Question

In: Computer Science

White Paper about security in big data: ( technical Writing) limit the security part to one...

White Paper about security in big data: ( technical Writing)

limit the security part to one specific measure or practice. If that isn't possible then go with the entire security protocol that is/may be followed.

  • 1) What particular problem does your topic solve or need does your topic address?
  • 2) Is your topic of interest to technicians or subject matter experts because it is innovative? Why or why not?
  • 3) Is your topic of interest to managers because it provides business related benefits and solutions? Why or why not?
  • 4) Will you be able to provide an accurate and historical account of the problem and be able to identify how the problem directly affects the audience? Why or why not?
  • 5) Will you be able to provide an accurate and historical account of the solution? Why or why not?
  • 6) Is your topic one that a wide readership needs to know about? Why or why not?
  • 7) What organization or company will you situate yourself in to write on this topic?

Solutions

Expert Solution

White Paper about security in Big Data:

Today, big data security issues are increasing as big data has centralized storage and there is the management of very high-value data. That's why it has become a major target of cyberattacks. Big data ransomware attacks, data leaks, and global big data security incidents occur frequently. In response to big data security demands, research and development (R&D), and production have emerged in security technologies and solutions in the form of programs and goods, but these lag in comparison to industry developments.

Big data security is a comprehensive issue touching on areas such as technology, law, regulation, and social governance, and it can influence national security, industrial security, and people's legitimate rights and interests. At the same time, innovation in areas such as big data's scope, processing methods, and theories of application will not only bring about change in the security requirements of big data platforms but also will drive changes in data security protection concepts and bring about requirements and expectations for high-level privacy protection technology.

ANS 1. Now, talking about the big issues or problems that need to be solved is data platform security and access control mechanism as today we see in situations requiring big data, data is aggregated from a more diverse range of channels, data types, user roles, and application requirements. A huge amount of data is to be handled on a centralized platform where the security and authenticity of data and users are to be checked and maintained to secure data and avoid data abuse. Hackers can hide their attacks within big data, making it difficult for traditional detection methods to identify a data breach and security threat. As a result, APT attacks against big data platforms have occurred, and large-scale distributed denial of service (DDoS) attacks on big data platforms are not uncommon. Verizon’s 2018 Database Breach Investigations Report shows that 48% of data breaches are related to hacker attacks. Among them, DDoS, phishing attacks, and abuse of privileges are the main hacking methods. So, strengthening data segregation and access control, and realizing data "usability without visibility," are new data security requirements in the big data environment. The results of using big data technology for large-scale data mining analysis may include sensitive information touching on national security, economic functions, social governance, etc. therefore security management when sharing and publishing those results must be strengthened.

ANS 2. YES, my topic of interest is innovative and attracts technicians or subject matter experts because talking about big data platform security as its a centralized platform to store the bulk of data at one place and authorized users may access any piece of information, anytime and anywhere. If this data is hacked by someone it poses a major security threat to the organization, nation, and persons who are directly or indirectly involved in the maintenance and handling of that amount of data. This is a major concern and experts should always do research and find the vulnerability in data and the different ways to secure sensitive data and national security information. Proper authentication, encryption mechanisms should be developed and implemented using artificial intelligence and machine learning in order to secure data integrity and originality.

ANS 3. YES, my topic of interest is interesting to managers because it provides business-related benefits and solutions as in today's competitive commercial world when everyone wants to earn more money and make more profit data can play a major role in bringing success to an individual/organization. For example, for an enterprise or company, ethical hackers are hired to find vulnerabilities in their system and ways to secure sensitive data that may cause billion dollars of profit or loss. So, everywhere data plays a major role. Knowing the past work-record of an organization, it becomes easy for a manager to evaluate their areas of strength/weakness and form policies accordingly for the progress of organisation so here also data integrity is much important.

ANS 4. An accurate and historical account of the problem to identify how the problem directly affects the audience is stated as under:

Large-scale user data breaches that affected hundreds of millions of people included a U.S. Republican voter data firm [Deep Root Analytics] and the [Equifax] credit reporting agency. There have also been data breaches in China. In March 2017, probationary employees at JD.com colluded with hackers to steal 5 billion pieces of personal information related to transportation, logistics, and medical treatment, then sold them on the online black market.

In the Cambridge Analytica incident in March 2018, because Facebook did not effectively manage nor hold accountable third-party data use, 87 million users’ data was abused. It also led to a sharp fall in stock prices and a decline in the company’s credibility, among other serious consequences.

Hence, data security cannot be compromised as it affects the audience directly in a big way It is necessary to establish defense systems that are adapted to and build more secure and reliable big data platforms.


Related Solutions

WRITING ASSIGNMENT AND TECHNICAL TERM-PAPER 1. Please write a technical term paper about GRAVITATION - TOPIC:...
WRITING ASSIGNMENT AND TECHNICAL TERM-PAPER 1. Please write a technical term paper about GRAVITATION - TOPIC: GRAVITATION - INTRODUCTION: should be between 1/2 page to 1 page - MINIMUM OF 3 PAGES OR MAXIMUM OF 5 PAGES - A CONCLUSION - A REFERENCE AT THE END OF LAST PAGE THANK YOU
ARTICLE :Big data and big intelligence . “The big data revolution is not about the data....
ARTICLE :Big data and big intelligence . “The big data revolution is not about the data. It’s about the analytics that we can come up with and that we now have to beable to understand what these data say.” – Gary King, Professor and director of the Institute for Quantitative Social Science, Harvard University Companies need to collect, aggregate and analyze data to make better business decisions. With the help of business-intelligence tools and methodologies, companies can now analyze large...
Big Data raises many questions about security, ethical standards, and proper use of data in health...
Big Data raises many questions about security, ethical standards, and proper use of data in health information systems. Ensuring ethical standards means that rules have to be established, but also enforced. Explain the types of activities you would implement in an organization you manage to ensure the proper use of data, particularly in light of the concerns Big Data raises. What safeguards would you recommend for collecting and retrieving healthcare data?
Identify technical and clinical factors that limit the application of data-mining tools in the EHR.
Identify technical and clinical factors that limit the application of data-mining tools in the EHR.
Please write a technical paper that defines 3 to 5 security features that can be integrated into the Quadrago game.
Please write a technical paper that defines 3 to 5 security features that can be integrated into the Quadrago game. Provide design diagrams or pseudocode defining how the security feature would be implemented, and document the test cases for each feature to demonstrate verification (function accuracy) and validation (operational use) testing.
This is an individual assignment. In writing a paper about each problem, identify the consequences of...
This is an individual assignment. In writing a paper about each problem, identify the consequences of the actions taken, and then determine whether the actions taken represented a greater good, who would benefit from the good, and whether the consequences ethically justify the decisions and actions. The Mayor of a large city was given a free membership in an exclusive golf club by people who have received several city contracts. He also accepted gifts from organizations that have not done...
Scan the internet and find an article about big data. Discuss the implications of big data...
Scan the internet and find an article about big data. Discuss the implications of big data by considering the pros and cons. Is big data a good thing? Is the collection of data from people without their knowledge or consent ethical? Will the information gathered from big data be beneficial? Include the internet link to the article in the initial discussion post
What is the most challenging thing there is about writing a research paper? What can be...
What is the most challenging thing there is about writing a research paper? What can be the easiest thing to help write a research paper?
Examine and elaborate FIVE (5) major technical challenges encountered in Big Data application development.
Examine and elaborate FIVE (5) major technical challenges encountered in Big Data application development.
Uses of security-market indexes – Please write a paper about the uses of security-market indexes. How...
Uses of security-market indexes – Please write a paper about the uses of security-market indexes. How are they constructed and differentiated? How are they used as benchmarks? Why should investors examine numerous security-market indexes to evaluate the performance of their investments? Integrate Leviticus 19:22-25 and Ecclesiastes 11:1-6 into the paper. Requirements: 500 words minimum
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT