- The Necessity
- Hidden Dangers
- Troubled Waters
Organizations use data lakes or data warehouses to store massive amounts of data. However, proper security measures are not present in these data repositories. In this article at The Conversation, Mohiuddin Ahmed discusses the reality of data lakes.
The Necessity of Data Lakes
Previously, service providers would store the collected data in centralized data warehouses. The catch is you must pre-process every information before saving. Businesses need supercomputers to process those millions of data on the internet. This process is both time-consuming and costly. So, leaders switched to data lakes that can store raw information.
The Not-So-Hidden Dangers: While data lakes saved the day for businesses, lack of proactive security measures attracted hackers, too. Technological advancement comes at a price—data vulnerability. A seemingly harmless folder can contain a malware that might corrupt several data lakes. Hackers also use free tools to inject false data into a system connected to the internet. The previous decade was a witness to these data breach incidents.
Data Lake Features: Data lakes have three features—collection, storage, and analytics.
Data from various sources come to data lakes during data ingestion. No security policies are in place to monitor and prevent corrupt information from entering the repositories. The cybercriminals can easily inject false data during this phase. The next step is data storage, where the data is stored without undergoing any security checks. The third phase is data analytics. Data lakes create and develop algorithms to analyze raw data and produce meaningful insights.
Businesses cannot use data once it is corrupt. Data lakes affected by malware attacks can mislead the healthcare industry. Distorted diagnosis can downgrade services to fatal outcomes. Breached repositories can also cause mayhem in sectors like defense, banking, governance, and education. If businesses want to leverage data, the data architects must establish strict security measures for the data lakes.
To view the original article in full, visit the following link: https://theconversation.com/data-lakes-where-big-businesses-dump-their-excess-data-and-hackers-have-a-field-day-123865