{"id":827,"date":"2018-06-18T13:25:34","date_gmt":"2018-06-18T17:25:34","guid":{"rendered":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/?p=827"},"modified":"2018-06-18T13:25:34","modified_gmt":"2018-06-18T17:25:34","slug":"pros-cons-big-data-cybersecurity","status":"publish","type":"post","link":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/2018\/06\/18\/pros-cons-big-data-cybersecurity\/","title":{"rendered":"The Pros and Cons of Big Data in Cybersecurity"},"content":{"rendered":"

The things that make big data what it is \u2013 high velocity, variety, and volume \u2013 make it a challenge to defend. And it presents a tempting target for potential attackers.<\/p>\n

But big data technologies are also being used to help cybersecurity, since many of the same tools and approaches can be used to collect log and incident data, process it quickly, and… Read more<\/a> <\/i><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"

The things that make big data what it is \u2013 high velocity, variety, and volume \u2013 make it a challenge to defend. And it presents a tempting target for potential attackers. But big data technologies are also being used to help cybersecurity, since many of the same tools and approaches can be used to collect […]<\/p>\n","protected":false},"author":57,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-827","post","type-post","status-publish","format-standard","hentry","category-cyber-security-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/comments?post=827"}],"version-history":[{"count":1,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/827\/revisions"}],"predecessor-version":[{"id":828,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/827\/revisions\/828"}],"wp:attachment":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/media?parent=827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/categories?post=827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/tags?post=827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}