Comments
Mitigate Risks Through Data Analytics
View Comments: Newest First | Oldest First | Threaded View
The OPSEC way
  • 4/18/2015 2:53:23 AM
NO RATINGS

A tricky business associate can use social engineering or mobile devices to steal information collected by data analytics applications. We can stop them the OPSEC (Operational Security) way. It's a method of stopping an adversary from getting the unclassified information in private, non-profit and pubiic sectors. It was Admiral Ulysses Sharp, Commander-in-Chief, Pacific who started the OPSEC in Vietnam. He set up the Purple Dragon team to discover how the enemy was able to get advance information on military operations. I will talk some more about how the OPSEC way could be applied to the health care sector.

Re: Security
  • 4/17/2015 4:05:07 PM
NO RATINGS

kq4ym, there are different ways of measuring cost effective countermeasures depending on what policies an organization has in place.  One way is to determine the ROI of each and all countermeasures. There are other ways as well.

Re: Security
  • 4/17/2015 3:59:06 PM
NO RATINGS

Lyndon Henry, thanks for the link. I wrote blogs about mobile management for a web site that sailed away last summer. I am very much aware of the emerging threats to mobile devices, big data and cloud storage organizations. The business associates including data scientists need to be educated or more aware of these threats and risk mitigation options.  I have talked about them from time to time.

Re: Security
  • 4/17/2015 3:27:16 PM
NO RATINGS

..

This blog post made me more curious about the risk of cyberattack, so I Googled the topic. The following article, datelined today, was one of the results; it may be of interest.


Cyber-Attack Risk Mitigation: Key Steps

http://www.healthcareinfosecurity.com/interviews/cyber-attack-risk-mitigation-key-steps-i-2647

 

Re: Security
  • 3/28/2015 10:31:11 AM
NO RATINGS

And then there's the question of "What cost-effective countermeasures your organization needs," in line with the absolutely necessary government compliance issues required in the organization. How to gauge the cost effectiveness might be one of the challenging decisions to task.

Re: Security
  • 3/17/2015 4:53:56 AM
NO RATINGS

@SethBreedlove, here are some clues that a data center is being hacked that a system administrator would see on his console:

  1. The IT infrastructure slows down,
  2. The data traffic is being diverted from normal routes on the networks.
  3. The network becomes unusually sluggish,
  4. The network is using up all avaiable resources for storage.

With the properly configured software defined networking (SDN), the system controller may be able to reroute the network traffic to safer routes.

Security
  • 3/16/2015 1:02:28 AM
NO RATINGS

I haven't worked in IT security, so I'm speaking generally here.   I would like to know how much analytics helps secBut

We know many of the signs that a personal computer is being hacked.  But what are the clues that a datacenter is being hacked?



INFORMATION RESOURCES
ANALYTICS IN ACTION
CARTERTOONS
VIEW ALL +
QUICK POLL
VIEW ALL +