Canalblog
Editer l'article Suivre ce blog Administration + Créer mon blog
Publicité
Groupement INI : Intégration Numérique pour l'Industrie
8 février 2016

Internet of Things- Threats and Thriving Analytics

Internet of things or internet of everything is a galaxy of digital devices forming a horizon by being connected to the internet. IoT ripples and driving forces are creating waves of opportunities and innovations along with risk and remedy challenges. IoT adopts an information ecosystem of electronic equipment, applications, systems and networks that are owned and operated by humans to enhance digital human life.

Threats are undeniable facts that cause damage, destruction, disruption, danger and disaster in the field of information communication sensitivity and integrity. Vulnerable systems and applications are exposed to exploitation that escalates threats level so the chances of risks is contagious.

In my view, analytics come in many forms as predictive, detective, corrective, informative and reporting. However, analytics performs analysis (processing) of given input with the help of logics, programs and algorithms to produce meaningful output that is called efficiency of analytics, and its outcome can be measured on effectiveness.

Different Types of AnalyticsSource: CI&T

 

Why are analytics thriving?

In the information security realm, IoT as an entity produces numerous logs, events and data flows. As a security profound tool, SIEM (Security Information and Event and Management) has been adopted by various businesses and government agencies. SIEM correlates security baseline with logs, events and flows and uses its own analytic engines to process a report along with real-time monitoring outputs. Lately, SIEM is being considered an essential organ for security compliance and legal obligations.

Due to advanced technology and trends, security dimension has evolved into advanced persistence proliferation of malware. The spectrum of security is being penetrated, and information systems are safe havens for harvesting ripe information and sold pricelessly. Sophisticated hackers have entered into an age of advanced persistence malware and threats. Threats analysis has become a critical and integral part of security, and it is crucial to the digital economy and forensic analysis to fight cyber security crimes and criminals.

To overcome malware and their proprietor, security threats specific to Big Data sources are being published publicly as a malware dictionary so it can be used to develop signatures and reference repository. Even commercial vendors such as Palo Alto, CISCO, HP and IBM are trusting on the public threats of Big Data. For instance, billions of new malware types have been constantly updating from the IoT world to the threats commonly set up by various vendors, global governments and other organizations by challenging geo-political legal obligations and jurisdictions.

To process this vast swath of malware-specific Big Data requires millions of analytical engines’ power. The IoT trend is transforming Big Data into Enormous Data soon. Trends of IoT are an unprecedented proliferation in the age of information, and its protection is abided to ethical and social values of digital users—a digital-human dilemma!

Article written by Bip Khanal for icrunchdata News New York City, New York USA

Publicité
Publicité
Commentaires
About us

INI is a groupment of high tech small and medium size companies with over 20 years experience in the field of Internet technologies objects and big data. Activity: Design, production and database integration for the production of high value-added services. INI is powered by MOV'EO Cluster.

Publicité
Contact us
Links to the websites of the Groupement INI members
Archives
Visiteurs
Depuis la création 9 316
Publicité