In use case 1 Finance the security of the non relational databases were

In use case 1 finance the security of the non

This preview shows page 24 - 27 out of 30 pages.

In use case 1 (Finance) the security of the non-relational databases were provided by the Big Data System. In the two other use cases (Telecom and Energy smart meters) non-relational databases were secured by a third party system, through additional configuration in the Big Data System. Big Data monitoring and logging Enable logging on nodes participating in the Big Data computation Enable logging on databases (relational or not) , as well as Big Data applications Detect and prevent modification of logs Regularly test the restoration of Big Data backups considering the vast amount of data being used in the system Access control and authentication Use authentication and authorization to ensure that Big Data queries are executed by authorized users and entities only Use components in the Big Data system that follow same security standards to maintain the desired level of security
Image of page 24
Big Data Security December 2015 25 Following our analysis the table represent the challenges associated with their mitigation measures: CHALLENGES/ MITIGATION MEASURES ENCRYPTION SECURITY TESTING AND CODE AUDITING CERTIFICATION STANDARDS RISK ASSESSEMENT SOURCE FILTERING ACCESS CONTROL AND AUTHENTICATION MONITORING AND LOGGING Source validation and Filtering Yes Yes Yes Yes Yes Yes Secure computation Yes Yes Yes Yes Yes Yes Access control and authentication Yes Yes Yes Yes Yes Secure Data Management Yes Yes Yes Yes Infrastructure security Yes Yes Yes Yes Yes Supply chain security Yes Yes Yes Application software security Yes Yes Yes Trustworthiness of devices Yes Yes Yes Interoperability of applications Yes Yes Yes Secure Use of Cloud computing Yes Yes Yes Yes Yes Yes Distributed Denial of Service Attacks Yes Yes Yes From our analysis it seems that Security Testing Procedures could be one of the mitigation measure that is key for ensuring proper security controls. Authentication mechanisms, and use of devices and applications with secure standards or certification, are the next key mitigation measures that must be employed.
Image of page 25
Big Data Security December 2015 26 5. Recommendations In this section this report provides a list of recommendations addressed to the organizations considering to adopt or that already have adopted Big Data systems based on the analysis of the security challenges and use cases described above. Recommendation 1: Policy makers should focus on providing guidance for secure use of Big Data systems in the critical sectors. Due to the distributed nature of this business model and to the interdependencies with other systems, especially in the case Big Data support critical systems, the policy makers and all experts involved in publishing guidelines should take a holistic approach towards Big Data security. When the implementation supports systems vital to the well- being of the society then the security threat analysis and risk assessment should be done in each component separately follow a top-down approach.
Image of page 26
Image of page 27

You've reached the end of your free preview.

Want to read all 30 pages?

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes