Page 592 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 592

warehouses contain large amounts of potentially sensitive information
               vulnerable to aggregation and inference attacks, and security

               practitioners must ensure that adequate access controls and other
               security measures are in place to safeguard this data. Second, data
               mining can actually be used as a security tool when it’s used to develop
               baselines for statistical anomaly–based intrusion detection systems.
               Data mining is used to “hunt” through large volumes of security-
               related data for anomalous events that could indicate an ongoing
               attack, compromise, or breach.



               Data Analytics

               Data analytics is the science of raw data examination with the focus of
               extracting useful information out of the bulk information set. The
               results of data analytics could focus on important outliers or
               exceptions to normal or standard items, a summary of all data items,

               or some focused extraction and organization of interesting
               information. Data analytics is a growing field as more organizations
               are gathering an astounding volume of data from their customers and
               products. The sheer volume of information to be processed has
               demanded a whole new category of database structures and analysis
               tools. It has even picked up the nickname of “big data.”

               Big data refers to collections of data that have become so large that

               traditional means of analysis or processing are ineffective, inefficient,
               and insufficient. Big data involves numerous difficult challenges,
               including collection, storage, analysis, mining, transfer, distribution,
               and results presentation. Such large volumes of data have the potential
               to reveal nuances and idiosyncrasies that more mundane sets of data

               fail to address. The potential to learn from big data is tremendous, but
               the burdens of dealing with big data are equally great. As the volume
               of data increases, the complexity of data analysis increases as well. Big
               data analysis requires high-performance analytics running on
               massively parallel or distributed processing systems. With regard to
               security, organizations are endeavoring to collect an ever more
               detailed and exhaustive range of event data and access data. This data
               is collected with the goal of assessing compliance, improving

               efficiencies, improving productivity, and detecting violations.
   587   588   589   590   591   592   593   594   595   596   597