6050_Week 3-Discussion Board
docx
keyboard_arrow_up
School
Strathmore University *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
2
Uploaded by DukeMinkMaster907
1
WEEK 3 DISCUSSION
Week 3 Discussion
Can a big data approach support or argument the current “defense-in-depth” approach?
We are in the age of big data and, therefore, organizations should always know that
cybersecurity is not an end state or a one-off project. Instead, cybersecurity is a work in progress
that should be constantly improved. At the same time, organizations should maintain the right
mindset. This means that it is important that organizations take a diligent, responsible approach
to securing data. This approach is the defense-in-depth approach which can be significantly
supported by big data approach. The way in which big data approach helps defense-in-depth is in
detective. With big data approach, an organization can easily identify anomalous security
behavior. For example, with big data approach, an organization can easily audit activities in the
database, closely monitor systems and networks, and provide compliance reports and alerts about
potential cybersecurity problems. This helps in enhancing cybersecurity in an organization and
improving the defense-in-depth approach (Insights, 2015).
What are the limits of the big data approach?
By now, the advantages and benefits of big data approach are well known. With big data
approach, an organization can make draw inferences from large datasets which consequently
help in identifying hidden patterns and trends. While this is advantageous, there are also limits
associated with big data approach (Sellman, 2021). A major limitation is finding meaningful
correlations in the data being analyzed. With big data approach, the pool of data that is worked
with is so large which could be difficult sometimes to sift through. Additionally, when working
with such data, there is a possibility of many correlations that one could make between different
data variables. However, making such correlations will not mean that one will have made
2
WEEK 3 DISCUSSION
something significant and there is a possibility of the relationships between variables being
insignificant (Sellman, 2021).
References
Insights, M. T. (2015).
Big Data, Big Security: Defense in Depth
.
https://www.technologyreview.com/2015/07/20/167100/big-data-big-security-defense-in-
depth/
Sellman, J. (2021).
What Are the Limitations of Big Data for Marketers?
https://medium.com/marketing-in-the-age-of-digital/what-are-the-limitations-of-big-data-
for-marketers-5b0eae79c234
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help