Exploiting Flaws in Big Data Systems

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8

Abstract

In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold.  In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions.  

Authors and Affiliations

Michael G. Brown, Paolina Centonze

Keywords

Related Articles

To Control Electrical MCBs using Hand Gesture Recognition

There has been growing interest in development of new techniques and methods for Human-Computer Interaction (HCI). Gesture Recognition is one of the important areas of this technology. Gesture Recognition means interfaci...

ENVIRONMENTAL IMPLICATIONS OF CELL PHONES PENETRATION AND DISPOSAL IN KENYA

Kenya has over six million active  mobile subscribers who may at some point want to replace or   get rid of old mobile phones. A big number of the mobile phones were recently switched off for not being genuine without...

A FRAMEWORK FOR SUPPORT ON GENERATION OF MASSIVE OPEN ONLINE COURSE ADAPTATIVE MOOC USING TECHNIQUES OF CONTEXT ADAPTATION

This paper presents a proposal for a software framework to aid in the development of adaptive MOOC, using techniques adapted to the context. This solution will support the adaptation of the content of MOOCs according to...

Data Mining as Support for Customer Relationship Management: A Case Study

This article describes the data mining application to CRM - Customer Relationship Management. The article starts with an introduction showing the importance of the CRM strategy for the company, after it’s introduced th...

The Analysis on the Key Factors of Fire Rescue Course Content Design A Case Study of Miaoli County

This study discussed the factors affecting the design of the fire rescue and training courses for firefighters in Miaoli County. A questionnaire survey was conducted on firefighters. The content of the fire rescue course...

Download PDF file
  • EP ID EP650835
  • DOI 10.24297/ijct.v15i8.1498
  • Views 99
  • Downloads 0

How To Cite

Michael G. Brown, Paolina Centonze (2016). Exploiting Flaws in Big Data Systems. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(8), 6967-6975. https://europub.co.uk/articles/-A-650835