[go: up one dir, main page]

0% found this document useful (0 votes)
12 views4 pages

Written Assignment 5

The document discusses the significant security challenges posed by big data, highlighting three main threats: data breaches, insider threats, and lack of data integrity. It emphasizes the importance of developing a comprehensive security plan, implementing security controls, and providing employee training to mitigate these risks. By addressing these threats, organizations can protect sensitive information and maintain stakeholder trust.

Uploaded by

Yohanes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

Written Assignment 5

The document discusses the significant security challenges posed by big data, highlighting three main threats: data breaches, insider threats, and lack of data integrity. It emphasizes the importance of developing a comprehensive security plan, implementing security controls, and providing employee training to mitigate these risks. By addressing these threats, organizations can protect sensitive information and maintain stakeholder trust.

Uploaded by

Yohanes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Written Assignment Unit 5

University of the People

CS 3440: Big Data

Introduction

Big data has revolutionized various industries, enabling organizations to extract valuable

insights and make informed decisions. However, the increasing volume, velocity, and variety

of data also present significant security challenges (Jin et al., 2015). Organizations must

understand and address these threats to protect sensitive information and maintain their

reputation. We’ll discuss three main threats to big data security and outline steps

organizations can take to mitigate these risks.

Three Main Threats to Big Data Security

Organizations face several key threats in the realm of big data security:

● Data Breaches: Data breaches involve unauthorized access to sensitive information,

potentially leading to financial loss, reputational damage, and legal consequences; this

week I already mentioned the data breach that involved Synlab Italia and its millions

of customers. Hackers employ various techniques, such as malware attacks, phishing

scams, and social engineering, to exploit vulnerabilities and gain access to valuable

data (Chahal et al., 2017). The interconnected nature of big data systems increases the

potential impact of a breach, as attackers can compromise multiple systems and

access large amounts of data.


● Insider Threats: Insider threats arise from individuals within the organization who

misuse their authorized access to data. This can include accidental data leakage,

intentional theft, or sabotage. Employees, contractors, or even former employees with

access to sensitive information can pose a significant risk if they are not properly

trained or monitored.

● Lack of Data Integrity: Data integrity refers to the accuracy, consistency, and

reliability of data throughout its lifecycle. Threats to data integrity can arise from

various sources, including human error, software bugs, hardware failures, and

malicious attacks (Chahal et al., 2017). If data is corrupted, a company might have

severe losses; just this week I had to deal with an error from our collaborator that lead

to loss of the data concerning hundreds of conversations, we are currently trying to fix

the problem but this was the result of a simple mistake.

Steps to Mitigate Big Data Security Threats

To effectively address these threats, organizations should take the following steps:

Develop a Comprehensive Security Plan: Organizations must develop a robust security

plan that addresses all aspects of big data security, including data collection, storage,

processing, and access. This plan should include security policies, procedures, and guidelines

that are regularly updated to reflect the evolving threat landscape.

Implement Security Controls: Organizations must implement appropriate security controls

to protect their big data assets. This includes access controls, encryption, intrusion detection

systems, and data loss prevention tools. Regular security assessments and vulnerability scans

can help identify and address potential weaknesses in the system (Chahal et al., 2017).
Employee Training and Awareness: Employees play a crucial role in maintaining big data

security. Organizations must provide regular training and awareness programs to educate

employees about security policies, best practices, and potential threats. This will help reduce

the risk of accidental data leakage and empower employees to identify and report suspicious

activity (Gupta, 2018).

Conclusion

Big data security is a critical concern for organizations across all industries. By understanding

the main threats and implementing appropriate mitigation strategies, organizations can

protect their valuable data assets and maintain the trust of their stakeholders. A

comprehensive security plan, robust security controls, and employee training are essential

components of a successful big data security strategy.

word count: 543

References

Chahal, D., Kharb, L., & Gupta, M. (2017). Challenges and Security Issues of NOsql

Databases. International Journal of Scientific Research in Computer Science, Engineering

and Information Technology.

https://www.researchgate.net/profile/Latika-Kharb/publication/348297239_Challenges_and_

Security_Issues_of_NOsql_Databases/links/5ff6cd8645851553a026d7b6/Challenges-and-Sec

urity-Issues-of-NOsql-Databases.pdf

Gupta, N. K. (2018). Addressing big data security issues and challenges. International

Journal of Computer Engineering & Technology, 9(4),


229–237.https://iaeme.com/MasterAdmin/Journal_uploads/IJCET/VOLUME_9_ISSUE_4/IJ

CET_09_04_025.pdf

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data

research. Big Data Research, 2(2), 59-64.

https://wah.cse.cuhk.edu.hk/wah/Wah/papers/J94/J96.pdf

You might also like