Security Threats for Big Data

Author(s):  
Muhammad Nazrul Islam ◽  
Tarannum Zaki ◽  
Md. Sami Uddin ◽  
Md. Mahedi Hasan

With the advancement of modern science and technology, data emerging from different fields are escalating gradually. Recently, with this huge amount of data, Big Data has become a source of immense opportunities for large scale organizations related to various business sectors as well as to information technology (IT) professionals. Hence, one of the biggest challenges of this context is the security of this big set of data in different ICT based organizations. The fundamental objective of this article is to explore how big data may create security challenges in email communication. As an outcome, this article first shows that big data analysis helps to understand the behavior or interest of email users, which in turn can help phishers to create the phishing sites or emails that result in IT security threat; second, the article finds that phishing e-mail generation based on the (email) users' behavior can break an organization's IT security; and finally, a framework was proposed that would help to enhance the security of email communication.


2018 ◽  
Vol 7 (1) ◽  
pp. 33-39
Author(s):  
Kanika . ◽  
Alka . ◽  
R. A. Khan

Big data is a huge amount of data created by individuals related to their medical, internet activity, social networking sites, energy usage communication patterns etc. From these sources, data is being collected and processed by various survey organizations, national statistical agencies, medical centres, and other companies etc. There are many security challenges which occur during data transactions, such as un-authentication, phishing, Vishing, data mining based attacks, etc. From a security point of view the biggest challenge for big data is the protection of user’s privacy. Yazan et.al, have presented big data lifecycle threat model. This paper does a critical review of the work. An Improved Security Threat Model for Big Data Life Cycle has been proposed as a main contribution of the paper. A new phase i.e. data creation phase has been added to the life cycle and it is claimed that the phase is very important one with respect to security and privacy. To justify the claim theoretical and statistical evidences have been provided.



Author(s):  
Tarannum Zaki ◽  
Md. Sami Uddin ◽  
Md. Mahedi Hasan ◽  
Muhammad Nazrul Islam
Keyword(s):  
Big Data ◽  


Significance This followed an incident in Jeddah on January 21 when two militants blew themselves up in order to avoid capture. Although Riyadh is focused on Tehran as its primary external security threat, most incidents inside the kingdom involve salafi-jihadist forces. Impacts Security challenges could diversify, requiring agencies to broaden their oversight. Fiscal reforms may boost domestic discontent. In the long term, the large population of expatriate workers might become a more serious security concern.



2021 ◽  
Vol 9 (3) ◽  
pp. 405-428
Author(s):  
Ngboawaji Daniel Nte ◽  
Oluka Nduka Lucas ◽  
Ridwan Arifin

This study is a modest but objective comparative evaluation of internal security threats facing two sub-regional large countries of Africa and South Asia-Nigeria and Pakistan. Considering the fact that ethnicity, sectarianism and economic instability are fundamental variables of internal security threats in both countries, the study argued that religious extremism has created an unenviable image of both nations in the eyes of the rest of the world, undoubtedly, this has affected both nations adversely. The study also identified inter-regional grievances as potential causes of damages to both federations. Also identified is ethno-sectarian problem as a major security threat to both nations. This in the opinion of the authors will remain a huge impediment to the goals of economic prosperity to both nations. Consequently, the focus of this study is to examine interdependence of these multifaceted challenges and their overall impact on internal security in both countries. To achieve this, the study employed qualitative research method in which analytical approach was used to examine the similarities in the security challenges in Nigeria and Pakistan. Structural questionnaire was used as the instrument for data collection.  The employment of thematic analytic approach was adopted to analyse data collected for the study. The study concludes among others, the need for both countries to individually address these national security threats and find viable solutions to the problems of socio-economic and political reforms and unemployment within a reasonable timeframe to mitigate future threats.Keywords: Internal Security; Ethnicity; Sectarianism; Challenges Dua Bangsa Satu Tantangan: Analisis Politik dan Hukum pada Ancaman Keamanan dalam Negeri (Internal Security) di Nigeria dan PakistanAbstrak Penelitian ini merupakan evaluasi komparatif sederhana namun objektif terhadap ancaman keamanan internal yang dihadapi dua negara besar sub-regional Afrika dan Asia Selatan-Nigeria dan Pakistan. Mempertimbangkan fakta bahwa etnisitas, sektarianisme, dan ketidakstabilan ekonomi adalah variabel fundamental dari ancaman keamanan internal di kedua negara. Penelitian ini berpendapat bahwa ekstremisme agama telah menciptakan citra yang tidak baik dari kedua negara di mata dunia. Tidak diragukan lagi, ini telah mempengaruhi kedua negara secara merugikan. Penelitian ini juga mengidentifikasi kasus-kasus antar-regional sebagai penyebab potensial kerusakan pada kedua federasi. Juga diidentifikasi masalah etno-sektarian sebagai ancaman keamanan utama bagi kedua negara, dimana akan tetap menjadi hambatan besar bagi tujuan kemakmuran ekonomi kedua negara. Fokus penelitian ini adalah untuk menguji saling ketergantungan dari tantangan beragam ini dan dampaknya secara keseluruhan terhadap keamanan internal di kedua negara. Untuk mendapatkan data tersebut, penelitian ini menggunakan metode penelitian kualitatif dimana pendekatan analitik digunakan untuk menguji kesamaan dalam tantangan keamanan di Nigeria dan Pakistan. Kuesioner struktural digunakan sebagai instrumen pengumpulan data. Penggunaan pendekatan analitik tematik diadopsi untuk menganalisis data yang dikumpulkan untuk penelitian ini. Studi ini menyimpulkan antara lain, perlunya kedua negara untuk secara individual mengatasi ancaman keamanan nasional ini dan menemukan solusi yang layak untuk masalah reformasi sosial-ekonomi dan politik dan pengangguran dalam jangka waktu yang wajar untuk mengurangi ancaman di masa depan.Kata Kunci: Keamanan dalam Negeri; Etnisitas; Sektarianisme; Tantangan Две нации, разные регионы, одинаковые вызовы: правовой и политический анализ угроз внутренней безопасности в Нигерии и Пакистане АбстрактныйЭто исследование представляет собой скромную, но объективную сравнительную оценку угроз внутренней безопасности, с которыми сталкиваются две субрегиональные крупные страны Африки и Южной Азии - Нигерия и Пакистан. Учитывая тот факт, что этническая принадлежность, сектантство и экономическая нестабильность являются фундаментальными переменными угроз внутренней безопасности в обеих странах, в исследовании утверждается, что религиозный экстремизм создал незавидный имидж обеих стран в глазах остального мира, несомненно, это повлияло на обе нации неблагоприятно. Исследование также определило межрегиональные жалобы как потенциальные причины ущерба для обеих федераций. Также определена этно-сектантская проблема как серьезная угроза безопасности для обеих стран. Это, по мнению авторов, останется огромным препятствием на пути достижения целей экономического процветания обеих стран. Следовательно, целью данного исследования является изучение взаимозависимости этих многогранных вызовов и их общего воздействия на внутреннюю безопасность в обеих странах. Для достижения этой цели в исследовании использовался качественный метод исследования, в котором использовался аналитический подход для изучения сходства проблем безопасности в Нигерии и Пакистане. Структурная анкета использовалась в качестве инструмента для сбора данных. Для анализа данных, собранных для исследования, был использован тематический аналитический подход. В исследовании, среди прочего, делается вывод о необходимости для обеих стран индивидуально противодействовать этим угрозам национальной безопасности и находить жизнеспособные решения проблем социально-экономических и политических реформ и безработицы в разумные сроки для смягчения будущих угроз.Ключевые слова: внутренняя безопасность; Этническая принадлежность; Сектантство; Вызовы



2021 ◽  
Author(s):  
Sarwar J. Minar

While it is conventionally believed that large scale refugees pose security threats to the host community or state. So, since the massive influx of Rohingyas in Bangladesh in 2017, which resulted a staggering total of 1.6 million Rohingyas refuge in Bangladesh, it was argued that Bangladesh will face severe security threats. This article investigates the security experience of Bangladesh in case of Rohingya influx in a span of three years, August 2017 to August 2020. The research question I intend to address is, has Bangladesh faced security threat due to massive Rohingya influx? If so in what ways? I test four security threat areas, which include, societal security, economic security, internal security, and public security. I have used newspaper reports or newspaper content analysis over past three years along with interview data collected from interviewing local people in cox’s bazar area in the first half of 2019 where the Rohingya camps are located. The identity of the interviewees is kept anonymous as per request. In order to assess if the threats are low level, medium level, or high level, I look into both the frequency of reports and the way they are interpreted. I find that Bangladesh has not experience any serious security threat in the last three years. There are some criminal activities and offenses, but these are only low-level security threat at best. My research presents empirical evidence that challenges conventional assertions that refugees are security threats or challenges in the host states.



Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.



2018 ◽  
Vol 6 (7) ◽  
pp. 981-985
Author(s):  
Dinesh Singh ◽  
Dayanand . ◽  
Arushi Arya
Keyword(s):  
Big Data ◽  


2020 ◽  
Vol 9 (6) ◽  
pp. 3509-3517
Author(s):  
K. Malakonda Rayudu ◽  
A. Kumar


2020 ◽  
Author(s):  
Anusha Ampavathi ◽  
Vijaya Saradhi T

UNSTRUCTURED Big data and its approaches are generally helpful for healthcare and biomedical sectors for predicting the disease. For trivial symptoms, the difficulty is to meet the doctors at any time in the hospital. Thus, big data provides essential data regarding the diseases on the basis of the patient’s symptoms. For several medical organizations, disease prediction is important for making the best feasible health care decisions. Conversely, the conventional medical care model offers input as structured that requires more accurate and consistent prediction. This paper is planned to develop the multi-disease prediction using the improvised deep learning concept. Here, the different datasets pertain to “Diabetes, Hepatitis, lung cancer, liver tumor, heart disease, Parkinson’s disease, and Alzheimer’s disease”, from the benchmark UCI repository is gathered for conducting the experiment. The proposed model involves three phases (a) Data normalization (b) Weighted normalized feature extraction, and (c) prediction. Initially, the dataset is normalized in order to make the attribute's range at a certain level. Further, weighted feature extraction is performed, in which a weight function is multiplied with each attribute value for making large scale deviation. Here, the weight function is optimized using the combination of two meta-heuristic algorithms termed as Jaya Algorithm-based Multi-Verse Optimization algorithm (JA-MVO). The optimally extracted features are subjected to the hybrid deep learning algorithms like “Deep Belief Network (DBN) and Recurrent Neural Network (RNN)”. As a modification to hybrid deep learning architecture, the weight of both DBN and RNN is optimized using the same hybrid optimization algorithm. Further, the comparative evaluation of the proposed prediction over the existing models certifies its effectiveness through various performance measures.



Author(s):  
Sir Richard Dearlove

This article discusses the changing perceptions on national security and civic anxiety. During the Cold War and its aftermath, security was rather a simple and straightforward issue. The countries knew their enemies, where they are and the threats they presented. On the event that, the enemies's secrets were unknown, probing techniques were employed to determine the weaknesses of the enemy. This formulaic situation which seeped through in to the twenty-first century left little room for innovation. In fact, in some countries, security maintained at the Cold War levels despite criticisms that new and emerging national security threats should be addressed at a new level. Of the powerful nations, America maintained the role of a world policeman and adapted its national security priorities according to its perception of a new series of strategic threats; however these new security strategies were without a sense of urgency. However, the perception of global threats and national security radically changed in the event of the 9/11 attack. The sleeping national security priorities of America came to a full force which affected the national security priorities of other nations as well. In the twenty-first globalized world, no conflict remains a regional clash. The reverberations of the Russian military action in Georgia, the Israeli intervention in Gaza, and the results of the attacks in Mumbai resonates loudly and rapidly through the wider international security system. While today, nations continue to seek new methods for addressing new security threats, the paradox of the national security policy is that nation-states have lost their exclusive grip of their own security at a time when the private citizens are assailed by increased fears for their own security and demand a more enhanced safety from the state. Nation-states have been much safer from large-scale violence, however there exists a strong sense of anxiety about the lack of security in the face of multiplicity of threats. Nations have been largely dependent on international coordinated action to achieve their important national security objectives. National policies and security theory lack precision. In addition, the internationalization of national security has eroded the distinction between domestic and foreign security. These blurring lines suggest that the understanding of national security is still at the height of transformations.



Sign in / Sign up

Export Citation Format

Share Document