AIT 614 - Assignment 12.docx - Homework Assignment 12 Big...

This preview shows page 1 - 2 out of 4 pages.

Homework Assignment 12Big data security is the word used for all the precautions and tools used to monitor both dataand analytics processes from various attacks that can happen such as theft and othermalicious events to harm them. Just like the other forms of cyber-security, this variant of bigdata deals with the attacks that happen either from the online or offline ends. Big datasecurity has multi faces when spoken about the companies which operate on the cloud:threats include theft of the data stored, ransomware or DDoS attacks which could crash aserver easily. This can get far worse when companies try to store sensitive data about theircustomers credit cards or contact details etc. These attacks on company’s big data storagecould cause serious financial damages. There are mainly three bigdata security practiceswhich defines how an organization sets up theirBI security. The first challenge is incomingdata: which could be intercepted or corrupted in transit. The second is data in storage: whichcan be stolen while put on cloud or on servers. The third is data that is being outputted: whichseems not so important but could provide an access point for hackers. These main concernsshould play a major role in creating a secure end-to-end big data security idea for anyorganization.[ CITATION sis \l 1033 ]Challenges1.Most big data implementations actually spread huge processing jobs across many systemsfor much faster analysis. Hadoop is one such instance of open source technology involvedin this, and originally had no security of any sort. Distributed processing may mean lessdata processed by any one system, but it means a lot more systems where security issuescomes up.2.NoSQL databases lack data security by themselves.3.The data in the big data architecture is stored in various tiers, depending on the businessneeds and cost efficiency. For example, high-priority data will usually be stored on flashmedia. So, locking down storage will mean creating a tier-conscious strategy.4.Security solutions that draw logs from endpoints will need to validate the authenticity ofthose endpoints properly if not the analysis is not going to do much good.5.Real-time security/compliance tools generate a tremendous amount of information; thekey is finding a way to ignore the false positives, so that the efforts can be focused on thetrue breaches than the false positives.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture