The harm and security of large data--a Weibo leaked constructed's cell phone number

Source: Internet
Author: User
Keywords Large data security attack



Into the information age, into the network era, information and data ushered in a large-scale outbreak, has become the protagonist of the Times. It also makes big data more known. The massive data nature lets the enterprise and the Netizen all enjoy the convenience, but the latent security risk also cannot neglect. As the old saying goes, things always have two sides.
  
The danger of large data: A microblog leaked tyrants's cell phone number
  
A well-known white hat has been cited as an example: Constructed on Weibo on the microblogging of a certain electric dealer delivery too slow, but also the order number hang out. However, this order number can be traced to the "national husband" mobile phone, address, mailbox, and other large amounts of personal information. "One day he was basking in pictures and he was getting a new computer desk." Then see the computer table has a small flash drive, worth more than 10,000, this is tyrants life, we can not understand. I went to see the flash drive is true, not a cottage. ”
  
It is by no means sensational that a microblog message reveals the privacy of a rich star. Today, your image of the sun on the social network, the whereabouts of the sun, tomorrow may become a hacker attack your important data. A few days ago, Apple's icloud account leaked Hollywood celebrity photos because of the personal information that celebrities are exposing on social networks.

More than that, the cyber attacks of large-profit data hackers are becoming simpler. The well-known white hat has also demonstrated an automated attack tool based on large data. He has billions of security vulnerabilities, more than 1 billion accounts and password dictionaries, tens of millions of attack scripts, hundreds of millions of tens of thousands of Web site configuration information entered into an analysis tool, to the statistics and classification of these large data. Then, simply enter a Web site or a Netizen's information on the Internet, you can find the security vulnerabilities, and then you can directly attack.

Large data makes the threshold for cyber attacks lower and even makes it possible for ordinary people to become expert attackers. Future hackers may not need superb technology, but a master of information discovery and data integration.

Large data security: A blocking command from billions of log analysis

Hackers can use large data to do attack damage, security workers are also using large data for security defense.

in the "Web and Application Security Forum" of the China Internet Security Conference held on September 25, security experts from home and abroad discussed the attack and defense in large data situations. A security expert in the "Data analysis, keywords and underground industry," the keynote speech, said, "in-kind" is the best martial arts, and the use of large data to defend large data attacks are also effective measures.

kills dangerous data from large data source encryption is the most effective means

visible large data is called a contradiction, it lets the security and the danger exist simultaneously, protects the modern network and the information security simultaneously also to be exploited by the lawless elements to let the malicious attack become rampant, lets the network environment from healthy, clean The state is getting farther. Therefore, for the security of large data, we have to dig deep, maximize the use of large data to protect the Internet security, to ensure that everyone in the modern society of the information security. But for the danger of big data, it is natural to stifle it.

In fact, large data makes it possible for hackers to exploit the security of each role in the network because there is a lot of data in the network, and they can attack the object by trying to steal the data for analysis and processing. So to organize large data to bring the drawbacks, the most fundamental is to ensure data security, as long as hackers can not get data, they naturally do not know how to do, not to mention attacks. At present, the encryption technology that can protect data from the root is absolutely the best choice. The

encryption technology is used directly for the data itself, starting with the data source, and once encrypted, the file is in the form of ciphertext. Therefore, even if the computer system suffers from various aspects of a variety of attacks resulting in files were stolen by criminals, the contents of the file can not be as they see, because the file open is garbled, encryption is still a file to protectProtective effect. And now decryption has become more difficult, so the data once the encryption technology to protect the confidentiality of the data can be guaranteed.

with the development and upgrading of encryption technology, today's multimode encryption technology can be said to be the best guarantee of data security. Multi-mode encryption using symmetric encryption and asymmetric algorithm, while ensuring the quality of protection at the same time, so that users in different working environment independent choice of different encryption mode, flexible and targeted. In addition to a variety of modes of encryption, the technology has no restrictions on the format of encrypted files, as long as the computer exists in the format can be encrypted, while the encryption of each file has a unique key, security has the greatest improvement. The


Data Network has become a very important part of everyone's daily lives, and although it's convenient but it makes hacking easier, it's something we don't want to see. So we want to stop hacker attacks, the best way is to prevent data leakage from the source, using flexible and targeted encryption software for important data encryption, away from hacker attacks, maintain a large data age security.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.