Exploiting Flaws in Big Data Systems

Authors

  • Michael G. Brown Iona College, New Rochelle, NY, USA
  • Paolina Centonze Iona College

DOI:

https://doi.org/10.24297/ijct.v15i8.1498

Keywords:

Big Data, Hadoop, Hadoop Security, Kali Linux, Securing Big Data

Abstract

In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold.  In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions.  

Downloads

Download data is not yet available.

Author Biographies

Michael G. Brown, Iona College, New Rochelle, NY, USA

Computer Science Graduate

Paolina Centonze, Iona College

Professor of Computer Science

Downloads

Published

2016-05-17

How to Cite

Brown, M. G., & Centonze, P. (2016). Exploiting Flaws in Big Data Systems. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 15(8), 6967–6975. https://doi.org/10.24297/ijct.v15i8.1498

Issue

Section

Research Articles