"Prism door" hit "Big Data" a slap in the face: accurate privacy exposure

Source: Internet
Author: User
Keywords Internet large data

Last year was "cloud computing," and this year was "big data". Nowadays, as the most popular information "symbol", every industry is making efforts for its own "big data" ability. For a time, it seems not to say that they have "big data" genes, or are doing "big data" related things, all feel that they can not catch up with the trend. But the recently fired "prism door" incident is like a loud slap on the "Big data" of "face", so that has been "big data" of the public have a new understanding of it.

"Double-sided" of "Big Data"

Recently, a former CIA employee named Snowden appeared in Hong Kong and disclosed some confidential documents to the media, leading to a public view of several secret U.S. government intelligence surveillance programs, including the Prism project. It is understood that "prism" the project involves US intelligence agencies on the Internet to listen to 10 main types of information, including China, with e-mail messages, instant messages, videos, photos, stored data, voice chats, file transfers, video conferencing, logon hours and social networking information. For a time, public opinion on the "prism" of the existence of the project has given a lot of condemnation. However, many people ignore a key problem, it is the existence of "big data" to allow the "PRISM" project to implement.

"Large data" exists in the original intention, is to obtain a large number of user behavior data, accurate analysis, can be more efficient service for users. But big data is also a double-edged sword: on the one hand, the objectivity of large data allows many decision-makers to make the most correct decisions more rationally. Tencent computer Butler, such as the use of "large data" for the concept of network security services, launched the "Panoramic Network security defense system" relies on Tencent computer Butler security Yuncu "Big Data", through Tencent Instant messaging software QQ 700 million of users, as well as search engine Soso, Micro-mail and Weibo and other Internet portals to capture the whereabouts of phishing sites.

On the other hand, "big data" in providing more accurate and objective data analysis for all walks of life, the collection of user data has become a valuable "whole", whether the user's privacy or the use of data itself, has become a controversial "gray zone." According to information, a Wall Street stock speculators used computer programs to analyze the world's 340 million micro-blog accounts, to judge the public sentiment. If most people are excited, buy stocks, and if everyone's anxiety rises, sell. The approach helped the stock speculator get a 7% quarterly yield, but for many of the users who provided the data, it became an object of personal use but no benefit.

"Large data" that cannot be rejected

For the vast majority of Internet users and even ordinary citizens, there seems to be no way to completely insulate themselves from "Big data". According to Victor Maire-Schoenberg and Kenneth Couqueil in the big Data age, Facebook, which has about 1 billion users in 2012, is interconnected through hundreds of billions of friends, a huge social network that covers about 10% of the world's population, and in China, like Tencent, Baidu , Alibaba, 360 and so on the Internet giant, its user's large data resources control even more. Since the user level has been unable to resist the "big data" of "tentacles", the enterprise level of "big data" attitude is critical.

But in reality, "Big data" is often dressed in a shiny "coat", but it is the enterprise level only use value but ignore the protection of resources. Rising security experts pointed out that the "PRISM" project exposure for the domestic enterprise information security sounded the alarm, exposing our enterprise information security at least five blind spots, resulting in the enterprise network at a high risk, business secrets at any time may be hackers, competitors to steal, Even some of the data related to the survival of the enterprise unknowingly by anonymous Third-party backup. These consequences are limited to the survival and development of enterprises, heavy threat to national security. According to the analysis report of the rising side, domestic enterprises blindly choose foreign electronic products at the same time enterprise information Security system construction is basically zero, and enterprises allow employees to own personal computers, mobile phones, tablets and other terminal equipment access to the enterprise intranet will also become the Achilles heel of enterprise information security, in addition, new technology, new applications developed rapidly, This also brings a lot of unknown risk to enterprise information security.

Rising security experts explained, "the most close to the life of the example is a smartphone, hackers or corporate ghosts can use the smartphone camera and microphone, the whole process of monitoring information inside the enterprise." At the same time as mobile terminal equipment, mobile phones can use their own network, will monitor the information uploaded to the Internet at any time. Therefore, even without access to intranet, hackers, corporate ghosts, and competitors (or state) intelligence departments may use intelligent terminal Equipment to obtain corporate confidential information. "Like the movie" 007 "," The Spy in the dish "the Cyber Bridge section, now has become the reality.

After the Prism project was exposed, the NSA declared that it was "not a safe conscience, not afraid of ghosts, but for many" forced "to join the" big data ", or do not want their own" big data "by others to be consulted at any time, under this irreversible" big data "trend, it seems that there is no room for choice.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.