Tuesday, June 28, 2011

Securing the Digital Universe

The term "digital universe" refers to the vast and ever-expanding collection of digital data and information that exists in various digital formats, stored across numerous devices, systems, and platforms. It encompasses all the data generated, transmitted, and stored by individuals, organizations, and systems in the digital age. 

Here are some key aspects of the digital universe:

Data Types- The digital universe comprises a wide range of data types, including text, images, videos, 
audio, sensor data, structured and unstructured data, and more. This data is generated by humans, 
machines, and various digital devices and systems.

Data Sources- Data in the digital universe originates from various sources, including social media interactions, internet browsing, online transactions, mobile apps, IoT (Internet of Things) devices, 
sensors, scientific research, and business operations.

Data Growth- The digital universe is characterized by exponential data growth. Advances in technology, increased connectivity, and the proliferation of digital devices have contributed to the rapid expansion of this universe.

Big Data- Much of the digital universe falls under the category of "big data" due to its volume, velocity, variety, and complexity. Analyzing and extracting insights from this data can be challenging but also 
highly valuable.

Data Privacy and Security- With the vast amount of data in the digital universe, concerns about data privacy and security are paramount. Safeguarding personal and sensitive information from unauthorized access and breaches is a significant challenge.


Approximately 75% of the digital Universe is a copy, only 25% is unique, while enterprise account for 20% of the data generated, they are liable for 80% of the data created and by 2020 more of this data will live or pass through the cloud.

In terms of sheer volume of data to be protected from 2009 to 2020 the amount of data in the Digital Universe is expected to grow by a factor of 44times to 35 trillion gigabytes. Although identity, financial account and credit card data are the most sought after even surpassing illicit drugs as organized crime most desirable commodity.

The compromise of system data i.e. configurations, settings and log files can be the gateway for access to this data and needs continuous monitoring and protection.

I Wish You Great Success