Return to Article Details Information Security Techniques to Prevent Malicious Activities like Data Breaches on Big Data Obtained for Analysis Purpose Download Download PDF