Big Data analytics is the act of analysing data to discover hidden patterns, trends, preferences, and other important information in order to detect infiltration, prevent fraud, and possibly make the right judgements. This study was carried out to investigate the implementation of big data analytics as a technique for information protection against cyber attacks. This study specifically examined the extent of big data analytics implementation and the challenges militating the adoption and full implementation.
The survey research design was employed and a total of one hundred and twenty-one staff members of the Joint Admission and Matriculation Board (JAMB) and the Independent National Electoral Commission (INEC) were enrolled in the study. The instrumentation of questionnaire was used to elicit information from the study participants. The data collected were analysed using the binary logistic regression. Findings from the study revealed that big data analytics provides better advantage to information protection against cyber attacks. Also, the findings showed that to a significant extent, big data analytics has not been full adopted and implemented by institution and organizations in Nigeria. This gap was detected in this study to be a result of high cost of hiring expert personnel, time and large quantity of silos. These factors indirectly affects the decision of top management regarding the adoption and implementation of big data analytics. This study recommends the adoption and implementation of big data analytics by organizations and institutions in Nigeria. Adequate training should be provided for staff members whose job description involves interacting with big data.
Inhaltsverzeichnis (Table of Contents)
- ABSTRACT
- CHAPTER ONE.
- INTRODUCTION
- Introduction..
- Background of the study
- Problem Statement
- Aims and Objectives of the study..
- Research Questions.
- Research hypotheses.........
- Significance of the study...
- Scope of the study.
- Limitation of the study
- CHAPTER TWO
- LITERATURE REVIEW
- INTRODUCTION
- REVIEW/EXPLANATION OF IMPORTANT/RELEVANT TERMS AND TECHNOLOGIES
- Concept of Critical Information Structure.
- Concept of Big Data …....
- Concept of Big Data Analytics .......
- Overview of Cyber-Crime and Cybersecurity.
- Goals of Cyber Security.......
- E-crimes that are Peculiar to Nigeria........
- Concept of Cyber-Attack.
- Big Data Technologies
- Threat detection with Big Data Analytics .....
- Security Analytics With Big Data Analytics
- Big Data Mechanism In Analytics Cybercrime.....
- Challenges To Security From The Production, Storage, And Use Of Big Data.
- Best Practices For Managing Big Data In An Organization, From a Security Perspective.....
- Technological Solutions Available To Secure Big Data And Ensure It's Gathered And Used Properly.....
- Strategic And Tactical Policy Approaches Exist To Do The Same
- How The Use Of Big Data Different To The Use Of Large Datasets In The Past
- How Companies Can Ensure And Prove Compliance While Using Big Data....
- How Traditional Notions Of Information Lifecycle Management Relate To Big Data
- How Governance Frameworks Can Be Adapted To Handle Big Data Security Issues And Risk
- REVIEW OF SIMILAR EXISTING SYSTEMS/PREVIOUS RELATED WORKS..
- SUMMARY OF RELATED WORK
- IDENTIFICATION OF GAP FROM REVIEWED LITERATURE.
- CHAPTER THREE..
- METHODOLOGY/SYSTEM ANALYSIS AND DESIGN
- Introduction........
- Research Design
- Population of the Study.
- Sample and Sampling Techniques.
- Sample Size...
- Sample Technique
- Method of Data Collection Result
- Primary
- Instrument of Data Collection
- Administration of Instrument...
- Description Questionnaire..
- Secondary Data........
- Variables and Measurement
- Method of Data Analysis.
- Non-inferential Techniques.......
- Inferential Techniques........
- Ethical Consideration......
- Summary..
- CHAPTER FOUR.......
- DATA PRESENTATION, ANALYSIS AND DISCUSSION.
- Introduction........
- CHAPTER FIVE.
- SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATION
- Summary of findings….....
- Conclusion and Recommendation....
- REFERENCES
- QUESTIONNAIRE..
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
The study aims to investigate the implementation of big data analytics as a technique for information protection against cyber attacks. It specifically examines the extent of big data analytics implementation and the challenges preventing its full adoption.
- The implementation of big data analytics for information protection
- Challenges to the adoption and full implementation of big data analytics
- The impact of big data analytics on information security
- The use of big data analytics in critical information infrastructure protection
- Factors influencing the decision to adopt big data analytics for cyber security
Zusammenfassung der Kapitel (Chapter Summaries)
- Chapter One: Introduction
- Chapter Two: Literature Review
- Chapter Three: Methodology/System Analysis and Design
- Chapter Four: Data Presentation, Analysis and Discussion
- Chapter Five: Summary of Findings, Conclusion and Recommendation
This chapter introduces the study, providing background information, problem statement, research objectives, and hypotheses. It highlights the importance of information protection and the role of big data analytics in safeguarding critical infrastructure.
Chapter two delves into the theoretical foundation of the study, providing definitions and explanations of relevant concepts such as critical information infrastructure, big data, cybercrime, and cybersecurity. It explores the use of big data analytics for threat detection, security analytics, and managing big data from a security perspective. The chapter also discusses challenges to security from the production, storage, and use of big data and explores technological solutions to address these challenges.
This chapter outlines the research methodology employed in the study, including the research design, population, sampling techniques, data collection methods, and data analysis approaches.
Chapter four presents the findings of the study based on the analysis of the collected data. This chapter focuses on analyzing the relationship between big data analytics implementation and information security, exploring the challenges faced, and discussing the impact of big data analytics on cybercrime.
This chapter provides a summary of the key findings of the study, drawing conclusions based on the analysis. It discusses the potential benefits and limitations of big data analytics in safeguarding critical information infrastructure and recommends steps for organizations to improve their cybersecurity posture through the adoption and implementation of big data analytics.
Schlüsselwörter (Keywords)
This study focuses on the use of big data analytics for information protection, particularly in the context of critical information infrastructure. Key terms include: big data analytics, cybersecurity, cyber attacks, critical information infrastructure, threat detection, security analytics, data governance, compliance, and information lifecycle management.
- Quote paper
- Torty Vincent (Author), Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks, Munich, GRIN Verlag, https://www.grin.com/document/1224910