Prevention of data leakage in big data life cycle
BücherAngebote / Angebote:
The intensive applications for processing and managing big data need security and privacy of the information and asset. Everywhere security intensive information is floating, anyone having malicious intent can misuse the information. This may cause harm to an organization or individual. Organizations are a rich source of user's personal information and it gives opportunity to financially motivated cyber attackers. dependency of human life on computers is continuously increasing. Everything is connected through computer and internet. Internet is like oxygen for computer. The interconnection of computers through internet has cut down the limitations of geographical boundaries all over the world. Each and everything is handled through internet. Due to the low cost availability of internet data is growing exponentially and this increasing data is called big data. It is big data era now and is going to set the present and future research boundaries. The amount of data captured by the organizations and the constant growth such as the rise of social media, Internet of things (IoT), and multimedia, has generated a huge flow of data in a structured and unstructured format. Big data is characterized by three perspectives: (a) data is huge, (b) data cannot be classified into traditional databases, and (c) data is created, captured, and processed fast.
Folgt in ca. 10 Arbeitstagen