It has been observed that, the world is changing a lot from the technological perspective. Hence, it is important for the organizations dealing with large data sets to implement strategies regarding security of these data sets. Big data sets can be referred to as large pieces of information stored in servers, or rather server farms. The traditional means of processing all these data sets will not be useful, and even, there would be a risk of security breach within these data sets. Hence, we are required to implement security analytics that will help in increasing the security of this data and, at the same time will protect the data against malicious attacks of viruses, Trojans, and other Malware.
The organization will run into deep trouble if they are not implementing any security mechanisms for protecting their data sets. Today, in a given cyber world, we are required to protect the data sets against the cyber threats such as hacking the data set and retrieving the confidential information, stealing away the data and information through cyber means, and destroying the data sets through cyber means. The research proposal shall thereby, try to analyze the papers that have carried out their research in this direction, and will try to find out the impact of cyber security for the given data-sets in a given organization. The research question will be how cyber security will help in protecting the data-sets of a given organization? We would be inspecting nearly six to seven resources with a view to find out the answers to our research question, and will try to find out the recommendations to protect the data-sets against the cyber threats of the contemporary world.
- Langer, S., & Stewart, B. (1999). Aspects of computer security: A primer. Journal of Digital Imaging, 12(3), 114-131.
In this research article, the researchers try to focus upon the security issues within a given healthcare environment. With the advancement in the field of healthcare, the medical organizations have started adapting to different technologies such as archiving, digital imaging, and telemedicine. However, there still seems to be gaps regarding the security of the patient-related information, which is stored and retrieved in the given medical organizations. The physicians will be requiring secured digital networks while implementing Telemedicine or any other digital approaches. The research tries to focus upon how to build a security network from several perspectives so as to ensure data security for a given organization.
In this research paper, the focus us upon examining the networking and data security issues within a given healthcare setting. They have tried to find out solutions regarding how to operate a file securely, and how to send the data over a given network securely. They have even tried to find out the characteristics of a hacker, and accordingly, have suggested the tools and techniques to overcome a given problem. It is a qualitative data and hence, the researchers have included their discussion on computer basics and vulnerabilities associated with it. They have tried to find out the ways in which the computer systems and the big data sets transmission can be protected in a given environment. They have even mentioned the vulnerabilities and the ways in which the hacker can attack a given system. There have been types of attacks mentioned as such as Single-user Reboot, IP Spoofing, Denial-of-Service attacks, and many others to make everyone aware about the ways in which the system can be attacked.
Finally, the authors have provided the defensive strategies to overcome such attacks. These include switching of the networks, providing firewalls, providing Secured, implementing TCP Wrappers for all the systems, and many others. It will thereby, help in protecting the given data sets of the patients and other useful and confidential information of the respective medical organization.
- Whaiduzzaman, M., Haque, M.N., Chowdhury, R.K., & Gani, A. (2014). A Study on Strategic Provisioning of Cloud Computing Services. Scientific World Journal, 1-16.
In this research paper, the authors have tried to find out the importance of cloud computing services, and how it can help in not only storing huge data sets, but will also help in protecting these data sets. Cloud Computing seems to be one of the best emerging technologies, since it helps in creating a virtualization platform. All the physical resources, applications, and infrastructure can be visualized, which will help in storing our huge data sets. However, with the increase in the number of service providers for cloud computing and with the increase in the security risks associated with cloud computing, it is important to analyze the way of selecting the cloud computing services, and thereby, understand the security mechanism associated with it.
The researchers have identified certain objectives and parameters on the basis of which the cloud service can be obtained by any organization. They need to first of all determine the objective of securing a cloud computing services. It could be either compliance or rank or fair comparison or better performance. Second, will be the type to topologies that they can use, such as Inter-Cloud or Single cloud topologies. Thirdly, they need to determine the requirements of their data sets, and then select the cloud service provider on the basis of availability, agility, security and trust, and price. Finally, they also need to look upon the metrics to determine the performance of cloud service. This can be determined on the basis of response time, consistency time, benchmark time, throughput, and execution time.
- Barrows, R.C., & Clayton, P.D. Privacy, Confidentiality, and Electronic Medical Records. Journal of the American Medical Association, 3(2), 139-149.
Today, with the increase in technology, it seems that, majority of the fields have advanced in one or the other way. Even, the medical field seems to have progressed a lot, and hence, this is the reason that, we are finding electronic medical records. However, it is important to maintain the privacy of the data of the individuals, or else it could cause psychological, economic, and social harm, if the information is disclosed. However, there is a great probability that, such information data repository could be hacked, and hence, there could be a security breach of these records. Hence, it is important for the healthcare organizations to understand the importance of informational security and implement measures of security to protect the data sets.
Finally, in this research paper, the important findings are the measures such as backup and disaster recovery mechanisms, providing security to the bridges and routing equipment, data encryption techniques, electronic signatures, and several other data protection policies. They have even provided with informed consent information which need to be disclosed only when required. The authors have concluded that, security can be best implemented provided the requirements are known, and proper training is provided to all the staff of a given organization.
- Eccher, C., Eccher, L., & Izzo, U. (2005). An implementation of a Security Infrastructure compliant with the Italian Personal Data Protection Code in a Web-based Cooperative Work System. AMIA Annual Symposium Proceedings, 945.
The methods adopted in this paper are in accordance with the legal provisions set by the Law Department of the University of Trento. All the records of the patients are stored in an electronic format, and can be retrieved through a Web Server (IIS) request to the Centralized database. However, during the transmission of the data, there is a unique SSL Encryption Protocol of 128 bit provided with a view to ensure security of the information. There is even Data Minimization Principle deployed with a view to minimize the use of personal data. The data will not be disclosed to anyone, unless specific authentication and requirement provided. There is care being taken that, the information is not misused.
Finally, the system operated in a way it was designed, and in accordance with the new PCDC principles. However, the authors believe that, there are still more issues of security that need to be addressed, and still more security mechanism that need to be implemented for the protection of the data sets within a given organization.
- Adams, N. (2014). Fraud Detection, Cyber Security: Synergies with Astrostatistics.
This research study was conducted to discuss certain aspects related to the cyber security. The researcher has presented his research about dealing with big data problems through Astrostatistics based solutions. Astronomy is considered as one of the established branch of sciences. The author thinks that it can be applied in case of strengthening the cyber security. The research can be considered as one of the extra-ordinary works in its domain that discusses the proposed solutions to the big data based problems.
The researchers tried to explore certain theoretical and applied aspects with regards to the cyber security. This paper has provided a detailed insight into the given subject. Cyber security based research can be applied to the issues related to banking systems, e-commerce solutions and other payment processing applications. The author tried to investigate the current issues with regard to the cyber security, and has identified the possible ways of security breaches that may result due to neglecting the application of modern sophisticated technology.
The results concluded with a comprehensive overview of the cyber security and its relationship with the Astrostatistics based security models. The study includes certain personal level experiences of the researcher. The researcher has shared his experience of the development of certain sophisticated payment based secure solutions for the great and famous Barclay. This includes the overview of the development approach that was adopted by the development team during the application building and securing its networking ability to interact with the world. The conclusion of the study also discusses certain aspects and possibilities with regards to the future development of the cyber security.
- Davis, C.M., Tate, J.E., Okhravi, H., Grier, C., Overbye, T.J., & Nicol, D. (2006). SCADA cyber security tested development. In Proceedings of the 38th North American power symposium, 483-488.
This study provides an investigation about certain important and interesting facts about the cyber security features and segments that can be vulnerable with regards to the power based communication systems. We know the importance of communication systems that provides convenience to run the everyday operations without causing any inconvenience. The study contains a thorough analysis based upon a development of a test-bed design by the researchers.
The researchers presented their valuable thoughts about encountering with the possible cyber-attacks to the communication systems. They have investigated the key factors and thoughts that are associated with the quick remedy or regulation of situation. These features contribute important role in the management of the adequate strategy to deal with the actual problem of the security breach and the root causes associated with them.
The study is concluded with the presentation of an overview of the facts compiled in the paper and analysis that responds towards the significance of implementation of secure method presented in the experiment. The researchers in this study have worked to experiment and test certain features that are associated with the provision of cyber security against the all possible vulnerabilities. The method illustrated by the researchers can be handy for the Network Analysts and IT experts to test and analyze the possibility of risks that assist them in development of adequate strategy. They are required to deal with the actual and complicated problem based situation. The dry run performed in the experiment provides a brief introduction and start for the original idea that needs to be developed for dealing with all possible threats related to the cyber security. The facts illustrated by the researchers in this study can be helpful for any further experimentation in the same area of cyber security.
- Deng, Y., Shukla, S., Lin, H., & Thorp, J. (2014). Power Systems/Communication System Co-Simulation and Experimental Evaluation of Cyber Security of Power Grid.
This study was conducted to investigate certain important and noticeable facts about the cyber security trends and implications with regards to the power based grids. The power systems are important part of our national system that is providing uninterruptable supply of electricity, which makes the everyday operations to carry on without any breakage. The study contains a thoughtful analysis based upon a case study presented by the researchers.
The researcher had tried to investigate the key factors and thoughts that are associated with any possibility of cyber-attacks on the power grid. These factors contribute towards the management of the ways to deal with such attacks in a simulation- based environment.
The results concluded with the investigative results and analysis that responds towards the fact that software infrastructure equipped with adequate security measures plays a vital role in the protection against the cyber-attacks on a power grid. The researchers and scientists have worked to investigate certain facts that are associated with the experimentation conducted in the field of securing the power grids from any sort of cyber-attacks to hack the control. These risks encourage the researchers to look into the development of counter-strategy to deal with the cyber-attacks and cater the problem right as it starts. The simulation provides an initial design of the original security model adopted by the researchers. This initial simulation-based design is helpful to apply advanced practical natured steps followed by further research and experimentation in the future for other scientists and researchers.
Thus, looking at different scenarios, and also viewing at the present situation, it seems that, the organizations needs to focus heavily on implementing the cyber security solutions. They need to implement all the security measures to protect their data sets and thereby, protect them against several vulnerabilities as discussed in this literature review. There have been several solutions recommend to protect the information data sets against the threats and thus, ensure security of all the information systems within a given organization.