In the new IT era, the rise of mobile internet and cloud computing has driven huge business opportunities based on large data applications. But at the same time, the risks were immediately uninvited. Through the Internet, massive data "readily available", especially the use of internal staff mobile Terminal Equipment (BYOD) has greatly increased the likelihood of advanced persistent threat (APT). As more and more companies outsource business processes through the cloud to control costs, are data security in the cloud? Although in recent two years the government in the cloud computing sector has introduced more support policies and financial support, but there is no specific cloud computing operations and security of the relevant laws and regulations issued. For the enterprise, once the data has been threatened, the loss will be incalculable. In front of massive data, the traditional information security system exposes not only the flaw of system function, but also the security hidden trouble of the whole architecture system. Traditional information security solutions in the context of the protection of the leak is not outside of the import and export, optical drive, Bluetooth and other monitoring, but can not control the security of secret data transmission and storage. In the Prism Gate incident, the National Security Agency (NSA) is using cloud service providers to get a lot of personal information stored in the cloud. If the core of cloud computing is the centralization, integration, correlation and sharing of data, the application of large data plays an important role in collating and analyzing, and seemingly unrelated data can become highly confidential data after mining, collation and analysis. Application level, future cloud computing and large data applications will focus on government, telecommunications, education, medical, financial, petrochemical and power industries. The use value of the data not only impels the enterprise to carry on the data integration positively and realizes the real-time on-line renewal, the massive once individual data is integrated into has the high utilization value the information resource storehouse, and these resources once leaks, the risk will double erupt. Figure 1:2010-2016 China Cloud computing Industry scale and forecast (billion) 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' alt= ' "width=" 377 " height= "212" src= "http://s3.51cto.com/wyfs01/M01/32/49/wKioOVJ695vxtYfCAAAmmL2W58M177.jpg"/> Figure 2:2009-2015 China Large data industry scale and forecast (billion USD) 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' alt= ' "width=" 375 " height= "210" src= "http://s8.51cto.com/wyfs01/M00/32/49/wKioOVJ695zD_WuPAAAwCerDCTw650.jpg"/> It is predicted that Global data will reach 35ZB by 2020, nearly 30 times times faster than 1.2ZB in 2010. If we are in the midst of the initial chaos of massive data outbreaks, the Prism gate has led to deep thinking and attention on cloud computing and data security in large data backgrounds. According to IDC estimates, only 30% of the world's Internet data can be called security, and as enterprises for data value awareness, the importance of data security is self-evident. Therefore, for cloud computing, large data and the next generation of the Internet firewall, data leakage protection, and so on to become active defense of the new generation of security products will appear explosive growth. "Editorial Recommendation" large data security challenges big Data security promise "Big data" = How does "big exposure" manufacturer solve this problem? Building a Hadoop security model to make large data safe to the ground face big data security crisis teach you how not to get mad "responsible editor: Blue Rain Tear TEL: (010) 68476606" Original: Big data will bring a new generation of security products explosive growth return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.