1 / 7

Customer Location Data

Customer Location Data. Rachel Edelshteyn John Faustino Hussain Hussani David Miller Khamel Mumford M SIT 458. Security Problem. Confidentiality of Customer Data Across Various Technologies Multiplicity / Volume

bishop
Télécharger la présentation

Customer Location Data

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Customer Location Data Rachel Edelshteyn John Faustino Hussain Hussani David Miller Khamel Mumford MSIT 458

  2. Security Problem • Confidentiality of Customer Data Across Various Technologies • Multiplicity / Volume • Tightening Up Security in Vulnerable Areas • Collection • Server Side • App Side • Multiple Sectors • Consumer Electronics • Financial Services

  3. What About Protection Against Data Theft During Transmission? What About Areas Where Collection is Not Protected?

  4. Focus on Mobile DEMPSY Server as a Probe Data Repository HADOOP for Batch Analytics on Apache Server Pull Probe data written to csv file LDAP/ Kerberos

  5. Why? “Security is largely ignored in the community” - Dr. Chen “Why join the navy if you can be a pirate?” - Steve Jobs Speed to Market Strategy Proof of Concept Investment vs Risk Security is always competing with other priorities

  6. Potential Solutions • Encryption • 70% of security breaches are committed from inside a network’s perimeter • Just focus on the internal? • Others TBD

  7. Thank you!

More Related