You are the CISO for a Fortune 500 online auctioning company which is implementing "big data" technologies in order to make sense out of its millions of electronic transactions it conducts on a typical day.
a. Discuss the general security requirements for the online auctioning system in terms of confidentiality, integrity and availability.
b. Describe threats and vulnerabilities that are possible after implementing "big data" technologies in the online auctioning company.
c. What security measures are required to address these identified threats and vulnerabilities?
d. Explain how "big data" technologies can be used to improve cybersecurity. Provide illustrative examples that could pertain to this company.