How do you Secure Big Data? Big Data (Fact or Myth)??
Transcript
1. How do you Secure Big Data? Big Data (Fact or Myth)??
2. Agenda Copyright 2014 Atomic Database Corp Information
Technology issues today Multi Source Data Aggregation/Correlation
Data complexity / flexibility Data Cyber Security Concerns Change
the Architecture ! Solution?
3. FBI Hacker Copyright 2014 Atomic Database Corp Reality Check
The MOST Dangerous words in business This is the way we have always
done it
4. Computer Productivity Basics Copyright 2014 Atomic Database
Corp Centralized Security Most Secure Less Productive De -
Centralized Security Least Secure More Productive Up to 1980s After
1990s Associative Based Security More Secure More Productive The
Future
5. Back to Basics Copyright 2014 Atomic Database Corp Knowledge
Security Knowledge Information Multiple Data Sources Security Level
- Critical Security Level - Important Security Level - fractured
Information Technology Computer Science Hardware Software (Cir.
1971) SQL FILES Main Frame Trade Feed Social VideoNOSQL EXCEL
6. The CEO Security Problem Too many disparate Databases and
data sources Lack of timely information & Incorrect information
Potential Loss of control of the business Sky rocketing cost for
storage Lack of Enterprise reporting Lack of knowledge &
support capabilities Overly complex systems Copyright 2014 Atomic
Database Corp Contributing issues :
7. Associative Data Management Copyright 2014 Atomic Database
Corp 3rd Normal Form (N) Normal Form ACID Compliance A New Option
HR Contracts Delivery Accounting Manufacturing Inventory CRM
SalesAccounts Clients Marketing Parts Distribution HR Contracts
Delivery Accounting Manufacturing Inventory CRM SalesAccounts
Clients Marketing Parts Distribution HR Contracts Delivery
Accounting Manufacturing Inventory CRM SalesAccounts Clients
Marketing Parts Distribution HR HR HR Aggregation ETL Bidirectional
Sync Single Source Bidirectional Sync Transition
8. SQL / No SQL vs Associative Copyright 2014 Atomic Database
Corp 18 Tables 176 Fields 1 Model 72 Fields 3rd Normal Form (circa
1971) (N) Normal Form ACID Compliance A New Option
9. Associative data matrix Copyright 2014 Atomic Database Corp
Data Data Data Data Data Data Data Data Data Data Data Data Data
Data Associative Pointer AtomicDB Manages The Pointer
(Associations) It Does NOT Manage the Data
10. Standard data matrix Copyright 2014 Atomic Database Corp
1991 2001 1986 2001 2012 1993 1991 1998 Lawyer Teacher Mother
Mother Musician Engineer Lawyer Chef Robert John Jeff Bill Andre
John Alex Bill Jones Smith Jones Heart Stone Jefferson Washington
Smith Susan Susan Amanda Amanda Sally Summer Deborah Brittney
11. Copyright 2014 Atomic Database Corp 1991 1986 2001 2012
1993 1998 Teacher Mother Musician Engineer Lawyer Chef Robert Jeff
Bill Andre John Alex Jones Smith Heart Stone Jefferson Washington
Susan Amanda Sally Summer Deborah Brittney Information gets
contextualized based on associations and works like the human brain
Security through Abstraction
12. Copyright 2014 Atomic Database Corp Multi Database Design
500 + RDBMS Oracle 10, 9, 11, Associative DB Staging Connectivity
Hub Application A Application BApplication A Application B Data
Cleansing Data Normalization Application C Associative DB Reporting
Intranet Monitoring Business Intelligence Storage, Licences fees,
Agility Production DW/ DBBi-Directional Security through
Compartmentalization
13. Associative data matrix Copyright 2014 Atomic Database Corp
Courtesy of Dr Ashis Banerjee