In: Computer Science
White Paper about security in big data: ( technical Writing)
limit the security part to one specific measure or practice. If that isn't possible then go with the entire security protocol that is/may be followed.
White Paper about security in Big Data:
Today, big data security issues are increasing as big data has centralized storage and there is the management of very high-value data. That's why it has become a major target of cyberattacks. Big data ransomware attacks, data leaks, and global big data security incidents occur frequently. In response to big data security demands, research and development (R&D), and production have emerged in security technologies and solutions in the form of programs and goods, but these lag in comparison to industry developments.
Big data security is a comprehensive issue touching on areas such as technology, law, regulation, and social governance, and it can influence national security, industrial security, and people's legitimate rights and interests. At the same time, innovation in areas such as big data's scope, processing methods, and theories of application will not only bring about change in the security requirements of big data platforms but also will drive changes in data security protection concepts and bring about requirements and expectations for high-level privacy protection technology.
ANS 1. Now, talking about the big issues or problems that need to be solved is data platform security and access control mechanism as today we see in situations requiring big data, data is aggregated from a more diverse range of channels, data types, user roles, and application requirements. A huge amount of data is to be handled on a centralized platform where the security and authenticity of data and users are to be checked and maintained to secure data and avoid data abuse. Hackers can hide their attacks within big data, making it difficult for traditional detection methods to identify a data breach and security threat. As a result, APT attacks against big data platforms have occurred, and large-scale distributed denial of service (DDoS) attacks on big data platforms are not uncommon. Verizon’s 2018 Database Breach Investigations Report shows that 48% of data breaches are related to hacker attacks. Among them, DDoS, phishing attacks, and abuse of privileges are the main hacking methods. So, strengthening data segregation and access control, and realizing data "usability without visibility," are new data security requirements in the big data environment. The results of using big data technology for large-scale data mining analysis may include sensitive information touching on national security, economic functions, social governance, etc. therefore security management when sharing and publishing those results must be strengthened.
ANS 2. YES, my topic of interest is innovative and attracts technicians or subject matter experts because talking about big data platform security as its a centralized platform to store the bulk of data at one place and authorized users may access any piece of information, anytime and anywhere. If this data is hacked by someone it poses a major security threat to the organization, nation, and persons who are directly or indirectly involved in the maintenance and handling of that amount of data. This is a major concern and experts should always do research and find the vulnerability in data and the different ways to secure sensitive data and national security information. Proper authentication, encryption mechanisms should be developed and implemented using artificial intelligence and machine learning in order to secure data integrity and originality.
ANS 3. YES, my topic of interest is interesting to managers because it provides business-related benefits and solutions as in today's competitive commercial world when everyone wants to earn more money and make more profit data can play a major role in bringing success to an individual/organization. For example, for an enterprise or company, ethical hackers are hired to find vulnerabilities in their system and ways to secure sensitive data that may cause billion dollars of profit or loss. So, everywhere data plays a major role. Knowing the past work-record of an organization, it becomes easy for a manager to evaluate their areas of strength/weakness and form policies accordingly for the progress of organisation so here also data integrity is much important.
ANS 4. An accurate and historical account of the problem to identify how the problem directly affects the audience is stated as under:
Large-scale user data breaches that affected hundreds of millions of people included a U.S. Republican voter data firm [Deep Root Analytics] and the [Equifax] credit reporting agency. There have also been data breaches in China. In March 2017, probationary employees at JD.com colluded with hackers to steal 5 billion pieces of personal information related to transportation, logistics, and medical treatment, then sold them on the online black market.
In the Cambridge Analytica incident in March 2018, because Facebook did not effectively manage nor hold accountable third-party data use, 87 million users’ data was abused. It also led to a sharp fall in stock prices and a decline in the company’s credibility, among other serious consequences.
Hence, data security cannot be compromised as it affects the audience directly in a big way It is necessary to establish defense systems that are adapted to and build more secure and reliable big data platforms.