A Global Approach to Assure Protection of Data

Tirumanapally Prashanth, GUNDU PURNA CHANDAR RAO

Abstract


It has been predicted that analyzing Big Data will become a key basis of competition, underpinning new waves of productivity growth, innovation, and consumer surplus. Since data is a critical component, it is essential to ensure privacy and protect data no matter where it resides and how it is consumed. Organizations are now defending for attacks occurred yesterday, however their adversaries look to exploit the vulnerabilities of tomorrow. Consequently, sophisticated intruders are bypassing perimeter defenses to perpetrate dynamic attacks that are highly targeted and difficult to detect. In this work we present a strategy focusing the few important questions to the most critical data vulnerabilities.

Full Text:

PDF

References


"A Decade at Google", Alon Halevy, ACM SIGMOD, September 20, 2015 http://wp.sigmod.org/?p=1851

"The Real Story of Stuxnet", David Kushner, IEEE SPECTRUM. Feb 2013, http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet

“Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually,” Sept. 7, 2011, www.symantec.com/about/news/release/article.jsp?prid=20110907 _02

“2011 Cost of Data Breach Study,” Ponemon Institute LLC, March 2012, www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.enus.pdf?om_ext_cid=biz_socmed_twitter_facebook_marketwir e_linkedin_2012Mar_worldwide__CODB_US

"Target cyber breach hits 40 million payment cards at holiday peak", By Jim Finkle and Dhanya Skariachan, Technology News,Dec 19, 2013 , http://www.reuters.com/article/us-target-breach-idUSBRE9BH1GX20131219

"PlayStation Network hackers access data of 77 million users" Ben Quinn and Charles Arthur, The Guardian, 26 April 2011 https://www.theguardian.com/technology/2011/apr/26/playstation-network-hackers-data

https://en.wikipedia.org/wiki/Threat_(computer)

"A Survey of Insider Attack Detection Research", Malek Ben Salem, Shlomo Hershkop Salvatore J. Stolfo http://lasr.cs.ucla.edu/classes/239_1.fall10/papers/Insider_survey.pdf .


Refbacks

  • There are currently no refbacks.

Comments on this article

View all comments




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.