- 4/18/2015 2:53:23 AM
A tricky business associate can use social engineering or mobile devices to steal information collected by data analytics applications. We can stop them the OPSEC (Operational Security) way. It's a method of stopping an adversary from getting the unclassified information in private, non-profit and pubiic sectors. It was Admiral Ulysses Sharp, Commander-in-Chief, Pacific who started the OPSEC in Vietnam. He set up the Purple Dragon team to discover how the enemy was able to get advance information on military operations. I will talk some more about how the OPSEC way could be applied to the health care sector.
- 4/17/2015 4:05:07 PM
kq4ym, there are different ways of measuring cost effective countermeasures depending on what policies an organization has in place. One way is to determine the ROI of each and all countermeasures. There are other ways as well.
- 4/17/2015 3:59:06 PM
Lyndon Henry, thanks for the link. I wrote blogs about mobile management for a web site that sailed away last summer. I am very much aware of the emerging threats to mobile devices, big data and cloud storage organizations. The business associates including data scientists need to be educated or more aware of these threats and risk mitigation options. I have talked about them from time to time.
- by Lyndon_Henry, Blogger
- 4/17/2015 3:27:16 PM
This blog post made me more curious about the risk of cyberattack, so I Googled the topic. The following article, datelined today, was one of the results; it may be of interest.
Cyber-Attack Risk Mitigation: Key Steps
- by kq4ym, Data Doctor
- 3/28/2015 10:31:11 AM
And then there's the question of "What cost-effective countermeasures your organization needs," in line with the absolutely necessary government compliance issues required in the organization. How to gauge the cost effectiveness might be one of the challenging decisions to task.
- 3/17/2015 4:53:56 AM
@SethBreedlove, here are some clues that a data center is being hacked that a system administrator would see on his console:
- The IT infrastructure slows down,
- The data traffic is being diverted from normal routes on the networks.
- The network becomes unusually sluggish,
- The network is using up all avaiable resources for storage.
With the properly configured software defined networking (SDN), the system controller may be able to reroute the network traffic to safer routes.
- by SethBreedlove, Data Doctor
- 3/16/2015 1:02:28 AM
I haven't worked in IT security, so I'm speaking generally here. I would like to know how much analytics helps secBut
We know many of the signs that a personal computer is being hacked. But what are the clues that a datacenter is being hacked?