INFORMATION SECURITY AND BIG DATA ANALYTICSSentinel Africa
Current technologies pose different challenges towards solving information security. One of the greatest hacks towards solving cybersecurity risks is by deployment of technologies sufficient to manage the data as one of the vital components for any organization regardless of their size.
84% of businesses that use big data managed to block cyber-attacks, according ISACA “How big data is helping Cybersecurity” What was their secret? Three words: big data analytics.
Organizations implement Information management systems to cater for their information security needs such as confidentiality, integrity, and availability. This is the most vital component for any party, Whether corporate or individual.
Initially, the aim of analysing such data was to make data-driven decisions and determine customer preferences to improve operational efficiency and enhance client satisfaction. But now, it is used to as a tool to strengthen measures against cybercrime. This is through analysing historical data to come up with better security threat controls.
Ranging from capacity management, incident management, logging and monitoring are aspects of cybersecurity that depend on data. Every asset creates data and hence the ability to understand, analyze, monitor, and manage data will help solve 90% of the cybersecurity issues. This will improve the value of the asset by through various visualizations and making data driven decisions. Data is the new gold!
While it’s true cyber-criminals do target big data while formulating their attacks, organizations can use the same data against them through data analytics and machine learning.
Data analytics follows the cycle below to assist organizations business analysts and cyber analysts provide meaningful insights towards the strategic goal of any organization in an information security perspective.
- Data discovery and formation requires an understanding of the business and the associated risks.
- Data preparation-Prepare data to ensure integrity, the garbage in garbage out concept comes in handy.
- Design a model-Design rules to assist capture meaningful insights.
- Build the model.
- Communicate results.
- Measure the effectiveness/Operationalize.
Think big on cyber security, Think Data
Mary Njoroge, Senior Consultant
References: ISACA Author: Ken Lynch, CEO and Founder of Reciprocity, Inc.
Date Published: 27 November 2019