Review of the Mechanisms Used to Protect the Big Data from Attacks

Nadia Mohammad Alnawafleh, Amer Ibrahim, Manas Ranjan Pradhan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

This study primarily aims to protect large data from different types of assaults. The deployment of big data security measures to prevent unauthorized access to data and analytics is becoming standard practice. More and more, cybercriminals are stealing consumers' personal information via deceptive phone calls, messages, and other methods. An rising number of these assaults are happening online these days. In order to make big data more safe, this study has uncovered a variety of security technologies and tactics that are currently being used. Additionally, this research has gained knowledge on digital forensics technologies that may help determine the who, what, and where of an assault. This project brings together data science and cyber security. Key objectives of this project include using cyber security and digital forensics tools to detect assaults on large data and to ensure and mitigate data security.

Original languageEnglish
Title of host publication2nd International Conference on Cyber Resilience, ICCR 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350394962
DOIs
Publication statusPublished - 2024
Externally publishedYes
Event2nd International Conference on Cyber Resilience, ICCR 2024 - Dubai, United Arab Emirates
Duration: Feb 26 2024Feb 28 2024

Publication series

Name2nd International Conference on Cyber Resilience, ICCR 2024

Conference

Conference2nd International Conference on Cyber Resilience, ICCR 2024
Country/TerritoryUnited Arab Emirates
CityDubai
Period2/26/242/28/24

Keywords

  • Big-data
  • Cyber-attacks
  • Digital Forensics
  • Security

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Safety, Risk, Reliability and Quality
  • Social Sciences (miscellaneous)
  • Education
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Review of the Mechanisms Used to Protect the Big Data from Attacks'. Together they form a unique fingerprint.

Cite this