Security Challenges in Data Analytics
Keywords:
Abstract
The measure of information in world is developing step by step. Information is developing a result of utilization of web, brilliant telephone and interpersonal organization. Huge information is an assortment of informational collections which is enormous in size just as intricate. By and large size of the information is Petabyte and Exabyte. Conventional data set frameworks can't catch, store and break down this huge measure of information. As the web is developing, measure of huge information keep on developing. Huge information examination give new ways for organizations and government to break down unstructured information. Presently a days, Data information is perhaps the most talked subject in IT industry. It will assume significant part in future. Enormous information changes how information is overseen and utilized. A portion of the applications are in regions like medical services, traffic the board, banking, retail, schooling, etc. Associations are getting more adaptable and more open. New sorts of information will give new difficulties too. The present paper features significant ideas of Data Analytics.
References
- A.U. Haq and T. S. Khan, “Security in automation: Smartphone might bethe greatest threat,” CFE Media, 2015.Retrieved from: https://www.controleng.com/articles/security-in-automation-smartphonemight-be-the-greatest-threat/
- E.Barak, “Explaining security automation and its evolving definitions,“New York, NY: IDG Communications, Inc,2016.Retrieved from:https://www.networkworld.com/article/3121275/explaining-securityautomation-and-its-evolving-definitions.html
- K. Panos, “Security Automation and Threat Information-Sharing Options,” IEEE Security & Privacy 12,2014,42-51.
- M. Metheny, "Continuous monitoring through security automation, "ScienceDirect, 2017.Retrieved from: https://www.sciencedirect.com/topics/computer- science/securityautomation
- P.Nguyen and A.Graham, “Enhancing Security with Automation and Orchestration, “Serious Edge,2015.Retrieved from:https://edge.siriuscom.com/security/enhancing-security-with-automationand-orchestration
- R. Montesino and S. Fenz, "Automation Possibilities in Information Security Management," 2011 European Intelligence and Security Informatics Conference, Athens, 2011, pp. 259-262, DOI:10.1109/EISIC.2011.39.
- T. AlSadhan and J. S. Park, "Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation," 2016 European Intelligence and Security Informatics Conference (EISIC), Uppsala, 2016, pp. 164-167, DOI:10.1109/EISIC.2016.042.
- C. N. N. Hlyne, P. Zavarsky, and S. Butakov, "SCAP benchmark for Cisco router security configuration compliance," 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, 2015, pp. 270-276, DOI: 10.1109/ICITST.2015.7412104.
- G. B. Peterside, P. Zavarsky, and S. Butakov, "Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2," 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, 2015, pp. 355-360, DOI:10.1109/ICITST.2015.7412120.
- M. Brunner, C. Sillaber and R. Breu, "Towards Automation in Information Security Management Systems," 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), Prague, 2017, pp.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.