Exploiting Flaws in Big Data Systems
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8
Abstract
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold. In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions. Â
Authors and Affiliations
Michael G. Brown, Paolina Centonze
Multipath Routing protocol: NCPR and QAMR
Mobile ad hoc network is an assembly of mobile nodes with no centralized server. Due to mobility of nodes and decentralized network it is difficult to maintain the quality of service (QoS) in routing the packets from sou...
Effect of Weight Factor on The Performance of Hybrid Column Wavelet Transform used for Watermarking under Various Attacks.
Digital image watermarking is aimed at copyright protection of digital images. Strength of embedded watermark plays an important role in robustness and invisibility of watermarking technique. In this paper, effect of two...
AN ENHANCED TASK ALLOCATION STRATEGY IN CLOUD ENVIRONMENT
Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is...
Descriptive statistical analysis based on patients EEG energy in coma and quasi-brain-death state
In this paper, measure of descriptive statistical analysis based on EEG (electroencephalography) energy was proposed to evaluate coma and quasi-brain-death patients EEG. Firstly, 36 cases of EEG (coma: 19; quasi-br...
INSTABILITY PROBLEM OF CONVENTIONAL TRANSFORMER DIFFERENTIAL PROTECTION-APPLICATION OF ZERO SEQUENCE CURRENT TRAP
Zero sequence component of current usually causes instability of the differential protection. It enters circuits through earthed terminals. The traditional way of solving the problem in differential schemes is by connect...