YoVDO

Big Data, Little Security - Practical Steps for Securing Big Data

Offered By: LASCON via YouTube

Tags

LASCON Courses NoSQL Databases Courses Encryption Courses Authorization Courses Kerberos Courses Threat Modeling Courses Big Data Security Courses

Course Description

Overview

Explore practical steps for securing big data installations in this 49-minute conference talk from LASCON. Learn about the security challenges associated with big data's three Vs (Velocity, Variety, and Volume) and discover how to address the potential fourth V: Vulnerability. Delve into topics such as deployment security issues, authorization methods like Kerberos, NoSQL vulnerabilities, node-to-node encryption, and threat modeling. Gain insights on creating a secure environment with a single point of access and understand the importance of implementing robust security measures in big data projects.

Syllabus

Intro
About Manoj
Agenda
What is Big Data
Framework
Data nodes
NoSQL
Big Data Security
Deployment Security Issues
No Security
Security is not optional
No Security Examples
Authorization
Kerberos
Finding Hadoop admins
Kerberos in Hadoop
Limitations of Kerberos
No sequel vulnerabilities
Should we add OBJ
Authentication and Authorization plugin
Node to Node encryption
Enterprise adoption
Project Rhino
Threat Modeling
Secure Environment
Single Point of Access


Taught by

LASCON

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera