Ask a question to Desklib · AI bot


Big Data Analytics and Cyber Security: An Overview

Added on -2019-09-23

This article discusses the implications of big data analytics on cyber security and how it can be used to enhance the five pillars of information assurance: availability, integrity, authentication, confidentiality, and non-repudiation. It also highlights the benefits and risks of using big data analytics in the field of cyber security.
| 5 pages
| 1514 words

Trusted by 2+ million users,
1000+ happy students everyday

Big Data Analytics IntroductionBig data analytics is buzzword for the security industries to innovate and develop the robust andintelligent defensive solution for the cyber security. Big data is defined as the data having theproperties of velocity, veracity, variety. Big data is generated in millions of bytes per second sothat it contains every piece of information. Big data analytics is showing the abundant scope toimprove the cyber security. The data analyst of the industries gains the confidence by big dataanalytics to develop more effective solution for the security risks and problems. There is need ofthe risk management and intelligent action oriented technique to provide the accurate and timelysolution for the security issues and the problems associated with the cyberspace. The riskmanagement and assessment by big data analytic become more proper and accurate. This corebenefit of this technology boosts the security industries to adopt this technology to develop morerobust and cost effective solutions for securing the assets of the information system of anorganization. The competitive environment of the innovation and development of the latest toolsand technology are more powerful for the identification, assessment and defining the coresecurity system with planned feasibility (Hopkins, Brian & Boris Evelson, 2008). There are so many positive and negative implications of the selected technology such as big dataanalytics upon the cyber security. The security experts states that the big data analytics can beused to develop robust and efficient security systems. These experts also states that the cybercriminals may use this technology to find out the attack mechanism to break any incorporatedsecurity defensive mechanism. Big Data Analytics and Five Pillars of Information AssuranceThe five pillars of information assurance in the cyberspace of an information system and Itsusers are availability, integrity, authentication, confidentiality and non repudiation. These all arethe security and privacy systems requires to be addressed by robust security analysis platform todetermine the effective solution of any circumstance of the security breaches and categorizedcyber attacks.
Risk management includes the risk identification, risk assessment, and risk mitigation. Thesethree pillars of risk management by the help of big data analytics are efficiently carried out. The AvailabilityAvailability is very common term in the field of information security and cyber security.Availability of systems and information plays very important role for the business andconsumers to be functional all the time. Big data analytics technology provides an powerfulenvironment to identify the risks and vulnerabilities of the system and information in cyberspace.The historical figures of the security breaches related with the availability services are focusedwith the data analysis to predict the future trends of the attack vectors through the risk andvulnerability. This process brings the actual reasons and circumstances of the attacks andunwanted situation with the cyber security. IntegrityIntegrity is another services for the cyber security. Data integrity and mechanisms used tomaintain the integrity of data and information can be so intelligent to manage the integrityservices effectively. Big data analytics technology provides the platform to make analytics of thedata and its tools to enforce the integrity services in the field of cyber security. One of the mostcommon factor of integrity violation such as alteration of vital information either communicatingthrough the public network or stored in storage repository. This problem can be optimized bydeveloping such a analyzed solution that can enhance the security related with data integrity. Foran effective policy of cyber security can deal with the effective solution to ensure the integrity ofdata with a less probability of violation. The system should so intelligent to catch the maliciousactivity that to report the originator of data for occurring the violation (Wang, We, Srivatsa,Duan, & Du, 2017). Big data analytics proposes the definition of effective algorithm byexploring the analytical framework of the data integrity requirements.AuthenticationAuthentication is one of the common security method employed to authenticate or verify theusers of the system. The system provides access interface only for those users who areauthenticated by the system. Authentication service only provides the services related with the

Found this document preview useful?

You are reading a preview
Upload your documents to download
Become a Desklib member to get accesss

Students who viewed this