{"title":"当代大数据与信息系统安全威胁研究","authors":"J. Jaiswal, Rita Samikannu, Ilango Paramasivam","doi":"10.1109/ICRTCCM.2017.33","DOIUrl":null,"url":null,"abstract":"A substantive prerequisite for the development of any industry, organization, or institute is nothing but the big data. Big data comprises numerous maneuvers for its production, warehousing, and utilization. Security vulnerability comes into existence from the scratch of a collection of the big data and parallel exists till the end. Security of the data is quite essential since its effluence may incorporate a big loss. As technology increases to preserve and secure big data, hackers and intruders express themselves one step farther. A remarkable census can be observed that every year they are exploiting the data up to a huge extent leaving companies in the loss of billions nevertheless companies are spending immense amounts to secure their data. In this paper, we have followed a survey about various malware and malicious activities, some techniques and processes followed by hackers and intruders, and elaborated some Detection, prevention, and treatment techniques to secure big data.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey on Contemporary Security Threats in Big Data and Information System\",\"authors\":\"J. Jaiswal, Rita Samikannu, Ilango Paramasivam\",\"doi\":\"10.1109/ICRTCCM.2017.33\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A substantive prerequisite for the development of any industry, organization, or institute is nothing but the big data. Big data comprises numerous maneuvers for its production, warehousing, and utilization. Security vulnerability comes into existence from the scratch of a collection of the big data and parallel exists till the end. Security of the data is quite essential since its effluence may incorporate a big loss. As technology increases to preserve and secure big data, hackers and intruders express themselves one step farther. A remarkable census can be observed that every year they are exploiting the data up to a huge extent leaving companies in the loss of billions nevertheless companies are spending immense amounts to secure their data. In this paper, we have followed a survey about various malware and malicious activities, some techniques and processes followed by hackers and intruders, and elaborated some Detection, prevention, and treatment techniques to secure big data.\",\"PeriodicalId\":134897,\"journal\":{\"name\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"volume\":\"121 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTCCM.2017.33\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTCCM.2017.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Contemporary Security Threats in Big Data and Information System
A substantive prerequisite for the development of any industry, organization, or institute is nothing but the big data. Big data comprises numerous maneuvers for its production, warehousing, and utilization. Security vulnerability comes into existence from the scratch of a collection of the big data and parallel exists till the end. Security of the data is quite essential since its effluence may incorporate a big loss. As technology increases to preserve and secure big data, hackers and intruders express themselves one step farther. A remarkable census can be observed that every year they are exploiting the data up to a huge extent leaving companies in the loss of billions nevertheless companies are spending immense amounts to secure their data. In this paper, we have followed a survey about various malware and malicious activities, some techniques and processes followed by hackers and intruders, and elaborated some Detection, prevention, and treatment techniques to secure big data.