Access "Is big data education a big failure?"
This article is part of the July/August 2013 / Volume 15 / No. 6 issue of Unlock new pathways to network security architecture
When it comes to integrating information technology trends into the curriculums of many universities and colleges, the educational system has fallen behind the learning curve. This is true for big data education, and unfortunately, the IT security needed to protect unstructured information. The concepts related to the handling of large amounts of data are briefly touched on in courses that focus on databases or algorithms. But when big data is addressed in an algorithms class, it’s primarily as a justification for teaching different sorting algorithms, essentially, ordering lists in “big data” projects. If universities do offer classes on big data, it is often as graduate-level coursework. Despite few computer engineering or computer sciences classes that focus specifically on big data, we see the concept show up in other courses; bio-informatics, for example, where processing big data is required to complete a task. Security optional Given the void in big data education, it should come as no surprise that the security of big data is not covered in most ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Unlock new pathways to network security architecture
by Dave Shackleford
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams.
-
Enterprise mobile security by the numbers
by Kathleen Richards, Features Editor
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?
-
Unlock new pathways to network security architecture
by Dave Shackleford
-
-
Third-party risk management: Horror stories? You are not alone
by MacDonnell Ulsch, Contributor
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements.
-
Third-party risk management: Horror stories? You are not alone
by MacDonnell Ulsch, Contributor
-
Columns
-
New data on enterprise mobile security
by Kathleen Richards, Features Editor
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in.
-
Ten years later: The legacy of SB 1386 compliance on data privacy laws
by Randy Sabett, Contributor
A decade after becoming law, the ripple effects of California's SB 1386 have surfaced in a new breed of proactive, granular state data privacy laws.
-
Is big data education a big failure?
by Doug Jacobson and Julie A. Rursch
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer?
-
New data on enterprise mobile security
by Kathleen Richards, Features Editor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...