2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet333/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   329   330   331   332   333   334   335   336   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Data Analytics
Data analytics
is the science of raw data examination with the focus of extracting useful 
information out of the bulk information set. The results of data analytics could focus on 
important outliers or exceptions to normal or standard items, a summary of all data items, 
or some focused extraction and organization of interesting information. Data analytics is a 
growing field as more organizations are gathering an astounding volume of data from their 
customers and products. The sheer volume of information to be processed has demanded 
a whole new category of database structures and analysis tools. It has even picked up the 
nickname of “big data.”
Big data
refers to collections of data that have become so large that traditional means 
of analysis or processing are ineffective, inefficient, and insufficient. Big data involves 
numerous difficult challenges, including collection, storage, analysis, mining, transfer, dis-
tribution, and results presentation. Such large volumes of data have the potential to reveal 
nuances and idiosyncrasies that more mundane sets of data fail to address. The potential 
to learn from big data is tremendous, but the burdens of dealing with big data are equally 
great. As the volume of data increases, the complexity of data analysis increases as well. Big 
data analysis requires high-performance analytics running on massively parallel or distrib-
uted processing systems. With regard to security, organizations are endeavoring to collect 
an ever more detailed and exhaustive range of event data and access data. This data is col-
lected with the goal of assessing compliance, improving efficiencies, improving productiv-
ity, and detecting violations.


350
Chapter 9 

Security Vulnerabilities, Threats, and Countermeasures

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   329   330   331   332   333   334   335   336   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish