Strategies for Handling Cyber Threats and Ensuring Data Privacy in Distributed Memory Systems
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 215 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Technology | India | Volume 8 Issue 11, November 2019 | Popularity: 4.7 / 10


     

Strategies for Handling Cyber Threats and Ensuring Data Privacy in Distributed Memory Systems

Gnana Teja Reddy Nelavoy Rajendra


Abstract: In a world where data is increasingly important, distributed memory systems (DMS) are critical in the most advanced applications, such as cloud computing, big data analysis, and HPC. Such systems allow scalability, high performance, and resilience by distributing data and computing loads among many nodes. However, their decentralization poses great cybersecurity and data privacy threats. It, therefore, seeks to look at some of the biggest threats to distributed memory systems. DDoS attacks, data breaches, insider threats, and malware. It also gives broad ways to counter these risks and protect the data, from traditional encryption and MFA to the most innovative technologies of AI & ML. The paper focuses on a predictive model for security and a layered approach to control risks and protect data in distributed memory space.


Keywords: DMS, Cybersecurity, Data Privacy, Cloud Computing, Big Data Analytics, HPC, DDoS, Data Encryption, MFA, AI, ML, Zero - Trust Architecture, Malware, Insider Threats, Sharding, and Compliance are critical factors that define the technological environment


Edition: Volume 8 Issue 11, November 2019


Pages: 2046 - 2060


DOI: https://www.doi.org/10.21275/SR24918031411



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Gnana Teja Reddy Nelavoy Rajendra, "Strategies for Handling Cyber Threats and Ensuring Data Privacy in Distributed Memory Systems", International Journal of Science and Research (IJSR), Volume 8 Issue 11, November 2019, pp. 2046-2060, https://www.ijsr.net/getabstract.php?paperid=SR24918031411, DOI: https://www.doi.org/10.21275/SR24918031411

Similar Articles

Downloads: 56 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Informative Article, Computer Technology, India, Volume 9 Issue 12, December 2020

Pages: 1478 - 1482

Blockchain for Health Records System Storage using Attribute-Based Signature

Nenavath Chander

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Technology, India, Volume 13 Issue 1, January 2024

Pages: 1686 - 1691

AI for Making Smarter Cities

Tiara Jain

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Technology, India, Volume 10 Issue 1, January 2021

Pages: 1685 - 1699

Enhancing Retail Compliance through Automation: A Comprehensive Approach to Labor, Payroll, and Safety Standards

Ankur Saini

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Technology, India, Volume 13 Issue 11, November 2024

Pages: 1443 - 1444

The Impact of Emerging Technologies on Modern Diplomacy

Vansh Pandey

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Doctoral Thesis, Computer Technology, Philippines, Volume 10 Issue 11, November 2021

Pages: 1342 - 1367

Predictors of Computer Utilization among Personnel of the Local Government Units: Implications to Human Resource Management

Dr. John C. Amar

Share this Article
Top