TY - GEN
T1 - Review of the Mechanisms Used to Protect the Big Data from Attacks
AU - Alnawafleh, Nadia Mohammad
AU - Ibrahim, Amer
AU - Pradhan, Manas Ranjan
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - This study primarily aims to protect large data from different types of assaults. The deployment of big data security measures to prevent unauthorized access to data and analytics is becoming standard practice. More and more, cybercriminals are stealing consumers' personal information via deceptive phone calls, messages, and other methods. An rising number of these assaults are happening online these days. In order to make big data more safe, this study has uncovered a variety of security technologies and tactics that are currently being used. Additionally, this research has gained knowledge on digital forensics technologies that may help determine the who, what, and where of an assault. This project brings together data science and cyber security. Key objectives of this project include using cyber security and digital forensics tools to detect assaults on large data and to ensure and mitigate data security.
AB - This study primarily aims to protect large data from different types of assaults. The deployment of big data security measures to prevent unauthorized access to data and analytics is becoming standard practice. More and more, cybercriminals are stealing consumers' personal information via deceptive phone calls, messages, and other methods. An rising number of these assaults are happening online these days. In order to make big data more safe, this study has uncovered a variety of security technologies and tactics that are currently being used. Additionally, this research has gained knowledge on digital forensics technologies that may help determine the who, what, and where of an assault. This project brings together data science and cyber security. Key objectives of this project include using cyber security and digital forensics tools to detect assaults on large data and to ensure and mitigate data security.
KW - Big-data
KW - Cyber-attacks
KW - Digital Forensics
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85195126494&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85195126494&partnerID=8YFLogxK
U2 - 10.1109/ICCR61006.2024.10533073
DO - 10.1109/ICCR61006.2024.10533073
M3 - Conference contribution
AN - SCOPUS:85195126494
T3 - 2nd International Conference on Cyber Resilience, ICCR 2024
BT - 2nd International Conference on Cyber Resilience, ICCR 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd International Conference on Cyber Resilience, ICCR 2024
Y2 - 26 February 2024 through 28 February 2024
ER -