Secure large data with large data analysis

Source: Internet
Author: User
Keywords Large data security large data analysis

Ctrip information leaked events have aroused widespread concern, in the large data age, a wide range of information and transparent, almost no one, any organization can get out of things, but the direct result of this information exposure is that privacy protection has become more difficult. In particular, what if your bank account number and password are compromised? Your file server is storing important confidential data, how do you protect it? http://www.aliyun.com/zixun/aggregation/14045.html "> The network administrator controls the important whole network data information, his security risk how to guard against?

Since it is a large data age, it is possible to use large data methods to protect data. Many companies are in this area of scientific and technological research, including the network level of security solutions, including the application level of user information protection mechanism.

At the network level, as the world's leading provider of information and communication solutions, Huawei at the U.S. RSA2014 Security summit to explain the "use of large data analysis cast security Agile Network" concept, and released the next generation of Anti-ddos solutions to provide T-class DDoS protection performance, At the same time announced the T-Class High-performance Data Center firewall, successfully passed the United States NSS Laboratory testing, to become the industry's first Third-party certified T-class data center firewall products. These two industry-leading high-performance products, leading safety into the T-Class era of protection for "large data" security escort.

Suppose there was such a case: Zhang was at home, and suddenly someone knocked at the door, after opening the door, the other side but call themselves express but go the wrong place; the results wait for Zhang three after the door, the man went to the door of the DOE House, Doe Open, this person is the same rhetoric; Finally, when the man knocked at Harry's house, no one came to the door. He pried open the door lock and carried out the theft.

From our personal perspective, everyone will think that his personal behavior is normal, but if the eyes of the Community security camera monitoring data, you will find that this is a potential threat, the person's behavior is abnormal.

In the context of large data, from the perspective of the whole network security and and from a single point of view, the difference is very large. Huawei uses the controller technology program to see the whole web, using large data analysis to identify potential threats, thereby creating higher security precautions.

Huawei has also proposed a new technology called the Sandbox, just like a virus petri dish, it can simulate the operating environment of the software, if the discovery of suspicious applications will put the application into the inside, let it in a fake environment to test the operation, and constantly monitor the various behavior of the software. Users send data to the sandbox to observe, automatically observe, automatically analyze, and then automatically alarm, so that the very potential of the initial stage of the threat to capture, and better protect the network.

Of course, under the large data, can login to controller administrator also need to be particularly wary of, if the administrator problem, the impact on the network is great. From this, Huawei through Uma to achieve the audit of the administrator to monitor the risk. Previously recorded in the log is only the input of the command, and Uma not only will record the command, but also record the administrator with this command to see all the information. Uma like a camera, all the movements can be recorded, and no one can delete, after the audit, this is a large data era of the whole network security synergy.

Another risk from the ordinary users, the user's important information may be lost, may be stolen, in extreme cases, involving user funds account password, identity card, etc. may be at the same time by other people to obtain. So, can also protect the user's information and money security?

In this regard, Alibaba because of E-commerce and Internet financial reasons will be the first to face problems. According to the introduction of relevant personnel, Alibaba is also using large data methods to protect the information, even in extreme cases to protect the security of the user's funds.

In fact, we often see in the film and television play on the battlefield has been a diversion of the classic method, a major force ready to sneak into the battlefield, in order to cover up the transfer of information, often leaving only the headquarters of the transmitter, continue to be in situ in disguise to send and receive telegrams and command, this method has indeed been successfully used in the war, the reason is that, Each transmitter will have their own unique fingering, speed, the formation of "fingerprint", the enemy's monitoring department will be based on the characteristics of the transceiver to identify the army and the line of action, which is actually a large data application.

Based on this principle, each of us in the use of PC or mobile phone login account, enter the password, click on the link will also form their own habits of action, these actions form large data information will also be recorded and analyzed, if which day when the system suddenly found that these actions are abnormal, will take interception measures, Through a series of new information to check the steps to ensure the security of transactions, under special conditions will suspend the transaction and with the capital of the owner of direct communication verification.

In the big data age, there is almost no privacy for ordinary users. Large data adds to the convenience of Internet users, but it also opens the door to illegal use. However, the magic of a ruler, road high, large data also let us have more and better information protection methods. As long as we use it rationally, big data will make our life more exciting.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.