Achieving telecom security and regulatory compliance

This is more of an industry specific use case wherein nationwide Telecom companies are driven by regulatory compliance to implement all security protocols for Law Enforcement Agencies for investigation of any cyber crime and to perform occasional audits. These regulations have become much more strict with the advancement of technologies, social footprints and multiple ways by which cyber criminals can perform unethical activities. This has greatly expanded the scope of Telecom companies from regulatory compliance perspective, which today gets into more real-time and percolation driven detection along with batch analysis of network data. The data records can be analyzed in depth to establish a communication graph for every caller over a period of time such that this time series data can be replayed whenever required. These mechanisms prove very useful to Law Enforcement Agencies for their investigations. Here we are discussing massive data that flows through networks of various telecom providers, which may add up to petabytes of data across couple of months. The only way to achieve all the capabilities discussed above is by leveraging Big Data capabilities for data collection, processing and analysis.

Figure 05: Communication Graph Analysis

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.218.151.44