Eurogiro News 7
Uwe Holmsgaard,
Contingency
Takayuki Murakami from Japan Postbank
gave an update on the enhanced contingency
procedures they have implemented after the
earthquake and the tsunami in 2011. The
major problem after the disaster was lack of
staff as a result of the breakdown in trans
portation services. A 3rd ELS is now installed
at the DR site and it is synchronized with the
production ELS. Procedures are in place for
frequent DR testing.
Big Data
Big Data is still one of the most discussed
technology trends. Urs Fischer, Switzerland
gave an eye-opening account of how data is
being collected and processed.
He began by showing the massive building
constructions of NSA where data, according
to Mr. Snowden, is collected, stored and
processed. He continued showing a video on
how Big Data can be used for “mind-reading”:
Data is collected to be analysed to find
patterns and correlations that may not be
initially apparent, but may be useful in making
business decisions. This process is called Big
Data analytics. This data is often personal
data that is useful from a marketing perspec-
tive in understanding the likes and dislikes of
potential buyers and in analysing and predic-
ting their buying behaviour. Personal data can
be categorised as:
>
Volunteered data
- Shared by individuals
(social networks)
>
Observed data
– Captured by recording
the actions of individuals
>
Inferred data
– Data about individuals
based on analysis of volunteered or obser-
ved information
Big Data Risk
The concept of Big Data risk management is
still at the infancy stage for many enterprises,
and security policies and procedures are still
developing in many areas. Numerous busi-
ness executives might not recognise that the
faster and easier it is to access Big Data, the
greater the risk to all of that valuable informa-
tion. Inaccurate, incomplete or fraudulently
manipulated data poses an increasing risk
as enterprises become more dependent
on the data to drive decision-making and
assess results.
Urs Fischer concluded: “A proper governance
must be in place. The enterprise culture, which
either fights or embraces innovation, requires a
Big Data leader who understands his/her role
in innovation or enterprise direction.”
APT and DDoS
Jan Kaastrup from the security company
CSIS in Denmark spoke on "How to deal
Big Data refers to data sets that are
too large or too fast changing to be
analysed using traditional relational or
multi-dimensional database tech-
niques or commonly used software
tools to capture, manage and process
the data at a reasonably elapsed time.
with Distributed Denial of Service Attacks
and Advanced Persistent Threats (APT)" .
APT covers all kinds of threats to your IT
environment, such as viruses, phishing,
web-site manipulation, Trojan horses and
modifications to routers. The exploitation is
often from professional hackers via cloud
provider penetration, WIFI or Smartphone
bridging.
Malware is produced on a scale where
100,000 new variants emerge every day,
making the anti-virus software insufficient as
it is not possible to keep it updated with the
required speed. The detection must include
baseline comparison and traffic analysis.
To protect the environment from DDoS you
may need multiple IP addresses into your
web-site or present your site via a cloud-
based service.
Eurogiro IT is looking forward to next year’s
event where we will present the new ELS
/ ESM user interface. We will again invite
external speakers to present the challenges
which we have to deal with in our respective
organisations.
3
Big data analytics can positively
affect:
>
Product development
>
Market development
>
Operational efficiency
>
Customer experience and loyalty
>
Market demand predictions
DDoS attacks are often
performed by disgruntled
customers, political
groupings or kids just for
the fun of it!
Shri B. P. Ganapathy, India Post, presented
the IT infrastructure and how to computer-
ize 130,000 post offices before the end of
2014 in the Rural ICT project
Watch the video
where random
people are invited in
for a “mind-reading”
session
DDos Pricelist:
1 hour:
10 USD
24 hours:
150 USD
1 week:
600 USD
1 month:
2000 USD
DDos is “Crime-as-a-service” where
you can order an attack on a certain
site via the internet.