Amazines Free Article Archive - Monday, August 15, 2022
Read about the most recent changes and happenings at
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Subscriptions Manage Ezines
 Article Archive
 Advertising (133525)
 Advice (161581)
 Affiliate Programs (34788)
 Art and Culture (73842)
 Automotive (145681)
 Blogs (75446)
 Boating (9851)
 Books (17221)
 Buddhism (4129)
 Business (1330086)
 Business News (426438)
 Business Opportunities (366485)
 Camping (10971)
 Career (72777)
 Christianity (15845)
 Collecting (11639)
 Communication (115072)
 Computers (241922)
 Construction (38939)
 Consumer (49947)
 Cooking (17079)
 Copywriting (6732)
 Crafts (18205)
 Cuisine (7548)
 Current Affairs (20308)
 Dating (45902)
 EBooks (19700)
 E-Commerce (48247)
 Education (185377)
 Electronics (83517)
 Email (6439)
 Entertainment (159838)
 Environment (28923)
 Ezine (3040)
 Ezine Publishing (5452)
 Ezine Sites (1550)
 Family & Parenting (110929)
 Fashion & Cosmetics (196540)
 Female Entrepreneurs (11851)
 Feng Shui (132)
 Finance & Investment (310511)
 Fitness (106443)
 Food & Beverages (63012)
 Free Web Resources (7939)
 Gambling (30227)
 Gardening (25194)
 Government (10512)
 Health (629911)
 Hinduism (2206)
 Hobbies (44080)
 Home Business (91593)
 Home Improvement (251150)
 Home Repair (46217)
 Humor (4717)
 Import - Export (5456)
 Insurance (45104)
 Interior Design (29591)
 International Property (3488)
 Internet (191011)
 Internet Marketing (146666)
 Investment (22859)
 Islam (1161)
 Judaism (1352)
 Law (80455)
 Link Popularity (4596)
 Manufacturing (20902)
 Marketing (99276)
 MLM (14140)
 Motivation (18232)
 Music (26999)
 New to the Internet (9497)
 Non-Profit Organizations (4048)
 Online Shopping (129728)
 Organizing (7809)
 Party Ideas (11853)
 Pets (38072)
 Poetry (2229)
 Press Release (12687)
 Public Speaking (5640)
 Publishing (7561)
 Quotes (2407)
 Real Estate (126617)
 Recreation & Leisure (95461)
 Relationships (87650)
 Research (16180)
 Sales (80346)
 Science & Technology (110281)
 Search Engines (23497)
 Self Improvement (153287)
 Seniors (6217)
 Sexuality (35998)
 Small Business (49289)
 Software (83018)
 Spiritual (23482)
 Sports (116150)
 Tax (7661)
 Telecommuting (34073)
 Travel & Tourism (308186)
 UK Property Investment (3122)
 Video Games (13382)
 Web Traffic (11764)
 Website Design (56892)
 Website Promotion (36618)
 World News (1000+)
 Writing (35839)
Author Spotlight

The Word of God is as, “Sweet as Honey”. God has Taken Me Through a Whole Lot of Things...more

Myself Ram Sewak possessing indepth domain experience of more than 10 years in SEO, SEM, Web Develop...more

Areesh Ishtiaq a Top Rated SEO and Digital Marketing Guru on Upwork, working as a project manager fo...more

About Octopus Intelligence We provide greater certainty with excellent global Commercial Compe...more

Designpluz has steadily matured from a passionate graphics design start-up, into a full service digi...more

What are the Top 5 Big Data Vulnerability Classes? by Sam White

Article Author Biography
What are the Top 5 Big Data Vulnerability Classes? by
Article Posted: 07/16/2013
Article Views: 76
Articles Written: 16
Word Count: 955
Article Votes: 0
AddThis Social Bookmark Button

What are the Top 5 Big Data Vulnerability Classes?

Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and challenges and I happily accepted.

Key Insights on Existing Big Data Architecture

Big data is fundamentally different from traditional relational databases in terms of requirements and architecture. Big data is often characterized by 3Vs, Volume, Velocity and Variety of data. Some of the fundamental differences in Big Data architecture are as follows:

Distributed Architecture: Big data architecture is highly distributed on the scale of 1000s of data and processing nodes. Data is horizontally partitioned, replicated and distributed among multiple data nodes available. As a result, Big Data architecture is generally highly resilient and fault tolerant. Real-Time, Stream and Continuous Computations: Performing computation real-time and continuously is next trend in Big Data apart from Batch processing model as supported by Hadoop. Ad-hoc Queries: Big data enables Knowledge Workers to create and execute data analyzing queries on the fly. Parallel and Powerful Programming Language: The computations performed in Big Data are much more complex, highly parallel and computationally intensive than traditional SQL / PLSQL queries. For example, Hadoop uses MapReduce framework to perform computations on data processing nodes. MapReduce programs are written in Java. Move the code: In Big Data, it is easy to move the code, rather than data. Non Relational Data: Migrating tremendously from traditional relational databases, the data stored in Big Data is non relational. The main advantage of non relational data is that it can accommodate large volume and variety of data. Auto-tiering: In Big Data, hottest data blocks are tiered into higher performance media, while the coldest data is sent to lower cost high capacity drives. As a result, it is extremely difficult to know precisely where the data is exactly located among the available data nodes. Variety of Input Data Sources: Big Data requires collecting data from many sources such as logs, end to point devices, social media etc.

Finally, there is no silver bullet in Big Data in terms of data model. Hadoop is already outdated and unsuitable for many Big data problems. Some of the emerging Big data solutions are following:

For Real-time analytics: Cloudscale, Storm For Graph Computation: Giraph and Pregel (Some examples graph computation are Shortest Paths, Degree of Separation etc.) For low latency queries over very large data set: Dremel and so on.

Top 5 Big Data Vulnerability Classes

1. Insecure Computation

There are many ways an insecure program can create big security challenges for a big data solution including:

An insecure program can access sensitive data such as personal profile, age credit cards etc. An insecure program can corrupt the data leading to incurrent results. An insecure program can perform Denial of Service into your Big Data solution leading to financial loss.

2. End-point input validation/filtering

Big data collects data from variety of sources. There are two fundamental challenges in data collection process:

Input Validation: How can we trust data? What kind of data is untrusted? What are untrusted data sources? Data Filtering: Filter rogue or malicious data.

The amount of data collection in Big Data makes it difficult to validate and filter data on the fly.

The behavior aspect of data poses additional challenges in input validation and filtering. Traditional Signature based data filtering may not solve the input validation and data filtering problem completely. For example a rogue or malicious data source can insert large legitimate but incorrect data to the system to influence prediction results.

3. Granular access control

Existing solutions of Big Data are designed for performance and scalability, keeping almost no security in mind. Traditional relational databases have pretty comprehensive security features in terms of access control in terms users, tables and rows and even at cell level. However, many fundamental challenges prevent Big Data solutions to provide comprehensive access control:

Security of Big Data is still an ongoing research. Non relational nature of data breaks traditional paradigm of table, row or cell level of access control. Current NoSQL databases dependents on 3rd party solutions or application middleware to provide access control. Ad-hoc Queries poses additional challenge wrt to access control. For example, imagine end user could have submitted legitimate SQL queries to Relational Databases. Access control is disabled by default.

4. Insecure data storage and Communication

There are multiple challenges related to data storage and communication in Big Data:

Data is stored at various Distributed Data Nodes. Authentication, authorization and Encryption of data is challenge at each node. Auto-tiering: Auto partitioning and moving of data can save sensitive data on a lower cost and less sensitive medium. Real Time analytics and Continuous computation requires low latency with respect to queries and hence encryption and decryption may provide additional overhead in terms of performance. Secure communication among nodes, middlewares and end users is another area of concern. Transactional logs of big data is another big data itself and should be protected same as data.

5. Privacy Preserving Data Mining and Analytics

Monetization of Big data generally involves doing data mining and analytics. However, there are many security concerns pertaining to monetizing and sharing big data analytics in terms of invasion of privacy, invasive marketing, and unintentional disclosure of sensitive information, which must be addressed.

For example, AOL released anonymized search logs for academic purposes, but users were easily identified by their searchers. Netflix faced a similar problem when users of their anonymized data set were identified by correlating their Netflix movie scores with IMDB scores.

Read the original blog here and many other security articles:

Related Articles - Big Data, Penetration Testing, Pentesting, Data Analytics, Hadoop,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.


Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
Please enter the code in the image:

 Author Login 
Register for Author Account


Advertiser Login


   Limited Time $60 Offer!
   90  Days-1.5 Million Views  


Great Paranormal Romance


Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more

Stevert Mckenzie, Travel Enthusiast. ...more

After 60-plus years of living I am just trying to pass down some of the information that I have lear...more

William Buchanan has worked in the fields of marketing, advertising, and marketing research for almo...more

Susan Friesen, founder of the award-winning web development and digital marketing firm eVision Media...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2022, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from under the GNU FDL license