The book focuses on key mitigation techniques, such as IAM, encryption methods, network segmentation, firewalls, and intrusion detection systems. It also proposes an integrated cybersecurity model, combining these solutions for enhanced effectiveness against cyberattacks. The book also identifies research gaps and suggests areas for future research, such as adapting to emerging technologies and improving scalability in big data security frameworks. The book is a valuable resource for cybersecurity professionals, researchers, and practitioners aiming to address the unique challenges posed by cyberattacks on big data systems.
The book aims to equip various professionals with the knowledge and strategies necessary to address the vulnerabilities associated with cyberattacks on big data environments.
The book focuses on key mitigation techniques, such as IAM, encryption methods, network segmentation, firewalls, and intrusion detection systems. It also proposes an integrated cybersecurity model, combining these solutions for enhanced effectiveness against cyberattacks. The book also identifies research gaps and suggests areas for future research, such as adapting to emerging technologies and improving scalability in big data security frameworks. The book is a valuable resource for cybersecurity professionals, researchers, and practitioners aiming to address the unique challenges posed by cyberattacks on big data systems.
The book aims to equip various professionals with the knowledge and strategies necessary to address the vulnerabilities associated with cyberattacks on big data environments.

The Implication of Cyberattacks on Big Data and How to Mitigate the Risk
111
The Implication of Cyberattacks on Big Data and How to Mitigate the Risk
111Product Details
ISBN-13: | 9783031885693 |
---|---|
Publisher: | Springer Nature Switzerland |
Publication date: | 04/25/2025 |
Series: | Information Systems Engineering and Management , #39 |
Pages: | 111 |
Product dimensions: | 6.10(w) x 9.25(h) x (d) |