Big_Data_Security_Management_Issues
Big_Data_Security_Management_Issues
Abstract—Big data phenomenon arises from the increasing uniform message digest may not work. As for availablity,
number of data collected from various sources, including the redundancy is difficult due to the size and distributed nature
internet. Big data posses characteristics that make it difficult to of big data.
manage from security point of view. This paper looks at NIST risk
management guidance and determines whether it is applicable NIST Special Publication 800-30 (2012) [4] is a guidance
to big data. documentation for conducting risk assessments of information
Index Terms—Big data, security, management
security. This guidance provides senior leader/executives in
organisations the information needed to determine appropriate
courses of action in response to identified risk. The objective of
I. I NTRODUCTION this paper is to map big data characteristics into steps outline
TABLE I
B IG DATA V ULNERABILITY C LASSES
into steps outlined in the NIST document. In each step, NIST IV. C ONCLUSION
suggested methodology to obtain the data. NIST Risk Assessment framework described in NIST
There are three ways big data affected the NIST framework; SP800-30 [4] can be use for big data. The methodology
(1) no change, (2) the methodology is the same but the data is in obtaining the data for risk assessment is still the same,
larger, and (2) the methodology must be change. Using these, although we may have to deal with larger data.
we map the content as shown in Table II.
R EFERENCES
Looking at the tabel, we can see that big data has effect
to the methodology but not in a way that requires a new [1] Jitendra Chauchan. Top 5 big data vulnerability classes, 2013 July.
[2] K. Davis and D. GordonPatterson. Ethics of Big Data. O’Reilly, 2012.
methodology. At most, we have to deal with larger data. Thus, [3] Judith Hurwitz, Alan Nugent, Fern Halper, and Marcia Kaufman. Big
NIST SP800-30 framework is still viable for big data. Data for Dummies. 2013.
4
TABLE II
R ISK A SSESSMENT ACTIVITIES NIST AND E QUIVALENT R ISK S ECURITY IN B IG DATA
[4] Computer Security Division Information Technology Laboratory. Guide Budi Rahardjo is a researcher and lecturer at Bandung Institute of Technol-
to elliptic curve cryptography for conducting risk assessments. Technical ogy.
report, National Institute of Standards and Technology, 2012.
[5] A. MacAfee and E. Brynjolfsson. Big data: The management revolution.
Harvard Business Review Magazine, October 2012.
[6] S. Sagiroglu and D. Sinanc. Big data: A review. In International Confer-
ence on Collaboration Technology and System. International Conference
on Collaboration Technology and System, 2013.
[7] A. Sathi. Big Data Analytics: Disrupting Technologies for Changing
Game. MC Press, 2012.
[8] D. Zage, K. Glass, and R. Colbaugh. Improving supply chain security
using big data. In International Conference on Intelligence and Security
Informatics. IEEE, 2013.