Featured Post

SQL Interview Success: Unlocking the Top 5 Frequently Asked Queries

Image
 Here are the five top commonly asked SQL queries in the interviews. These you can expect in Data Analyst, or, Data Engineer interviews. Top SQL Queries for Interviews 01. Joins The commonly asked question pertains to providing two tables, determining the number of rows that will return on various join types, and the resultant. Table1 -------- id ---- 1 1 2 3 Table2 -------- id ---- 1 3 1 NULL Output ------- Inner join --------------- 5 rows will return The result will be: =============== 1  1 1   1 1   1 1    1 3    3 02. Substring and Concat Here, we need to write an SQL query to make the upper case of the first letter and the small case of the remaining letter. Table1 ------ ename ===== raJu venKat kRIshna Solution: ========== SELECT CONCAT(UPPER(SUBSTRING(name, 1, 1)), LOWER(SUBSTRING(name, 2))) AS capitalized_name FROM Table1; 03. Case statement SQL Query ========= SELECT Code1, Code2,      CASE         WHEN Code1 = 'A' AND Code2 = 'AA' THEN "A" | "A

Here's Quick Guide on Hadoop Security

Here is a topic of security and tools in Hadoop. These are security things that everyone needs to take care of while working with the Hadoop cluster.


Quick guide on Hadoop security and its features with top references.

Hadoop Security

Security

  • We live in a very insecure world. For instance, your home's front door to all-important virtual keys, your passwords, everything needs to be secured. In Big data systems, where humongous amounts of data are processed, transformed, and stored. So security you need for the data.
  • Imagine if your company spent a couple of million dollars installing a Hadoop cluster to gather and analyze your customers' spending habits for a product category using a Big Data solution. Here lack of data security leads to customer apprehension.

Security Concerns

  • Because that solution was not secure, your competitor got access to that data, and your sales dropped 20% for that product category.
  • How did the system allow unauthorized access to data? Wasn't there any authentication mechanism in place? Why were there no alerts?
  • This scenario should make you think about the importance of security, especially where sensitive data is involved.
  • Hadoop has inherent security concerns due to its distributed architecture. The installation that has clearly defined user roles and multiple levels of authentication (and encryption) for sensitive data will not let any unauthorized access go through.

Hadoop Security.

  • When talking about Hadoop security, you have to consider how Hadoop conceptualized. When Doug Cutting and Mike Cafarella started developing Hadoop, security was not the priority.
  • Hadoop meant to process large amounts of web data in the public domain, and hence security was not the focus of development. That's why it lacked a security model and only provided basic authentication for HDFS—which was not very useful since it was easy to impersonate another user.
  • Another issue is that Hadoop was not designed and developed as a cohesive system with pre-defined programs. But it was as a collage of modules that either correspond to various open-source projects or a set of (proprietary) extensions developed by different vendors to supplement functionality lacking within the Hadoop ecosystem.
  • Therefore, Hadoop expects a secure environment for data processing. In real-time, there are some glitches to have secure processing. You can read more about it from references.

Keep Reading
White Papers

Comments

Popular posts from this blog

How to Fix datetime Import Error in Python Quickly

Explained Ideal Structure of Python Class

How to Check Kafka Available Brokers