• No results found

BIG DATA CALLS FOR BIG SECURITY!

N/A
N/A
Protected

Academic year: 2021

Share "BIG DATA CALLS FOR BIG SECURITY!"

Copied!
22
0
0

Loading.... (view fulltext now)

Full text

(1)

Session ID: Session Classification: Branden R. Williams RSA Security DSP-F41 Intermediate

BIG DATA CALLS FOR BIG

SECURITY!

Jason Rader

(2)

Big Data Analytics

► They are the future!

► How do we deal with them in the security world?

Unique Security Concerns With Big Data

► How can we learn from other security issues?

► What snakes may be lurking in the grass?

Applied Knowledge

► A scenario!

► What to do?

► DO IT!

WHAT IS THIS SESSION

ABOUT?

(3)

Big Data

► Not LOTS of data

► But many disparate sources with mixed structure

Industry trends driving Big Data & analytics

► Storage is cheap

► “Anywhere” computing

► Hardware over-engineering

► (or distributed computing)

Math is pretty awesome

PREDICTIVE ANALYTICS –

THE FUTURE OF BI

(4)

Simply, deriving value from big data!

Complexly (is that a word?)

► Organizing the unorganized

► Heavy math use

► The search for leading indicators

How do we use it?

► Business strategy

► Public safety (CDC,NOAA)

► Predict the future

WHAT ARE PREDICTIVE

ANALYTICS?

(5)

Massive historical data

Lots of math

► Sometimes bad math

► The search for trends

► Execute trades!

The next step?

► Implications of social media

► See through the corporate veil

► Now we can focus on the individual!

WHO DOES THIS WELL

TODAY? INVESTORS!

(6)

A BIG DATA FRAMEWORK

Parise, S., Iyer, B., & Vesset, D. (2012). Four strategies to capture and create value from big data. Ivey Business Journal, 76(4), 1-5.

Social Analytics Decision Science Performance Management Data Exploration Transactional Data Non-Transactional Data Measurement Experimentation

B

USINESS

O

BJECTIVE

D

ATA

T

YPE

(7)

Businesses have data coming out of their ears

SO DO THE BAD GUYS!

Huge shift from the past

► Forensics example

Unused data

Can we find value?

Business leaders must innovate

1

► But focus on business model innovation

► PA can drive this!

PREDICTIVE ANALYTICS –

THE WHY

(8)

Analytics automate “data crunching”

Could become the new IP!

Businesses act on output

What about deriving sensitive info?

► PII

► Privacy issues!

If I accurately guess your info,

do I need to protect it?

DERIVED DATA & ANALYTICS

(9)

If I derive your PII, must I protect it?

Law is WAY behind

Compliance might be farther

Do I have to protect data

from aggregation?

► Flickr EXIF Reveals Client list

► Geotags

Huge impact to business

► US = Case Law

► EU Privacy Updates

PROBLEM OF DERIVED

SENSITIVE DATA

(10)

THE RELEVANCE OF DATA

MASS

Amount of data

Pa

yof

f

(11)

How Target knew a teenager was pregnant before her

own father did:

► Pause for story time!

Implications:

► Target can predict due dates/sex

► Aggregations of data can accurately predict the future

► Better placement (upside?)

► Price discrimination

Not Singular pieces of data!

► It’s the CORRELATION that matters

REAL STORIES OF BIG DATA

FUN

(12)

Big data requires big flexibility

► But that impacts security

► Think about SQL features:

► Views

► Complex Queries (with aggregates)

► Column-level RBAC

Classic approaches (where have we

solved this problem before)

► DBAs still a risk (so is the Data Scientist)

► Operators may not know what they are looking at

THE COMPARTMENTALIZATION

TECHNIQUE

(13)

Hacking the Coca Cola formula

► Can you derive the formula?

► YES YOU CAN!

► Shipping/Receiving/Production data

► Think Crypto plaintext attack

► KFC would be harder, but possible!

IP/Strategy Derivation

► Attackers can figure out your IP by looking at data sets you don’t

necessarily protect

► Macro trends repeat themselves over multiple sets of data, can I fill the gaps from missing data sets?

DATA SYNTHESIS

TECHNIQUES

(14)

Data mapping

► Where does data live?

► What is the full lifecycle of data?

► Raw

► WIP

► Data product

► Disposal

► How is it used by the business?

Common Practices (with caveats)

► Governance

► Separation of Duties/RBAC

► Dev/UA/Prod

PROTECTION SCHEMES –

WHERE TO START?

(15)

THE VALUE OF

INFORMATION OVER TIME

Time

V

alue

Max Value

Area under this curve = money for information

owner

Information eventually becomes a liability WIP

(16)

HOW TO VIEW DATA AND

ANALYTICS

Valuable to me Valuable if Lost Valuable to Competitors or Military Customer Analytics IT Configs Biz Processes Derivative Data Analytics for Sale

Medical Records

Old Source Code Old IP

Old/Retired Encryption Keys Secret Sauce Intellectual Property Software Vuln DB Corp Strategy Crown Jewels Easily Transferrable IP Actionable IP Encryption Keys CC Data PII/PHI Data Unused Biz Data

Disinformation COMPINT

(17)

Taco Corp is evaluating land for leasing of mineral rights

► They have proprietary data consisting of their own costs/profits related to past extractions

► This data is critical in understanding when a particular lease becomes profitable, trigging the process of extraction

Two critical assets:

► Expected mineral output from plots of land

► Profitability triggers

Potential public info:

► Existing leases with no extraction

► Leases with active extraction

► Commodity market for closing price of extracted minerals

(18)

Competitor (or real estate agent!) wants to get a jump on

key land leases

While they don’t know the expected mineral outputs or

the profitability triggers, can they synthesize?

► May know approximate timing of extraction through permits, media

► Can look up historical commodity value

► Search for patterns or thresholds

► Derive profitability approximations

Constantly refine over time

Get the jump on Taco Corp!

(19)

MOCKUP OF DATA

SYNTHESIS

The

Good

s

Proprietary Data Sets Uh oh! Holes in the data? Public/Unpro tected Data Sets Hooray! Alternate Approximates!

(20)

Large analytical computations with diverse

data sets can be reconstructed (think RAID)

What needs to be protected?

► Inputs & data sources

► Analytics process (“pre-IP”)

► Outputs (duh)

Analytics process bonus:

► Learn where juicy data lives!

► Understand what can be substituted!

► What output is important to mgt!

► New third party data could mean M&A

(21)

Q/A

Branden Williams

@BrandenWilliam

s

Jason Rader

@JasonRaderRS

A

(22)

References

Related documents

In 2007, the company launched a range of 7 ounce-denominated investment bars that bear the names (in Chinese) of China Banknote Printing and Minting Corporation and China

• On the Database Server, schedule a Differential backup of database to Tape every day (except Sunday) at exact same time as FileStore backup at 11pm (a time after the last

In conclusion, for the studied Taiwanese population of diabetic patients undergoing hemodialysis, increased mortality rates are associated with higher average FPG levels at 1 and

The findings of this study point to a trend of increasing use of mobile devices and intensification of private online access among children in Brazil. In the light of this

The supply of market information for the agricultural sector in West Africa is highly variable. A number of MIS provide data on cereals, including public, private,

On the single objective problem, the sequential metamodeling method with domain reduction of LS-OPT showed better performance than any other method evaluated. The development of

ECP Project Management Structure Board of Directors Science Council Industry Council Project Director Deputy Director CTO Integration Manager D ep ar tm en t o f En er g y

The Diesel Technology – Komatsu Program is a partnership between the North Dakota State College of Science, participating Komatsu dealerships and participating students.. Each has