Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant
{"title":"大数据云计算环境下的网络安全技术比较研究","authors":"Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant","doi":"10.1109/IC3I56241.2022.10072552","DOIUrl":null,"url":null,"abstract":"Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment\",\"authors\":\"Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant\",\"doi\":\"10.1109/IC3I56241.2022.10072552\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10072552\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment
Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.