Big data encryption: do it right from the start to reduce risk

Big data encryption: do it right from the start to reduce risk

Big data encryption: do it right from the start to reduce risk

Previously, only large entities such as governments and larger enterprises, could afford the massive infrastructure necessary for hosting and mining big data. Now as the technology become more powerful and affordable, big data use cases are expanding rapidly in numerous industries. Like many new technologies, big data presents numerous challenges as well as opportunities.

Many organizations are struggling with the question of what to do with the data. Analyzing big data in order to reveal insights that can improve decision making and business operations is a growing challenge. Rather than relying on humans analysts, machine learning and cognitive computing are increasingly being leveraged to make sense of big data.

The Cloud Security Alliance “Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy” states that security vulnerabilities are compounded by the diversity of big data sources and formats, the streaming nature of data acquisition, and the transmission of data between distributed cloud infrastructures. The large volume of big datasets also results in large attack surfaces.

Read Also:
Business Intelligence ROI: 5 Critical Ways to Show BI Value

In other words, the very attributes that define big data are the same attributes that contribute to security vulnerabilities: volume, variety, and velocity.

Utility and privacy of data often work in opposition. Leaving data free and open for all certainly can enable all interested parties to access and utilize the data to its greatest advantage. But, of course, this is not an option. Fortunately a reasonable balance between enabling necessary access while restricting unauthorized access is possible.

Securing and encrypting big data is a big challenge. The Gemalto 2015 Breach Level Index showed a continuing failure among many organizations to prevent data breaches and actually protect their information assets of all sizes.

According to The Big Data Security and Privacy Handbook, “Traditional security mechanisms tailored to secure small-scale, static data on firewalled and semi-isolated networks are inadequate.”

Security shouldn’t hurt performance and cause lag times. After all, velocity is one of the characteristics that define big data.

Read Also:
How to move beyond digital transformation

Often big data use cases involve public data such as traffic patterns and residency stats. Anonymizing the data is a common solution. Unfortunately, it’s simply inadequate.

Much like perimeter security is no longer adequate to secure an organization’s IT assets, big data has also outgrown the tactics used at the dawn of its time.

 



Chief Analytics Officer Europe

25
Apr
2017
Chief Analytics Officer Europe

15% off with code 7WDCAO17

Read Also:
How smart storage will rescue big data

Chief Analytics Officer Spring 2017

2
May
2017
Chief Analytics Officer Spring 2017

15% off with code MP15

Read Also:
Looker flouts conventional wisdom in making data lakes accessible

Big Data and Analytics for Healthcare Philadelphia

17
May
2017
Big Data and Analytics for Healthcare Philadelphia

$200 off with code DATA200

Read Also:
How to move beyond digital transformation

SMX London

23
May
2017
SMX London

10% off with code 7WDATASMX

Read Also:
Engineers Smash Record for Fiber Optic Data Transmission With New Kind of Laser
Read Also:
3 ways AI will change project management for the better

Data Science Congress 2017

5
Jun
2017
Data Science Congress 2017

20% off with code 7wdata_DSC2017

Read Also:
Artificial Intelligence Poised To Revolutionise Media Agency Structure

Leave a Reply

Your email address will not be published. Required fields are marked *