6050_Week3 Discussion Board

docx

School

Strathmore University *

*We aren’t endorsed by this school

Course

389

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by DukeMinkMaster907

Report
1 WEEK 3 DISCUSSION Week 3 Discussion Can a big data approach support or argument the current “defense-in-depth” approach? The benefits of big data approach in the private sector are well-known. At the same time, the public sector and the defense sector are increasing the big data approach in improving their efficiency and effectiveness. We are at a time when defense is acutely important and, therefore, big data approach can significantly help in supporting defense-in-depth approach by analyzing important data to provide more accurate cybersecurity insights (Begovic, 2015). With big data approach, organizations can efficiently analyze volumes of data which supports defense-in-depth by enabling organizations in detecting early signs and indications that their information assets are being threatened and that something needs to be done. Additionally, because of functions like cross-media engines associated to big data approach, organizations are able to analyze large amounts of data through which the organization will know and understand threats to their clients’ reputation. Big data approach also provides information for movements and plans of known cybersecurity threats (Begovic, 2015). What are the limits of the big data approach? The principle on which big data approach is founded is simple – with the increased ability for organizations to generate and store large datasets from their activities, it is no longer necessary for organizations to analyze data from representative samples. Principally, organizations can easily analyze the existing data as opposed to guessing (DynamicWeb, 2015). While this approach has been beneficial, it also has some limits. These limits are false positives, sampling bias, and sampling error. For example, when use in cybersecurity, because of false positives, it can trigger wrong cybersecurity measures on which an organization could waste
2 WEEK 3 DISCUSSION resources like time and money. In the same way, sampling error could result in the organization analyzing wrong indications from the wrong data (DynamicWeb, 2015). References Begovic, K. (2015). Applying Big Data Analytics to Defense in Depth . https://www.linkedin.com/pulse/applying-big-data-analytics-defense-depth-kenan- begovic?trk=portfolio_article-card_title DynamicWeb. (2015). What Your Data Isn’t Telling You: The Limits of Big Data . https://dynamicweb.com/resources/insights/blog/what-your-data-isnt-telling-you-the- limits-of-big-data
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help