Download as pdf
Download as pdf
You are on page 1of 2
12422, 4:49 PM 106137041122: Discussion § DS61370H122 Big Data Analytics Home / Mycourses / Online / GBP / 2022 / June 30,2022 / DS618704122 / Module 5 (08/22/2022 09/04/2022) / Discussion § 7 Discussions © | search forums Q Discussion 5 Discussion 5 1 sottngs > -< Discussion 5 Discussion 5 » Display replies in nested form “The due date for posting to this forum is Sunday, September 4, 2022, 11:59 PM. Discussion 5 by Dipen Brahimbhalt - Monday, August 22, 2022, 6:31 AM Cloud computing, big data, map-reduce environments, and hardtop environments are some of the subjects that are brought up for debate and consideration. Other themes include: hardtop environments. Big data security is more of a catch-all phrase that refers to all of the security processes and technology that is applied to analytics and data processing, The includes both physical and digital measures of protection. Firewalls and encryption software are examples of the procedures and technology that fall under this category of security (Vinay, 2015). To express it another way, the idea that is referred to when people talk about big data security is all-encompassing (Jun, 2019). Examples of big dat ‘The numerous security issues in cloud computing that are associated with large amounts of data are currently receiving the majority of attention and focus (Vinay, 2015). Applications that make use of vast amounts of data are of tremendous value to ‘companies, organisations, and enterprises of all kinds, n addition to a wide variety of major and small industries. As @ ‘consequence of ths, there will be less visibility and control over certain data. It also raises the question of how it may possibly be safeguarded against access by unauthorised parties in an efficient manner (Jun, 2018), ‘The most serious problem with cloud computing security is account theft, which is one of a number of significant problems plaguing the industry (Jun, 2019). If for some reason a hacker is able to obtain access to an account belonging to a user or to the account belonging to a company or organisation. After that point, the hacker will have full permission to participate in actions that have not been authorised. The potential of being locked in by third-party providers is another key concern ‘connected with cloud computing (Vinay, 2015). References Jun, ., Lee, J ., and Kim, 8. H. (2079). Cloud-based Big data assessment stage using estimation designs for the collecting industry. Overall Journal of Computer Integrated Manufacturing, 2(8), 723-738. Vinay, A, Shekhar, V.S, Ritupama J, Aggrawal, , Murthy K.N. 8. and Natarajan, S. (2018) Cloud Based Big Data Analytic Framework for Face Recognition In Social Networks Using Machine Learning, Procedla Computer Science, S0, 622-620 8 hitps:iicourses.campbellsvlle.edulmod!forunvciscuss.php?é=1877019 1 12422, 4:49 PM 106137041122: Discussion § Permalink Reply Re: Discussion 5 by Venkata Velamanchill -Wednesday, August 24, 2022, 6:55 AM Hello Diphen, Great post! At conclusion, itis essential to emphasize the significance of the fact that both big data & cloud computing play significant roles in the modern digital society. The fact thatthe two are connected together gives individuals who have fantastic ideas but less resources a chance to be successful in business, In addition to this, they make it possible for ‘existing firms to make use of data that they have been collecting but which they have not previously seemed to have the abllty to analyse, Artificial intelligence is one of the more contemporary components of the conventional ‘Software as a ‘Service’ architecture used by cloud infrastructure (Tariq et al, 2021). This paradigm makes it possible for organisations to iv Next activi hitpsiicourses.campbellsvlle.edulmod!forunvciscuss.php?é=1877019

You might also like