70 likes | 206 Views
Customer Location Data. Rachel Edelshteyn John Faustino Hussain Hussani David Miller Khamel Mumford M SIT 458. Security Problem. Confidentiality of Customer Data Across Various Technologies Multiplicity / Volume
E N D
Customer Location Data Rachel Edelshteyn John Faustino Hussain Hussani David Miller Khamel Mumford MSIT 458
Security Problem • Confidentiality of Customer Data Across Various Technologies • Multiplicity / Volume • Tightening Up Security in Vulnerable Areas • Collection • Server Side • App Side • Multiple Sectors • Consumer Electronics • Financial Services
What About Protection Against Data Theft During Transmission? What About Areas Where Collection is Not Protected?
Focus on Mobile DEMPSY Server as a Probe Data Repository HADOOP for Batch Analytics on Apache Server Pull Probe data written to csv file LDAP/ Kerberos
Why? “Security is largely ignored in the community” - Dr. Chen “Why join the navy if you can be a pirate?” - Steve Jobs Speed to Market Strategy Proof of Concept Investment vs Risk Security is always competing with other priorities
Potential Solutions • Encryption • 70% of security breaches are committed from inside a network’s perimeter • Just focus on the internal? • Others TBD