Data mining is one of the more efficient tools when it comes to looking for specific characteristics over large amounts of data. It is as simple as typing in certain keywords and the words being highlighted in certain articles and other data. Data mining however, is not nearly a perfect process. It has certain limitations and capabilities that can vary by situation. The article N.Y. bomb plot highlights limitations of data mining, brought up a few very good points about using data mining to apprehend potential terrorists. The data mining tools only work well when you have a well-defined search field to scan through. If you don’t, it can be very time consuming and almost defeat the process. The data mining process logs specific activities by suspicious individuals and links them together to form patterns and predict future activities. If the suspicious person is not acting in a certain pattern, it can be nearly impossible to predict certain moves in an efficient time frame. Data mining is truly an innovative process that if used the correct way, can yield tremendous results. It does have its limitations though, and fixing them is going to be key in streamlining the process.
Protecting against insider security threats is one of the biggest initiatives for a business. Businesses can protect against this by incorporating stringent policies and rules for violators. They can also invest money and time into constantly monitoring employee activity. Protecting against insider security threats can be the key in making or breaking a business