Analyzing Big Data

Blog Date: 3/11/2013
Author: Ray Coulombe

As our information world continues to generate an unfathomable amount of stored data, a surprisingly common term has been coined to describe this expanding mass ...BIG...or Big Data to be accurate. How big is big, one asks? The answer: big enough that conventional data structures and analysis cannot effectively deal with it. IBM calculates that, every day, 2.5 quintillion bytes (that’s a million trillion bytes, or exabytes) of new data is created. They further estimate that, by 2020, the amount of digital information created and replicated in the world will grow to 35 trillion gigabytes. Some of this data is highly structured (e.g. financial information) and other data, such as IP video, is unstructured. The science of big data has given rise to a new job title, data scientist, i.e., one who can scientifically and creatively make sense of all of this.
On January 30, RSA, The Security Division of EMC Corporation, announced the release of RSA® Security Analytics, described as “a transformational security monitoring and investigative solution designed to help organizations defend their digital assets against today’s most sophisticated internal and external threats.” The fact that techniques used to compromise information security are used on a broad basis creates the potential to spot trends and threats if sufficient data can be captured, correlated and analyzed. The RSA product combines external threat intelligence with an analysis of internal traffic down to the packet level to feed an analytics and reporting engine that enables network security visibility, actionable intelligence, and investigative capability on another level. Logs and packets are captured by a decoder appliance that collects, reassembles and normalizes traffic at OSI Layers 2-7. The RSA Investigation module has a patented metadata framework of organizing the data (e.g., nouns, verbs, etc.) in a way that supports timely investigation.
On January 31, IBM announced IBM Security Intelligence with Big Data which, the company says, combines “leading security intelligence with big data analytics capabilities for both external cyber security threats and internal risk detection and prevention”. This is achieved by “analyzing structured, enriched security data alongside unstructured enterprise data” and “helps find malicious activity hidden deep in the masses of an organization’s data.” Structured data includes alerts from security devices, operating system logs, DNS transactions and network flows, while unstructured data could be emails, social media interactions, full packet information or business transactions. In their announcement, IBM specifically mentioned the vulnerabilities due to inside threats.
The same types of big data analysis techniques that are inherent in products like RSA’s and IBM’s can be used to provide additional insights into patterns of crime and potential physical security vulnerabilities. In law enforcement, efforts such as predictive policing and intelligence-led policing (ILP) have evolved, based on methodologies for assembling data from disparate sources and tools such as GIS, applying analysis, and using the results to guide decision making. In moving from a reactive mode to proactive, the hoped for result is effective anticipation, leading to the prevention or response to predicted crime. As these techniques become more refined and proven effective, the increasingly limited dollars available for public safety can be better targeted, including risk-based deployment of resources. There appears to be no shortage of data or statistics, but, until now, these predictive efforts have been limited by available analysis techniques, hindering law enforcement’s ability to interpret and use the data. It is easy to see how big data analytics will also be a major tool in fighting fraud, credit card theft, and identity theft. This will no doubt encompass access control data, both physical and network and ultimately affect the way Physical Security Information Management (PSIM) systems are implemented.
Link to Complete Article as it appeared in Security Technology Executive Magazine

 

Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe
RFS Article Image

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

RFS Article Image

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

RFS Article Image

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

RFS Article Image

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

RFS Article Image

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->