Tittle/Topic: Big data for cyber security.
You only have to do part Method (Which big data tool you are using)WE CHOOSE Hadoop.
Introduction / Motivation
|
Brief Introduction about project.
|
Background
|
Discuss about present scenario and challenges involved.
|
Data
|
Size of data and its type
|
Methods
|
Which big data tool you are using
|
Evaluation
|
Results obtained
|
Conclusion
|
Summary of your project along with references
|
Introduction In this fast-paced competitive world where there is massive dependence on technology, it become imperative to secure the data which is been stored or transferred. There are almost petabytes of data that are being communicated over the internet almost every day. In order to make sense of such large amount of data that is being generated from all around the corner organisation depends on Big Data. With the sheer volume of data that is being transferred and stored over the cloud servers there are trillion of dollars at risk if this data is compromised. Some Important Pictures for your PPT explaining the content shared in Background It not only affects the integrity of the company but also can be root cause of financial theft. It is very common to relate big data with cyber security since they reflect the overall capacity of gathering enormous amount of data and generate information for the same. This can be implemented by extracting right data and visualizing it in the form of dashboards that can deliver future insights into disastrous cyber threats as well as attacks which can be located much before its onset. Much stronger as well as robust cyber protection can be gauged with the help of Big Data. This can enable the organization to generate more actionable initiatives making business more effective and efficient. Technically, big data takes into consideration data analytical tools which perhaps generates strong business intelligence. This takes cyber defence and security to next level by incorporating elements like machine learning, statistics, predictive modelling to bolster defence and detection of the organisation. Background (In Bullets for your PPT) Big Data implies massive volume of data, which is usually very challenging to process through traditional methodologies. As an essential domain of cyber security which is becoming one of critical requirement of business today. Primary role of big data is to analyse large volume of data to identify different trends like behavioural along with common patterns. Big Data has fuelled new possibilities with reference to analytics and can offer new security solutions to shield the data. Analysis and insights gauged by the Big Data software blended with data that is gathered from several network flows, cloud systems and security infrastructure can offer complete cyber defence which is required to be deployed as an IDS - Intrusion Detection System. This can enable the business to shield from any malicious element present in the open network, detect any intrusion as well as promptly respond at the real-time. Technically, there are two broad categories of IDS cyber defence system which are explained below · NIDS - Network Intrusion Detection System · HBIS - Host-Based Intrusion Detection Systems While former analyses the incoming network traffic while the latter monitors essential operating system files. Primary difference between big data and traditional data is the essence of volume, variation and velocity (V cube). First aspect which the volume, implies data that can be generated, second aspect takes into picture the velocity that can be explained with the frequency of data which is generated along with variations that implies how data is organised like non-structured versus structured data. Some Important Pictures for your PPT explaining the content shared in Background References Mtsweni, J., Mutemwa, M., & Mkhonto, N. (2016). Development of a Cyber-Threat Intelligence-Sharing Model from Big Data Sources. Journal of Information Warfare, 15(3), 56–68. https://www.jstor.org/stable/26502744 Landon-Murray, M. (2016). Big Data and Intelligence: Applications, Human Capital, and Education. Journal of Strategic Security, 9(2), 92–121. http://www.jstor.org/stable/26466778