Analyzing Cyber Security Problems and Big Data Solutions - Report
VerifiedAdded on 2024/05/30
|8
|2444
|472
Report
AI Summary
This report delves into the cyber security challenges faced by organizations like Zoom Printing, highlighting key issues such as botnet attacks, NFC vulnerabilities, and BYOD risks. It explores the potential of big data analytics in enhancing threat detection, fraud prevention, and overall security posture. The report discusses major alternatives, including cloud-based solutions and AI-driven security measures, and provides a cost analysis of implementing big data solutions. Ultimately, it emphasizes the importance of leveraging big data to improve business intelligence and create a more secure and resilient organization. Desklib offers this report and many other solved assignments for students.

Computer Security – Assignment II 1
Computer Security – Assignment II
Unit Code-Title
Student Name-Student Number
Campus
Tutor Name
Computer Security – Assignment II
Unit Code-Title
Student Name-Student Number
Campus
Tutor Name
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Computer Security – Assignment II 2
Table of Contents
Introduction......................................................................................................................................3
Analysis and Discussion..................................................................................................................3
Top Eight Problems related to Cyber Security............................................................................3
Potential issues of Big Data.........................................................................................................5
Proposition...................................................................................................................................6
Major Alternatives.......................................................................................................................7
Cost of Applying Big Data Problem Solution.............................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Table of Contents
Introduction......................................................................................................................................3
Analysis and Discussion..................................................................................................................3
Top Eight Problems related to Cyber Security............................................................................3
Potential issues of Big Data.........................................................................................................5
Proposition...................................................................................................................................6
Major Alternatives.......................................................................................................................7
Cost of Applying Big Data Problem Solution.............................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................8

Computer Security – Assignment II 3
Zoom Printing Case
Introduction
Zoom Printing is an organization facing different issues of IT. Fast identification of
security events to diminishing the impact is considered critical in this era of complex IT
environment. Security teams needs the proper trappings to identify and remediate occurrences in
this environment. Zoom printingneeds tools to process and associate enormous amounts of real
time and historical safety event data. Advanced analytical skills are used by InfoSec teams for
recognition and protection against the cultured attacks. Implementation of this is not that much
easy in real world as it is said.According to research by Verizon for the data breach soundings
report in 2017 invaders uses a combination of practices during their operations(Chen, Chiang, &
Storey, 2012). According to that report 43% comprised of social attacks, 62% occurrences were
associated to hacking, whereas, 51% made use of malware. It also included 14% of attacks that
happened due to carelessness of workers leading to safety gap that could be oppressed(Duan &
Da Xu, 2012).
Analysis and Discussion
Top Eight Problems related to Cyber Security
For Zoom printing, there are various issues but the top most eight issues are discussed int
this section. Cybercrimes costs £266 billion each year to global economy because it has reached
to unexpected level in financial service industry. The use of these technologies like near field
communication (NFC) and Digital wallet service have increased due to which chances of data
security breaches and data hacking have increased. Point of view of Neil Cross, who was
Managing director of Advanced 365 enlightens that in order to survival of financial service
businessesthey must need to discoverequilibrium between embracing revolution to create
competitive edge for meeting needs of superiority gathering requirements related to superior
compliance and cyber sanctuary(Katal, Wazid, & Goudar, 2013).
According to Neil Cross many companies like ZP are preparing to for threats that are
related to past, not for their future strategies. It is because of the reason that protection of past if
not provided future will become uncertain and hacking risk is one of the risks that are associated
with it. The below mentioned eight technology related threats are outlined by Neil Cross that
financial service firms will have to face in future.
Zoom Printing Case
Introduction
Zoom Printing is an organization facing different issues of IT. Fast identification of
security events to diminishing the impact is considered critical in this era of complex IT
environment. Security teams needs the proper trappings to identify and remediate occurrences in
this environment. Zoom printingneeds tools to process and associate enormous amounts of real
time and historical safety event data. Advanced analytical skills are used by InfoSec teams for
recognition and protection against the cultured attacks. Implementation of this is not that much
easy in real world as it is said.According to research by Verizon for the data breach soundings
report in 2017 invaders uses a combination of practices during their operations(Chen, Chiang, &
Storey, 2012). According to that report 43% comprised of social attacks, 62% occurrences were
associated to hacking, whereas, 51% made use of malware. It also included 14% of attacks that
happened due to carelessness of workers leading to safety gap that could be oppressed(Duan &
Da Xu, 2012).
Analysis and Discussion
Top Eight Problems related to Cyber Security
For Zoom printing, there are various issues but the top most eight issues are discussed int
this section. Cybercrimes costs £266 billion each year to global economy because it has reached
to unexpected level in financial service industry. The use of these technologies like near field
communication (NFC) and Digital wallet service have increased due to which chances of data
security breaches and data hacking have increased. Point of view of Neil Cross, who was
Managing director of Advanced 365 enlightens that in order to survival of financial service
businessesthey must need to discoverequilibrium between embracing revolution to create
competitive edge for meeting needs of superiority gathering requirements related to superior
compliance and cyber sanctuary(Katal, Wazid, & Goudar, 2013).
According to Neil Cross many companies like ZP are preparing to for threats that are
related to past, not for their future strategies. It is because of the reason that protection of past if
not provided future will become uncertain and hacking risk is one of the risks that are associated
with it. The below mentioned eight technology related threats are outlined by Neil Cross that
financial service firms will have to face in future.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Computer Security – Assignment II 4
1. Botnet assaults – Botnet (robots & networks) is defined as a group and network of
computers or other devices in connection with internet that have been hacked for the
purpose of execution of fraud and to attack servers. It is estimation that financial
institutions are facing loss of millions of pounds due to these botnet attacks by criminals
and hackers. Billions of prospective new bots introduced by bulk adoption of internet of
things. It only aggravates security encounters for companies like ZP thus making their
survival difficult.
2. Self-transformingmainframe virus – Next cohort of self-transforming mainframe virus
attacks are considered as ‘Pandoras’. Electronic infrastructures are known as essential
part of financial service organizations. These kinds of viruses are aimed to complicate,
destabilize and to abolish these electronic infrastructures. From strategic viewpoint, they
can be used as security contrivance. Security Mechanism could be defensive as well as
offensive(Katal et al., 2013).
3. Near Field Communication (NFC) – Near field communication (NFC) could be used to
exchange data from two devices but it is only possible when they are placed within a
short distance. Banks are introducing new products and are adopting new techniques like
mobile payments. Customers are vulnerable to destructive cyber-attacks such as avatar-
based attacks. These attacks depend on unconventional digital creation that is gathered
from embezzled aspects of discrete identity(Katal et al., 2013).
4. Technology related to Payments – By the end of 2016, it is expected that new mobile
technologies such as Google Wallet and Apple Pay will be adopted massively by market.
Due to this massive use of technology by consumers and organizations are facing more
chances of become victim of cyber-crimes. Efforts are being intensified by hackers for
making fraud and many cases have become evident in U.S. The associated fraud cases are
already mounting to millions of dollar loss to consumers and companies(Katal et al.,
2013).
5. Bio-hacking – Advanced techniques are being used to affect humanperformance and for
the target of deep-seated safety breaches. One of the examples of this is Bio-hacking that
uses science as well as technology. For identification and verification of persons who
have the ability to activate phones and access erections shrewd grafts will be used. These
1. Botnet assaults – Botnet (robots & networks) is defined as a group and network of
computers or other devices in connection with internet that have been hacked for the
purpose of execution of fraud and to attack servers. It is estimation that financial
institutions are facing loss of millions of pounds due to these botnet attacks by criminals
and hackers. Billions of prospective new bots introduced by bulk adoption of internet of
things. It only aggravates security encounters for companies like ZP thus making their
survival difficult.
2. Self-transformingmainframe virus – Next cohort of self-transforming mainframe virus
attacks are considered as ‘Pandoras’. Electronic infrastructures are known as essential
part of financial service organizations. These kinds of viruses are aimed to complicate,
destabilize and to abolish these electronic infrastructures. From strategic viewpoint, they
can be used as security contrivance. Security Mechanism could be defensive as well as
offensive(Katal et al., 2013).
3. Near Field Communication (NFC) – Near field communication (NFC) could be used to
exchange data from two devices but it is only possible when they are placed within a
short distance. Banks are introducing new products and are adopting new techniques like
mobile payments. Customers are vulnerable to destructive cyber-attacks such as avatar-
based attacks. These attacks depend on unconventional digital creation that is gathered
from embezzled aspects of discrete identity(Katal et al., 2013).
4. Technology related to Payments – By the end of 2016, it is expected that new mobile
technologies such as Google Wallet and Apple Pay will be adopted massively by market.
Due to this massive use of technology by consumers and organizations are facing more
chances of become victim of cyber-crimes. Efforts are being intensified by hackers for
making fraud and many cases have become evident in U.S. The associated fraud cases are
already mounting to millions of dollar loss to consumers and companies(Katal et al.,
2013).
5. Bio-hacking – Advanced techniques are being used to affect humanperformance and for
the target of deep-seated safety breaches. One of the examples of this is Bio-hacking that
uses science as well as technology. For identification and verification of persons who
have the ability to activate phones and access erections shrewd grafts will be used. These
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Computer Security – Assignment II 5
persons will be in addition to the persons who can replace PIN codes of smartphones to
make illegal bank transactions.
6. Cloud and the big data– Maximum of the world’s record will be transferred or will be
deposited in the cloud at certain phase in ten years’ phase. The results of this activity will
be in the form of more refined data safety spasms. These spasms will target flowing from
device-based to cloud-based botnets, cloud substructures and hijacking disseminated
handling power.
7. Cell Phones – According to an estimate it is a judgment that almost 80% of internet
connections will originate from the platform provided by cell phones by 2025. Data
stealing from devices and crack down of cell phone codes will no longer be done by
mobile phones itself as per the prediction of experts of industry. Data resources that could
be accessed via clouds will be targeted by criminals through facilitation of mobile
phones.
8. Bring Your Own Device (BYOD) – Employees are allowed to bring their own devices
in companies and highly structured industries are struggling with the associated risk.
Employees exemplify the most possible source of security instances is revealed by the
respondents of PWC in a survey in 2014. The ratio associated to this is 44% which is
higher than industry average that is 9%(Katal et al., 2013).
Potential issues of Big Data
Big data challenges can be faced by Zoom printingand 3 of them are given below.
Protection of personal and sensitive information
Not having faculty (i.e. data researchers) to scrutinize the data
Ownership and Data rights
It sounds simple enough that we are facing main encounter of data fortification but when
you look at the volume of data it becomes more intimidating to prevent cyber-attacks. A medium
size company that works with 20,000 laptops, smartphones etc. like Zoom printingwill generate
more than 50 TB data in a day. Zoom printingcan have an idea of volume of data processing
from this example. This means that every second you need to analyze 5 Gbits of data to detects
any potential threats and cyber-attacks and malware accredited to wicked hackers. Technology
and other security riggings are diverting from actual threats by generating inefficiencies and
huge integer of false positives. These tools follow reactive approach not proactive approach.
persons will be in addition to the persons who can replace PIN codes of smartphones to
make illegal bank transactions.
6. Cloud and the big data– Maximum of the world’s record will be transferred or will be
deposited in the cloud at certain phase in ten years’ phase. The results of this activity will
be in the form of more refined data safety spasms. These spasms will target flowing from
device-based to cloud-based botnets, cloud substructures and hijacking disseminated
handling power.
7. Cell Phones – According to an estimate it is a judgment that almost 80% of internet
connections will originate from the platform provided by cell phones by 2025. Data
stealing from devices and crack down of cell phone codes will no longer be done by
mobile phones itself as per the prediction of experts of industry. Data resources that could
be accessed via clouds will be targeted by criminals through facilitation of mobile
phones.
8. Bring Your Own Device (BYOD) – Employees are allowed to bring their own devices
in companies and highly structured industries are struggling with the associated risk.
Employees exemplify the most possible source of security instances is revealed by the
respondents of PWC in a survey in 2014. The ratio associated to this is 44% which is
higher than industry average that is 9%(Katal et al., 2013).
Potential issues of Big Data
Big data challenges can be faced by Zoom printingand 3 of them are given below.
Protection of personal and sensitive information
Not having faculty (i.e. data researchers) to scrutinize the data
Ownership and Data rights
It sounds simple enough that we are facing main encounter of data fortification but when
you look at the volume of data it becomes more intimidating to prevent cyber-attacks. A medium
size company that works with 20,000 laptops, smartphones etc. like Zoom printingwill generate
more than 50 TB data in a day. Zoom printingcan have an idea of volume of data processing
from this example. This means that every second you need to analyze 5 Gbits of data to detects
any potential threats and cyber-attacks and malware accredited to wicked hackers. Technology
and other security riggings are diverting from actual threats by generating inefficiencies and
huge integer of false positives. These tools follow reactive approach not proactive approach.

Computer Security – Assignment II 6
Another problem associated with these tools for ZP is that they do not have required bandwidth
to deal with greater volume of data(Kim, Trimi, & Chung, 2014).
To reply in factual times, big data analytics enables professionals of cyber security to
scrutinize data from different types and sources(Liebowitz, 2013). Collection of information
from whole universe, making connections and correlations and to connect dots between data
could be done through data analytics in Zoom printing. Thus, it increases the efficiency of
professionals of cyber-crime and casts a widespread more trustworthy net when it comes to
avoiding cyber-attacks. The presentation of prospects by big data is great when companies dig
out the use of latest technologies and learn how to defend sensitive and personal data. Big data
offers these two major assistances to companies now days:
Detection of fraud and a replacement of SIEM system
Business intelligence viaadmittance to customer analytics and massive data that can be
used to enhance and improvemarketing and sales strategies.
Proposition
Big data offers abundant opportunity not only for companies but for cyber criminals too
because the compensation they get sound value of the efforts they made to penetrate in layers of
security of big data. When criminals go after huge data sets they have lot more to attain. It means
companies could face heavy loss by losing their data if security measures are not in proper
place(McAfee, Brynjolfsson, & Davenport, 2012). In order to upsurge the safety around big data,
ZP may anticipate:
Cooperating with other business aristocrats to craft business standards, head off
government conventions, and to segment best performs
Protect open foundation software such as Hadoop
Attribute based encryption to defendcomplex information shared by third parties
Retain and observe audit records across all aspects of the industry
To improve business intelligence big data offers wholly enormous opportunities for
organizations. Cyber security could be improved by big data itself. Companies should bear the
obligation and risk of defensing that data itself if they want to get benefits from big data.
Absolute online Master of Science in Cyber Security procedures and management was presented
by the University of San Diego. You should visit their page if you want to attain more and
extensive information about the attributed and endorsed degrees of information security.
Another problem associated with these tools for ZP is that they do not have required bandwidth
to deal with greater volume of data(Kim, Trimi, & Chung, 2014).
To reply in factual times, big data analytics enables professionals of cyber security to
scrutinize data from different types and sources(Liebowitz, 2013). Collection of information
from whole universe, making connections and correlations and to connect dots between data
could be done through data analytics in Zoom printing. Thus, it increases the efficiency of
professionals of cyber-crime and casts a widespread more trustworthy net when it comes to
avoiding cyber-attacks. The presentation of prospects by big data is great when companies dig
out the use of latest technologies and learn how to defend sensitive and personal data. Big data
offers these two major assistances to companies now days:
Detection of fraud and a replacement of SIEM system
Business intelligence viaadmittance to customer analytics and massive data that can be
used to enhance and improvemarketing and sales strategies.
Proposition
Big data offers abundant opportunity not only for companies but for cyber criminals too
because the compensation they get sound value of the efforts they made to penetrate in layers of
security of big data. When criminals go after huge data sets they have lot more to attain. It means
companies could face heavy loss by losing their data if security measures are not in proper
place(McAfee, Brynjolfsson, & Davenport, 2012). In order to upsurge the safety around big data,
ZP may anticipate:
Cooperating with other business aristocrats to craft business standards, head off
government conventions, and to segment best performs
Protect open foundation software such as Hadoop
Attribute based encryption to defendcomplex information shared by third parties
Retain and observe audit records across all aspects of the industry
To improve business intelligence big data offers wholly enormous opportunities for
organizations. Cyber security could be improved by big data itself. Companies should bear the
obligation and risk of defensing that data itself if they want to get benefits from big data.
Absolute online Master of Science in Cyber Security procedures and management was presented
by the University of San Diego. You should visit their page if you want to attain more and
extensive information about the attributed and endorsed degrees of information security.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Computer Security – Assignment II 7
Major Alternatives
Major issues that are associated with big data are not undefeatable and intractable. To
daze the inspiring economics of data handling and packing you can discover solutions like cloud
based solutions. It makes big data more pleasant(Villars, Olofson, & Eastwood, 2011).Likewise,
if current SIEM solutions supplements with platform of big data it can increase the whole
security position of company.This structure will be capable of modeling and exploring big sets of
information.AI can be used to bring data science into the crease with machine erudition. AI
could also be used to highlight security alerts and to systematizereply. This can expressively
reduce the tiredness placed on sanctuary teams. For documentation of abnormal behavior
patterns that may not be netted by predefined safety instructions can also be done through
models of machine learning. Security teams are consideringdevoting this skillset in data sciences.
Collaboration of IT professionals and security teams can make this easier for analysts. It can also
help to improve process. Eventually, choosing a right data platform in Zoom printingand using
big data technique solves all the problems. It also opens the door for more confident and
protected organization.
Cost of Applying Big Data Problem Solution
A study was conducted on costs associated with maintenance and building of warehouses
by Amazon(Watson & Wixom, 2007). According to that, for Zoom printing, the expenses related
to this could be approximately $ 19,000 to $ 25,000 terabytes annually. Supposing each TB
requires $ 22,000 in possession means to store a data of 40TB in warehouse requires cost of $
880,000 (approximately $1 million) annually.
Conclusion
Getting intuition for safety is hard when having utter variety of attack trajectories. It is
not enough to protect from only one type of attack. Zoom Printing is the organization in this case
who is facing issue in management of the major resources and the cybersecurity in their
organisation. The top eight cyber security issues have been highlighted in this regard leading to
the development of big data as a source of information and solution for Zoom Printing. They can
also cut down their current cost of cybercrimes through big data development.
Major Alternatives
Major issues that are associated with big data are not undefeatable and intractable. To
daze the inspiring economics of data handling and packing you can discover solutions like cloud
based solutions. It makes big data more pleasant(Villars, Olofson, & Eastwood, 2011).Likewise,
if current SIEM solutions supplements with platform of big data it can increase the whole
security position of company.This structure will be capable of modeling and exploring big sets of
information.AI can be used to bring data science into the crease with machine erudition. AI
could also be used to highlight security alerts and to systematizereply. This can expressively
reduce the tiredness placed on sanctuary teams. For documentation of abnormal behavior
patterns that may not be netted by predefined safety instructions can also be done through
models of machine learning. Security teams are consideringdevoting this skillset in data sciences.
Collaboration of IT professionals and security teams can make this easier for analysts. It can also
help to improve process. Eventually, choosing a right data platform in Zoom printingand using
big data technique solves all the problems. It also opens the door for more confident and
protected organization.
Cost of Applying Big Data Problem Solution
A study was conducted on costs associated with maintenance and building of warehouses
by Amazon(Watson & Wixom, 2007). According to that, for Zoom printing, the expenses related
to this could be approximately $ 19,000 to $ 25,000 terabytes annually. Supposing each TB
requires $ 22,000 in possession means to store a data of 40TB in warehouse requires cost of $
880,000 (approximately $1 million) annually.
Conclusion
Getting intuition for safety is hard when having utter variety of attack trajectories. It is
not enough to protect from only one type of attack. Zoom Printing is the organization in this case
who is facing issue in management of the major resources and the cybersecurity in their
organisation. The top eight cyber security issues have been highlighted in this regard leading to
the development of big data as a source of information and solution for Zoom Printing. They can
also cut down their current cost of cybercrimes through big data development.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Computer Security – Assignment II 8
References
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big
data to big impact. MIS quarterly, 36(4).
Duan, L., & Da Xu, L. (2012). Business intelligence for enterprise systems: a survey. IEEE
Transactions on Industrial Informatics, 8(3), 679-687.
Katal, A., Wazid, M., & Goudar, R. (2013). Big data: issues, challenges, tools and good
practices. Paper presented at the Contemporary Computing (IC3), 2013 Sixth
International Conference on.
Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the government sector.
Communications of the ACM, 57(3), 78-85.
Liebowitz, J. (2013). Big data and business analytics: CRC press.
McAfee, A., Brynjolfsson, E., & Davenport, T. H. (2012). Big data: the management revolution.
Harvard business review, 90(10), 60-68.
Villars, R. L., Olofson, C. W., & Eastwood, M. (2011). Big data: What it is and why you should
care. White Paper, IDC, 14.
Watson, H. J., & Wixom, B. H. (2007). The current state of business intelligence. Computer,
40(9).
References
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big
data to big impact. MIS quarterly, 36(4).
Duan, L., & Da Xu, L. (2012). Business intelligence for enterprise systems: a survey. IEEE
Transactions on Industrial Informatics, 8(3), 679-687.
Katal, A., Wazid, M., & Goudar, R. (2013). Big data: issues, challenges, tools and good
practices. Paper presented at the Contemporary Computing (IC3), 2013 Sixth
International Conference on.
Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the government sector.
Communications of the ACM, 57(3), 78-85.
Liebowitz, J. (2013). Big data and business analytics: CRC press.
McAfee, A., Brynjolfsson, E., & Davenport, T. H. (2012). Big data: the management revolution.
Harvard business review, 90(10), 60-68.
Villars, R. L., Olofson, C. W., & Eastwood, M. (2011). Big data: What it is and why you should
care. White Paper, IDC, 14.
Watson, H. J., & Wixom, B. H. (2007). The current state of business intelligence. Computer,
40(9).
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




