Comprehensive Review of Attack Strategies and Privacy Safeguards in Big Data Systems 🔒
Explore the latest insights into cyberattack tactics, privacy challenges, and safety models in big data environments. A must-read for cybersecurity professionals and data managers seeking to enhance system security.

IAES Institute of Advanced Engineering and Science
28 views • Sep 29, 2024

About this video
Authors: Chaymae Majdoubi, Saida El Mendili, Youssef Gahi (IJEECS ID 39429)
This systematic review comprehensively explores cyberattack tactics, privacy concerns, and safety models within big data systems, focusing on critical facets of contemporary data security. It begins by categorizing various cyberattack types, laying a solid groundwork for understanding the intricate threats faced by modern data environments. Through meticulous analysis of past research methodologies, the review identifies vulnerabilities and tactics that compromise privacy and undermine safety protocols. The review thoroughly examines the ethical considerations in big data security, highlighting the indispensable role of artificial intelligence in strengthening defenses against evolving threats. The review also compares regulatory frameworks such as the General Data Protection Regulation (GDPR), the National Institute of Standards and Technology (NIST), and the International Organization for Standardization (ISO 27001) standards. This helps to explain the legal and compliance issues related to data privacy and security. The review brings together ideas from different sources to suggest a structured way to find and handle cyberattacks. It supports an integrated strategy that fixes technical flaws and makes sure that regulations are followed. In essence, this review significantly contributes to the cybersecurity discourse in the big data era, offering invaluable insights for researchers, practitioners, and policymakers to navigate the landscape of data security and safeguard data integrity and confidentiality.
Indonesian Journal of Electrical Engineering and Computer Science
https://ijeecs.iaescore.com
Supported by Master Program of Electrical and Computer Engineering, Universitas Ahmad Dahlan, https://mee.uad.ac.id #yogyakarta
Admission: https://mee.uad.ac.id/pendaftaran/
#scopus #journal #publications #publication #uad #electricvehicle #EV #solution #environment #pollution #passenger #fieldorientedcontrolled #FOC #PermanentMagnetSynchronousMotor #PMSM #MATLAB #gradient #truck #regenerative #propulsion #MachineLearning #DeepLearning #InternetOfThings #Classification #CloudComputing #ConvolutionalNeuralNetwork #CNN #SupportVectorMachine #SVM #GeneticAlgorithm #IoT #Security #ArtificialIntelligence #Optimization #COVID-19 #ParticleSwarmOptimization #PSO #ImageProcessing #Clustering #NeuralNetwork #ArtificialNeuralNetwork #FuzzyLogic #RenewableEnergy #5G #WirelessSensorNetwork #WSN #DataMining #Cryptography #Photovoltaic #FeatureSelection #Encryption #Microcontroller #DistributedGeneration #FeatureExtraction #NaturalLanguageProcessing #NLP #TransferLearning #WirelessSensorNetworks #Prediction #SentimentAnalysis #PowerQuality #Simulation #DecisionTree #BigData #RandomForest #Arduino #Sensors #Segmentation #EnergyEfficiency #FPGA #MobileApplication #Algorithm #EnergyConsumption #MATLAB #Blockchain #PIDController #Sensor #Authentication #ComputerVision #THD #TotalHarmonicDistortion #Harmonics #RaspberryPi #FaceRecognition #ImageClassification #IntrusionDetectionSystem #LuminousFlux #QualityOfService #QoS #ElectricVehicle #EV #Network #Routing #SocialMedia #SosMed #Steganography #TextMining #Throughput #Accuracy #AugmentedReality #DeepNeuralNetwork #MANET #MultilevelInverter #NaiveBayes #Performance #Temperature #TextClassification #Elearning #LoadBalancing #NetworkLifetime #PrincipalComponentAnalysis #PCA #Android #BitErrorRate #BER #ColorHomogeneity #Efficiency #Healthcare #MPPT #Microgrid #MiescatteringTheory #RFID #KNN #OFDM #GPS #GSM
This systematic review comprehensively explores cyberattack tactics, privacy concerns, and safety models within big data systems, focusing on critical facets of contemporary data security. It begins by categorizing various cyberattack types, laying a solid groundwork for understanding the intricate threats faced by modern data environments. Through meticulous analysis of past research methodologies, the review identifies vulnerabilities and tactics that compromise privacy and undermine safety protocols. The review thoroughly examines the ethical considerations in big data security, highlighting the indispensable role of artificial intelligence in strengthening defenses against evolving threats. The review also compares regulatory frameworks such as the General Data Protection Regulation (GDPR), the National Institute of Standards and Technology (NIST), and the International Organization for Standardization (ISO 27001) standards. This helps to explain the legal and compliance issues related to data privacy and security. The review brings together ideas from different sources to suggest a structured way to find and handle cyberattacks. It supports an integrated strategy that fixes technical flaws and makes sure that regulations are followed. In essence, this review significantly contributes to the cybersecurity discourse in the big data era, offering invaluable insights for researchers, practitioners, and policymakers to navigate the landscape of data security and safeguard data integrity and confidentiality.
Indonesian Journal of Electrical Engineering and Computer Science
https://ijeecs.iaescore.com
Supported by Master Program of Electrical and Computer Engineering, Universitas Ahmad Dahlan, https://mee.uad.ac.id #yogyakarta
Admission: https://mee.uad.ac.id/pendaftaran/
#scopus #journal #publications #publication #uad #electricvehicle #EV #solution #environment #pollution #passenger #fieldorientedcontrolled #FOC #PermanentMagnetSynchronousMotor #PMSM #MATLAB #gradient #truck #regenerative #propulsion #MachineLearning #DeepLearning #InternetOfThings #Classification #CloudComputing #ConvolutionalNeuralNetwork #CNN #SupportVectorMachine #SVM #GeneticAlgorithm #IoT #Security #ArtificialIntelligence #Optimization #COVID-19 #ParticleSwarmOptimization #PSO #ImageProcessing #Clustering #NeuralNetwork #ArtificialNeuralNetwork #FuzzyLogic #RenewableEnergy #5G #WirelessSensorNetwork #WSN #DataMining #Cryptography #Photovoltaic #FeatureSelection #Encryption #Microcontroller #DistributedGeneration #FeatureExtraction #NaturalLanguageProcessing #NLP #TransferLearning #WirelessSensorNetworks #Prediction #SentimentAnalysis #PowerQuality #Simulation #DecisionTree #BigData #RandomForest #Arduino #Sensors #Segmentation #EnergyEfficiency #FPGA #MobileApplication #Algorithm #EnergyConsumption #MATLAB #Blockchain #PIDController #Sensor #Authentication #ComputerVision #THD #TotalHarmonicDistortion #Harmonics #RaspberryPi #FaceRecognition #ImageClassification #IntrusionDetectionSystem #LuminousFlux #QualityOfService #QoS #ElectricVehicle #EV #Network #Routing #SocialMedia #SosMed #Steganography #TextMining #Throughput #Accuracy #AugmentedReality #DeepNeuralNetwork #MANET #MultilevelInverter #NaiveBayes #Performance #Temperature #TextClassification #Elearning #LoadBalancing #NetworkLifetime #PrincipalComponentAnalysis #PCA #Android #BitErrorRate #BER #ColorHomogeneity #Efficiency #Healthcare #MPPT #Microgrid #MiescatteringTheory #RFID #KNN #OFDM #GPS #GSM
Video Information
Views
28
Likes
2
Duration
15:00
Published
Sep 29, 2024
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now