This paper proposes the threat that lies over the huge piles
of data registered, stored by numerous Enterprise. Each Enterprise big or
small, generates a huge stack of data which can be in regards to data subject
to customer’s personal information or it can be some crucial information
regarding the profits and losses of an Enterprise or in fact regarding some
information on company’s private and top secret policies etc. This data is very
crucial to any Enterprise and can decide the future of a company to rise or
demolish at one’s. Hence, this data needs to be preserved and needs to be
protected from getting captured by anyone who could misuse it.
These days cloud storage is widely popular as it reduces the
junk in system and makes the data available to various system without occupying
space in any. But, this data stored in cloud face numerous cyberattack in order
to capture them and drain the crucial information out of it. Hence our paper
focuses on this side of the data, it’s security, the threats it face and the
measures to keep it safe.
75% of incidents recorded in
the financial services sector came from web application attacks, distributed
denial of service (DDoS) and card skimming; while cyber espionage and DDoS were
particularly common in the manufacturing sector
Why Big data is more sensitive
An enterprise, including your
telephone service provider to Google a famous search engine keeps track of your
searching habits to App merchants that can access some sensitive and personal
data of yours via their application/user agreement license. The more they get
in close to end-user’s personal data the more they hold the personal
information of their customer’s/users. This personal information can tell a
person a lot about the user and can be a root cause to compromise with security
and privacy of that user, and some hackers look for this information in order
to plant a malware for that user. So, this is possible only if they can sneak
in a user’s internet usage habits which is possible if they can hack this data
and get the info about numerous users. Hence, big data looks like a big stack
of honey to this greedy bee sort hackers and hence is more often to experience
a cyberattack. Now, in order to prevent the interest of their fellow users it
is the responsibility of these data holders to keep this personal information
secure and as confidential as possible.
What could be a bein for these
· User – This can refer to end user
authentication and security, it can trace he data such as users working choice
,user’s taste preferences, his/her location information as well as the types of
browsing trend they have inhabited.
· Content – The content present in the data also
decides it’s vulnerability to attack. The type of file/document, password.
Patterns suck as (11 characters together can be an account no, 4 digit together
can be an ATM pin).
· Customers – This would be more crucial fro he
customers of a debit card or a credit card company as well as any company that
could involve process of premium payments.
· Networks – They type of network including
minute details of it together can play a crucial role in determining the
attack. The Source and Destination as well as the Time Zone (Date as well as
Time), the bandwidth of the network and the activity.
· Device – Together including the software and
types constitute of it. Whether the software is updated on regular basis or not
and if the security certificates are revised on regular basis or not determine
Easy tricks to identify this
· Irregular trends in transaction – If a system
or network makes too many request for a transaction like it had never made before,
can be a determining factor in a security measure. As, it is possible that this
request is a part of an attack made on the database.
· Anonymous IP Addresses making request to
network – If an IP Address of a request is found to be unusual or hidden, there
is a higher possibility that it’s an attack and the Sender is too smart and
knows that IP Address can get him behind the bars and therefore this can make
an attack from a non-detectable source, PC.
· Unusual traffic in the network, can also cause
congestion – When there are suddenly too many request on a particular, though
it can be a normal scenario. But. There are fair chances that it’s an attack
and has been planted to jam the site/ overload the server to make it inactive
to prevent against the attack.
· Suspicious software making transaction request
– Sometimes the software/technology can also help us to detect an attack. What
if we are receiving a request via a system software, never interacted with. Can
it be someone’s innovation to ease his attack on our database.