6050_Week3 Discussion Board
docx
keyboard_arrow_up
School
Strathmore University *
*We aren’t endorsed by this school
Course
389
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
2
Uploaded by DukeMinkMaster907
1
WEEK 3 DISCUSSION
Week 3 Discussion
Can a big data approach support or argument the current “defense-in-depth” approach?
The benefits of big data approach in the private sector are well-known. At the same time,
the public sector and the defense sector are increasing the big data approach in improving their
efficiency and effectiveness. We are at a time when defense is acutely important and, therefore,
big data approach can significantly help in supporting defense-in-depth approach by analyzing
important data to provide more accurate cybersecurity insights (Begovic, 2015). With big data
approach, organizations can efficiently analyze volumes of data which supports defense-in-depth
by enabling organizations in detecting early signs and indications that their information assets are
being threatened and that something needs to be done. Additionally, because of functions like
cross-media engines associated to big data approach, organizations are able to analyze large
amounts of data through which the organization will know and understand threats to their clients’
reputation. Big data approach also provides information for movements and plans of known
cybersecurity threats (Begovic, 2015).
What are the limits of the big data approach?
The principle on which big data approach is founded is simple – with the increased
ability for organizations to generate and store large datasets from their activities, it is no longer
necessary for organizations to analyze data from representative samples. Principally,
organizations can easily analyze the existing data as opposed to guessing (DynamicWeb, 2015).
While this approach has been beneficial, it also has some limits. These limits are false positives,
sampling bias, and sampling error. For example, when use in cybersecurity, because of false
positives, it can trigger wrong cybersecurity measures on which an organization could waste
2
WEEK 3 DISCUSSION
resources like time and money. In the same way, sampling error could result in the organization
analyzing wrong indications from the wrong data (DynamicWeb, 2015).
References
Begovic, K. (2015).
Applying Big Data Analytics to Defense in Depth
.
https://www.linkedin.com/pulse/applying-big-data-analytics-defense-depth-kenan-
begovic?trk=portfolio_article-card_title
DynamicWeb. (2015).
What Your Data Isn’t Telling You: The Limits of Big Data
.
https://dynamicweb.com/resources/insights/blog/what-your-data-isnt-telling-you-the-
limits-of-big-data
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help