In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference sour
Security, Privacy, and Forensics Issues in Big Data
โ Scribed by Brij B. Gupta, Ramesh C. Joshi
- Publisher
- IGI Global
- Year
- 2019
- Tongue
- English
- Leaves
- 476
- Series
- dvances in Information Security, Privacy, and Ethics
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains.
Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.
โฆ Table of Contents
Title Page
Copyright Page
Book Series
Editorial Advisory Board
Table of Contents
Detailed Table of Contents
Preface
Acknowledgment
Chapter 1: Securing the Cloud for Big Data
Chapter 2: Big Data
Chapter 3: Human Factors in Cybersecurity
Chapter 4: Security and Privacy Challenges in Big Data
Chapter 5: Cloud-Centric Blockchain Public Key Infrastructure for Big Data Applications
Chapter 6: Security Vulnerabilities, Threats, and Attacks in IoT and Big Data
Chapter 7: Threat Hunting in Windows Using Big Security Log Data
Chapter 8: Nature-Inspired Techniques for Data Security in Big Data
Chapter 9: Bootstrapping Urban Planning
Chapter 10: Securing Online Bank's Big Data Through Block Chain Technology
Chapter 11: Enhance Data Security and Privacy in Cloud
Chapter 12: The Unheard Story of Organizational Motivations Towards User Privacy
Chapter 13: Botnet and Internet of Things (IoTs)
Chapter 14: A Conceptual Model for the Organizational Adoption of Information System Security Innovations
Chapter 15: Theoretical Foundations of Deep Resonance Interference Network
Chapter 16: Malware Threat in Internet of Things and Its Mitigation Analysis
Chapter 17: Leveraging Fog Computing and Deep Learning for Building a Secure Individual Health-Based Decision Support System to Evade Air Pollution
Compilation of References
About the Contributors
Index
๐ SIMILAR VOLUMES
<p><span>This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security. </span></p><p><span>ย </span></p><p><span>During the past f
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Secu
<p><span>It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, hig
<p><span>Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT, social platforms, healthcare, system logs, bio-informatics, etc. contribute to and define the