Abstract
Data science delivers an important role in cybersecurity by utilizing the power of data, high-performance computing, and data mining to protect users against cybercrimes and threats. Due to the rapid expansion of data, there are hidden dark data in organizations that are unidentified and unmanageable. It is significant to understand the various prospects that will arise through the utilization of dark data by various organizations. They will find these data valuable to their business intelligence. In this chapter, we are introducing the methodology which will identify dark data and forecast future cybersecurity threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Analyzing “Dark Data” for Traders Using IBM Watson and Bluemix. (2017), Retrieved February 7, 2020, from Altoros website: https://www.altoros.com/blog/analyzing-dark-data-for-traders-using-ibm-watson-bluemix/
From data to knowledge: Dark data. (2018), Retrieved February 7, 2020, from Ibm.com website: https://www.ibm.com/developerworks/library/ba-data-becomes-knowledge-3/index.html
From data to knowledge: Dark data. (2018), Retrieved from Ibm.com website: https://www.ibm.com/developerworks/library/ba-data-becomes-knowledge-3/index.html
N. Anderson, Control Dark Data in the New Age of Compliance and Security. (n.d.), Retrieved from https://www.ciosummits.com/Control_Dark_Data_in_the_New_Age_of_Compliance_and_Security.pdf
Dark Data, Big Data, and Your Data: Creating an aCtion Plan for Information governanCe. (n.d.). Retrieved from https://www.ciosummits.com/Dark_Data_Big_Data_Your_Data_Creating_an_Action_Plan_for_Information_Governance.pdf
Dark Data – The Blind Spots in Your Analytics | iDashboards Blog, (2020), Retrieved February 7, 2020, from Idashboards.com website: https://www.idashboards.com/blog/2019/01/30/dark-data-the-blind-spots-in-your-analytics/
T. Dingeldein, 4 Dark Data Mining Insights for Small Business Owners. (2018), Retrieved February 7, 2020, from Capterra.com website: https://blog.capterra.com/dark-data-mining/
Hortonworks Big Data Maturity Model HORTONWO RKS BIG DATA MATURITY MODEL. (2016), Retrieved from http://hortonworks.com/wp-content/uploads/2016/04/Hortonworks-Big-Data-Maturity-Assessment.pdf
J. Colchester, Dark Data – Systems Innovation. (2018), Retrieved February 7, 2020, from Systems Innovation website: https://systemsinnovation.io/dark-data/
Destroying Dark and Unstructured Data | IDM Magazine. (2018), Retrieved February 7, 2020, from Idm.net.au website: https://idm.net.au/article/0012194-destroying-dark-and-unstructured-data
Figure 2f from: Irimia R, Gottschling M (2016) Taxonomic revision of Rochefortia Sw. (Ehretiaceae, Boraginales). Biodivers. Data J. 4: e7720. https://doi.org/10.3897/BDJ.4.e7720. (n.d.). doi: https://doi.org/10.3897/bdj.4.e7720.figure2f
The risks of Dark Data for your organization | Migrato(2016), Retrieved February 7, 2020, from Migrato website: https://www.migrato.nl/the-risks-of-dark-data-for-your-organization/; M. Tulloch, Shedding light on dark data: Is it an opportunity or risk? (2019) Retrieved February 7, 2020, from TechGenix website: http://techgenix.com/dark-data-risk/
M. Ross-Smith, Dark Data: The hidden billion dollar opportunity – SmartData Collective. (2016), Retrieved February 7, 2020, from SmartData Collective website: https://www.smartdatacollective.com/dark-data-hidden-billion-dollar-opportunity/
bhuthesh@kenome.io, Kenome: An Enterprise Knowledge Graph Company. (2017), Retrieved February 7, 2020, from Kenome.io website: https://www.kenome.io/
K. Kirkham, Why Companies Need To Pay Attention To Their Dark Data – blog.100tb.com. (2018), Retrieved February 7, 2020, from blog.100tb.com website: https://blog.100tb.com/why-companies-need-to-pay-attention-to-their-dark-data
What is Dark Data and How Can You Use It? – UC Today. (2019), Retrieved February 7, 2020, from UC Today website: https://www.uctoday.com/unified-communications/what-is-dark-data-and-how-can-you-use-it/
Standard: PCI Data Security Standard (PCI DSS) Effective Daily Log Monitoring. (2016), Retrieved from https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Teymourlouei, H., Jackson, L. (2021). Dark Data: Managing Cybersecurity Challenges and Generating Benefits. In: Arabnia, H.R., et al. Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-69984-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-69984-0_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69983-3
Online ISBN: 978-3-030-69984-0
eBook Packages: Computer ScienceComputer Science (R0)