Viw Magazine

Business Coach

.

  • Written by Mohiuddin Ahmed, Lecturer of Computing & Security, Edith Cowan University
Unlike purpose-built data storage systems, a data lake can be used to dump data in its original form. This data usually remains unsupervised. Shutterstock.com

Machines and the internet are woven into the fabric of our society. A growing number of users, devices and applications work together to produce what we now call “big data”. And this data helps drive many of the everyday services we access, such as banking.

A comparison of internet snapshots from 2018 and 2019 sheds light on the increasing rate at which digital information is exchanged daily. The challenge of safely capturing and storing data is becoming more complicated with time.

This is where data warehouses and data lakes are relevant. Both are online spaces used by businesses for internal data processing and storage.

Unfortunately, since the concept of data lakes originated in 2010, not enough has been done to address issues of cyber security.

These valuable repositories remain exposed to an increasing amount of cyber attacks and data breaches.


Read more: Australia is vulnerable to a catastrophic cyber attack, but the Coalition has a poor cyber security track record


A proposed panacea for big data problems

The traditional approach used by service providers is to store data in a “data warehouse” – a single repository that can be used to analyse data, create reports, and consolidate information.

However, data going into a warehouse needs to be pre-processed. With zettabytes of data in cyber space, this isn’t an easy task. Pre-processing requires a hefty amount of computation done by high-end supercomputers, and costs time and money.

Data lakes were proposed to solve this. Unlike warehouses, they can store raw data of any type. Data lakes are often considered a panacea for big data problems, and have been embraced by many organisations trying to drive innovation and new services for users.

James Dixon, the US data technician who reputedly coined the term, describes data lakes thus:

If you think of a datamart as a store of bottled water – cleansed and packaged and structured for easy consumption – the data lake is a large body of water in a more natural state. The contents of the data lake stream in from a source to fill the lake, and various users of the lake can come to examine, dive in, or take samples.

Be careful swimming in a data lake

Although data lakes create opportunities for data crunchers, their digital doors remain unguarded, and solving cyber safety issues remains an afterthought.

Our ability to analyse and extract intelligence from data lakes is threatened in the realms of cyber space. This is evident through the high number of recent data breaches and cyber attacks worldwide.

With technological advances, we become even more prone to cyber attacks. Confronting malicious cyber activity should be a priority in the current digital climate.

While research into this has flourished in recent years, a strong connection between effective cyber security and data lakes is yet to be made.

Not uncommon to be compromised

Due to advances in malicious software, specifically in malware obfuscation, it’s easy for hackers to hide a dangerous virus within a harmless-looking file.

False data injection attacks have increased over the past decade.

The attack happens when a cyber criminal exploits freely available tools to compromise a system connected to the internet, to inject it with false data.


Read more: Aerial threat: why drone hacking could be bad news for the military


The foreign data injected gains unauthorised access to the data lake and manipulates the stored data to mislead users. There are many potential motivators behind such an attack.

Components of data lakes

Data lake architecture can be divided into three components: data ingestion, data storage and data analytics.

Data ingestion refers to data coming into the lake from a diverse range of sources. This usually happens with no legitimate security policies in place. When incoming data is not checked for security threats, a golden opportunity is presented for cyber criminals to inject false data.

The second component is data storage, which is where all the raw data gets dumped. Again, this happens without any sizeable cyber safety considerations.

The most important component of data lakes is data analytics, which combines the expertise of analysts, scientists and data officers. The objective of data analytics is to design and develop modelling algorithms which can use raw data to produce meaningful insights.

For instance, data analytics is how Netflix learns about its subscribers’ viewing habits.

Challenges ahead for data experts

The slightest change or manipulation in data lakes can hugely mislead data crunchers and have widespread impact.

For instance, compromised data lakes have huge implications for healthcare, because any deviation in data can lead to a wrong diagnosis, or even casualties.

Also, government agencies using compromised data lakes may face mayhem in international affairs and trade situations. The defence, finance, governance and educational sectors are also vulnerable to data lake attacks.


Read more: Who's afraid of the bad, big data? You might want to read this


Considering the volume of data stored in data lakes, the consequences of cyber attacks are far from trivial.

And since generating huge amounts of data in today’s world is inevitable, it’s crucial that data lake architects try harder to ensure these at-risk data depots are correctly looked after.

Mohiuddin Ahmed does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

Authors: Mohiuddin Ahmed, Lecturer of Computing & Security, Edith Cowan University

Read more http://theconversation.com/data-lakes-where-big-businesses-dump-their-excess-data-and-hackers-have-a-field-day-123865

Revolutionizing Manufacturing: Unleashing the Full Potential of Stereolithography SLA 3D Printing

3D printing is changing how we make things, and Stereolithography (SLA) 3D printing is at the center of this change. Making models or prot...

Impact of Early Intervention on Hearing-Impaired Children

Early intervention plays a crucial role in shaping the lives of children with hearing impairments, providing them with the necessary suppo...

The Role of a Mortgage Broker in Handling Your Reverse Mortgage

Choosing the right reverse mortgage can be a daunting task, especially given the multitude of options and complex terms involved. A mortga...

Showcasing Craftsmanship in Sydney's Furniture Outlets

Seeking an appropriate furnishing is the first step towards accomplishing perfect interior layout in Sydney, a colourful city where styl...

Blue Stars FX Review – The Benefits of Using an Advanced Online Brokerage Firm

If you are a seasoned trader in the dynamic world of crypto trading, then you understand that it is crucial to have a trading platform by ...

Maxon365 Review - (maxon365.com) Is Maxon 365 Scam or a Proper Broker?

The crypto trading arena is considered to be highly volatile and unpredictable. Hence, to keep up with the changing dynamics of the market...

Scrap Copper Secrets: Unlocking Melbourne's Pricing Patterns

In the heart of Melbourne's bustling urban landscape lies a hidden world of scrap metal, where discarded treasures await their chance at r...

Setting Up The Home Game Room Of Your Dreams

Everybody likes to play games, for some, it's a pleasant occasional pass time, for some, it's a regular good-natured competition with frie...

What is the best Ethernet Cable to satisfy your networking needs?

Whether you are a seasoned IT professional or a novice enthusiast, understanding something about ethernet cables can significantly impact ...

The Top 10 Reasons to Purchase a Makeup Mirror

Investing in a quality makeup mirror is a game-changer for anyone who applies makeup, grooms, or simply wants a better view when taking ca...

Understanding TPD Claims: Navigating the Process and Securing Your Entitlements

Total and Permanent Disability (TPD) claims serve as a vital resource for individuals facing significant injuries or illnesses that hinder...

Brisbane Personal Injury Lawyers: Advocates for Your Rights and Compensation

When you've suffered a personal injury in Brisbane, navigating the legal landscape can be daunting. That's where Brisbane personal injury ...

How Does Salary Sacrificing Save Money?

By strategically sacrificing salary, you save money through tax benefits and boosted take-home pay. Lower taxable income means less tax ...

Tips for Reducing Mould in Your Caravan

To prevent mould in your caravan, ensure good ventilation by opening windows and using fans. Keep airflow constant, especially when cookin...

Navigating the Aftermath: What to Do When You're in a Car Accident

Car accidents can be unsettling and chaotic experiences, often leaving individuals overwhelmed and unsure of what steps to take next. Howe...

Smart Mirrors: Revolutionizing Your Morning Routine with High-Tech Features

In today’s fast-paced world, technology seamlessly integrates into every aspect of our daily lives, aiming to enhance convenience and ef...

Brisbane to Face Another Gribbly Winter

Queensland has experienced another wet, hot summer, and in Brisbane, this means populations of pest species will be booming. For many pest...

Common Household Electrical Problems

Ever had a rough day just because you had an electrical problem at your residential property?  Imagine a fine morning, when you are read...

Important Instructions for Australians Living in Camper Trailers

Living in a camper trailer offers Australians a unique way to embrace adventure and freedom while exploring the vast and beautiful landsca...

Maintaining Your Mini Digger: Tips for Longevity and Performance

If you're a proud owner or operator of a mini digger in Australia, you understand the importance of keeping your equipment in top-notch co...

Tomorrow Business Growth