logo

Big Data Security

11 Pages3107 Words67 Views
   

Added on  2023-03-23

About This Document

This report discusses the security concerns associated with big data and strategies for addressing them. It covers topics such as data privacy, infrastructure security, and data management. The report concludes with future trends in big data security.

Big Data Security

   Added on 2023-03-23

ShareRelated Documents
Running head: BIG DATA SECURITY
BIG DATA SECURITY
Name of student
Name of university
Author’s note:
Big Data Security_1
1
BIG DATA SECURITY
Table of Contents
Introduction....................................................................................................................2
Discussion......................................................................................................................2
Security and privacy concerns associated with big data............................................3
Strategies for addressing the concerns.......................................................................5
Conclusions and future trends........................................................................................7
References......................................................................................................................9
Big Data Security_2
2
BIG DATA SECURITY
Introduction
The aim of this report is to provide the clear discussion about the aspects of security
issues connected to big data as well as the methods by which the security issues could be
monitored. The brief background of the Big data technology is discussed within this report.
The concise debate of some of security as well as the privacy worries that are linked with the
big data are provided in this report. The appropriate strategies for the addressing these
concerns are briefly conversed in the report. Lastly, an appropriate conclusion is provided for
this report that provides the summary of the report.
Discussion
Big data might be referred as the emerging terminology that assists in describing the
large volume of structured, unstructured or the semi-structured data, which contains of
potential of being excavated for the information alogn with the feature of the technology of
using it in the projects of the machine learning and any other progressive applications of the
analytics (Zhang, 2018). Big data encompasses the vast variety of the data types that includes
the structured data within the SQL databases as well as the warehouses of the data, the
unstructured data like the document files and the text files, which are held in the NoSQL
systems or the Hadoop clusters and the data that is semi-structured like the logs of the web
servers or the streaming data from the sensors (Patil & Seshadri, 2014).
The big data security could be referred as the collective terminology that considers all
the measures and the tools that are used for securing both data and the processes of the
analytics from the thefts, attacks, or any kind of the malicious activities that might harm
immensely or it might negatively affect them (Xu et al., 2014). Similar like the forms of the
cyber security, the variant of the big data has been concerned with the attacks that originates
from both the offline and the online platforms (Kim, Trimi & Chung, 2014). Some of the
Big Data Security_3
3
BIG DATA SECURITY
common kinds of the threats involves the theft of the information that has been stored online,
DDoS attacks or the ransomware that might crash any server. This issue could be particularly
worse when the companies stores the information that is particularly confidential or sensitive,
like the customer information, the numbers of the credit cards or simply the contact details of
the customers.
Security and privacy concerns associated with big data
Along with the proliferation of devices which are linked to the internet and might
have the connection among one another, the significant capacity of the data that is
warehoused after the collection for executing the processing is significantly increasing each
day that also introduces the new challenges in the relations of information security (Kshetri,
2014). Factually, the presently utilised security mechanisms such as firewalls as well as
DMZs might not be effectively utilised in the infrastructure of the Big data due to the fact
that security mechanisms are required to be strained out of the boundaries of the network of
any organisation for fulfilling the mobility requirements of the user or the data and the
policies of the BYOD. With the consideration of these new scenarios, the main question that
has emerged is what is the appropriate policies and the technologies that might be suitable for
fulfilling the present top confidentiality and the safety demands of the big data. These
specific issues might be organised into the four features of the big data like the infrastructure
security (secure distributed calculations that are utilising the MapReduce), the data privacy
(the data mining, which helps in the protection of privacy or granular access), the data
management (securing the data governance and the storing) as well as integrity with sensitive
security (actual time effective observing of the attacks as well as the anomalies) (Matturdi et
al., 2014). While considering the sector of the Big data, there might be the significant risk
sectors that are required to be considered. It includes all the information lifespan (possession,
governance and the arrangement of the data), process of the formation and the gathering of
Big Data Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Big Data Security Concerns
|16
|3327
|45

Security Risks and Concerns with Big Data Technology
|12
|3149
|419

Privacy/Security Issues Report for the Victorian Privacy Commissioner Project
|9
|2616
|418

Information Systems and Big Data Analysis
|9
|1954
|379

Postgraduate potential Applicants on Data Analysis using (AWS) Serverless Cloud Technology
|82
|11633
|75

Technology in Organisation
|12
|3990
|464