Big Data Analytics Applied in the Security WorldAs a former federal agent, I worked with police departments using “big data” for such activities as hotspot identification, crime mapping, geospatial prediction, and social network analysis. With this data, we were able to anticipate localized crime spikes, impact city and neighborhood planning, and aid in investigator management decisions. For instance, an increase in criminal activity in a particular area, highlighted by crime mapping, meant more patrolmen needed to be deployed in a particular area. You can imagine the sensitivity of the data we collected, and we definitely did not want the data to end up in the wrong hands.
How Your Company Can Leverage Big Data AnalyticsBig data analytics can help you to harness your organization’s data to identify and pave the way for new opportunities. It can lead to smarter business decisions and make operations more efficient, while increasing customer satisfaction and driving higher profits. But, with the growing excitement surrounding big data comes the need to access, manipulate, massage, transform and unpack all of the information at once.
Access Management Challenges of Big DataAccess to this vast amount of data needs to be controlled. Many organizations are failing to properly secure their sensitive data in big data environments. We’re seeing the results of this failure in the form of a vast increase data breaches and the diminishment of privacy, frequently accompanied by huge fines and decreased public trust. As your information needs continue to grow and change, you need a method to secure your big data. And, that is one area where privileged access management, or PAM, becomes important. Various questions come into play, such as:
- Who needs access to your big data?
- Is it part of their job description?
- What compliance issues need to be addressed when they access it?
- Can and should it be accessed remotely, or only onsite?
- What other data is being introduced into the mix?
- How much can your user's access?
- How long will they need access?
- How can you restrict access to just certain portions of a dataset?
How Privileged Access Management Helps Secure Big DataPAM solutions enable the creation of a secure, streamlined method to authorize and monitor all privileged users for all your relevant systems that store your big data. PAM solutions allows you to:
- Monitor privileged account access in real time and block or flag activities that are suspicious.
- Grant privileges to users only for systems on which they are authorized.
- Grant access only when it’s needed and revoke access when the need expires.
- Centrally and quickly manage access across all of your systems.
- Create an audit trail of privileged operations.
Derek A. Smith, Founder, National Cybersecurity Education Center
Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently an IT Supervisor at the Internal Revenue Service. He is also owner of The Intercessors Investigative and Training Group (www.theintercessorgroup.com). Formerly, Derek worked for several IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He is also a cyber security professor at the University of Maryland, University College and Virginia University of Science and Technology and has taught for over 25 years. Derek is retired from the US Army and also served in the US Navy, and Air Force for a total of 24 years. He is completing his Doctorate Degree in Organizational Leadership and has completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education. Derek has written several books including Cybersense: The Leaders Guide to Protecting Critical Information, and its companion workbook, and he has contributed to several other books as an author and technical adviser.