big data and security challenges

47
Geo Intelligence India 13-14 Jun 2013 New Delhi

Upload: anupriti

Post on 28-Nov-2014

489 views

Category:

Technology


0 download

DESCRIPTION

Big Data is getting bigger and bigger but at the same time before adopting it seriously and exploiting it we should also take care of the security shortcomings it comes up with....from a forensics and security point of view....we need to understand the vulnerabilities they come up with before blindly adopting them!!!!

TRANSCRIPT

Page 1: BIG DATA AND SECURITY CHALLENGES

Geo Intelligence India

13-14 Jun 2013

New Delhi

Page 2: BIG DATA AND SECURITY CHALLENGES

Do lafzon ki hai DATA ki kahani...............

Ek hai ZERO....duja hai ONE.....

2

Page 3: BIG DATA AND SECURITY CHALLENGES

Big Spatial Data

Security

WELCOME

3

Page 4: BIG DATA AND SECURITY CHALLENGES

BIG SPATIAL DATA has been with us for ages in various forms…but pretty invisible!!

4

Page 5: BIG DATA AND SECURITY CHALLENGES

5Ancient Egypt

River nile

Engineers used to try data analysis to predict crop yields

6695 Km long

Page 6: BIG DATA AND SECURITY CHALLENGES

Basic Intro

Concepts

Perceptions

Challenges

…the 15 min route to THANK YOU slide

6

Page 7: BIG DATA AND SECURITY CHALLENGES

An English professor wrote the words :

“A Woman without her man is nothing”

On the chalk board and asked his students to punctuate it correctly….

“A Woman,without her man,is nothing”.

“A Woman: Without her, man is nothing”

7

Page 8: BIG DATA AND SECURITY CHALLENGES

A greater scope of Geo Int info

New kinds of Geo data and analysis

Real time Geo information

Data influx from new technologies

Non traditional forms of Geo data

Large volumes of Geo data

The latest buzzword

Social media data

0 2 4 6 8 10 12 14 16 18 20

Series 1

DEFINING BIG SPATIAL DATA

8

How we understand it ?

Page 9: BIG DATA AND SECURITY CHALLENGES

Spatial data sets exceeding capacity of current computing systems……

….to manage, process or analyze the data with reasonable effort

due to Volume, Velocity, Variety and Veracity

DEFINING BIG SPATIAL DATA

BIG SPATIAL DATA9

Page 10: BIG DATA AND SECURITY CHALLENGES

10

DATA is Exploding in

Volume Velocity VARIETY

While decreasing in

Veracity

Page 11: BIG DATA AND SECURITY CHALLENGES

DEFINING BIG SPATIAL DATA

BIG SPATIAL DATAFinding actionable info in Massive volumes of both structured and unstructured geo data that is so large and complex that it’s difficult to process with traditional database and software techniques……

Volume

Velocity

VARIETY

VERACITY

Data at rest

Data in Motion

Data in Manyforms

Data in Doubt

11

Page 12: BIG DATA AND SECURITY CHALLENGES

90% of data in the world was created in the last 2 years

2.5 EB of data is created

every day

U.S. drone aircraft sent back 24 years

worth of video footage in 2009

Gigabyte (GB) - 1,024MBTerabyte (TB) - 1,024GBPetabyte (PB) - 1,024TBExabyte (EB) - 1,024PB

Page 13: BIG DATA AND SECURITY CHALLENGES

* Estimated revenue FY 2013

growth of geospatial data is outpacing both software and services and is set to become a major contributor to the overall growth of the industry

13

Page 14: BIG DATA AND SECURITY CHALLENGES

100% security is a mythNo one has said this!!!

But it remains a fact

14

Increasing attack surface

Page 15: BIG DATA AND SECURITY CHALLENGES

The technology is ready….

But are we ready ?

15

Page 16: BIG DATA AND SECURITY CHALLENGES

16

16

DISASTER RELIEF

FINANCIAL

FRAUD DETECTION

CALL CENTER REQUESTS

DISEASE SURVEILLANCE

INSURANCE

RETAIL

TELECOMMUNICATIONS

UTILITIES

ECO-ROUTING

Page 17: BIG DATA AND SECURITY CHALLENGES

The otherof the

side story

17

Page 18: BIG DATA AND SECURITY CHALLENGES

Security challenges before we adopt Big spatial data

18

Page 19: BIG DATA AND SECURITY CHALLENGES

Distributed programming frameworks

Ek

19

Page 20: BIG DATA AND SECURITY CHALLENGES

Distributed programming frameworks

Input fileMap Intermediate

Combining Shuffle Output File

Local Reduce Reduce

Mapper performs computation& outputs a key/value pairs

20

Reducer combines the values belonging to each distict key and outputs the result

Utilise parallilism in computation & storage to process massive amounts of data

Page 21: BIG DATA AND SECURITY CHALLENGES

MAP REDUCE

FRAMEWORK

Splits the input data-set into independent chunks which are processed

in a completely parallel manner

Aggregate results from map phase

performs a summary operation

Schedules and re-runs tasks

Splits the input

Moves map outputs to reduce inputs

Receive the results

Distributed programming frameworks

21

Page 22: BIG DATA AND SECURITY CHALLENGES

So challenge is not storage but it is I/O speed

One Machine

4 i/o ChannelsEach channel : 100 MB/s

10 Machine’s

4 i/o ChannelsEach channel : 100 MB/s

Read 1 TB

45 Min 4.5 Min

Page 23: BIG DATA AND SECURITY CHALLENGES

Untrusted Mappers

Securing the data in the presence of an untrusted mapper

Distributed programming frameworks

23

Page 24: BIG DATA AND SECURITY CHALLENGES

NO SQL ISSUES

TWO24

Page 25: BIG DATA AND SECURITY CHALLENGES

25

First off : the name

NoSQL is not “NEVER SQL”

NoSQL is not “No To SQL “

Page 26: BIG DATA AND SECURITY CHALLENGES

26

NoSQL

Is simply

Not Only SQL!!!!!

Page 27: BIG DATA AND SECURITY CHALLENGES

MongoDB

Redis

27

NoSQL DB are still evolving with

respect to security infrastructure

Page 28: BIG DATA AND SECURITY CHALLENGES

Data storage & transaction logs

28

Page 29: BIG DATA AND SECURITY CHALLENGES

STORAGE TIERS

- Multi-tiered storage media

- Necessitated by scalable size

- Different categories of data- Different types of storage

Data storage & transaction logs

29

Page 30: BIG DATA AND SECURITY CHALLENGES

Lower tier means reduced security, loose access controls

Keeping track of data location

Data storage & transaction logs

30

Page 31: BIG DATA AND SECURITY CHALLENGES

INPUT VALIDATION/FILTERING

31

Page 32: BIG DATA AND SECURITY CHALLENGES

How can we trust data ?

Validating data when source of input data is not reliable?

Filtering malicious data @ BYOD

Input validation/filtering

32

Page 33: BIG DATA AND SECURITY CHALLENGES

REAL TIME MONITORING

33

Page 34: BIG DATA AND SECURITY CHALLENGES

Humongous number of alerts!!!!

False positives

Filtering malicious data @ BYOD

REAL TIME MONITORING

34

Page 35: BIG DATA AND SECURITY CHALLENGES

Secure communication

35

Page 36: BIG DATA AND SECURITY CHALLENGES

End to end security ?

Data encryption : attribute based encryption!!!to be made richer

Secure communication

36

Page 37: BIG DATA AND SECURITY CHALLENGES

Granular audits

37

Page 38: BIG DATA AND SECURITY CHALLENGES

New attacks will keep happening…and to find out we need detailed audit logs

Missed true positives

Granular audits

38

Page 39: BIG DATA AND SECURITY CHALLENGES

PRIVACY ISSUES

39

Page 40: BIG DATA AND SECURITY CHALLENGES

EG : How a retailer was able to identify that a teenager was pregnant before her father knew

40

PRIVACY ISSUES

In the world of big data,privacy invasion is a business model

Page 41: BIG DATA AND SECURITY CHALLENGES

And...

We Also Have cloud with us?

41

Page 42: BIG DATA AND SECURITY CHALLENGES

At 1.4% in 2011-12 Cloud was a very small percentage of the total IT spend

42

Page 43: BIG DATA AND SECURITY CHALLENGES

Pace of Big Spatial Data adoption has been

Sluggish

43

Page 44: BIG DATA AND SECURITY CHALLENGES

44

There is unlikely to be a day soon in near

future when we have a

“FIND TERRORIST”

BUTTON

Page 45: BIG DATA AND SECURITY CHALLENGES

45

We have mostly been reactive till

date…..

Page 46: BIG DATA AND SECURITY CHALLENGES

46USE KERBEROS FOR NODE AUTHENTICATION – (BUT WE KNOW IT’S A PAIN TO SET UP)

STRINGENT POLICIES

STANDARD TO INTRA COUNTRY LAWS

EXHAUSTIVE LOGS

SECURE COMMUNICATION

STRINGENT POLICIES

Page 47: BIG DATA AND SECURITY CHALLENGES

47