Getting to grips with Big Data security

Davey Winder asked the big security questions about Big Data and has found experts with the answers...

"In 2005 there were an estimated 1.3 billion RFID tags used in numerous businesses to monitor assets, as of last year this has risen to over 30 billion all of which are generating data points," Jopling says.

With such a huge increase in instrumented devices, this results in great potential attack vectors with the emergence of greater and more sensitive data from devices such as smartphones.

"As a further example, in 2012 there was a 19 per cent increase in attack tools for mobile devices with over 4400 new security vulnerabilities across all spectrums according to the IBM 2012 X Force Trend & Risk Report," he adds.

Where Big Data really becomes a problem for the enterprise is when it is unstructured. Take, for example, anything on the desktop or shared areas such as SharePoint where the data is best described as being freeform in nature. The enterprise just doesn't have any way of knowing the value of this data, compared to structured systems such as SAP or a payroll system where decisions can be taken sensibly, and securely, as there is access to the data that is involved.

Advertisement - Article continues below
Advertisement - Article continues below

"The problem is that people focus on the big easily understandable systems, forget that a lot of the valuable stuff is unstructured and go ahead using a one size fits all policy," warns Martin Sugden, CEO of data security software firm Boldon James.

So what are the specific security challenges that Big Data brings to the enterprise? Lior Arbel, CTO at Performanta, thinks of these in terms of the 'Three V's' namely: Volume, Variety and Velocity.

"The volume of data an organisation needs to manage poses the risk that data will end up where it shouldn't, and the greater the amount of data the less visibility the user has of where it goes," Arbel says.

"The variety of data that an organisation deals with demands complex systems of organisation with a flexible system of control to comply with regulations, and to securely protect intellectual properties and finally the velocity (or demand for data) knows no bounds as patience no longer exists in the digital world with data needing to be available at any moment."

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now

Most Popular

data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
cyber security

If not passwords then what?

8 Jan 2020
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020