logo

Big Data Security - Report

   

Added on  2022-08-27

8 Pages2458 Words13 Views
1/7/2020
Running Head: BIG DATA SECRUITY 0
SystemJP
STUDENT NAME
Big Data
Security
Report

BIG DATA SECRUITY 1
Table of Contents
Introduction................................................................................................................................2
Importance for BD Security.......................................................................................................2
Protecting reocrds.......................................................................................................................2
Real-time security and privacy of data.......................................................................................3
Validation and Filtration............................................................................................................3
Secure Non-Rational Data Stores...............................................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................6

BIG DATA SECRUITY 2
Introduction
Big Data (BD) is a basic need of a firm, which is useful in the management of a large
amount of data of business functions of a firm, such as supply chain, sales, marketing,
inventory, transactions, and many more (Bou-Harb, Debbabi, & Assi, 2016). There are some
issues in the security of the BD, which can be a huge issue in front of a firm. There are
various reasons to break the security of a firm (Bui, 2018). Thus, it is necessary to know
about the relation between different things, which has connected with each other.
Importance for BD Security
There are various types of cyber-attacks, which has used malicious programs to hack
BD. In addition, ransomware is a new threat in front of many firms, which has used poor
security. The report has discussed the ransomware attacks, which is a new trend in the field of
cybercrime. Hackers have infected the victim’s computer systems using malware, which has
encrypted the data of the host system, then ransom is demanded in various forms, such as
Bitcoins (Provin, 2018). This attack was launched through phishing emails, which contain
malicious programs (Buttler, 2017). Moreover, it can be possible, when downloading many
things from compromised websites. It infects the whole system and restricts access to the
files and data (Arlitsch & Edelman, 2014).
In this attack, a huge impact will apply to a firm or individual. It is successful, if
recovery or backup solution is not available at the victim’s end, as it is expensive. The report
has explained about the ransomware with the help of examples. It is a good way to explain
about such types of things (Bendovschi, 2015). The report has provided different variants of
ransomware. Thus, organizations can be avoided by the firms. It is necessary to know about
the pattern, which is useful for protecting systems (Cates, 2018).
Protecting reocrds
It is necessary to protect logs and data of a firm, which has stored in the BD. There
are various impacts of cyber-attacks, which are financial loss, proprietary data loss,
disruption of business, and reputation as well. There are various examples of a lucrative
business, which has provided the field of ransomware. There are many assets in a firm, which
are not secure and upgraded. In addition, it is good for the various victims and the rest of
them (Fruhlinger, 2018).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
DDOS and Ransomware - Desklib
|4
|739
|285

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469

Computer Security Breach in Notpetya Cyber Attack
|10
|2248
|160

Ransomware Attack and its Impact
|13
|2416
|74

IT Security Risks and Securities of Ransomware
|14
|2848
|75

ISYS100 Information Technology and society
|13
|3604
|69