Written Assignment Unit 5
University of the People
CS 3440: Big Data
Introduction
Big data has revolutionized various industries, enabling organizations to extract valuable
insights and make informed decisions. However, the increasing volume, velocity, and variety
of data also present significant security challenges (Jin et al., 2015). Organizations must
understand and address these threats to protect sensitive information and maintain their
reputation. We’ll discuss three main threats to big data security and outline steps
organizations can take to mitigate these risks.
Three Main Threats to Big Data Security
Organizations face several key threats in the realm of big data security:
● Data Breaches: Data breaches involve unauthorized access to sensitive information,
potentially leading to financial loss, reputational damage, and legal consequences; this
week I already mentioned the data breach that involved Synlab Italia and its millions
of customers. Hackers employ various techniques, such as malware attacks, phishing
scams, and social engineering, to exploit vulnerabilities and gain access to valuable
data (Chahal et al., 2017). The interconnected nature of big data systems increases the
potential impact of a breach, as attackers can compromise multiple systems and
access large amounts of data.
● Insider Threats: Insider threats arise from individuals within the organization who
misuse their authorized access to data. This can include accidental data leakage,
intentional theft, or sabotage. Employees, contractors, or even former employees with
access to sensitive information can pose a significant risk if they are not properly
trained or monitored.
● Lack of Data Integrity: Data integrity refers to the accuracy, consistency, and
reliability of data throughout its lifecycle. Threats to data integrity can arise from
various sources, including human error, software bugs, hardware failures, and
malicious attacks (Chahal et al., 2017). If data is corrupted, a company might have
severe losses; just this week I had to deal with an error from our collaborator that lead
to loss of the data concerning hundreds of conversations, we are currently trying to fix
the problem but this was the result of a simple mistake.
Steps to Mitigate Big Data Security Threats
To effectively address these threats, organizations should take the following steps:
Develop a Comprehensive Security Plan: Organizations must develop a robust security
plan that addresses all aspects of big data security, including data collection, storage,
processing, and access. This plan should include security policies, procedures, and guidelines
that are regularly updated to reflect the evolving threat landscape.
Implement Security Controls: Organizations must implement appropriate security controls
to protect their big data assets. This includes access controls, encryption, intrusion detection
systems, and data loss prevention tools. Regular security assessments and vulnerability scans
can help identify and address potential weaknesses in the system (Chahal et al., 2017).
Employee Training and Awareness: Employees play a crucial role in maintaining big data
security. Organizations must provide regular training and awareness programs to educate
employees about security policies, best practices, and potential threats. This will help reduce
the risk of accidental data leakage and empower employees to identify and report suspicious
activity (Gupta, 2018).
Conclusion
Big data security is a critical concern for organizations across all industries. By understanding
the main threats and implementing appropriate mitigation strategies, organizations can
protect their valuable data assets and maintain the trust of their stakeholders. A
comprehensive security plan, robust security controls, and employee training are essential
components of a successful big data security strategy.
word count: 543
References
Chahal, D., Kharb, L., & Gupta, M. (2017). Challenges and Security Issues of NOsql
Databases. International Journal of Scientific Research in Computer Science, Engineering
and Information Technology.
https://www.researchgate.net/profile/Latika-Kharb/publication/348297239_Challenges_and_
Security_Issues_of_NOsql_Databases/links/5ff6cd8645851553a026d7b6/Challenges-and-Sec
urity-Issues-of-NOsql-Databases.pdf
Gupta, N. K. (2018). Addressing big data security issues and challenges. International
Journal of Computer Engineering & Technology, 9(4),
229–237.https://iaeme.com/MasterAdmin/Journal_uploads/IJCET/VOLUME_9_ISSUE_4/IJ
CET_09_04_025.pdf
Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data
research. Big Data Research, 2(2), 59-64.
https://wah.cse.cuhk.edu.hk/wah/Wah/papers/J94/J96.pdf