Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Big Data and Cyber Security:

Threat or Opportunity?

Michel Mbayed
Cybersecurity Big data and cyber security are here. For most organizations, this entails both
opportunity and risk. If you work in cyber security, you're probably familiar with

and the term "big data," which refers to an extremely large data set that is mined and
analyzed for patterns and behavioral trends. It is characterized by a high density

Big Data of variety, velocity, and volume. Big data has opened up new possibilities in
terms of analytics and security solutions for protecting data and preventing
future cyber assaults from the perspective of cyber security.
#1 What is Big Data?

#2 What challenges do cybersecurity experts face?


Big Data and
Cyber Security:
Threat or
Opportunity? #3 Big data – is it a threat or a blessing?

#4 Anomaly Based IDS


What is Big Data?

Put simply, big data can be defined as a huge


amount of structured and unstructured
information that because of its large size,
cannot be processed using traditional
database and software techniques. It has
become increasingly utilized by companies as
a way of discovering patterns and trends in
behaviour, while it also allows for advanced
threat detection and machine learning.
What challenges do
cybersecurity experts
face?

Daily, countless sensitive


records are processed by
businesses across the
globe. If this information
was to end up in the wrong
hands, the consequences
could potentially be
disastrous
CYBER RISK: IN NUMBER
(From May 2006 – June 2020)

USA India South Korea

156 23 18
47 21 16

UK Germany Australia
Latest Data
Breach
• City of Grass Valley,
California, suffers data
breach – employee and
citizen information
exposed
Social Security numbers and
medical information has
been accessed, revealing
that the malicious actor had
transferred files outside of
the city’s network, including
the financial and personal
information of “individuals
associated with Grass
Valley”.
Big data – is it a
threat or a blessing?

• Optimizing cybersecurity
should be high up on the
priority list of any
business in the digital age,
as not having the correct
tools could possibly spell a
catastrophe.

• Big data technology is


becoming used by more
and more businesses
around the world, as it
helps them to fend off any
potential attacks from
hackers prior to them
happening.
TOP FIVE CYBER SECURITY TIPS

#1
Secure Access Service Edge
SASE is a cloud-based software that virtually merges everything into a single
secured network. Instead of using various tools to keep your security strong,
this software brings everything together to make it more manageable.

#2 Implement Cybersecurity Policies


These policies help keep sensitive data related to the business and
any clients private and secure to help reduce the risk of information
getting into the wrong hands.

#3 Keep Everyone Trained and Informed


Even though over half of the data breaches found in the Verizon
report were from outside perpetrators, many data breaches also
come from internal factors and human error.

#4
Install Firewall Protection
Your firewall also needs to be updated regularly to ensure
and holes in your security rea patched.

#5
Use Multi-Factor Authentication
Multi-factor authentication is an extra security step on top o a
password. It could be a second password, a fingerprint or facial
recognition, or an access card of chip the employee must enter.
LATEST DATA BREACHES AND THREATS
(According to Portswigger)

VMware Horizon under


Moodle attack as China-based
e-learning Log4j
ransomware group targets
Log4j vulnerability
platform 11 January
-Microsoft says cybercrime
12 January
group is attempting to
deploy NightSky
ransomware
Moodle e-learning platform patches session hijack bug
that led to pre-auth RCE. Multiple vulnerabilities in
-Researchers disclose second critical flaw in Microsoft Teams could
authentication plugin spoof URLs, leak IP
addresses
MS Teams -Only one of the issues has
22 December so far been patched
Big Data Usage

• Scrutinizing Network
Traffic: Data Analytics in
Cyber Security help you to
acquire a glimpse of your
network traffic and thus
provide you with the ability to
identify any kind of network
anomaly. Simultaneously, you
can also use cloud security
tools in order to perceive
threats in the cloud
environment.
Big Data
Usage

• Detection of Insider Threats: Data


breach or leakage can also be an
intentional act of malicious insiders
who possess access to sensitive data
in the form of network credentials.
Data Analytics Cyber Security tools
can be utilized for sensing insider
threats through keeping tabs on such
activities as abnormal email usage,
unsanctioned database requests,
unusual login times and so on.
Anomaly Based IDS

Big Data Anomaly-based IDS


Anomaly Based
IDS

In an anomaly-based intrusion detection


system, the behavior of the network is
first examined to:
• Find dynamic patterns
• Automatically create a data-driven
model
• Profile the normal behavior
• Detects deviations in the case of any
anomalies
Thus, anomaly-based IDS can be treated
as a dynamic approach, which follows
behavior-oriented detection.
How it works
Conclusion

• Big data analysis can be hugely


beneficial for companies through the
detection of growth and
performance insights which can help
to drive a business forward.
• Big data is also arguably the best
way forward when it comes to
cybersecurity, as detecting threats at
the earliest possible opportunity is
now easier than ever before.
• Big data undoubtedly has its plus
points for any business needing to
process large volumes of data on a
regular basis.
THANK
YOU

You might also like