logo

Security Risks and Concerns with Big Data Technology

12 Pages3149 Words419 Views
   

Added on  2022-11-25

About This Document

This article discusses the security risks and concerns associated with big data technology, including access control issues, insecure web interfaces, and lack of transport encryption. It also provides strategies for addressing these concerns.

Security Risks and Concerns with Big Data Technology

   Added on 2022-11-25

ShareRelated Documents
IT SECURITY 0
Big Data Security
Security Risks and Concerns with Big Data Technology_1
IT SECURITY 1
Table of Contents
Introduction........................................................................................................... 2
Background of the study........................................................................................ 2
Security and privacy concern with big data...........................................................3
Size of the potential problem.............................................................................3
Problem with access control...............................................................................4
In a secure web interface................................................................................... 4
Improper authentication of servers....................................................................4
Lack of transport encryption...............................................................................4
Insecure cloud interface..................................................................................... 5
Denial of service attack...................................................................................... 5
Less confidentiality and configurability..............................................................5
Malware attack on the networks.........................................................................5
Strategies for addressing the concerns.................................................................6
Use authentic servers......................................................................................... 6
Secure data storage elements............................................................................6
Secure non-relational data................................................................................. 6
Ensure endpoint security.................................................................................... 7
Use encryption technique................................................................................... 7
Prevent insider threats....................................................................................... 7
Conclusion............................................................................................................. 7
References............................................................................................................. 9
Security Risks and Concerns with Big Data Technology_2
IT SECURITY 2
Introduction
Big data is a modern information technology that is utilized for
analysing and evaluating a big volume of data centres. Mainly, it deals
with the statistics sets which are too large and multifaceted to be
distributed with by old-style data dispensation request. It is identified
that security is a major concern for many companies while utilizing big
data technology (Boyle, & Panko, 2014). The purpose of this research is
to identify the concept of big data and describe security risks and issues
linked with big data technology. Mainly, it is a developing stint which
described a huge size of organized and semi-structured data in an
effective manner. The outline of this report contains several sections, for
example, the background of the study, safety and confidentiality issues
linked with big data and strategies for avoiding such issues.
Background of the study
Big data is an effective technique which is now used in many
organizations for controlling and managing a huge amount of facts. Such
kind of technology has the ability for analysing both organized and
shapeless data in an effective manner. There are major three
physiognomies of big data technology for example the volume of facts,
variety of data and velocity of the data at which the obtained data or
information must be processed (Inukollu, Arsi, & Ravuri, 2014). In this
advanced generation, it is very complex for companies to control and
manage a large number of data sets for which information technology
developed a technology which is called big data.
Safety of information is a very serious problem faced by many
organizations and communities because that use internet connecting
while operating big data approaches which is associated with the cyber-
crimes and attacks. A recent study identified that big data security is the
effective team for all the computer tools which is mainly utilized to guard
both information and analytics processes from attacks (Kaisler, Armour,
Security Risks and Concerns with Big Data Technology_3
IT SECURITY 3
Espinosa, & Money, 2013). It is observed that like other forms of
cybersecurity, the big data variant is also connected with the cyber-
attacks which directly impact on the personal data or information of
consumers and companies.
Demchenko, Zhao, Grosso, Wibisono, & De Laat, (2012) argued
that form largest business industries and organizations which operate on
the cloud-based servers; big data security is a very common challenge
that affects the entire computer network or server. Moreover, attacks of
the company’s big data could cause dangers financial problem which
includes losses, fines or litigation costs. However, big data security is a
constant concern because the deployment system of big data technology
is valuable targets to would be intruders and a solitary cyber-crime may
influence the enactment of the organization in a negative way.
In last few years there are numbers of research papers published
on the big data security and most of the authors identified that use of
unauthorized servers while accessing big data accounts is a common
issue which increases the rate of security threats and data breach (Costa,
2014). The three Vs of big data such as volume, velocity and variety help
companies for handling the enormous volume of records. It is analysed
that companies gather data from numbers of sources, for example, social
media websites, business transactions, machine to machine data, and
information from sensors.
So, for controlling and monitoring such kind of data companies use
the concept of big data technology that provides a platform to the
management for managing such kinds of data. Mainly, hackers attack the
companies’ servers and networks and enter into the big data analytic due
to which many users may suffer from the data breach and hacking
related issues (Grolinger, et al., 2014).
Security Risks and Concerns with Big Data Technology_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security – Challenges and Solutions
|13
|3663
|313

Data Security in Cloud Computing
|6
|874
|413

Social Engineering and Cybersecurity
|7
|3161
|211

Cyber Security Assignment 2022
|12
|2845
|22

Ransomware & Malware
|5
|581
|276

Electronic Security
|2
|1473
|73