SlideShare a Scribd company logo
Big Data Analytics
Ben Fountain
May 2016
2
What is Big Data?
“The dynamically linked super set of multiple significant
scale discrete data sets.”
-Oscar Wilde
Characteristics include
• Large volumes, typically adding terabytes of data daily
• Aggregation of many historically discrete data sets
• Dynamic links between the data sets
Consequently
• Any analysis is a point in time position
3
Why care?
• Better intelligence which can be leveraged in business, healthcare etc. to
target efforts;
• Cost of a DNA analysis has reduced by around 5 orders of magnitude
since the process became possible, making personalised medicines a
reality in the near future.
• If you are investing in Big Data projects, the risk of data loss doesn’t
necessarily change. The Volume of loss is potentially colossal with impacts that
aren’t understood for an extended period.
• Customers hold concerns about companies taking a role of Orwellian Big
Brother.
4
There’s no Best Practice…yet
Breaches
• Snowden showed that Government organisations with specific focus on
security struggle to control Big Data and the associated risks.
• Panama Papers showed that legal firms with an inherently high level of
confidentiality in their practices struggle.
Compliance issues
• Harder to define the purpose of data exploration.
• Big Data breaches tend to be….bigger.
• Regulators will expect technology to be used equally to exploit and
control Big Data.
5
Key Controls for Big Data
1. Track all access that collects, views, and manipulates sensitive data, and ensure that it is
encrypted at each point.
2. Encryption keys for sensitive data can't be stored at the same location as the data.
3. All access and processing of data must be logged. These logs must be subject to human and
automatically monitoring.
4. Use automated scanning to constantly monitor systems for vulnerabilities and malware.
5. Monitor network egress for anomalies in traffic.
6. Create a number of "false flag“ records. Configure alerts and blocks to identify and prevent
data breaches.
6
How to use Big Data Analytics?
Prescriptive Analytics
How can we influence the future?
Predictive Analytics
How can we plan for the future?
Diagnostic Analytics
Why did this happen?
Descriptive Analytics
Do we know what happened?
AnalyticsMaturity
HistoricalAnalyticsProactiveAnalytics
7
Police use of Predictive Analytics
The California city of Fresno is just one of
the police departments in the US already
using a software program called “Beware”
to generate “threat scores” about an
individual, address or area.
As reported by the Washington Post in
January, the software works by
processing “billions of data points,
including arrest reports, property records,
commercial databases, deep web
searches and the [person’s] social media
postings”.
Photo: Nick Otto/For The Washington Post
Quote :https://www.theguardian.com/technology/2016/feb/04/us-police-data-analytics-smart-cities-crime-likelihood-fresno-chicago-heat-list
8
How to do it well
Staff appropriately
• Specialist Skills are in demand;
• Big Data
• Data Management
• Have a plan to recruit and retain them!
Data Quality
• Big Data Leaders show maturity in data quality
9
Final Point
Big Data is a pre-requisite of the desire for better
analytics, the desire to better understand. Of itself, its
just a large data set waiting to breach.
10
Points of contact
Ben Fountain
Senior Consultant
M: +44 (0) 7545 503 311
E: ben.fountain@nccgroup.trust
NCC Group Blogs
https://www.nccgroup.trust/uk/about-
us/newsroom-and-events/blogs/
TED Talks on Big Data
https://www.ted.com/search?q=big+data
11
Experiment
“The dynamically linked super set of multiple
significant scale discrete data sets.”
-Oscar Wilde
Well that’s a lie.
12
NCC Locations
Europe
Manchester - Head Office
Amsterdam
Basingstoke
Cambridge
Copenhagen
Cheltenham
Delft
Edinburgh
Glasgow
Leatherhead
Leeds
London
Luxembourg
Madrid
Malmö
Milton Keynes
Munich
Vilnius
Zurich
Australia
Sydney
North America
Atlanta
Austin
Chicago
Kitchener
New York
San Francisco
Seattle
Sunnyvale

More Related Content

PPTX
Team 2 Big Data Presentation
PPTX
Big data
PPTX
Big data introduction
DOCX
Big data (word file)
PDF
Applications of Big Data
PPT
The Pros and Cons of Big Data in an ePatient World
PPTX
Big Data can be fun!
Team 2 Big Data Presentation
Big data
Big data introduction
Big data (word file)
Applications of Big Data
The Pros and Cons of Big Data in an ePatient World
Big Data can be fun!

What's hot (20)

PDF
Big Data & Analytics (Conceptual and Practical Introduction)
PDF
The promise and challenge of Big Data
PPTX
Big data 2017 final
PPTX
Big data PPT prepared by Hritika Raj (Shivalik college of engg.)
PDF
Approaching Big Data: Lesson Plan
PPTX
Chapter 4 what is data and data types
PDF
NewMR 2016 presents: 9 Big Applications of Big Data
PPTX
Big Data - 25 Amazing Facts Everyone Should Know
PPTX
A Short History of Big Data
PPTX
Big data ppt
PPTX
Ppt for Application of big data
PPTX
PDF
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
PPTX
Big Data for Beginners
PPTX
Big data - What is It?
PPTX
BIG DATA & DATA ANALYTICS
PPTX
Big data and its applications
PPTX
Big Data - Applications and Technologies Overview
PDF
Big Data vs. Small Data...what's the difference?
PPTX
5 v of big data
Big Data & Analytics (Conceptual and Practical Introduction)
The promise and challenge of Big Data
Big data 2017 final
Big data PPT prepared by Hritika Raj (Shivalik college of engg.)
Approaching Big Data: Lesson Plan
Chapter 4 what is data and data types
NewMR 2016 presents: 9 Big Applications of Big Data
Big Data - 25 Amazing Facts Everyone Should Know
A Short History of Big Data
Big data ppt
Ppt for Application of big data
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data for Beginners
Big data - What is It?
BIG DATA & DATA ANALYTICS
Big data and its applications
Big Data - Applications and Technologies Overview
Big Data vs. Small Data...what's the difference?
5 v of big data
Ad

Viewers also liked (14)

PDF
Stalling investments in infrastructure and the expanding infra debt burden in...
PPTX
Big Data and Cyber Security
PDF
SAP HANA Express Edition 무료배포판
PDF
[2014년 3월 25일] mining minds 빅 데이터, 욕망을 읽다
PPTX
Bringing big data to life
PPTX
The What, Why and How of Big Data
PDF
5 Big Data stats that will convince your boss
PPTX
Big Data in Cyber Security
PDF
Expanding Your Data Warehouse with Tajo
PDF
Big Data for the Retail Business I Swan Insights I Solvay Business School
PPTX
The Big Data Revolution in Retail
PPTX
What is big data?
PDF
Working With Big Data
PPTX
Big data ppt
Stalling investments in infrastructure and the expanding infra debt burden in...
Big Data and Cyber Security
SAP HANA Express Edition 무료배포판
[2014년 3월 25일] mining minds 빅 데이터, 욕망을 읽다
Bringing big data to life
The What, Why and How of Big Data
5 Big Data stats that will convince your boss
Big Data in Cyber Security
Expanding Your Data Warehouse with Tajo
Big Data for the Retail Business I Swan Insights I Solvay Business School
The Big Data Revolution in Retail
What is big data?
Working With Big Data
Big data ppt
Ad

Similar to Big Data Analytics (20)

PPTX
Your organization and Big Data: Managing access, privacy, and security
PPT
Big Data Analytics (1).ppt
PPTX
The REAL Impact of Big Data on Privacy
PDF
Analytics solution
PDF
Big data march2016 ipsos mori
PDF
Big data assignment
PDF
El contexto de la integración masiva de datos
PPTX
IM seminor.pptx
PPTX
Data Mining With Big Data
PDF
Big_data_analytics_for_life_insurers_published
PDF
Big data analytics for life insurers
PPTX
Bigdata Hadoop introduction
PDF
ebook.driving decision-making, security
PDF
Big Data in Healthcare and Medical Devices
PPTX
Smart Data Module 5 d drive_legislation
PDF
ZoomLens - Loveland, Subramanian -Tackling Info Risk
DOCX
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
PPTX
Big Data World
PDF
Data Analytics for Security Intelligence
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Your organization and Big Data: Managing access, privacy, and security
Big Data Analytics (1).ppt
The REAL Impact of Big Data on Privacy
Analytics solution
Big data march2016 ipsos mori
Big data assignment
El contexto de la integración masiva de datos
IM seminor.pptx
Data Mining With Big Data
Big_data_analytics_for_life_insurers_published
Big data analytics for life insurers
Bigdata Hadoop introduction
ebook.driving decision-making, security
Big Data in Healthcare and Medical Devices
Smart Data Module 5 d drive_legislation
ZoomLens - Loveland, Subramanian -Tackling Info Risk
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
Big Data World
Data Analytics for Security Intelligence
Proven Practices to Protect Critical Data - DarkReading VTS Deck

More from Napier University (20)

PDF
Intrusion Detection Systems
PPTX
PPTX
Memory, Big Data and SIEM
PPTX
What is Cyber Data?
PPTX
Open Source Intelligence
PDF
10. Data to Information: NumPy and Pandas
PDF
2. Defence Systems
PDF
1. Cyber and Intelligence
PPTX
The Road Ahead for Ripple, Marjan Delatinne
PDF
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
PPTX
ARTiFACTS, Emma Boswood
PPTX
RMIT Blockchain Innovation Hub, Chris Berg
PPTX
Keynote, Naseem Naqvi
PPT
Browser-based Crypto M, C. F Mondschein
PPTX
Should we transform or adapt to blockchain - a public sector perspective?, Al...
PPTX
IoT device attestation system using blockchain, Alistair Duke
PPTX
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
PDF
Using Blockchain for Evidence Purpose, Rafael Prabucki
PPTX
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
PPTX
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Intrusion Detection Systems
Memory, Big Data and SIEM
What is Cyber Data?
Open Source Intelligence
10. Data to Information: NumPy and Pandas
2. Defence Systems
1. Cyber and Intelligence
The Road Ahead for Ripple, Marjan Delatinne
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
ARTiFACTS, Emma Boswood
RMIT Blockchain Innovation Hub, Chris Berg
Keynote, Naseem Naqvi
Browser-based Crypto M, C. F Mondschein
Should we transform or adapt to blockchain - a public sector perspective?, Al...
IoT device attestation system using blockchain, Alistair Duke
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Using Blockchain for Evidence Purpose, Rafael Prabucki
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra

Recently uploaded (20)

PDF
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Pharma ospi slides which help in ospi learning
PDF
Pre independence Education in Inndia.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Pharma ospi slides which help in ospi learning
Pre independence Education in Inndia.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Anesthesia in Laparoscopic Surgery in India
2.FourierTransform-ShortQuestionswithAnswers.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
O5-L3 Freight Transport Ops (International) V1.pdf
Microbial disease of the cardiovascular and lymphatic systems
Cardiovascular Pharmacology for pharmacy students.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
The Final Stretch: How to Release a Game and Not Die in the Process.
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Open Quiz Monsoon Mind Game Final Set.pptx
Insiders guide to clinical Medicine.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...

Big Data Analytics

  • 1. Big Data Analytics Ben Fountain May 2016
  • 2. 2 What is Big Data? “The dynamically linked super set of multiple significant scale discrete data sets.” -Oscar Wilde Characteristics include • Large volumes, typically adding terabytes of data daily • Aggregation of many historically discrete data sets • Dynamic links between the data sets Consequently • Any analysis is a point in time position
  • 3. 3 Why care? • Better intelligence which can be leveraged in business, healthcare etc. to target efforts; • Cost of a DNA analysis has reduced by around 5 orders of magnitude since the process became possible, making personalised medicines a reality in the near future. • If you are investing in Big Data projects, the risk of data loss doesn’t necessarily change. The Volume of loss is potentially colossal with impacts that aren’t understood for an extended period. • Customers hold concerns about companies taking a role of Orwellian Big Brother.
  • 4. 4 There’s no Best Practice…yet Breaches • Snowden showed that Government organisations with specific focus on security struggle to control Big Data and the associated risks. • Panama Papers showed that legal firms with an inherently high level of confidentiality in their practices struggle. Compliance issues • Harder to define the purpose of data exploration. • Big Data breaches tend to be….bigger. • Regulators will expect technology to be used equally to exploit and control Big Data.
  • 5. 5 Key Controls for Big Data 1. Track all access that collects, views, and manipulates sensitive data, and ensure that it is encrypted at each point. 2. Encryption keys for sensitive data can't be stored at the same location as the data. 3. All access and processing of data must be logged. These logs must be subject to human and automatically monitoring. 4. Use automated scanning to constantly monitor systems for vulnerabilities and malware. 5. Monitor network egress for anomalies in traffic. 6. Create a number of "false flag“ records. Configure alerts and blocks to identify and prevent data breaches.
  • 6. 6 How to use Big Data Analytics? Prescriptive Analytics How can we influence the future? Predictive Analytics How can we plan for the future? Diagnostic Analytics Why did this happen? Descriptive Analytics Do we know what happened? AnalyticsMaturity HistoricalAnalyticsProactiveAnalytics
  • 7. 7 Police use of Predictive Analytics The California city of Fresno is just one of the police departments in the US already using a software program called “Beware” to generate “threat scores” about an individual, address or area. As reported by the Washington Post in January, the software works by processing “billions of data points, including arrest reports, property records, commercial databases, deep web searches and the [person’s] social media postings”. Photo: Nick Otto/For The Washington Post Quote :https://www.theguardian.com/technology/2016/feb/04/us-police-data-analytics-smart-cities-crime-likelihood-fresno-chicago-heat-list
  • 8. 8 How to do it well Staff appropriately • Specialist Skills are in demand; • Big Data • Data Management • Have a plan to recruit and retain them! Data Quality • Big Data Leaders show maturity in data quality
  • 9. 9 Final Point Big Data is a pre-requisite of the desire for better analytics, the desire to better understand. Of itself, its just a large data set waiting to breach.
  • 10. 10 Points of contact Ben Fountain Senior Consultant M: +44 (0) 7545 503 311 E: ben.fountain@nccgroup.trust NCC Group Blogs https://www.nccgroup.trust/uk/about- us/newsroom-and-events/blogs/ TED Talks on Big Data https://www.ted.com/search?q=big+data
  • 11. 11 Experiment “The dynamically linked super set of multiple significant scale discrete data sets.” -Oscar Wilde Well that’s a lie.
  • 12. 12 NCC Locations Europe Manchester - Head Office Amsterdam Basingstoke Cambridge Copenhagen Cheltenham Delft Edinburgh Glasgow Leatherhead Leeds London Luxembourg Madrid Malmö Milton Keynes Munich Vilnius Zurich Australia Sydney North America Atlanta Austin Chicago Kitchener New York San Francisco Seattle Sunnyvale

Editor's Notes

  • #3: So, I’m starting by defining how I think of Big Data. Experimenting by falsely attributing this definition. This definition as of today has zero hits on google. Experiment with a search over time to see how, or if Google manages to find and attribute the quote to Oscar or myself.
  • #4: With Big Data you are sifting a larger data set, looking for more specific information than has previously been possible. Sometimes patterns emerge that weren’t previously identified at a macro scale, that’s more often in scientific efforts; business is typically looking to being better able to exploit an existing market than break new ground. So what are you looking to analyse? What are the data sets and how have they been compiled? What is their provenance? What about the data quality? Where Big Data projects have provided meaningful benefits a trend shows that these companies have three aspects in place; Strong staff who are interested in asking the right questions, not obsessed in ‘big data’ as a buzzword. Big Data doesn’t change the Garbage In, Garbage Out principle; Mature data quality processes are a must Responsible approach, several aspects big data can expose more details that are not palatable to the general public or sometimes to the company; you need to recognise that the analysis may challenge the hypothesis. RBAC is critical, exposing these data sets can result in significant harm to your organisation and everyone referred to either directly or indirectly Compliance becomes critical in this as soon as you have data sets which correlate to identify individuals instead of groups. Whilst personalised healthcare, advertising that predicts what we want just in time for us to purchase it and identifies criminals automatically is the goal, far too often we have found that new technologies tend to be exploited for less laudable goals. Big data under the GDPR will associate with big fines….
  • #6: Gunter Ollman of NCC Domain Services proposed that these controls give an overlapping set that work together across network, vulnerability, behaviour and (to a degree) stupidity to jointly reduce the likelihood and impact of a breach. Track all access and processing of the data, encrypt sensitive data as soon as possible, ideally at the source. Don’t leave the keys in the same place as the data. Log everything and monitor it. Leverage the anomaly detection systems to reduce the signal to noise ratio until humans can realistically review the volume of data. Use automated scanning to constantly monitor systems for vulnerabilities and malware. Monitor network egress for anomalies in traffic. Create a number of "false flag“ records. These will automatically alert your security team if they are accessed. Configure alerts and blocks to identify and prevent data breaches.
  • #7: We can split companies use of big data into what happened and what will happen and further segment that to provide a maturity model. Descriptive analytics is where most activity remains in the IT sector at the moment with regards to big data. Log collation and some analysis. In some instances we have a breach and move to diagnostic analytics as we look to analyse the detail, but this takes effort and because still many organisations do not report breaches the patterns are not always clear enough to derive a confident conclusion. This is a reactive position. Predictive analytics some of the more advanced and security focussed organisations are moving to. Threat modelling efforts sit here. Prescriptive analytics; crystal ball gazing is now moving into pre-crime, yet this is happening now for several police forces in the US. https://www.theguardian.com/technology/2016/feb/04/us-police-data-analytics-smart-cities-crime-likelihood-fresno-chicago-heat-list
  • #8: On a call, officers respond, Beware checks the address and get names of residents, these are checked against public data sources to threat model them RAG. How this is done is a trade secret, but could identify a PTSD sufferer who has tweeted about having bad experiences….. Your tweets could influence whether the officer approaches the door, and if you are flagged red, say because your account has recently been hacked then the outcome may be violent. http://www.aclunc.org/docs/201512-social_media_monitoring_softare_pra_response.pdf
  • #9: Traditional IT staff are often the wrong fit for big data, they focus on the T and not the I. Specialist skills are required, and only a few organisations work truly at Big Data Exabyte scales, so they are in high demand. The analysis can improve by ensuring that the importance of data quality is embedded in all your systems to ensure that the data sets are filtered as they progress through downstream systems before they hit the Big Data aggregation point.
  • #12: Experimenting by falsely attributing this definition. This definition as of the today has zero hits on google. I’ve configured a Google alert to track this quote and I’m looking forward to seeing who it gets attributed to.