6050_Week 3-Discussion Board

docx

School

Strathmore University *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by DukeMinkMaster907

Report
1 WEEK 3 DISCUSSION Week 3 Discussion Can a big data approach support or argument the current “defense-in-depth” approach? We are in the age of big data and, therefore, organizations should always know that cybersecurity is not an end state or a one-off project. Instead, cybersecurity is a work in progress that should be constantly improved. At the same time, organizations should maintain the right mindset. This means that it is important that organizations take a diligent, responsible approach to securing data. This approach is the defense-in-depth approach which can be significantly supported by big data approach. The way in which big data approach helps defense-in-depth is in detective. With big data approach, an organization can easily identify anomalous security behavior. For example, with big data approach, an organization can easily audit activities in the database, closely monitor systems and networks, and provide compliance reports and alerts about potential cybersecurity problems. This helps in enhancing cybersecurity in an organization and improving the defense-in-depth approach (Insights, 2015). What are the limits of the big data approach? By now, the advantages and benefits of big data approach are well known. With big data approach, an organization can make draw inferences from large datasets which consequently help in identifying hidden patterns and trends. While this is advantageous, there are also limits associated with big data approach (Sellman, 2021). A major limitation is finding meaningful correlations in the data being analyzed. With big data approach, the pool of data that is worked with is so large which could be difficult sometimes to sift through. Additionally, when working with such data, there is a possibility of many correlations that one could make between different data variables. However, making such correlations will not mean that one will have made
2 WEEK 3 DISCUSSION something significant and there is a possibility of the relationships between variables being insignificant (Sellman, 2021). References Insights, M. T. (2015). Big Data, Big Security: Defense in Depth . https://www.technologyreview.com/2015/07/20/167100/big-data-big-security-defense-in- depth/ Sellman, J. (2021). What Are the Limitations of Big Data for Marketers? https://medium.com/marketing-in-the-age-of-digital/what-are-the-limitations-of-big-data- for-marketers-5b0eae79c234
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help