Big Data Security Report: Ransomware Attacks and Protection
VerifiedAdded on 2022/08/27
|8
|2458
|13
Report
AI Summary
This report delves into the critical domain of big data security, emphasizing the significance of protecting sensitive information from cyber threats. It identifies the increasing prevalence of ransomware attacks, which encrypt data and demand ransom, and their devastating impact on organizations. The report explores the importance of digital identity, validation, and filtration, and the need for real-time security and privacy of data. It discusses strategies for protecting records and non-rational data stores, including identity provisioning, authentication, and authorization. The report also highlights the legal, ethical, and social responsibilities associated with digital identity. The conclusion underscores the necessity of robust cybersecurity measures to mitigate risks and ensure the integrity of big data systems. It emphasizes the use of various security measures like firewalls, anti-virus, and the importance of digital identity in safeguarding information and maintaining trust in the digital landscape. The report also provides valuable insights into the role of backup and recovery in a firm.

1/7/2020
Running Head: BIG DATA SECRUITY 0
Big Data Security
Report
SystemJP
Student name
Running Head: BIG DATA SECRUITY 0
Big Data Security
Report
SystemJP
Student name
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BIG DATA SECRUITY 1
Table of Contents
Introduction................................................................................................................................2
Importance for BD Security.......................................................................................................2
Protecting reocrds.......................................................................................................................2
Real-time security and privacy of data.......................................................................................3
Validation and Filtration............................................................................................................3
Secure Non-Rational Data Stores...............................................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................6
Table of Contents
Introduction................................................................................................................................2
Importance for BD Security.......................................................................................................2
Protecting reocrds.......................................................................................................................2
Real-time security and privacy of data.......................................................................................3
Validation and Filtration............................................................................................................3
Secure Non-Rational Data Stores...............................................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................6

BIG DATA SECRUITY 2
Introduction
Big Data (BD) is a basic need of a firm, which is useful in the management of a large
amount of data of business functions of a firm, such as supply chain, sales, marketing,
inventory, transactions, and many more (Bou-Harb, Debbabi, & Assi, 2016). There are some
issues in the security of the BD, which can be a huge issue in front of a firm. There are
various reasons to break the security of a firm (Bui, 2018). Thus, it is necessary to know
about the relation between different things, which has connected with each other.
Importance for BD Security
There are various types of cyber-attacks, which has used malicious programs to hack
BD. In addition, ransomware is a new threat in front of many firms, which has used poor
security. The report has discussed the ransomware attacks, which is a new trend in the field of
cybercrime. Hackers have infected the victim’s computer systems using malware, which has
encrypted the data of the host system, then ransom is demanded in various forms, such as
Bitcoins (Provin, 2018). This attack was launched through phishing emails, which contain
malicious programs (Buttler, 2017). Moreover, it can be possible, when downloading many
things from compromised websites. It infects the whole system and restricts access to the
files and data (Arlitsch & Edelman, 2014).
In this attack, a huge impact will apply to a firm or individual. It is successful, if
recovery or backup solution is not available at the victim’s end, as it is expensive. The report
has explained about the ransomware with the help of examples. It is a good way to explain
about such types of things (Bendovschi, 2015). The report has provided different variants of
ransomware. Thus, organizations can be avoided by the firms. It is necessary to know about
the pattern, which is useful for protecting systems (Cates, 2018).
Protecting reocrds
It is necessary to protect logs and data of a firm, which has stored in the BD. There
are various impacts of cyber-attacks, which are financial loss, proprietary data loss,
disruption of business, and reputation as well. There are various examples of a lucrative
business, which has provided the field of ransomware. There are many assets in a firm, which
are not secure and upgraded. In addition, it is good for the various victims and the rest of
them (Fruhlinger, 2018).
Introduction
Big Data (BD) is a basic need of a firm, which is useful in the management of a large
amount of data of business functions of a firm, such as supply chain, sales, marketing,
inventory, transactions, and many more (Bou-Harb, Debbabi, & Assi, 2016). There are some
issues in the security of the BD, which can be a huge issue in front of a firm. There are
various reasons to break the security of a firm (Bui, 2018). Thus, it is necessary to know
about the relation between different things, which has connected with each other.
Importance for BD Security
There are various types of cyber-attacks, which has used malicious programs to hack
BD. In addition, ransomware is a new threat in front of many firms, which has used poor
security. The report has discussed the ransomware attacks, which is a new trend in the field of
cybercrime. Hackers have infected the victim’s computer systems using malware, which has
encrypted the data of the host system, then ransom is demanded in various forms, such as
Bitcoins (Provin, 2018). This attack was launched through phishing emails, which contain
malicious programs (Buttler, 2017). Moreover, it can be possible, when downloading many
things from compromised websites. It infects the whole system and restricts access to the
files and data (Arlitsch & Edelman, 2014).
In this attack, a huge impact will apply to a firm or individual. It is successful, if
recovery or backup solution is not available at the victim’s end, as it is expensive. The report
has explained about the ransomware with the help of examples. It is a good way to explain
about such types of things (Bendovschi, 2015). The report has provided different variants of
ransomware. Thus, organizations can be avoided by the firms. It is necessary to know about
the pattern, which is useful for protecting systems (Cates, 2018).
Protecting reocrds
It is necessary to protect logs and data of a firm, which has stored in the BD. There
are various impacts of cyber-attacks, which are financial loss, proprietary data loss,
disruption of business, and reputation as well. There are various examples of a lucrative
business, which has provided the field of ransomware. There are many assets in a firm, which
are not secure and upgraded. In addition, it is good for the various victims and the rest of
them (Fruhlinger, 2018).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

BIG DATA SECRUITY 3
Furthermore, there are many things to manage in a firm, which can be a reason of
threat and risk. Thus, internet security is necessary for managing IT assets and other
resources (Bird, 2018). Cybercrime and cyber-attacks are increasing day-by-day, which is
not god for the various industries (Chang, 2017). it has described the impact of the cyber-
attacks and other things on a firm with the help of evidence. There are many good things in
the post, which makes it better for learners. There are some basic things to improve the
security of the network and computer systems to avoid the risks form an organization. It
makes better security to avoid cyber-attacks, such as ransomware, and many more
(Cuzzocrea, 2014).
Real-time security and privacy of data
BD is a useful tool to manage all the things in a better way. Moreover, Data can be
managed using BD and its techniques in a better way (Datafloq, 2019). Most of the processes
have used for improving real-time data. Endpoint security is necessary to avoid a few issues
of security, which can be better for companies and clients (Sharma, 2019).
Moreover, people can be used to advance systems to manage such types of issues. It
has provided the role of backup and recovery in a firm. Most of the things can be managed
using the international standard of cybersecurity. Furthermore, ransomware can make a huge
impact on the basic services, which is better for the company as well. There are some specific
reasons behind the cyber-attacks, such as vulnerabilities, risks, and many more. There is
some improvement in the security of the system, which is a good thing for the whole system
as well. Most of the firms have used a high level of security because of financial and
confidential data (Taylor, 2017).
Validation and Filtration
Validation is necessary at the endpoints, as most of the time endpoints are the victims
of cyber-attacks. Thus, a digital identity can be used. It is a persona on online services. This
post has provided various definitions of the digital identity to secure all the things on the
online processes. It described the identity management, which is a process to manage user
identity and resources in the network (Warren, 2011). There are many benefits of security of
various things, such as personal passwords, online accounts, emails, and many more. In
addition, cybersecurity is necessary to secure all the data (Bendovschi, 2015).
Furthermore, there are many things to manage in a firm, which can be a reason of
threat and risk. Thus, internet security is necessary for managing IT assets and other
resources (Bird, 2018). Cybercrime and cyber-attacks are increasing day-by-day, which is
not god for the various industries (Chang, 2017). it has described the impact of the cyber-
attacks and other things on a firm with the help of evidence. There are many good things in
the post, which makes it better for learners. There are some basic things to improve the
security of the network and computer systems to avoid the risks form an organization. It
makes better security to avoid cyber-attacks, such as ransomware, and many more
(Cuzzocrea, 2014).
Real-time security and privacy of data
BD is a useful tool to manage all the things in a better way. Moreover, Data can be
managed using BD and its techniques in a better way (Datafloq, 2019). Most of the processes
have used for improving real-time data. Endpoint security is necessary to avoid a few issues
of security, which can be better for companies and clients (Sharma, 2019).
Moreover, people can be used to advance systems to manage such types of issues. It
has provided the role of backup and recovery in a firm. Most of the things can be managed
using the international standard of cybersecurity. Furthermore, ransomware can make a huge
impact on the basic services, which is better for the company as well. There are some specific
reasons behind the cyber-attacks, such as vulnerabilities, risks, and many more. There is
some improvement in the security of the system, which is a good thing for the whole system
as well. Most of the firms have used a high level of security because of financial and
confidential data (Taylor, 2017).
Validation and Filtration
Validation is necessary at the endpoints, as most of the time endpoints are the victims
of cyber-attacks. Thus, a digital identity can be used. It is a persona on online services. This
post has provided various definitions of the digital identity to secure all the things on the
online processes. It described the identity management, which is a process to manage user
identity and resources in the network (Warren, 2011). There are many benefits of security of
various things, such as personal passwords, online accounts, emails, and many more. In
addition, cybersecurity is necessary to secure all the data (Bendovschi, 2015).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BIG DATA SECRUITY 4
Besides, the Australian agencies have provided mitigation strategies for cybercrime
and other works (ACSC, 2019). In addition, trust establishment is necessary for managing
and building a good relationship in the network.
Secure Non-Rational Data Stores
There are different ways to protect BD, such as identity provisioning, authentication,
and authorization, storage management, single-sign-on, and auditing. The post has included a
federated identity system, which is a possible way to improve the basic concepts of digital
identity. It is a system to create trust between different people (Buttler, 2017).
There are various legal, ethical, social rule and responsibilities to manage all the
things in a better way (Warren, 2011). It has described securing digital identity, which is
necessary for managing various things. It has included various methods, which are human
integration, directed identity, user control, and consent. In addition, the Australian
government has provided a code of ethics for all online users to make their rights and duties
better. Moreover, digital identity is necessary for various transactions and processing
(Warren, 2011).
In addition, data ownership is necessary for managing issues in business and other
activities. The post has included these attributes, which are necessary for managing various
things. Besides, security and privacy are a huge fact in the online processing of various
things. A secure system is a basic need, which has provided security, privacy, liability,
interoperability, and more (Sharma, 2019). Moreover, there are many advantages of
cybersecurity, which improve the relationship of people in the online relationship. There are
some vulnerabilities in a system of a firm, which is a reason behind the cybercrime and
cyber-attacks.
Most of the things have used for managing all the things, which is better for managing
all the things. Moreover, people have trust in various things, which are part of the system as
well. its impact on the relationship of different people (Rathi, 2019). Moreover, it is
necessary to improve the basic things in a company to reduce the chances of cybercrime, such
as firewalls, anti-virus, and many more. The network is a common part of various things,
which is a basic need for various services in a firm (Fisch & White, 2017). Furthermore, it
has described all the content in a better way to analyse risks and threats from digital security
issues. It can be reduced using cybersecurity (Bui, 2018).
Besides, the Australian agencies have provided mitigation strategies for cybercrime
and other works (ACSC, 2019). In addition, trust establishment is necessary for managing
and building a good relationship in the network.
Secure Non-Rational Data Stores
There are different ways to protect BD, such as identity provisioning, authentication,
and authorization, storage management, single-sign-on, and auditing. The post has included a
federated identity system, which is a possible way to improve the basic concepts of digital
identity. It is a system to create trust between different people (Buttler, 2017).
There are various legal, ethical, social rule and responsibilities to manage all the
things in a better way (Warren, 2011). It has described securing digital identity, which is
necessary for managing various things. It has included various methods, which are human
integration, directed identity, user control, and consent. In addition, the Australian
government has provided a code of ethics for all online users to make their rights and duties
better. Moreover, digital identity is necessary for various transactions and processing
(Warren, 2011).
In addition, data ownership is necessary for managing issues in business and other
activities. The post has included these attributes, which are necessary for managing various
things. Besides, security and privacy are a huge fact in the online processing of various
things. A secure system is a basic need, which has provided security, privacy, liability,
interoperability, and more (Sharma, 2019). Moreover, there are many advantages of
cybersecurity, which improve the relationship of people in the online relationship. There are
some vulnerabilities in a system of a firm, which is a reason behind the cybercrime and
cyber-attacks.
Most of the things have used for managing all the things, which is better for managing
all the things. Moreover, people have trust in various things, which are part of the system as
well. its impact on the relationship of different people (Rathi, 2019). Moreover, it is
necessary to improve the basic things in a company to reduce the chances of cybercrime, such
as firewalls, anti-virus, and many more. The network is a common part of various things,
which is a basic need for various services in a firm (Fisch & White, 2017). Furthermore, it
has described all the content in a better way to analyse risks and threats from digital security
issues. It can be reduced using cybersecurity (Bui, 2018).

BIG DATA SECRUITY 5
Moreover, there are many things to manage all the things, which is can be used for
improving the cybersecurity of a system. The post has included most of the things, which
have related to digital identity. Additionally, cyber-attacks can be reduced using various rules
and regulations. It is good for the improvement of the security and privacy of personal things
(Buttler, 2017). Moreover, cybersecurity is the best way to improve the relationship with the
basic need of the system. All the things can be managed using the proper security of IT assets
and other resources. However, cyber-attacks can be reduced using different processes. Most
of the things can be managed using all the services.
Computer systems can be secured using basic services. Most people have managed
their services using better rules and regulations. The post has provided a good message and
awareness about digital identity. In addition, basic services can b used for managing all the
things in a better way. All things can be secured using better security policies and regulations.
All over the post has provided a better source of information, which has used by the author. It
will improve the knowledge of a person towards present generation identity security
(Cuzzocrea, 2014).
Furthermore, BD is a basic tool to manage a large amount of data on the business
functions of a firm. In addition, security is an important part of the end of the firm as well as
customers (Sharma, 2019). Many firms have adopted a risk assessment framework to
analyze the risks and threats of their processes. In addition, cryptography can be a proper
solution to privacy and security issues in the firm. Moreover, BD can be used for new
emerging technologies and algorithms for improving security (Bird, 2018).
Conclusion
In conclusion, BD security is an important part, as it can be a huge loss for a firm if its
BD has compromised in cyber-attacks. Cybersecurity is another factor, which can improve
the security of the firm. This report has provided different factors, which are beneficial for
BD security, which is necessary for an organization. Finally, it is necessary to improve the
security of the BD to avoid cybercrimes. It will be better for an organization in the future.
Moreover, there are many things to manage all the things, which is can be used for
improving the cybersecurity of a system. The post has included most of the things, which
have related to digital identity. Additionally, cyber-attacks can be reduced using various rules
and regulations. It is good for the improvement of the security and privacy of personal things
(Buttler, 2017). Moreover, cybersecurity is the best way to improve the relationship with the
basic need of the system. All the things can be managed using the proper security of IT assets
and other resources. However, cyber-attacks can be reduced using different processes. Most
of the things can be managed using all the services.
Computer systems can be secured using basic services. Most people have managed
their services using better rules and regulations. The post has provided a good message and
awareness about digital identity. In addition, basic services can b used for managing all the
things in a better way. All things can be secured using better security policies and regulations.
All over the post has provided a better source of information, which has used by the author. It
will improve the knowledge of a person towards present generation identity security
(Cuzzocrea, 2014).
Furthermore, BD is a basic tool to manage a large amount of data on the business
functions of a firm. In addition, security is an important part of the end of the firm as well as
customers (Sharma, 2019). Many firms have adopted a risk assessment framework to
analyze the risks and threats of their processes. In addition, cryptography can be a proper
solution to privacy and security issues in the firm. Moreover, BD can be used for new
emerging technologies and algorithms for improving security (Bird, 2018).
Conclusion
In conclusion, BD security is an important part, as it can be a huge loss for a firm if its
BD has compromised in cyber-attacks. Cybersecurity is another factor, which can improve
the security of the firm. This report has provided different factors, which are beneficial for
BD security, which is necessary for an organization. Finally, it is necessary to improve the
security of the BD to avoid cybercrimes. It will be better for an organization in the future.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

BIG DATA SECRUITY 6
References
ACSC. (2019). Strategies to Mitigate Cyber Security Incidents. Retrieved September 3, 2019,
from acsc.gov.au: https://acsc.gov.au/infosec/mitigationstrategies.htm
Arlitsch, K., & Edelman, A. (2014). Staying safe: Cyber security for people and
organizations. Journal of Library Administration, 54(1), 46-56. Retrieved from
https://www.tandfonline.com/doi/abs/10.1080/01930826.2014.893116?
journalCode=wjla20
Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures.
Procedia Economics and Finance, 28, 24-31.
Bird, D. (2018). Information Security risk considerations for the processing of IoT sourced
data in the Public Cloud. doi:10.1049/cp.2018.0040
Bou-Harb, E., Debbabi, M., & Assi, C. (2016). Big data behavioral analytics meet graph
theory: on effective botnet takedowns. IEEE Network, 31(1), 18-26.
Bui, n. (2018). Big Data As A Service: IaaS, PaaS And SaaS. Retrieved October 25, 2019,
from https://blog.panoply.io/big-data-as-a-service-iaas-paas-and-saas
Buttler, P. (2017, July 28). 10 CHALLENGES TO BIG DATA SECURITY AND PRIVACY.
Retrieved from https://dataconomy.com: https://dataconomy.com/2017/07/10-
challenges-big-data-security-privacy/
Cates, S. (2018, February 8). Three Strategies for Big Data Security. Retrieved from
https://blog.thalesesecurity.com: https://blog.thalesesecurity.com/2018/02/08/three-
strategies-for-big-data-security/
Chang, L. Y. (2017). Cybercrime and Cyber security in ASEAN. In Comparative
Criminology in Asia, 135-148.
Cuzzocrea, A. (2014). Privacy and security of big data: current challenges and future research
perspectives. In Proceedings of the First International Workshop on Privacy and
Secuirty of Big Data (pp. 45-47). Shanghai: ACM.
Datafloq. (2019, March 1). Big Data Analytics Paving The Path For Businesses With More
Informed Decisions. Retrieved from https://datafloq.com:
References
ACSC. (2019). Strategies to Mitigate Cyber Security Incidents. Retrieved September 3, 2019,
from acsc.gov.au: https://acsc.gov.au/infosec/mitigationstrategies.htm
Arlitsch, K., & Edelman, A. (2014). Staying safe: Cyber security for people and
organizations. Journal of Library Administration, 54(1), 46-56. Retrieved from
https://www.tandfonline.com/doi/abs/10.1080/01930826.2014.893116?
journalCode=wjla20
Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures.
Procedia Economics and Finance, 28, 24-31.
Bird, D. (2018). Information Security risk considerations for the processing of IoT sourced
data in the Public Cloud. doi:10.1049/cp.2018.0040
Bou-Harb, E., Debbabi, M., & Assi, C. (2016). Big data behavioral analytics meet graph
theory: on effective botnet takedowns. IEEE Network, 31(1), 18-26.
Bui, n. (2018). Big Data As A Service: IaaS, PaaS And SaaS. Retrieved October 25, 2019,
from https://blog.panoply.io/big-data-as-a-service-iaas-paas-and-saas
Buttler, P. (2017, July 28). 10 CHALLENGES TO BIG DATA SECURITY AND PRIVACY.
Retrieved from https://dataconomy.com: https://dataconomy.com/2017/07/10-
challenges-big-data-security-privacy/
Cates, S. (2018, February 8). Three Strategies for Big Data Security. Retrieved from
https://blog.thalesesecurity.com: https://blog.thalesesecurity.com/2018/02/08/three-
strategies-for-big-data-security/
Chang, L. Y. (2017). Cybercrime and Cyber security in ASEAN. In Comparative
Criminology in Asia, 135-148.
Cuzzocrea, A. (2014). Privacy and security of big data: current challenges and future research
perspectives. In Proceedings of the First International Workshop on Privacy and
Secuirty of Big Data (pp. 45-47). Shanghai: ACM.
Datafloq. (2019, March 1). Big Data Analytics Paving The Path For Businesses With More
Informed Decisions. Retrieved from https://datafloq.com:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BIG DATA SECRUITY 7
https://datafloq.com/read/big-data-analytics-paving-path-businesses-decision/6110
Fisch, E., & White, G. (2017). Computer system and network security (1st ed.). London: CRC
press.
Fruhlinger, J. (2018). What is WannaCry ransomware, how does it infect, and who was
responsible? Retrieved 09 03, 2018, from
https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-
ransomware-how-does-it-infect-and-who-was-responsible.html
Provin, C. (2018). WannaCry & NotPetya Ransomware Attacks – One Year Later. Retrieved
September 21, 2018, from https://blog.thalesesecurity.com:
https://blog.thalesesecurity.com/2018/05/01/wannacry-notpetya-ransomware-attacks-
one-year-later/
Rathi, Y. (2019, Febuary 22). 9 Digital Identity Trends That Will Make or Break Businesses
in 2019. Retrieved from https://hackernoon.com: https://hackernoon.com/9-digital-
identity-trends-that-will-make-or-break-businesses-in-2019-f5cda26a8dac
Sharma, R. (2019, January 25). BIG DATA SECURITY: PROVEN BEST PRACTICES TO
LOCK IT DOWN. Retrieved from http://techgenix.com: http://techgenix.com/big-
data-security/
Taylor, C. (2017, June 27). Big Data Security. Retrieved from https://www.datamation.com:
https://www.datamation.com/big-data/big-data-security.html
Warren, E. (2011). Legal, Ethical, and Professional Issues in Information Security. Retrieved
from cengage:
https://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf
https://datafloq.com/read/big-data-analytics-paving-path-businesses-decision/6110
Fisch, E., & White, G. (2017). Computer system and network security (1st ed.). London: CRC
press.
Fruhlinger, J. (2018). What is WannaCry ransomware, how does it infect, and who was
responsible? Retrieved 09 03, 2018, from
https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-
ransomware-how-does-it-infect-and-who-was-responsible.html
Provin, C. (2018). WannaCry & NotPetya Ransomware Attacks – One Year Later. Retrieved
September 21, 2018, from https://blog.thalesesecurity.com:
https://blog.thalesesecurity.com/2018/05/01/wannacry-notpetya-ransomware-attacks-
one-year-later/
Rathi, Y. (2019, Febuary 22). 9 Digital Identity Trends That Will Make or Break Businesses
in 2019. Retrieved from https://hackernoon.com: https://hackernoon.com/9-digital-
identity-trends-that-will-make-or-break-businesses-in-2019-f5cda26a8dac
Sharma, R. (2019, January 25). BIG DATA SECURITY: PROVEN BEST PRACTICES TO
LOCK IT DOWN. Retrieved from http://techgenix.com: http://techgenix.com/big-
data-security/
Taylor, C. (2017, June 27). Big Data Security. Retrieved from https://www.datamation.com:
https://www.datamation.com/big-data/big-data-security.html
Warren, E. (2011). Legal, Ethical, and Professional Issues in Information Security. Retrieved
from cengage:
https://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.