https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/IoTWorldToday-mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Ar Chi, Thinkstock

Magnifying glass over computer monitor highlighting word security

Nine Main Challenges in Big Data Security

  • Written by Aleksandr Panchenko
  • 2nd April 2016

Every year the protection of private and confidential information gains more and more attention. According to the World Quality Report 2015-16, the only global report for application quality, security is the most highly ranked priority in the IT strategies used by survey respondents.

Until recently, a company’s applications were mainly internal and its security was viewed as low risk. However, with the increased adoption of web-based, mobile and cloud-based applications, sensitive data has become accessible from different platforms. These platforms are highly vulnerable to hacking, especially if they are low-cost or free.

Nowadays, organizations are collecting and processing massive amounts of information. The more data is stored, the more vital it is to ensure its security. A lack of data security can lead to great financial losses and reputational damage for a company. As far as Big Data is concerned, losses due to poor IT security can exceed even the worst expectations.

What are the Main Challenges When it Comes to Big Data Security?

Almost all data security issues are caused by the lack of effective measures provided by antivirus software and firewalls. These systems were developed to protect the limited scope of information stored on the hard disk, but Big Data goes beyond hard disks and isolated systems.

Nine Big Data Security Challenges

  1. Most distributed systems’ computations have only a single level of protection, which is not recommended.
  2. Non-relational databases (NoSQL) are actively evolving, making it difficult for security solutions to keep up with demand.
  3. Automated data transfer requires additional security measures, which are often not available.
  4. When a system receives a large amount of information, it should be validated to remain trustworthy and accurate; this practice doesn’t always occur, however.
  5. Unethical IT specialists practicing information mining can gather personal data without asking users for permission or notifying them.
  6. Access control encryption and connections security can become dated and inaccessible to the IT specialists who rely on it.
  7. Some organizations cannot – or do not – institute access controls to divide the level of confidentiality within the company.
  8. Recommended detailed audits are not routinely performed on Big Data due to the huge amount of information involved.
  9. Due to the size of Big Data, its origins are not consistently monitored and tracked.

How Can Big Data Security be Improved?

Cloud computing experts believe that the most reasonable way to improve the security of Big Data is through the continual expansion of the antivirus industry. A multitude of antivirus vendors, offering a variety of solutions, provides a better defense against Big Data security threats.

Refreshingly, the antivirus industry is often touted for its openness. Antivirus software providers freely exchange information about current Big Data security threats, and industry leaders often work together to cope with new malicious software attacks, providing maximum gains in Big Data security.

Here are some additional recommendations to strengthen Big Data security:

  • Focus on application security, rather than device security.
  • Isolate devices and servers containing critical data.
  • Introduce real-time security information and event management.
  • Provide reactive and proactive protection.

What’s Next for Big Data Security?

Of immediate concern to companies using Big Data is the security of cloud-based systems. Intel Security has recently published the McAfee Labs’ Threat Predictions Report that contains their expectations for the near-future of data security. Of particular concern in this report is the supposition that legitimate cloud file hosting services such as Dropbox, Box, and Stream Nation, are at risk of being used as control servers in upcoming cyber espionage campaigns. If targeted, these popular cloud services could enable the malware to transfer commands without raising suspicion.

Malicious attacks on IT systems are becoming more complex and new malware is constantly being developed. Unfortunately, companies that work with Big Data face these issues on a daily basis. Nevertheless, every problem has a solution and finding an effective and suitable answer for your organization is indeed possible.

Industry Perspectives is a content channel at Data Center Knowledge highlighting thought leadership in the data center arena. See our guidelines and submission process for information on participating. View previously published Industry Perspectives in our Knowledge Library.

 

Article was originally published on Data Center Knowledge.

Tags: Article Security Technologies IdeaXchange

Related Content


  • Caltech campus
    Robots Could Gain Sense of Touch, With New Artificial Skin
    New design can help businesses determine the presence of hazardous materials, offer greater safety for workers
  • Clearview AI Fined $9.4M Over Facial Data Scraping
    The company was ordered to delete any data it held on U.K. citizens.
  • Microsoft Ramping up Cybersecurity Service Offerings
    Three new managed services will boost the company’s presence in the security space
  • IoT Product Roundup
    IoT Product Roundup: PTC, Nokia, Arm and More
    All the latest Internet of Things products

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest News

  • Microsoft Extends Secured-Core Program to IoT Devices
  • Spot the Robot Dog Helps Police Ahead of Boston’s Fourth of July Celebration
  • Unmanned Robotic Combat Vehicle Being Tested
  • Image shows a Close up of lens on black background
    Carnegie Mellon Researchers Invent System to Find Hidden Cameras

Roundups

View all

IoT Product Roundup: Canonical, InfluxData, Wiliot and More

23rd June 2022

IoT Product Roundup: Cisco, Telit, Draganfly and More

9th June 2022

IoT Deals, Partnerships Roundup: Google, Arm, Senet and More

26th May 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Image shows Unilever's Alberto Prado at AI Summit 2022 in London

AI Summit 2022: Unilever’s Alberto Prado

Prado talks about how Unilever is using AI to accelerate the speed of new discoveries and gives them access to more breakthrough innovation

Image Shows John Lewis' Barry Panai at AI Summit London 2022

AI Summit 2022: John Lewis’ Barry Panayi on AI in Retail

Panayi talks about data and AI in retail and how individuals and the technology can work together

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

IoT Product Roundup: Nokia, Energous, Dashbot and more dlvr.it/STRKDh https://t.co/YgTAI5SXSB

6th July 2022
IoTWorldToday, IoTWorldSeries

A new #IoT bug monitoring system from @CENSIS121 is helping the UK’s #forestry industry fight pests, and save money… twitter.com/i/web/status/1…

6th July 2022
IoTWorldToday, IoTWorldSeries

NHTSA Boss Hints at Federally Regulating Autonomous Vehicles dlvr.it/STQrrw https://t.co/Yjp1UKuaE5

6th July 2022
IoTWorldToday, IoTWorldSeries

Nvidia Powered Driverless Three-Wheelers Set to Debut dlvr.it/STQq0H https://t.co/RrYyVPgFzB

6th July 2022
IoTWorldToday, IoTWorldSeries

New Drone System Aims for Full Autonomy dlvr.it/STQnvV https://t.co/S4O8hb6gQh

6th July 2022
IoTWorldToday, IoTWorldSeries

Bosch, VW Approved to Develop Automated Driving dlvr.it/STQllD https://t.co/neI30dVmC6

6th July 2022
IoTWorldToday, IoTWorldSeries

🤔 Looking for 3 Strategies to Avoid IoT Key Theft? We’ve got you covered! As tech companies continue to develop an… twitter.com/i/web/status/1…

5th July 2022
IoTWorldToday, IoTWorldSeries

AI Summit 2022: Unilever’s Alberto Prado dlvr.it/STMpRN https://t.co/1dyLREr8N6

5th July 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X