The large data age also requires us to construct a cooperative data security system from the aspects of legal system, organization management, industry direction and technology application.
-Liu Ying Group
2014 was seen as the year of the Big Data Analysis application, and various industries began experimenting with large data technologies. But at the same time, the frequent occurrence of information leaks in recent years, people sounded the security alarm. Experts remind that the big data age, the first need for data to build a "safety fence" (September 17 economic reference newspaper).
As one of the hottest words in IT industry nowadays, large data has become a hot topic in recent years. On the one hand, the number of Internet users is increasing, on the other hand, the number of network devices represented by Internet of things and intelligent mobile terminals is increasing rapidly, which makes the network access bandwidth and traffic of per capita increase quickly. In the big data age, everyone is the user and contributor of data. People enjoy the fast and efficient based on mobile communication technology and data service, while also shrouded in "the personal information leaks everywhere, everyone ' naked" risk. Driven by economic interests, the huge data industry chain around personal information collection, processing, development and sales is quietly formed in our country. The research shows that the grey industrial chain of Internet personal information security in China has reached tens of billions, and many hackers, advertisers, intermediaries and fraud syndicates have profited from it. The reason is that the law does not block the backdoor of leaks channels. As a report puts it, the commercial value of our personal information is found to be the ultimate, "from government departments, telecommunications operators and other information holders, to data platforms and intermediaries such as illegal intermediaries, and then to the illegal investigation companies, should be our information, as a tool for some people to profit." ”
Large data presents new challenges to traditional data security. In the past, our data security solutions such as data leakage protection, the object is local, limited, determined, and the large data age, perhaps the original insignificant or even worthless data, because of its accumulation from quantitative to qualitative change, also must become a protected object. A survey of "who protects personal information security" shows that 90% of people "are exposed to personal information" and 89% are "overwhelmed by personal information leaks". Judicial cases also show that many of the crimes of human rights violations and fraud related to the disclosure of personal information. "Public Personal Information Protection Awareness Survey" shows that personal information disclosure has become a social nuisance, more than 60% of the respondents have encountered personal information leakage, misappropriation and other issues, 90% received spam messages or telemarketing, more than 13% of people have been exposed to personal information or public.
Large data age to use large data methods to protect data. Large data era for personal information collection is increasingly convenient and comprehensive, in information security protection, the State should be organized and planned around large data security for scientific and technological research, including the network level of security solutions, including the application level of user Information protection mechanism of the framework. Of course, the large data age also requires us to build a cooperative data security system from the legal system, organization management, industry direction, technology application and other aspects to reduce the systematic risk of information security in large data age. From the perspective of foreign practice, many countries have passed legislation to protect personal information security.
In view of the current grim information leakage status quo, enhance data security has become a social consensus. In the short term, if there is no fundamental change in the Internet operating system, chips, core technology and other facts from abroad, you can adopt a "fence protection" strategy, the existing Internet system outside the formation of a layer of protection "fence", the threat and risk framed in the controllable scope. First, as all technology chairman Jiangen said the "fence-type password protection" strategy, using the "National Secret Algorithm" password technology to the threat and risk framed in a controllable range. Second, through the legal trap, to the information security backing. For example, the establishment of a unified application of citizen information Protection law, to establish the basic framework of personal information security protection of citizens. Another example is to increase the cost of violating laws and regulations and strengthen the accountability and punishment. That is, on the basis of legislation giving citizens relief of information leakage, (a) increase the penalties for selling or illegally providing information to others and for stealing or otherwise illegally acquiring such information, even if the unit commits a crime, and its directly responsible supervisors and other directly liable persons shall be sentenced in accordance with the law and shall not be sentenced to a fine only.
(Responsible editor: Mengyishan)