The game of privacy in large data age

Source: Internet
Author: User
Keywords Big data Age privacy consumer game

Large data age, data pervasive, who mastered the data, who can succeed. In this era, Douglas's bold prophecy of "Everything can be quantified" becomes the goal pursued by business decision-makers.

However, large data, the first to data, how to collect data, access data, analysis of data, become a business to think of the problem, which also allows a lot of data acquisition and analysis of the http://www.aliyun.com/zixun/aggregation/17703.html "> technology companies came into being." With the help of the advanced technology of the Internet, the information of a large number of consumers is collected as the basis of product customization in this personalized consumer era.

It is noteworthy that in these emerging technologies, the way consumers collect their personal information is fraught with concern. Due to the lack of legal regulation (the legal lag has to bring results), information collectors have exceeded the consumer's personal rights of the bottom line, such as the right to privacy is infringed, and even the personal information security poses a threat.

How to balance the relationship between the convenience of the development of technology and the protection of individual rights, and how to effectively promote the development of Internet industry in the era of large data under the premise of reasonable protection of personal information security, should be a higher level topic that Apple "backdoor" incident brings to us.

In fact, Apple back door is not a lone example, as early as this March, the national Information Security vulnerability Sharing Platform (CNVD) analysis and verification, Link, Cisco (Cisco), Linksys, Netgear, Tenda (TENGDA) and other manufacturers of the router products exist back door, The hacker can direct control the router, further initiates the DNS (domain Name System) hijacking, steals the information, the phishing and so on the attack, the direct threat user on-line transaction and the data storage security, causes the related product to become momentarily can detonate the safe "mine".

After that, IBM and Microsoft's information security issues surfaced again. And in the emerging information security problems, but also reflects the different political and commercial purposes.

If purely from the technical point of view, the so-called backdoor, is generally the development of software programmers for some purpose, in the software to keep the unknown program, through the backdoor, you can bypass the security mechanism of the software directly to obtain control authority. For example, some router manufacturers in the development of finished products, in order to later debugging and detection more convenient, will retain a Super Management authority on the product.

Even if the designer does not have any other intention, the consumer's risk still exists. Because although in general, this super Management authority is not easy to be found by outsiders, but once discovered and cracked by hackers, it means that hackers can directly remote control of the router.

However, it is noteworthy that the nature of Internet business competition is increasingly skewed to the data and information, who can grasp the key consumer information, who best grasp the likes of consumers, who may win from the business game. So, from a business logic point of view, the technologies that are available to global business companies cannot and should not be idle.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.