Exploiting Flaws in Big Data Systems
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8
Abstract
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold. In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions. Â
Authors and Affiliations
Michael G. Brown, Paolina Centonze
Software Quality: Issues, Concerns and New Directions
Software metrics and quality models have a very important role to play in measurement of software quality. A number of well-known quality models and software metrics are used to build quality software both in industry an...
DEVELOPING A CONCEPTUAL MODEL OF FACTORS AFFECTING SOCIAL MEDIA NETWORKING USAGE IN E-LEARNING AT TALAL ABU GHAZELEH UNIVERSITY COLLEGE OF BUSINESS (TAGUCB) IN BAHRAIN
Social networking has become pervasive in all sectors in the 21st century. The Kingdom of Bahrain is experiencing a big wave in reference to the use of social media networking in the context of a classroom. Indisputabl...
Backstepping Adaptive Control of DFIG-Generators for Variable-Speed Wind Turbines
In this paper, we present a nonlinear robust control of active and reactive power by the use of the technique Backstepping a double-fed asynchronous generator (DFIG) system incorporated in a wind. The power transfer betw...
Hajj and Umra smart mobile Application: Culture and Usability Study
Mobile technology is becoming more popular around the world. The importance of such technology relates to its capability of allowing the user of performing many different daily basis tasks. Despite the progress made in t...
Monitoring Pareto Type IV SRGM using SPC
The Reliability of the Software Process can be monitored efficiently using Statistical Process Control (SPC). SPC is the application of statistical techniques to control a process. SPC is a study of the best ways of des...