differences from traditional DBMS's. The authors describe changes in the intruder model and
new vulnerabilities in data management systems. A new threat model is developed. The
article presents new problems of information security in a distributed Big Data processing
and storage system.