{"title":"4. 大数据在黑客和社会工程中的应用","authors":"Shibakali Gupta, A. Mukherjee","doi":"10.1515/9783110606058-004","DOIUrl":null,"url":null,"abstract":": Nowadays, in the fast-paced world of Google and Facebook, every detail of human being could be considered as a set of data or array of data that can be stored, verified, and processed in several ways for the benefits of users. Big data would be perfectly described with humongous large and complex data entities, where classic approach application software is incompetent for them. Big data epitomizes the evidence chattels classified by a high volume, velocity, and variability to require precise technology and analytical approaches for its transformation into value. Big data include netting data, search, data stowing, transmission, updating, data scrutiny, visualization, sharing, querying, data source, and information confidentiality. Big data can castoff in innumerable sectors like defense, health care, and Internet of things. The most famous example probably being Palantir, which was primarily sponsored by the Intelligence Its primary was to deliver analytics sway in the war against terrorism of any kind but with accumulative dependency on big data, the menace of exploitation of this data also arises. The prominence of big data does not gyrate around data magnitude or dimensions rather it revolves around how you process it. You can consider stats from whichever cradle and analyze it to discover answers that facilitate cost diminutions, interval time declines, fresh product development and elevated offerings, and smart management. When you conglomer-ate big data with efficient and dynamic analytics, you can achieve business-corre-lated tasks such as detecting fraudulent behavior, recalculating entire risk portfolios in shorter span of time, determining root causes of failures, disputes, and blemishes in near real time. Few instances such as Cambridge Analytica lighten the insight of the exploitation of the big data. There are several instances where large amount of data has been stolen like in 2014, Yahoo Inc., where 3 billion accounts were effec-tively according to official sources in 2016, Adult Friend Finder where 412.2 million accounts were effected with credit card details of an event that is not a requisite illegal, but sketchy to say the least. The statistic that several sets of international figures were acknowledged in this bulk data set is what marks the news. With the evolution of big data, it makes treasured visions for hackers invariably tempting, but it also provides a big structure of data that con-verts it to payload utmost necessary to protect. In such a scenario, the security of big data is very important. This chapter shares sheer insight of how big data can be used in hacking and social engineering. This chapter will try to list down the ways big data is mined from various sources such as Google Services of Android and Facebook. It will list the various ways the big data is used in day-to-day life by the given companies and other advertising companies. This chapter will try to enlist all the major ill ways this data can be used against us and the ways the important and private data can be protected from the data-collecting companies.","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"63 5 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"4. Use of big data in hacking and social engineering\",\"authors\":\"Shibakali Gupta, A. Mukherjee\",\"doi\":\"10.1515/9783110606058-004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Nowadays, in the fast-paced world of Google and Facebook, every detail of human being could be considered as a set of data or array of data that can be stored, verified, and processed in several ways for the benefits of users. Big data would be perfectly described with humongous large and complex data entities, where classic approach application software is incompetent for them. Big data epitomizes the evidence chattels classified by a high volume, velocity, and variability to require precise technology and analytical approaches for its transformation into value. Big data include netting data, search, data stowing, transmission, updating, data scrutiny, visualization, sharing, querying, data source, and information confidentiality. Big data can castoff in innumerable sectors like defense, health care, and Internet of things. The most famous example probably being Palantir, which was primarily sponsored by the Intelligence Its primary was to deliver analytics sway in the war against terrorism of any kind but with accumulative dependency on big data, the menace of exploitation of this data also arises. The prominence of big data does not gyrate around data magnitude or dimensions rather it revolves around how you process it. You can consider stats from whichever cradle and analyze it to discover answers that facilitate cost diminutions, interval time declines, fresh product development and elevated offerings, and smart management. When you conglomer-ate big data with efficient and dynamic analytics, you can achieve business-corre-lated tasks such as detecting fraudulent behavior, recalculating entire risk portfolios in shorter span of time, determining root causes of failures, disputes, and blemishes in near real time. Few instances such as Cambridge Analytica lighten the insight of the exploitation of the big data. There are several instances where large amount of data has been stolen like in 2014, Yahoo Inc., where 3 billion accounts were effec-tively according to official sources in 2016, Adult Friend Finder where 412.2 million accounts were effected with credit card details of an event that is not a requisite illegal, but sketchy to say the least. The statistic that several sets of international figures were acknowledged in this bulk data set is what marks the news. With the evolution of big data, it makes treasured visions for hackers invariably tempting, but it also provides a big structure of data that con-verts it to payload utmost necessary to protect. In such a scenario, the security of big data is very important. This chapter shares sheer insight of how big data can be used in hacking and social engineering. This chapter will try to list down the ways big data is mined from various sources such as Google Services of Android and Facebook. It will list the various ways the big data is used in day-to-day life by the given companies and other advertising companies. This chapter will try to enlist all the major ill ways this data can be used against us and the ways the important and private data can be protected from the data-collecting companies.\",\"PeriodicalId\":93151,\"journal\":{\"name\":\"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...\",\"volume\":\"63 5 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1515/9783110606058-004\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/9783110606058-004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

:如今,在谷歌和Facebook的快节奏世界中,人类的每一个细节都可以被认为是一组数据或数据阵列,这些数据可以通过多种方式存储、验证和处理,以造福用户。大数据将被完美地描述为巨大而复杂的数据实体,传统的方法应用软件无法胜任。大数据集中了大量、快速和可变性的证据,需要精确的技术和分析方法才能将其转化为价值。大数据包括网络数据、搜索、数据存储、传输、更新、数据审查、可视化、共享、查询、数据源、信息保密等。大数据可以被用于国防、医疗保健和物联网等无数领域。最著名的例子可能是Palantir,它主要是由情报部门赞助的,它的主要目的是在打击任何形式的恐怖主义的战争中提供分析,但随着对大数据的累积依赖,利用这些数据的威胁也会出现。大数据的重要性不在于数据的大小或维度,而在于你如何处理它。您可以考虑来自任何摇篮的统计数据,并对其进行分析,以发现有助于降低成本、缩短间隔时间、开发新产品和提高产品质量以及智能管理的答案。当您通过高效、动态的分析整合大数据时,您可以完成与业务相关的任务,例如检测欺诈行为、在更短的时间内重新计算整个风险组合、近乎实时地确定故障、纠纷和瑕疵的根本原因。很少有像剑桥分析这样的例子能让人们对大数据的利用有更深刻的认识。有几个案例显示,大量数据被盗,比如2014年雅虎公司(Yahoo Inc.),根据官方消息来源,2016年有30亿个账户被有效窃取;Adult Friend Finder, 4.122亿个账户被信用卡详细信息影响,这不是必要的非法事件,但至少可以说是粗略的。在这个大数据集中,几组国际数据被承认的统计数据是新闻的标志。随着大数据的发展,它为黑客提供了宝贵的愿景,但它也提供了一个大的数据结构,将其转换为最需要保护的有效载荷。在这样的场景下,大数据的安全性就显得尤为重要。本章分享了大数据在黑客和社会工程中的应用。本章将尝试列出从各种来源(如Android的Google服务和Facebook)挖掘大数据的方式。它将列出给定公司和其他广告公司在日常生活中使用大数据的各种方式。本章将尝试列出这些数据可能被用来对付我们的所有主要不良方式,以及保护重要和私人数据免受数据收集公司侵害的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
4. Use of big data in hacking and social engineering
: Nowadays, in the fast-paced world of Google and Facebook, every detail of human being could be considered as a set of data or array of data that can be stored, verified, and processed in several ways for the benefits of users. Big data would be perfectly described with humongous large and complex data entities, where classic approach application software is incompetent for them. Big data epitomizes the evidence chattels classified by a high volume, velocity, and variability to require precise technology and analytical approaches for its transformation into value. Big data include netting data, search, data stowing, transmission, updating, data scrutiny, visualization, sharing, querying, data source, and information confidentiality. Big data can castoff in innumerable sectors like defense, health care, and Internet of things. The most famous example probably being Palantir, which was primarily sponsored by the Intelligence Its primary was to deliver analytics sway in the war against terrorism of any kind but with accumulative dependency on big data, the menace of exploitation of this data also arises. The prominence of big data does not gyrate around data magnitude or dimensions rather it revolves around how you process it. You can consider stats from whichever cradle and analyze it to discover answers that facilitate cost diminutions, interval time declines, fresh product development and elevated offerings, and smart management. When you conglomer-ate big data with efficient and dynamic analytics, you can achieve business-corre-lated tasks such as detecting fraudulent behavior, recalculating entire risk portfolios in shorter span of time, determining root causes of failures, disputes, and blemishes in near real time. Few instances such as Cambridge Analytica lighten the insight of the exploitation of the big data. There are several instances where large amount of data has been stolen like in 2014, Yahoo Inc., where 3 billion accounts were effec-tively according to official sources in 2016, Adult Friend Finder where 412.2 million accounts were effected with credit card details of an event that is not a requisite illegal, but sketchy to say the least. The statistic that several sets of international figures were acknowledged in this bulk data set is what marks the news. With the evolution of big data, it makes treasured visions for hackers invariably tempting, but it also provides a big structure of data that con-verts it to payload utmost necessary to protect. In such a scenario, the security of big data is very important. This chapter shares sheer insight of how big data can be used in hacking and social engineering. This chapter will try to list down the ways big data is mined from various sources such as Google Services of Android and Facebook. It will list the various ways the big data is used in day-to-day life by the given companies and other advertising companies. This chapter will try to enlist all the major ill ways this data can be used against us and the ways the important and private data can be protected from the data-collecting companies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Frontmatter 3. Anomaly detection in cloud big database metric 6. Big data security issues with challenges and solutions 1. Introduction 5. Steganography, the widely used name for data hiding
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1