You are previewing Big Data Analytics: Turning Big Data into Big Money.

Big Data Analytics: Turning Big Data into Big Money

Cover of Big Data Analytics: Turning Big Data into Big Money by Frank J. Ohlhorst Published by John Wiley & Sons
  1. Cover
  2. Contents
  3. Title
  4. Copyright
  5. Preface
  6. Acknowledgments
  7. Chapter 1: What is Big Data?
    1. The Arrival of Analytics
    2. Where is the Value?
    3. More to Big Data Than Meets the Eye
    4. Dealing with the Nuances of Big Data
    5. An Open Source Brings Forth Tools
    6. Caution: Obstacles Ahead
  8. Chapter 2: Why Big Data Matters
    1. Big Data Reaches Deep
    2. Obstacles Remain
    3. Data Continue to Evolve
    4. Data and Data Analysis are Getting More Complex
    5. The Future is Now
  9. Chapter 3: Big Data and the Business Case
    1. Realizing Value
    2. The Case for Big Data
    3. The Rise of Big Data Options
    4. Beyond Hadoop
    5. With Choice Come Decisions
  10. Chapter 4: Building the Big Data Team
    1. The Data Scientist
    2. The Team Challenge
    3. Different Teams, Different Goals
    4. Don’t Forget the Data
    5. Challenges Remain
    6. Teams versus Culture
    7. Gauging Success
  11. Chapter 5: Big Data Sources
    1. Hunting for Data
    2. Setting the Goal
    3. Big Data Sources Growing
    4. Diving Deeper into Big Data Sources
    5. A Wealth of Public Information
    6. Getting Started with Big Data Acquisition
    7. Ongoing Growth, No End in Sight
  12. Chapter 6: The Nuts and Bolts of Big Data
    1. The Storage Dilemma
    2. Building a Platform
    3. Bringing Structure to Unstructured Data
    4. Processing Power
    5. Choosing among In-house, Outsourced, or Hybrid Approaches
  13. Chapter 7: Security, Compliance, Auditing, and Protection
    1. Pragmatic Steps to Securing Big Data
    2. Classifying Data
    3. Protecting Big Data Analytics
    4. Big Data and Compliance
    5. The Intellectual Property Challenge
  14. Chapter 8: The Evolution of Big Data
    1. Big Data: The Modern Era
    2. Today, Tomorrow, and the Next Day
    3. Changing Algorithms
  15. Chapter 9: Best Practices for Big Data Analytics
    1. Start Small with Big Data
    2. Thinking Big
    3. Avoiding Worst Practices
    4. Baby Steps
    5. The Value of Anomalies
    6. Expediency versus Accuracy
    7. In-Memory Processing
  16. Chapter 10: Bringing it All Together
    1. The Path to Big Data
    2. The Realities of Thinking Big Data
    3. Hands-on Big Data
    4. The Big Data Pipeline in Depth
    5. Big Data Visualization
    6. Big Data Privacy
  17. Appendix: Supporting Data
    1. “The MapR Distribution for Apache Hadoop”
    2. “High Availability: No Single Points of Failure”
  18. About the Author
  19. Index
O'Reilly logo

Chapter 7

Security, Compliance, Auditing, and Protection

The sheer size of a Big Data repository brings with it a major security challenge, generating the age-old question presented to IT: How can the data be protected? However, that is a trick question—the answer has many caveats, which dictate how security must be imagined as well as deployed. Proper security entails more than just keeping the bad guys out; it also means backing up data and protecting data from corruption.

The first caveat is access. Data can be easily protected, but only if you eliminate access to the data. That’s not a pragmatic solution, to say the least. The key is to control access, but even then, knowing the who, what, when, and where of data access is only a start.

The second caveat is availability: controlling where the data are stored and how the data are distributed. The more control you have, the better you are positioned to protect the data.

The third caveat is performance. Higher levels of encryption, complex security methodologies, and additional security layers can all improve security. However, these security techniques all carry a processing burden that can severely affect performance.

The fourth caveat is liability. Accessible data carry with them liability, such as the sensitivity of the data, the legal requirements connected to the data, privacy issues, and intellectual property concerns.

Adequate security in the Big Data realm becomes a strategic balancing act among these caveats along with ...

The best content for your career. Discover unlimited learning on demand for around $1/day.