Introduction to Big Data Lesson 4

Velocity, in Big data means that data is being generated very fast, it also, refers to the speed of storing data and analyzing it, usually, the data used to get generated by people, but now we have social media, a security cameras at airports, sensors, smartphones, smart wearable devices like Apple watch and Samsung GEAR, The flow of data is huge and continuous.This real-time data can help researchers and businesses make valuable decisions that provide strategic competitive advantages and ROI (Return on investment).

You can see the speed of data being generated in real time by visiting the website:


Introduction to Big Data Lesson 3

Lecture 3


  • What is Volume in Big data?


  • Volume

Volume refers to a data that is too big to work on a regular computer, As we can see a huge growth in the data storage as the data is now more than text data (as it used to be on the World wide web aka web 1.0). We can find data in the format of videos, music and large images (which are taken from our smartphones and most of the new smartphones got high megapixel cameras) on our social media channels. It is very common to have Terabytes and Petabytes of the storage system for the tech companies (Google – Amazon – Microsoft). As the database grows the applications and architecture built to support the data needs to be reevaluated quite often. One the main reasons of a having a big volume are that the data are being generated not only by humans but also by machines too.The big volume indeed represents Big Data.






Information Security Analyst

               In recent days I’ve spotted many new hires from computer science asking me; what should I know about this field? What are the expected interview questions? For that, since everyone wants to know everything about information security. As an information security analyst myself I will include all career basics and I will include advantage topics in the future as a series.

                  Information Security Analyst aka (ISA) is a field of planning and implementing security measures to an organization’s valuable assets wither its employees, systems, computer, network or buildings. These measures are referred to as (CIA) Confidentiality, Integrity, and Availability. In Confidentiality you want to take actions to protect the information secrecy and ensure that organizations’ valuable information is only readable by authorized personnel, example of a used tool > encryption. For Integrity, you are insuring that editing the data is done only by allowed employees and any unauthorized changes are detected and prevented. For example, of a used tool > hashes. Finally, Availability. In this matter, information must be available whenever its needed so DDOS attack (refer to as Distributed Deny of service attacks) are not blocking your employees from entering a necessary data. For example, of a used tool > backup, mirroring, RAID, cloud computing, etc.


                 To implement security a policy must be raised and approved, and guidelines should be set in place to ensure everyone is following the steps to secure the company from breaches. You cannot enforce a policy without awareness about its benefits and how it is helping the organization. Awareness can include tips on how to secure your data for example, through backup and retention…etc.


                  Many companies are initiating their own information security program their names. They might be different from each other’s, but their goal is the same; securing information. These programs can include Risk Management, Information Asset Management, Physical Security Management, Awareness Program, Access Management, Backup and Retention Management, Business Continuity, Disaster Recover Management and External Party Management. Each one of these has a ton of tools and programs to manage them. On a monthly basis I will include details on how to achieve the goals of each programs’ elements until it is fully covered.

                  Referring to ( it is mentioned that you can build hard skills in :

  • IDS/IPS, penetration and vulnerability testing
  • DLP, anti-virus and anti-malware
  • TCP/IP, computer networking, routing and switching
  • Firewall and intrusion detection/prevention protocols
  • Windows, UNIX and Linux operating systems
  • Network protocols and packet analysis tools
  • C, C++, C#, Java or PHP programming languages
  • Cloud computing
  • SaaS models
  • Security Information and Event Management (SIEM)

These skills are not a must, but it is very useful to build throughout your career if you want to get good knowledge.