Skip to main content

Dark Data: Managing Cybersecurity Challenges and Generating Benefits

  • Conference paper
  • First Online:
Advances in Parallel & Distributed Processing, and Applications

Abstract

Data science delivers an important role in cybersecurity by utilizing the power of data, high-performance computing, and data mining to protect users against cybercrimes and threats. Due to the rapid expansion of data, there are hidden dark data in organizations that are unidentified and unmanageable. It is significant to understand the various prospects that will arise through the utilization of dark data by various organizations. They will find these data valuable to their business intelligence. In this chapter, we are introducing the methodology which will identify dark data and forecast future cybersecurity threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Analyzing “Dark Data” for Traders Using IBM Watson and Bluemix. (2017), Retrieved February 7, 2020, from Altoros website: https://www.altoros.com/blog/analyzing-dark-data-for-traders-using-ibm-watson-bluemix/

  2. From data to knowledge: Dark data. (2018), Retrieved February 7, 2020, from Ibm.com website: https://www.ibm.com/developerworks/library/ba-data-becomes-knowledge-3/index.html

  3. From data to knowledge: Dark data. (2018), Retrieved from Ibm.com website: https://www.ibm.com/developerworks/library/ba-data-becomes-knowledge-3/index.html

  4. N. Anderson, Control Dark Data in the New Age of Compliance and Security. (n.d.), Retrieved from https://www.ciosummits.com/Control_Dark_Data_in_the_New_Age_of_Compliance_and_Security.pdf

  5. Dark Data, Big Data, and Your Data: Creating an aCtion Plan for Information governanCe. (n.d.). Retrieved from https://www.ciosummits.com/Dark_Data_Big_Data_Your_Data_Creating_an_Action_Plan_for_Information_Governance.pdf

  6. Dark Data – The Blind Spots in Your Analytics | iDashboards Blog, (2020), Retrieved February 7, 2020, from Idashboards.com website: https://www.idashboards.com/blog/2019/01/30/dark-data-the-blind-spots-in-your-analytics/

  7. T. Dingeldein, 4 Dark Data Mining Insights for Small Business Owners. (2018), Retrieved February 7, 2020, from Capterra.com website: https://blog.capterra.com/dark-data-mining/

  8. Hortonworks Big Data Maturity Model HORTONWO RKS BIG DATA MATURITY MODEL. (2016), Retrieved from http://hortonworks.com/wp-content/uploads/2016/04/Hortonworks-Big-Data-Maturity-Assessment.pdf

  9. J. Colchester, Dark Data – Systems Innovation. (2018), Retrieved February 7, 2020, from Systems Innovation website: https://systemsinnovation.io/dark-data/

  10. Destroying Dark and Unstructured Data | IDM Magazine. (2018), Retrieved February 7, 2020, from Idm.net.au website: https://idm.net.au/article/0012194-destroying-dark-and-unstructured-data

  11. Figure 2f from: Irimia R, Gottschling M (2016) Taxonomic revision of Rochefortia Sw. (Ehretiaceae, Boraginales). Biodivers. Data J. 4: e7720. https://doi.org/10.3897/BDJ.4.e7720. (n.d.). doi: https://doi.org/10.3897/bdj.4.e7720.figure2f

  12. The risks of Dark Data for your organization | Migrato(2016), Retrieved February 7, 2020, from Migrato website: https://www.migrato.nl/the-risks-of-dark-data-for-your-organization/; M. Tulloch, Shedding light on dark data: Is it an opportunity or risk? (2019) Retrieved February 7, 2020, from TechGenix website: http://techgenix.com/dark-data-risk/

  13. M. Ross-Smith, Dark Data: The hidden billion dollar opportunity – SmartData Collective. (2016), Retrieved February 7, 2020, from SmartData Collective website: https://www.smartdatacollective.com/dark-data-hidden-billion-dollar-opportunity/

  14. bhuthesh@kenome.io, Kenome: An Enterprise Knowledge Graph Company. (2017), Retrieved February 7, 2020, from Kenome.io website: https://www.kenome.io/

  15. K. Kirkham, Why Companies Need To Pay Attention To Their Dark Data – blog.100tb.com. (2018), Retrieved February 7, 2020, from blog.100tb.com website: https://blog.100tb.com/why-companies-need-to-pay-attention-to-their-dark-data

  16. What is Dark Data and How Can You Use It? – UC Today. (2019), Retrieved February 7, 2020, from UC Today website: https://www.uctoday.com/unified-communications/what-is-dark-data-and-how-can-you-use-it/

  17. Standard: PCI Data Security Standard (PCI DSS) Effective Daily Log Monitoring. (2016), Retrieved from https://www.pcisecuritystandards.org/documents/Effective-Daily-Log-Monitoring-Guidance.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haydar Teymourlouei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Teymourlouei, H., Jackson, L. (2021). Dark Data: Managing Cybersecurity Challenges and Generating Benefits. In: Arabnia, H.R., et al. Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-69984-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69984-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69983-3

  • Online ISBN: 978-3-030-69984-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics