drops in losses from security breaches in 2011 compared to those in 2010. The hallmark of the new paradigm in security management is correlation of security events, such as an unusual increase in data traffic, with seemingly unrelated information such as a termination of the employment of a staff member in the bank. Specialists in data analytics for banks, such as FICO, ID Analytics, Opera Solutions and Global Analytics, have larger storehouses of information gathered from inside and outside the bank to find the correlations that enable them to spot lurking risks to banks. The traditional methods of securing banks from losses of data, such as authentication and encryption, have outlived their utility in a world where malware mutates into new forms before banks deal with known intrusions. The Anti-Phishing Working Group estimates that 39% of all computers are infected with financial malware that are typically placed on computers to steal account information. Identity thieves, masquerading as account holders, have increased the rate of takeover of online bank accounts at the rate of 150% per year according to numbers from Financial Services Information Sharing and Analysis Center and quoted by the American Banker magazine. A telling statistic, awkward for bank security managers, is the means by which banks become aware of a security breach. In 2012, banks were alerted to an intrusion by customers in 82% of the cases. This has increased from 76% of the cases in 2010 according to the 2012 Faces of Fraud Survey conducted by the Information Security Media Group. Banks can hardly mitigate losses when
the criminals bolt from the scene of crime much before they even become aware of it! As mobile payments grow, banks are more vulnerable to security breaches. A 2011 Aite Group survey of 24 global financial executives found that 75% of them believe the mobile channel exposes them to fraud and security risks and 88% are convinced it will be the dominant source of fraud risk. 
Some of the traits of smart phones lend themselves to fraud. Due to a smaller screen, some of the telltale signs of a phishing attempt are missed by users. Mobile users are three times more likely than their PC counterparts to give away their personal information on suspicious websites according to a report by Bank Director Magazine. A survey of the Aite Group found that only 37% of the respondents in the banking industry have a security system that integrated their online and mobile channels. In the arms race against the bad guys, banks are better served if they give up the idea that it is even possible to build a security fortress. The bad guys are guerrillas who will always find their way inside. Big Data is akin to a counter- intelligence system able to spy on them and catch them in the act. 
Predictive Analytics: an eye for the Black Swan 
By Kishore Jethanandani 
Recurring outages in October and September of 2012 at Bank of America and five of the largest banks were a new normal of Bank IT disasters. 
Outages of up to 20 hours were experienced as traffic volumes zoomed to 65 Gbps. The distraction of a congested network is also the backdrop for fraudulent wire transfers.
The symbolism was striking; the nation’s banks, the channel for payments to government employees and the military, were overwhelmed by the unprecedented magnitude of the disaster. 
Banks are increasingly susceptible to catastrophic disasters as cost-cutting compulsions drive them to virtualize their infrastructure that includes inter- connecting their sprawling data centers. In the latest wave of attacks, hackers created virtual clones of actual machines. They then used the IP addresses and related identity information of victims to masquerade as genuine customers in order attempt transfer of funds. 
A disruption in any of the servers, storage or cloud networks rapidly cascades throughout the virtual IT infrastructure. After the fact, banks find themselves overtaken by the momentum of disastrous events. Their one chance of minimizing the damage is to predict and pre-empt a disruption before it begins to snowball. 
Complexity has grown in data centers with increasing recourse to virtualization. More applications can be housed on a single server with virtualization. A 2012 Symantec survey of data centers found that the level of complexity in North American organizations is 7.81 (on a scale 1 to 10) compared to 6.15 for East Asian companies. The contributing factors are growing numbers of business critical applications, larger volumes of data, server virtualization, mobile and cloud computing. 
Companies have also made progress in switching to management tools that are more effective in the new world of virtualization. In 2011, there was a 16% increase in management tools, integrated with the virtualization
platform, such as Virtual Machine Manager, Virtual Center Manager or XenCenter. 
These management tools ease the tedium of data gathering and manual reconfiguration of physical devices that was the norm before virtualization was widely adopted. Virtualization also enables aggregation of data as it affords visibility into the entire network. 
On the other hand, the ease of reconfiguration encourages companies to redeploy the physical devices for a variety of functions as needs change. The likelihood of an error and outages increases as the servers are switched to a variety of functions. On an average, companies endure a staggering 16 outages each year at a cost of $5.1 million and 11 of them are due to system failures. 
Increasingly, banks like other companies recognize that real-time data aggregation and predictive analytics is the key to realizing their most valued goal of increasing availability of their IT. Several companies, IBM-Tivoli, Netuitive and HP’s Service Health Analyzer among others incorporate predictive analytic solutions in their management tools. 
However, these management tools are not a substitute for the effort companies have to make to identify key performance indicators. Only they can extract the relevant data from their systems and choose the models that predict performance with the greatest degree of accuracy. This is the task that will preoccupy them in the coming years.

More Related Content

What's hot

2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity reportOwen Bartolome
 
SecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportSecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportAlex Himmelberg
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliantDivya Kothari
 
IBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM India Smarter Computing
 
Cyber loss model for all industries
Cyber loss model for all industriesCyber loss model for all industries
Cyber loss model for all industriesThomas Lee
 
Half the Picture
Half the PictureHalf the Picture
Half the PictureThomas Lee
 
Calculating the Real ROI of Implementing a Biometridc Authentic Solution
Calculating the Real ROI of Implementing a Biometridc Authentic SolutionCalculating the Real ROI of Implementing a Biometridc Authentic Solution
Calculating the Real ROI of Implementing a Biometridc Authentic SolutionSamsung SDS America
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106Ted Richmond
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareLevi Shapiro
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, securityRoman Chanclor
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchLaurent Pacalin
 
201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding Profits201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding ProfitsSteven Callahan
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...FraudBusters
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Cognizant
 
How Big Data Can Lead to Bigger ROI
How Big Data Can Lead to Bigger ROIHow Big Data Can Lead to Bigger ROI
How Big Data Can Lead to Bigger ROIExperian
 

What's hot (15)

2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report
 
SecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportSecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_Report
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
IBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcare
 
Cyber loss model for all industries
Cyber loss model for all industriesCyber loss model for all industries
Cyber loss model for all industries
 
Half the Picture
Half the PictureHalf the Picture
Half the Picture
 
Calculating the Real ROI of Implementing a Biometridc Authentic Solution
Calculating the Real ROI of Implementing a Biometridc Authentic SolutionCalculating the Real ROI of Implementing a Biometridc Authentic Solution
Calculating the Real ROI of Implementing a Biometridc Authentic Solution
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt Healthcare
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus Research
 
201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding Profits201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding Profits
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
How Big Data Can Lead to Bigger ROI
How Big Data Can Lead to Bigger ROIHow Big Data Can Lead to Bigger ROI
How Big Data Can Lead to Bigger ROI
 

Viewers also liked (9)

Glide Paths from the Fiscal Cliff
Glide Paths from the Fiscal CliffGlide Paths from the Fiscal Cliff
Glide Paths from the Fiscal Cliff
 
POLITICAL RENEWAL AND PROSPECTS FOR EQUITIES[1]
POLITICAL RENEWAL AND PROSPECTS FOR EQUITIES[1]POLITICAL RENEWAL AND PROSPECTS FOR EQUITIES[1]
POLITICAL RENEWAL AND PROSPECTS FOR EQUITIES[1]
 
My blogs on big data and insurance
My blogs on big data and insuranceMy blogs on big data and insurance
My blogs on big data and insurance
 
proactive_it_management_eliminating_mean_time_to_surprise
proactive_it_management_eliminating_mean_time_to_surpriseproactive_it_management_eliminating_mean_time_to_surprise
proactive_it_management_eliminating_mean_time_to_surprise
 
Synchronization of Global Supply Chains
Synchronization of Global Supply ChainsSynchronization of Global Supply Chains
Synchronization of Global Supply Chains
 
FIRE ALL FINANCIAL ADVISORS
FIRE ALL FINANCIAL ADVISORSFIRE ALL FINANCIAL ADVISORS
FIRE ALL FINANCIAL ADVISORS
 
Supply Chain Synchronisation
Supply Chain SynchronisationSupply Chain Synchronisation
Supply Chain Synchronisation
 
Group 4 Supply Chain Synchronisation For Effective Operations Planning
Group 4   Supply Chain Synchronisation For Effective Operations PlanningGroup 4   Supply Chain Synchronisation For Effective Operations Planning
Group 4 Supply Chain Synchronisation For Effective Operations Planning
 
New Age Cybersecurity
New Age CybersecurityNew Age Cybersecurity
New Age Cybersecurity
 

Similar to My blogs on big data and cybersecurity in banks

Data-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital TransformationData-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital TransformationLindaWatson19
 
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...Stuart Blair
 
Technology Trends 2012
Technology Trends 2012Technology Trends 2012
Technology Trends 2012NECIndia
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Software Market Trends 2012 2.0
Software Market Trends 2012 2.0Software Market Trends 2012 2.0
Software Market Trends 2012 2.0allaboutsyed
 
Bank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial IntelligenceBank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial IntelligenceIJAEMSJORNAL
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Santhosh L
 
Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Earnest Sweat
 
6 use cases of machine learning in Finance
6 use cases of machine learning in Finance 6 use cases of machine learning in Finance
6 use cases of machine learning in Finance Swathi Young
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 
TRANSFORMATION - BANKING INDUSTRY.pdf
TRANSFORMATION - BANKING INDUSTRY.pdfTRANSFORMATION - BANKING INDUSTRY.pdf
TRANSFORMATION - BANKING INDUSTRY.pdfCeyhun Jay Tugcu
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Anton Chuvakin
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
 

Similar to My blogs on big data and cybersecurity in banks (20)

Data-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital TransformationData-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital Transformation
 
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
 
Technology Trends 2012
Technology Trends 2012Technology Trends 2012
Technology Trends 2012
 
Cyber Crime is Wreaking Havoc
Cyber Crime is Wreaking HavocCyber Crime is Wreaking Havoc
Cyber Crime is Wreaking Havoc
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Software Market Trends 2012 2.0
Software Market Trends 2012 2.0Software Market Trends 2012 2.0
Software Market Trends 2012 2.0
 
Bank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial IntelligenceBank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial Intelligence
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
6 use cases of machine learning in Finance
6 use cases of machine learning in Finance 6 use cases of machine learning in Finance
6 use cases of machine learning in Finance
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
TRANSFORMATION - BANKING INDUSTRY.pdf
TRANSFORMATION - BANKING INDUSTRY.pdfTRANSFORMATION - BANKING INDUSTRY.pdf
TRANSFORMATION - BANKING INDUSTRY.pdf
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 

More from Kishore Jethanandani, MBA, MA, MPhil,

Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...Kishore Jethanandani, MBA, MA, MPhil,
 
Vendor strategies: Operational Business Intelligence for Agile Enterprises
Vendor strategies: Operational Business Intelligence for Agile EnterprisesVendor strategies: Operational Business Intelligence for Agile Enterprises
Vendor strategies: Operational Business Intelligence for Agile EnterprisesKishore Jethanandani, MBA, MA, MPhil,
 
From CRM to Data Mining: Predictive Analytics for Precision Marketing
From CRM to Data Mining: Predictive Analytics for Precision MarketingFrom CRM to Data Mining: Predictive Analytics for Precision Marketing
From CRM to Data Mining: Predictive Analytics for Precision MarketingKishore Jethanandani, MBA, MA, MPhil,
 

More from Kishore Jethanandani, MBA, MA, MPhil, (18)

Predictive analytics
Predictive analyticsPredictive analytics
Predictive analytics
 
My blogs on digital media content
My blogs on digital media contentMy blogs on digital media content
My blogs on digital media content
 
My blogs on machine to-machine business solutions
My blogs on machine to-machine business solutionsMy blogs on machine to-machine business solutions
My blogs on machine to-machine business solutions
 
My blogs on collaboration
My blogs on collaborationMy blogs on collaboration
My blogs on collaboration
 
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
 
Tax Issues for Multinationals
Tax Issues for MultinationalsTax Issues for Multinationals
Tax Issues for Multinationals
 
Vendor comparisons: the end game in business intelligence
Vendor comparisons: the end game in business intelligenceVendor comparisons: the end game in business intelligence
Vendor comparisons: the end game in business intelligence
 
The Architecture for Rapid Decisions
The Architecture for Rapid DecisionsThe Architecture for Rapid Decisions
The Architecture for Rapid Decisions
 
The uses of pervasive intelligence
The uses of pervasive intelligenceThe uses of pervasive intelligence
The uses of pervasive intelligence
 
Financial Issues for Multinationals
Financial Issues for MultinationalsFinancial Issues for Multinationals
Financial Issues for Multinationals
 
City of south_miami_case_study
City of south_miami_case_studyCity of south_miami_case_study
City of south_miami_case_study
 
Vendor strategies: Operational Business Intelligence for Agile Enterprises
Vendor strategies: Operational Business Intelligence for Agile EnterprisesVendor strategies: Operational Business Intelligence for Agile Enterprises
Vendor strategies: Operational Business Intelligence for Agile Enterprises
 
Balanced scorecards: strategic performance management
Balanced scorecards: strategic performance managementBalanced scorecards: strategic performance management
Balanced scorecards: strategic performance management
 
Broadband Competitive Analysis
Broadband Competitive AnalysisBroadband Competitive Analysis
Broadband Competitive Analysis
 
Sarbanes Oxley: the architecture for operations risk management
Sarbanes Oxley: the architecture for operations risk managementSarbanes Oxley: the architecture for operations risk management
Sarbanes Oxley: the architecture for operations risk management
 
Information technologies for increasing fuel use efficiencies
Information technologies for increasing fuel use efficienciesInformation technologies for increasing fuel use efficiencies
Information technologies for increasing fuel use efficiencies
 
From CRM to Data Mining: Predictive Analytics for Precision Marketing
From CRM to Data Mining: Predictive Analytics for Precision MarketingFrom CRM to Data Mining: Predictive Analytics for Precision Marketing
From CRM to Data Mining: Predictive Analytics for Precision Marketing
 
Storage Area Networks and Wireless Applications
Storage Area Networks and Wireless ApplicationsStorage Area Networks and Wireless Applications
Storage Area Networks and Wireless Applications
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

My blogs on big data and cybersecurity in banks

  • 1. Revving data engines to chase cyber criminals By Kishore Jethanandani Banks are recognizing that speed is of the essence in nabbing cyber criminals. They need to ferret out lurking dangers on computers and corner criminals before their plots inflict damage. Big-data enabled anomalous pattern detection is widely recognized as the best practice for fraud prevention. The legacy data-warehouses and relational databases, however, were never designed for rapid storage and querying that is needed for real-time responses to criminal activity. Data-warehouses are batch processes and they take so long that most companies wait till after hours to transfer and load data into them. Relational databases were designed for structured data with an existing schema for organizing data in columns and rows. As the size of storehouses grows, the queries get larger and take ever more time to process. Paul Zolfaghar of ParAccel, speaking during a panel discussion, “Big Data: New Database Paradigms” at the Jefferies Global Technology, Internet, Media & Telecom Conference, said that some of his clients on Wall Street write 20,000 line SQL statements. In the time that it would take to process a query like that, the criminals would not only bolt but would be in hiding! Fraud detection is most effective when it parses both structured and unstructured information, including video, audio, images, social media feeds, email and more, to construct a rounded view of events and their relationships. While structured data volumes are growing slower than unstructured data, the utilization rates of unstructured data are much lower according to a survey by Freeform Dynamics in late 2012. Experts believe that unstructured data from social media sites provides a great deal more of insights. Banks are seeking to greatly increase the speed of data processing with a broader range of queries to extract information on criminal activity with Hadoop. The cornerstone of the Hadoop architecture is the use of a cluster of commodity servers and storage devices that house data without a pre-defined schema. Zion Bancorp, for example, formed a cluster of
  • 2. 30 nodes of servers and switches to process petabytes of data according to a report by Banktech. The time for queries has been drastically reduced with Big Data from four days to eight minutes according to Paul Zolfaghar at the conference cited above. Hadoop clusters are meant for simultaneous processing of multiple queries on as many data stores. These systems are akin to the Mapreduce architecture, used by search engines like Google, which sub-divide a larger repository according to a report by The Banker. Each of these data stores has a category of data that can be queried independent of other data stores. Since no specific schema is applied when the data is stored, it is possible to store and query both structured and unstructured data. Some early data suggests that the emerging architecture for fraud detection and response to cyber-criminals is effective. According to a survey by Financial Services Information Sharing and Analysis Center (FS-ISAC), there were an estimated 2.11 cyber-attacks per 1,000 commercial banking customers that compromised computers used for electronic bank transfers in 2012 compared to 3.42 in 2011. What’s more, in only 9% of the cyber- attacks the thieves were able to steal money compared to 70% in 2009 and 12% in 2011. One of the reasons attributed by the survey for the decline in losses from cyber-crime was the effort that banks are making to continuously track anomalous activity. The pressure for scrapping legacy bank systems is only going to grow as criminals become more adept at penetrating them. Banks can benefit from lower losses from crime but also other payoffs from the analysis of data for product development and customer retention. Big Brother’s all-seeing eyes for fraud By Kishore Jethanandani Big Data will save banks the embarrassment of being informed about security breaches much too late for their customers! They can now anticipate security vulnerabilities and respond in real time to prevent a potential loss of data with help from analytics.
  • 3. Security analyst Bernt Ostergaard, of industry analyst firm Current Analysis, reports in an interview to InfoRisk Today that those companies which have shifted to the new paradigm of security management experienced drops in losses from security breaches in 2011 compared to those in 2010. The hallmark of the new paradigm in security management is correlation of security events, such as an unusual increase in data traffic, with seemingly unrelated information such as a termination of the employment of a staff member in the bank. Specialists in data analytics for banks, such as FICO, ID Analytics, Opera Solutions and Global Analytics, have larger storehouses of information gathered from inside and outside the bank to find the correlations that enable them to spot lurking risks to banks. The traditional methods of securing banks from losses of data, such as authentication and encryption, have outlived their utility in a world where malware mutates into new forms before banks deal with known intrusions. The Anti-Phishing Working Group estimates that 39% of all computers are infected with financial malware that are typically placed on computers to steal account information. Identity thieves, masquerading as account holders, have increased the rate of takeover of online bank accounts at the rate of 150% per year according to numbers from Financial Services Information Sharing and Analysis Center and quoted by the American Banker magazine. A telling statistic, awkward for bank security managers, is the means by which banks become aware of a security breach. In 2012, banks were alerted to an intrusion by customers in 82% of the cases. This has increased from 76% of the cases in 2010 according to the 2012 Faces of Fraud Survey conducted by the Information Security Media Group. Banks can hardly mitigate losses when
  • 4. the criminals bolt from the scene of crime much before they even become aware of it! As mobile payments grow, banks are more vulnerable to security breaches. A 2011 Aite Group survey of 24 global financial executives found that 75% of them believe the mobile channel exposes them to fraud and security risks and 88% are convinced it will be the dominant source of fraud risk. Some of the traits of smart phones lend themselves to fraud. Due to a smaller screen, some of the telltale signs of a phishing attempt are missed by users. Mobile users are three times more likely than their PC counterparts to give away their personal information on suspicious websites according to a report by Bank Director Magazine. A survey of the Aite Group found that only 37% of the respondents in the banking industry have a security system that integrated their online and mobile channels. In the arms race against the bad guys, banks are better served if they give up the idea that it is even possible to build a security fortress. The bad guys are guerrillas who will always find their way inside. Big Data is akin to a counter- intelligence system able to spy on them and catch them in the act. Predictive Analytics: an eye for the Black Swan By Kishore Jethanandani Recurring outages in October and September of 2012 at Bank of America and five of the largest banks were a new normal of Bank IT disasters. Outages of up to 20 hours were experienced as traffic volumes zoomed to 65 Gbps. The distraction of a congested network is also the backdrop for fraudulent wire transfers.
  • 5. The symbolism was striking; the nation’s banks, the channel for payments to government employees and the military, were overwhelmed by the unprecedented magnitude of the disaster. Banks are increasingly susceptible to catastrophic disasters as cost-cutting compulsions drive them to virtualize their infrastructure that includes inter- connecting their sprawling data centers. In the latest wave of attacks, hackers created virtual clones of actual machines. They then used the IP addresses and related identity information of victims to masquerade as genuine customers in order attempt transfer of funds. A disruption in any of the servers, storage or cloud networks rapidly cascades throughout the virtual IT infrastructure. After the fact, banks find themselves overtaken by the momentum of disastrous events. Their one chance of minimizing the damage is to predict and pre-empt a disruption before it begins to snowball. Complexity has grown in data centers with increasing recourse to virtualization. More applications can be housed on a single server with virtualization. A 2012 Symantec survey of data centers found that the level of complexity in North American organizations is 7.81 (on a scale 1 to 10) compared to 6.15 for East Asian companies. The contributing factors are growing numbers of business critical applications, larger volumes of data, server virtualization, mobile and cloud computing. Companies have also made progress in switching to management tools that are more effective in the new world of virtualization. In 2011, there was a 16% increase in management tools, integrated with the virtualization
  • 6. platform, such as Virtual Machine Manager, Virtual Center Manager or XenCenter. These management tools ease the tedium of data gathering and manual reconfiguration of physical devices that was the norm before virtualization was widely adopted. Virtualization also enables aggregation of data as it affords visibility into the entire network. On the other hand, the ease of reconfiguration encourages companies to redeploy the physical devices for a variety of functions as needs change. The likelihood of an error and outages increases as the servers are switched to a variety of functions. On an average, companies endure a staggering 16 outages each year at a cost of $5.1 million and 11 of them are due to system failures. Increasingly, banks like other companies recognize that real-time data aggregation and predictive analytics is the key to realizing their most valued goal of increasing availability of their IT. Several companies, IBM-Tivoli, Netuitive and HP’s Service Health Analyzer among others incorporate predictive analytic solutions in their management tools. However, these management tools are not a substitute for the effort companies have to make to identify key performance indicators. Only they can extract the relevant data from their systems and choose the models that predict performance with the greatest degree of accuracy. This is the task that will preoccupy them in the coming years.