StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security of Big Data - Case Study Example

Cite this document
Summary
The paper "Securing of Big Data" explores firms must be aware that certificate authority servers are vulnerable to data loss. When deploying their own certificate, which is a better solution, organizations are extra cautious of these elements to protect themselves against these attacks.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Security of Big Data
Read Text Preview

Extract of sample "Security of Big Data"

Introduction According to SAS, Big Data is defined as “the ability for an organization to take multiple pieces of information the exponential growth and availability of data, both structured and unstructured.” In essence, Big Data means to clean raw pieces of information to get a better picture of data. The data are typically organized in relationships known as entities that allow users to manipulate information. It is clear that Big Data are needed in any organization to edit, modify, and store inventory. Big Data usually consists of huge Big Data allow users to have manipulation of data and created dynamic inventory queries to facilitate the business. Big Data are pivotal in many organizations because it allows respective stakeholders to view and analyze data. Before the advent of Big Data, information about customers and business were overwhelming. With Big Data, stakeholders can truly take this raw information and convert into data that can assist them in making real-time decisions. The challenge in many organizations is the fact that majority of decisions are made based on estimated guesses. One of the best elements of Big Data is the fact that it reduces any ‘guesswork’. Moreover, it allows the organization to understand customer behavior in a much meaningful way. Another huge aspect of Big Data is the collaboration aspect as it allows users to interact and use this data. Imagine an organization in which the marketing department requires key reports from the technology department. Clearly, the issue of latency can be a factor that can delay essential decision making. Hence, it is only evident that securing Big Data is essential because it holds true information because securing data is not only regulated by compliance, but can potentially fall into wrong hands. Securing data saves organization from financial implications that can have detrimental effects for everyone. Domain Attacks One of the worst vulnerabilities for user domains are insider attacks. Insider attacks occur. For instance, denial of service and spoofing are one the most common themes that occur. The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN technology in Big Data. Moreover, spoofing can also be conducted since an intruder can deceive the network that it recognizes a possible unauthorized access. The problem with installing firewalls in a user domain is the fact that they are fully feasible. Insider attacks occur when one user domain gains more privilege than the other user and shares that information. Tipton (2005) This becomes extremely dangerous because it allows the hacker to have one central location to exploit information. Inside attacks can be vast and potent depending on the type of attack. For instance, an executing script can copy sensitive information and can make one central machine a master. This can be detrimental to a data breach. This master to slave configuration can be used with full throttle for malicious attacks. Authentication is one aspect that will be examined heavily along with social engineering and SQL injections. A huge problem with human engineering is avoiding SQL Ad hoc injections. The fourth element that important to address was to rectify the SQL ad hoc injections. In essence, the intruder can easily get access to the SQL and execute queries to derive personal information. In any given website, sensitive information may be present such as password and usernames, which can lead to further information. The first remedy to this solution is to place this network in a private server that saves all the sensitive information. Moreover, it embeds hierarchy of database permissions that build a layer of security within SQL. For instance, if the user table would not succeed in running a query, it will only allow SELECT access command instead of update/delete. This means that the intruder cannot modify the contents within the SQL. Social Engineering Social engineering for user domains should be based on layering approach. Hierarchy should be followed to ensure user domains have permissions based on hierarchy needs. Another huge aspect of social engineering is loopbacks and text fields. For instead, spoofing is conducted on regular basis for a user account domain password. The logic should be embedded that if an intruder tries to attempt to put incorrect passwords, the system recognizes that. In most cases, Windows and even other open OS such as Ubuntu have been embedding smart logic behind engineering of user domains. Securing Big Data extends beyond social engineering and Ad hoc SQL injections. Public Key Infrastructure is one of the most prominent topics that is discussed in the IT realm. PKI allows organizations to harness a safe environment tin which data transmission is conducted with no breaches. PKI enables people and businesses to utilize a number of secure internal applications. For instance, secure and legally binding emails and any financial transactions conducted on the internet can be achieved through PKI. Without a doubt, the benefits of PKI are delivered through the use of Public Key Cryptography. A core aspect of PKI revolves around complicated cryptography that composes of encryption and decryption of data in bits. This paper will discuss the elements of public and in-house certificate authority. As organizations engage in e-commerce, it is clear that customers are also more involved in online transactions. However online security is always a concern that makes customers and even organizations weary as millions of transactions are conducted in cyberspace. One element of assurance that customers can have is the fact that when conducting these transactions involves the security of the organization. It is clear that when keys are exchanged, they are dealt in two parts-public and private. The algorithm is based on a logic that only the authentic organization can have the private keys, which ensures customer security. Furthermore, these keys cannot be replicated or reverse engineered based on perplexing mathematical formulas. This allows a safer exchange of keys between two parts. Lastly, most webpages convert themselves into HTTPS, which ensures that the page is secured. With the advent of SSL and MD5 encryptions, customers can have assurance that their transactions would not be hacked. Packet sniffing/Encryption With the advent of cloud computing, many black hat hackers continue to utilize many methods to exploit these types of environment. One type attack is known as network sniffing. Utilizing a packet sniffer, an attacker can capture sensitive data if unencrypted such as passwords and other essential configurations. Another threat that is used by majority of the hackers is known as port scanning. However, port 80 is always open since the server resides on top of it. In order to protect these intrusions, a user can easily encrypt date. With the usage of public and private keys, encryption can be achieved. Encrypting data clearly mitigates the risk of an intrusion attack that can cause drastic damage. Moreover, VPNs and VLANs that connect different servers that are running queries must run strong encryption methods. Threats that fall under availability completion causes increased failure and make clouds ready to be exploited by hackers, that can be rectified via PKI. When it comes to protecting data, PKI and CA have huge roles ensuring that data is secured. Organizations often like to outsource this information either to a third-party organization or develop this in-house. The problem with developing this in-house is the fact that it requires high level of expertise that most organizations lack. Additionally, the due diligence of a company falls within a user, which may not be the wisest decision. A huge benefit however is the fact that setting up your own certificate can be much cheaper without paying for a single license. Outsourcing certificates to a third-party vendor is an easier option. However, it is clear that financial implications are always an issue. It is clear that the idea of conducting a CA in-house is an attractive option, granted that an organization has various certificates to deploy. After a careful analysis, it is clear that the reason for conducting a CA in house because a lot of services run Windows Server 2003. Moreover, it is better to have these develop in-house because one can run these a set of services that run under Windows Server 2003. One thing to be incognizant of however is the fact that choosing own certificates in one server may be risky. If one of those certificates are compromised, then the organization’s overall security is compromised. Moreover, spoofing also becomes a very common threat, granted someone manages to hack the authentication server and spoofing the server’s identity. They could also decipher the SSL encryption in an effort to steal customer’s credit card numbers. Authentication Authentication should be done to ensure that only the proper user can have a channel to access that account. This is conducted via password protection, numbers, and codes. Best practices are also discussed here to ensure that user domains are functioning optimally. The first best practice for any use domain is never to open attachments from an unknown source. This is one of the most simple and best practices to embed. Secondly, using least privilege concept is a great practice because it mitigates risk of vulnerability. Moreover, patch management should be conducted on a regular basis to ensure that again mitigates risk of vulnerability. Lastly, all user domains must have unique identity. Unique identity allows each separate account to have their own unique identity. AUP are set of standard and guidelines that are established by a user domain setting. AUP allows logical guidelines to ensure that audit practices are being conducted and risks are being controlled. AUP are extremely important component of framework of security policies because it dictates policies. AUP must be clear and concise in user domain. One of the most prominent factors of AUP is to ensure that user domains are separated by segregation of duties. Another prominent usage policy for user domain is bandwidth limitation for usage. In essence, one user cannot hog the buffer of the RAM. It is crucial to understand that utilizing AUP allows suspension of user domains from an administrator standpoint. Accounts can be suspended, given limited access, administration rights to install programs, etc. Moreover, AUP encompasses managing passwords, software licenses, noncompliance consequences, and escalations. Johnson (2011)When administrator rights are breached or abused, PAA level agreements are crucial that are enabled to enhance accountability of user rights. In essence, the PAA is a written, explicit agreement that a user must acknowledge to. The PAA allows the security team to generally have a contingency plan, audit in timely manner. The PAA is a typically a two page document between administration and organization. It can also enhance the dictating policy utilizing social media. Security Assessment Policy is a governing legislation that outlines Information Security policies, employee orientation, security incidents and plans for new and existing users. It allows users to understand and analyze the security awareness level and avoid any future mishaps that will disrupt business flows. It is clear that that user domain settings and guidelines are essential for any organization. Policies such as SAP, AUP, and PAA are crucial to regulate user domains. Having well-document policies that govern user domains are critical to ensure risks are being mitigated at a consistent level. Lastly, best practices are being implemented to ensure that concepts such as social engineering and insider attacks are being mitigated. Conclusion In order to mitigate this risk, it is often advise to locate have transparency and different servers to execute the authentication problem. Another element that organizations must be aware off is the fact that certificate authority servers are vulnerable against data loss. A typical scenario in which user requests a certificate from the network but in midst of all this, a natural disaster strikes. Hence, that certificate is gone although the files are still encrypted. However, with the decryption keys missing, this can pose a huge issue for organizations attempting to seek data within their own organizations. It is clear that when deploying own certificate, which is a better feasible solution, organizations are extra cautious of these elements to protect themselves against these sort of attacks. Works Cited "Big Data: The next frontier for innovation, competition, and productivity." McKinsey & Company. http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation (accessed October 26, 2014). "Public Key RSA Encryption in C# .NET." - CodeProject. http://www.codeproject.com/Articles/10877/Public-Key-RSA-Encryption-in-C-NET (accessed October 27, 2014). 10 security best practice guidelines for businesses | ZDNet. (n.d.). ZDNet. Retrieved April 20, 2014, from http://www.zdnet.com/10-security-best-practice-guidelines-for-businesses-7000012088/ Kim, David, and Michael Solomon. Fundamentals of information systems security. Sudbury, Mass.: Jones & Bartlett Learning, 2012. Skiba, D. J. (2011). Are you computing in the clouds? understanding cloud computing. Nursing Education Perspectives, 32(4), 266-266-268. Retrieved from http://search.proquest.com/docview/894330516?accountid=10477 Tipton, H. F., & Krause, M. (2005). Information security management handbook (5th ed.). London: Taylor & Francis e-Library. Windows Azure Load Balancing: What To Know. (n.d.). InformationWeek. Retrieved February 24, 2014, from http://www.informationweek.com/software/enterprise-applications/windows-azure-load-balancing-what-to-know/d/d-id/899840 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security of Big Data Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Security of Big Data Research Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1662571-security-of-big-data
(Security of Big Data Research Paper Example | Topics and Well Written Essays - 1500 Words)
Security of Big Data Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1662571-security-of-big-data.
“Security of Big Data Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1662571-security-of-big-data.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security of Big Data

Technology Evaluation - Big Data Analytics

hellip; This paper is an evaluation study plan, aimed at understanding the benefits and costs of using the technology of big data Analytics.... Liebowitz (2013) therefore maintains that with the right platform of big data analytics, an organization will gain the capacity of increasing efficiency, boosting sales, improving operations, risk management, and customer service.... This paper is an evaluation study plan, aimed at understanding the benefits and costs of using the technology of big data Analytics....
4 Pages (1000 words) Research Paper

Big Data Challenged and Opportunities

The underlying purpose of this discussion is to provide the reader with a more informed understanding of some staggering revelations about big data.... It is evidently clear from the discussion that with big data, the problem of storage arises because of the fact that cloud storage has been seen vulnerable now to many security issues.... The processing power and the storage capabilities of the technology for big data should be met with to improve understanding of nature....
5 Pages (1250 words) Assignment

Impact of big data on data management functions

Thus, it has profound Running Head: Impact of big data on Data Management Impact of big data on Data Management Date of SubmissionImpact of big data on Data ManagementIntroduction Big data is a very important development in the realm of information technology.... haracteristics of big data Distinguishing characteristics of big data are its capabilities of circumnavigating data utilization and limitation issues....
2 Pages (500 words) Essay

The Analysis of the Heartbleed

The Shellshock vulnerability is a big concern since it eliminates the necessity for specialized knowledge and in turn offers a simple (unfortunately, very basic) means of taking control of another computer or even a web server to make it run code.... SSL, this shorthand represents Secure Sockets Layer—It is a security standard that allows secure transmission of information to occur between you and a service without the risk of interception of vital information by a third party....
16 Pages (4000 words) Essay

Big Data Management

The topic provides a vivid explanation of the broader application of big data in society and management research.... The additional use of big data is crucial to exemplify the significance of the topic to organizations like NHS trust and data management community.... The use of powerful technology and the massive influx of data are two reasons to increase the future use of big data in NHS trust.... he three literature sources provide a vivid explanation about big problems, opportunities and harness of big data....
9 Pages (2250 words) Essay

Methods Available for Maintaining Computer System Security

Computer security can be achieved in different ways such as by using an anti-malware program, by using cryptography technique to encrypt the data, and also various other methods.... Integrity relates to preventing improper or unauthorised modification of any data.... Secrecy or confidentiality relates to the protection of any data or information from unauthorised disclosure.... The security-related problem of a computer system is resolved by maintaining a division between various data as well as computing-related resources and the user of the computer system....
8 Pages (2000 words) Coursework

The Security Mechanism for IEEE 802.11 Wireless Networks

With the consistent and rapid evolution in technology and ways of computing, mobile computing and other wireless forms of data processing and computation will soon take over.... This is occasioned by the need for mobile computing and data processing techniques that allow anywhere any time processing that can only be achieved by using wireless connectivity.... This case study "The security Mechanism for IEEE 802.... 1 Wireless LAN's security mechanisms....
10 Pages (2500 words) Case Study

The Nature of Surveillance within the Context of Big Data Collection and Privacy Versus Security

As the paper "The Nature of Surveillance within the Context of big data Collection and Privacy Versus Security" outlines, surveillance has always been mainly used by organizations that concern themselves with law enforcement with the aim of keeping close attention on individuals of interest.... The paper will, therefore, seek to evaluate the nature of surveillance within the context of big data collection and privacy versus security.... hellip; The author of the paper states that the invention of the Closed Circuit Television (CCTV) was initially intended to be used by the security agencies so that they could be vigilant all the time to assist them in catching criminals which would, in turn, enable them to give eyewitness account in the courts of law (Valera & Velastin, 2005)....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us