Posts Tagged EA874 Topic 3

With Great Power Comes Great Responsibility

The Enterprise Data Architecture, Part 3

Every year, we face challenge after challenge regarding data security.  Whether it’s personal identity theft, corporate data hacking, ransomware or industrial espionage, it seems like for every step forward, we take two-three steps backwards.  This has a large impact not only on private consumers, but on the business world in general.

For consumers, the biggest issue being dealt with is Identity Fraud.  With the increasing amount of Identity theft & fraud, consumers are facing more and more challenges to keep their personal data safe.  More and more data is being collected from the consumer, from browsing habits to shopping trends.  Additionally, critical personal information such as credit card information, phone numbers, address, or even occasionally social security numbers are being used on various online websites.  Let’s not even start a discussion about the credit card skimmers at various retailers….

And what happens after your personal data has been stolen…?

Image Source: Ponemon Institute


On the business side, it appears that no one is safe.  With the recent hack of Equifax, we have seen tremendous amounts of data stolen that could be devastating to consumers.  A reported 143 million people’s data was taken, potentially including Social Security numbers.  And the worse part?  None of us even gave Equifax permission to have our data to begin with.  The list of hacks for 2017, according to ZDNet, is frightening:

  • Equifax – 143 million accounts
  • Verizon – 14+ million accounts
  • Bell Canada – 1.9 million accounts
  • Edmodo – 77 million accounts
  • Handbrake (video encoder software for Mac) – unknown number of users
  • Wonga – 270 thousand accounts
  • Wannacry ransomware – 200 thousand computers
  • Sabre – thousands of business customers
  • Virgin America
  • Cellebrite
  • Cloudfare
  • iCloud
  • TSA
  • OneLogin
  • US Air Force

The list could go on.  We live in a time where data is everywhere.  This is the reality of Big Data.  Regardless of whether it’s your personal data or  business data, it is stored somewhere, and it is potentially susceptible to to unwanted exposure.  We know that hackers are going to try their best to get to that data.  So what are the real challenges for the security of Big Data?  And what can we do to make it more secure?  According to Data Center Knowledge, here is a list of the top 9 Big Data Security challenges, and potential ways the security could be improved.

Big Data Security Challenges:

  1. Most distributed systems’ computations have only a single level of protection, which is not recommended.
  2. Non-relational databases (NoSQL) are actively evolving, making it difficult for security solutions to keep up with demand.
  3. Automated data transfer requires additional security measures, which are often not available.
  4. When a system receives a large amount of information, it should be validated to remain trustworthy and accurate; this practice doesn’t always occur, however.
  5. Unethical IT specialists practicing information mining can gather personal data without asking users for permission or notifying them.
  6. Access control encryption and connections security can become dated and inaccessible to the IT specialists who rely on it.
  7. Some organizations cannot – or do not – institute access controls to divide the level of confidentiality within the company.
  8. Recommended detailed audits are not routinely performed on Big Data due to the huge amount of information involved.
  9. Due to the size of Big Data, its origins are not consistently monitored and tracked.

How can Big Data Security be Improved?

  1. The continued expansion of the antivirus industry.
  2. Focus on application security, rather than device security.
  3. Isolate devices and servers containing critical data.
  4. Introduce real-time security information and event management.
  5. Provide reactive and proactive protection.

As stated by James Norrie, dean of the Graham School of Business at York College of Pennsylvania, “Big companies made big data happen. Now, ‘big security’ must follow, despite the costs. Regulators and legislators need to remind them through coordinated actions that they can spend it now to protect us all in advance or pay it later in big fines when they don’t. But either way, they are going to pay. Otherwise, the only ones paying will be consumers.”


, ,

1 Comment

Taming the Beast

The Enterprise Data Architecture, Part 2

So we know that Big data is a big problem.  What can we do about it and what can we do with it?

First of all, we need to have an understanding of the content of the big data and how we process this information.  Gandomi & Haider (2015) state that “the over all process of extracting insights from big data can be broken down into five stages.  These five stages form the two main sub-processes: data management and analytics. Data management involves processes and supporting technologies to acquire and store data and to prepare and retrieve it for analysis. Analytics, on the other hand, refers to techniques used to analyze and acquire intelligence from big data.”

Image source: Gandomi & Haider, 2015


Once we have a better understanding of the how to process Big Data, how can we efficiently leverage the information we gain?

The growth of data metrics over time in both quantity and quality is nothing new.  Even in the 80s and 90s, articles were published regarding the exponential growth of data and the challenges caused by this growth (Press, 2013).  The challenge that has been continually fought in all those years has been to make the available data meaningful.  Big data, as we have defined it, provides many opportunities for organizations through “improved operational excellence, a better understanding of customer relations, improved risk management and new ways to drive business innovation.  The business value is clear” (Buytendijk & Oestreich, 2016).  Yet, investment in big data tools and initiatives are slow to materialize.

Organizations can incorporate big data initiatives into their existing business process components and artifacts.  This will help establish big data as part of their Enterprise Architecture Implementation Plan and incorporate these new business strategies into the future architecture.  Educating business leaders and stakeholders as to the benefits of big data initiatives will help overcome any concerns they may have (Albright, Miller & Velumani, 2016).  Back in 2013, Gartner conducted a study on Big Data which showed that many leading organizations had already adopted big data initiatives to various degrees, and were starting to use the results in both innovation initiatives as well as sources of business strategy.  Included in their results from that study, they found that “42% of them are developing new products and business models, while 23% are monetizing their information directly” (Walker, 2014).

This is where Enterprise Architecture comes into play.  EA is uniquely equipped, with it’s holistic view of strategy, business and technology, to not only create a strategic plan to address the potential big data opportunities, but to create a road map which positions organizations to improve operations, enable growth, and foster innovation.  “Organizations that leverage EA in their big data initiatives are able to identify strategic business goals and priorities, reduce risk and maximize business value” (Walker, 2014).

Image source: Walker, 2014


Through the various efforts of EA, new technologies and new approaches to processing, storing and analyzing Big Data, organizations are gradually finding ways to uncover valuable insights.  Obviously, leading the charge are leaders such as Facebook, LinkedIn and Amazon, but many other companies have joined the effort as well.  “From marketing campaign analysis and social graph analysis to network monitoring, fraud detection and risk modeling, there’s unquestionably a Big Data use case out there with your company’s name on it” (Wikibon. 2012).  This infographic below was put together by Wikibon to show how various business leaders have overcome their challenges and have tamed the Big Data beast.




Albright, R., Miller, S. & Velumani, M. (August 2016).  Internet of Things & Big Data.  EA872, World Campus.  Penn State University.

Buytendijk, F. & Oestreich, T. (2016) Organizing for Big Data Through Better Process and Governance. (G00274498). Gartner.

Gandomi, A. & Haider, M. (2015). Beyond the Hype: Big data concepts, methods, and analytics, International Journal of Information Management, Volume 35, Issue 2, April 2015, Pages 137-144, ISSN 0268-4012,

Press, G. (2013) A Very Short History of Big Data. Retrieved from

Walker, M. (2014). Best Practices for Successfully Leveraging Enterprise Architecture in Big Data Initiatives (G00267056). Gartner.

Wikibon. (2012). Taming Big Data. Wikibon. Retrieved September 20, 2017 from


, ,

1 Comment

Come on… Big Data! Big Data!

The Enterprise Data Architecture, Part 1


With the explosive growth of the Internet and more recently, the Internet of Things (the rise of the machines…!!!), there has been a corresponding explosive growth in the amount of data available and collected from all those connected devices and software.  However, along with the vast volume of data that has been generated, there has been an even greater challenge in dealing with the data.  As early as 2001, various IT analysts started reporting on potential issues that would arise due to the mass amounts of data being generated.  Most notably, this article by Gartner analyst, Doug Laney, summarized the various issues attached to Big Data (as it’s commonly called) into whats known as the 3Vs:

  • Data Volume – The depth/breadth of data available
  • Data Velocity – The speed at which new data is created
  • Data Variety – The increasing variety of formats of the data

Now, 16 years after that article was written, we still face many of the same challenges.  Even though technology has improved to be able to handle larger amounts of data processing and analytics, the amount of source data has continued growing at exponential rates.  Cisco releases each year a Visual Networking Index which shows previous years data as well as predictions regarding the next few years as well.  In their 2016 report (Cisco, 2016), the prediction was that by 2020, there would be over 8 billion handheld/personal mobile ready devices as well as over 3 billion M2M devices (Other connected devices such as GPS, Asset Tracking Systems, Device Sensors, Medical applications, etc.) in use, consuming a combined 30 million terabytes of mobile data traffic per month.  And that is just mobile data.


So what are the real challenges being faced due to this exponential growth of data?  Here are some facts to consider as posted by Waterford Technologies:

  • According to estimates, the volume of business data worldwide, across all companies, doubles every 1.2 years.
  • Poor data can cost businesses 20%–35% of their operating revenue.
  • Bad data or poor data quality costs US businesses $600 billion annually.
  • According to execs, the influx of data is putting a strain on IT infrastructure. 55 percent of respondents reporting a slowdown of IT systems and 47 percent citing data security problems, according to a global survey from Avanade.
  • In that same survey, by a small but noticeable margin, executives at small companies (fewer than 1,000 employees) are nearly 10 percent more likely to view data as a strategic differentiator than their counterparts at large enterprises.
  • Three-quarters of decision-makers (76 per cent) surveyed anticipate significant impacts in the domain of storage systems as a result of the “Big Data” phenomenon.
  • A quarter of decision-makers surveyed predict that data volumes in their companies will rise by more than 60 per cent by the end of 2014, with the average of all respondents anticipating a growth of no less than 42 per cent.
  • 40% projected growth in global data generated per year vs. 5% growth in global IT spending.

Datamation put together this list if Big Data Challenges of which I want to highlight a few a specifically.

  1. Dealing with Data Growth – As already mentioned above, the amount of data is growing year over year.  So a solution that may work today, may not work well tomorrow.  Investigating and investing in the technologies that can grow together with the data is critical.
  2. Generating Insights in a Timely Manner – Generating and collecting mass amounts of data is a specific challenge that needs to be faced.  But more importantly, what do we do with all that data?  If the data being generated is not being analysed and used to benefit the organization, then the effort is being wasted.  New tools to analyze data are being created and released annually and these need to be evaluated to see if there are organizational benefits to be gained.
  3. Validating Data – Again, if your concern is generating and collecting mass amounts of data, then just as important as processing and analyzing the data, it is important to verify the integrity of the data.  This is especially important in the quickly expanding field of medical records and health data.
  4. Securing Big Data – Additionally, the security of the data is a rapidly growing concern.  As seen in recent data hacks such as the Equifax hacking attacks, the sophistication of hacking and phishing is growing at a rate equivalent to the volume of big data itself.  If the sources of data are not able to provide adequate security measures, the integrity of the data can be questioned as well as many other issues.

Big Data is here to stay, and it’s only going to get bigger.  Is your company ready for it?



Cisco (2016). Cisco Visual Networking Index. Retrieved from


, ,

No Comments