Академический Документы
Профессиональный Документы
Культура Документы
experimentation to find new insights secure their data to some extent.
by analyzing and comparing more However, as security is viewed as
information than was previously Compliance does not obstructive to data access and,
practical or possible. guarantee security. therefore, operational performance,
Do you have Data flow in faster, in greater the regulations actually serve as a
something variety, volume and levels of guide to the least-possible amount
to say about veracity, and can be processed efficiently by of security necessary to comply. Compliance does
this article? simultaneously accessing data split across up to not guarantee security.
Visit the Journal hundreds or thousands of data nodes in a cluster. Obviously, organizations do want to protect
pages of the ISACA Data are also kept for much longer periods of their data and the privacy of their customers, but
web site (www.isaca. time than would be in databases or relational access, insights and performance are paramount.
org/journal), find the database management systems (RDBMS), as To achieve maximum data access and security,
article, and choose the storage is more cost-effective and historical the gap between them must be bridged. So how
the Comments tab to context is part of the draw. can this balance best be achieved?
share your thoughts.
A FALSE SENSE OF SECURITY Figure 1Traditional View of Data Security
Go directly to the article:
If the primary goal of Hadoop is data access, data
Traditional View of Data Security
security is traditionally viewed as its antithesis.
There has always been a tug of war between Access Security
the two based on risk, balancing operational Source: Ulf T. Mattsson. Reprinted with permission.
performance and privacy, but the issue is
magnified exponentially in Hadoop (figure 1).
Worst Best
Source: Ulf T. Mattsson. Reprinted with permission.