Big data in China
Chapter 5 Big data, the part you don't know yet
Chapter 5 Big data, the part you don't know yet (3)
When educating people about big data, I often wonder what would happen if we changed the definition of big data?Change an angle and think about it with a more macroscopic thinking, and you will be able to jump out and think from the perspective of your own needs.
We might as well think of it this way: "Big data is a subjective state, which describes the situation when a company's (individual) infrastructure (status quo) cannot meet its needs for data processing."
In a sense, this judgment is "grey" and may not be as bright and beautiful as people imagine.There is no need for big data without demand.But it is closer to the truth: not everyone has to adapt to the era of big data, when you see it coming, the first thing you need to do is to determine whether you really need it, and then take appropriate action .
The big data revolution behind Prism Gate
☆Five issues that need attention
After the outbreak of the Prism Gate incident, people suddenly realized overnight from Snowden’s continuous exposure of information collection shady scenes that data management risks are ubiquitous. Whether it’s personal information or corporate information, in the era of big data, it has become a reality. It has become a "prey" that is easy to be collected, stolen, analyzed and controlled.This is because for most countries, big data has become a decisive force in the competition situation, and the security risks of data have also become more prominent.
● Powerful institutions can easily use technology to collect all our information.
●Today, data is more valuable than in any era, and it can determine the success or failure of competition.
●Data security has become an imminent challenge for every country, enterprise and individual.
Our country and enterprises have collected and stored all the data, we have upgraded related technologies, and laid the foundation for the vigorous development of the big data industry.
Next, what should the Chinese do to truly and safely develop the big data industry?How should we protect personal, corporate and national data from all directions?And most importantly, how can we use this data legally and healthily?
From the perspective of enterprise and personal information security, there are five issues in big data that require our attention.
cyber security
With the rise of online transactions, online conversations, online interactions, and more and more data online, hackers are more motivated than ever to commit crimes.Nowadays, in addition to individual hackers, there are also national hackers, such as the US National Security Agency.They are more organized, more professional, more powerful tools for committing crimes, and more methods of committing crimes emerge in endlessly.Compared with the one-time data leakage or hacking incidents in the past, once the data is leaked now, it is tantamount to a major blow to the entire enterprise, individual and the country, and it will lose everything if it is not careful. Not only will it lead to reputation damage and huge economic losses, but serious legal liabilities (such as security breaches in financial institutions) will also be borne.Therefore, in the era of big data, the resilience and prevention strategies of the network can be said to be crucial.
Cloud data
Cloud technology is a technological product of the new era. There is still a lot of pressure when people quickly adopt and implement cloud services, because we still have no way to predict and control the risks and consequences they may bring.More importantly, cloud data is a target for hackers, which is an attractive target for obtaining high-value information.Therefore, this puts forward extremely high requirements for enterprises to formulate security policies related to cloud computing.
mobile
This era is becoming "mobile", people's demand for data is increasing, and data collection, storage, access, transmission and other work need to use mobile devices, so the advent of the era of big data has also led to a surge in mobile devices.For example, more and more employees use their own mobile devices for office work. They come to the company with their mobile devices when they go to work, and copy the data to leave after get off work.We cannot deny that this is very convenient, beneficial to work, and has helped companies save a lot of expenses, but it has also brought greater security risks to companies.You must know that mobile devices are an excellent springboard for hackers to invade the internal network. For example, Israel attacked the Iranian nuclear power plant by connecting a small mobile hard disk to the industrial computer of the nuclear power plant, thereby releasing a virus to carry out a fatal attack.Mobility brings difficulties to enterprise management and security protection.
Delicate and tight supply chain
In today's era of globalization, every enterprise is complex and interdependent, and is part of the global supply chain, but the supply chain itself is precisely the weakest link.Information closely links the supply chain, from simple data to business secrets to intellectual property rights, and the leakage of information in a certain link may cause huge losses to enterprises in the entire supply chain, and may even violate the law and be subject to justice. sanctions.For globalization, information security is so important, it plays the role of blood in the entire supply chain - just imagine if our blood enters the virus, what will happen?
Privacy security
With the increasing amount of data generated, stored, and analyzed, privacy issues will become more prominent in the next few years.So new data protection requirements and the improvement of legislative bodies and regulators should be put on the agenda.
Based on these problems, it is not surprising that the Prism incident occurred in the era of big data. It would be strange if the Americans did not do so.Actually, Americans are not the only ones doing this, aren't they?It's not just the heads of state that are being threatened, is it?In this intelligence scandal that shocked the world, some people saw the appearance of the "clown", but others have already seen that behind the Prism Gate incident is a revolution destined to have far-reaching influence, a global revolution related to big data. change.
In this transformation, aggregation and big data analysis are like a treasure trove of marketing intelligence. Whether it is a country, a company or an individual, we may suffer from it, and we are more likely to benefit from it in an excellent way.It is difficult to ignore the impact of big data on our thinking and technological innovation, such as marketing and management.
When this change comes, we should maintain agility and prepare for the opportunity before it arises, and seize the opportunity decisively when it comes, instead of waiting for the opportunity to miss and then trying to fix it.Of course, for many countries and companies, everything is still in its infancy, and there are not many external requirements to force it to improve data processing technology to ensure information security.However, the scale of data processed by enterprises every day is still growing. Big data analysis will not wait for you to approach it actively, but will actively approach you under the influence of globalization.It makes business decisions more and more rely on raw data, making the quality of information more and more important.
Likewise, there is data security that you cannot ignore.Sophisticated analysis can be applied to relevant information security, helping you strengthen the gate of your data warehouse, so as to prevent it from becoming a free treasure trove extracted by powerful institutions at will.We can popularize these solutions to the whole society, encourage Chinese enterprises and ordinary users to use big data analysis to prevent fraud and conduct network security detection, use social analysis technology of big data and multi-channel real-time monitoring of security issues.
In general, big data is of infinite value to China.From the Prism Gate incident, we have seen its huge risks and potential safety hazards, but we have also experienced a "revolutionary change" that is about to come.The world is fair. China has missed the era of great voyages, but God has given us a chance so that we will not miss the era of big data.
☆Full display--Big data background of Prism Gate
Edward Snowden is a former employee of the CIA. The PRISM program he disclosed is a top-secret electronic monitoring project implemented by the US National Security Agency (NSA) since the time of George W. Bush.According to this plan, U.S. intelligence agencies have been conducting data mining through Internet companies, analyzing personal contacts and actions from audio, video, pictures, emails, documents, and connection information.
There are 10 types of monitoring: email messages, instant messages, videos, photos, stored data, voice chats, file transfers, video conferencing, login times, details of social network profiles.It also includes two covert surveillance programs:
1. Call records of public telephone calls;
2. People's network activities.According to Snowden's disclosure, from Europe to Latin America, from traditional allies to partners, from the calls of heads of state to the minutes of daily meetings, including citizens' personal information, US intelligence agencies are all monitoring.The NSA has access to vast amounts of personal chat logs, stored data, voice communications, file transfers, and personal social network data.For example, the U.S. government requires telephone companies to provide millions of private phone records, detailing the duration of individual calls, the location of the call, and the phone numbers of both parties. All this information is collected for analysis, and then key monitoring targets are selected.A U.S. senator confirmed that the NSA's phone records database is at least seven years old.
The annual cost of the project is US$2000 million.In 2012, as part of the President's daily briefing, the program data was cited a whopping 1477 times, showing how often it is used.The U.S. government argues that preventing terrorism takes precedence over protecting the right to privacy.Obama said: "You can't have 100% privacy and 100% convenience while having 100% security." The ally Britain also stood up and said: "British law-abiding citizens will never know that government departments are trying to stop you. have their identities stolen or thwart terrorist attacks.”
It sounds like they are very wronged, but user data has been leaked, and more than 99% of the people in it have nothing to do with terrorism.These global data are not only stored in the user's own country, but are even sent back to the United States for analysis by the National Security Agency. For example, Facebook stated in its privacy policy that all users must agree to their data being "transferred and stored in the United States." ".The "Patriot Act" gave the US government the power to use this data.Since the world's major technology companies are all headquartered in the United States, as long as they are connected to the Internet or use networking equipment provided by American companies such as Google and Cisco, people's privacy may be violated by the Prism project, and it will be transferred and stored in the relevant information of the US government. database.
Snowden said his exposure was motivated by privacy concerns.In this regard, he said frankly: "I don't want to live in a society that does those things. I don't want to live in a world where every word and deed is recorded." When he resolutely took the first step to expose the action, we suddenly It turns out that data collection technology has developed to such a horrifying level.
☆Reality--changes caused by technical reserves
"Prism" is a very high-end big data weapon at the technical level, and it is the result of the big data revolution, which of course requires strong technical reserves to achieve.The United States collects big data through powerful data channels and rich data sources.The exposed information shows that there are multiple projects in the United States related to the collection of Prism data, such as the "Blarney Project" that collects data from Internet backbone hubs, the "Upstream Project" that collects data from optical fiber networks, and so on.The success of these plans is due to the fact that the United States has the most backbone telecommunications network in the world.
First, the technical advantage of bandwidth.
Because the network infrastructure construction of the United States is ahead of the world, the bandwidth between North America and Europe, Asia-Pacific, and Latin America far exceeds other intercontinental bandwidth.Compared with sending data directly from the Asia-Pacific region to Europe, it will be faster and cheaper to transit through the United States. Therefore, the United States has become a passing station for data transmission, which provides the most basic conditions for it to monitor data.
(End of this chapter)
When educating people about big data, I often wonder what would happen if we changed the definition of big data?Change an angle and think about it with a more macroscopic thinking, and you will be able to jump out and think from the perspective of your own needs.
We might as well think of it this way: "Big data is a subjective state, which describes the situation when a company's (individual) infrastructure (status quo) cannot meet its needs for data processing."
In a sense, this judgment is "grey" and may not be as bright and beautiful as people imagine.There is no need for big data without demand.But it is closer to the truth: not everyone has to adapt to the era of big data, when you see it coming, the first thing you need to do is to determine whether you really need it, and then take appropriate action .
The big data revolution behind Prism Gate
☆Five issues that need attention
After the outbreak of the Prism Gate incident, people suddenly realized overnight from Snowden’s continuous exposure of information collection shady scenes that data management risks are ubiquitous. Whether it’s personal information or corporate information, in the era of big data, it has become a reality. It has become a "prey" that is easy to be collected, stolen, analyzed and controlled.This is because for most countries, big data has become a decisive force in the competition situation, and the security risks of data have also become more prominent.
● Powerful institutions can easily use technology to collect all our information.
●Today, data is more valuable than in any era, and it can determine the success or failure of competition.
●Data security has become an imminent challenge for every country, enterprise and individual.
Our country and enterprises have collected and stored all the data, we have upgraded related technologies, and laid the foundation for the vigorous development of the big data industry.
Next, what should the Chinese do to truly and safely develop the big data industry?How should we protect personal, corporate and national data from all directions?And most importantly, how can we use this data legally and healthily?
From the perspective of enterprise and personal information security, there are five issues in big data that require our attention.
cyber security
With the rise of online transactions, online conversations, online interactions, and more and more data online, hackers are more motivated than ever to commit crimes.Nowadays, in addition to individual hackers, there are also national hackers, such as the US National Security Agency.They are more organized, more professional, more powerful tools for committing crimes, and more methods of committing crimes emerge in endlessly.Compared with the one-time data leakage or hacking incidents in the past, once the data is leaked now, it is tantamount to a major blow to the entire enterprise, individual and the country, and it will lose everything if it is not careful. Not only will it lead to reputation damage and huge economic losses, but serious legal liabilities (such as security breaches in financial institutions) will also be borne.Therefore, in the era of big data, the resilience and prevention strategies of the network can be said to be crucial.
Cloud data
Cloud technology is a technological product of the new era. There is still a lot of pressure when people quickly adopt and implement cloud services, because we still have no way to predict and control the risks and consequences they may bring.More importantly, cloud data is a target for hackers, which is an attractive target for obtaining high-value information.Therefore, this puts forward extremely high requirements for enterprises to formulate security policies related to cloud computing.
mobile
This era is becoming "mobile", people's demand for data is increasing, and data collection, storage, access, transmission and other work need to use mobile devices, so the advent of the era of big data has also led to a surge in mobile devices.For example, more and more employees use their own mobile devices for office work. They come to the company with their mobile devices when they go to work, and copy the data to leave after get off work.We cannot deny that this is very convenient, beneficial to work, and has helped companies save a lot of expenses, but it has also brought greater security risks to companies.You must know that mobile devices are an excellent springboard for hackers to invade the internal network. For example, Israel attacked the Iranian nuclear power plant by connecting a small mobile hard disk to the industrial computer of the nuclear power plant, thereby releasing a virus to carry out a fatal attack.Mobility brings difficulties to enterprise management and security protection.
Delicate and tight supply chain
In today's era of globalization, every enterprise is complex and interdependent, and is part of the global supply chain, but the supply chain itself is precisely the weakest link.Information closely links the supply chain, from simple data to business secrets to intellectual property rights, and the leakage of information in a certain link may cause huge losses to enterprises in the entire supply chain, and may even violate the law and be subject to justice. sanctions.For globalization, information security is so important, it plays the role of blood in the entire supply chain - just imagine if our blood enters the virus, what will happen?
Privacy security
With the increasing amount of data generated, stored, and analyzed, privacy issues will become more prominent in the next few years.So new data protection requirements and the improvement of legislative bodies and regulators should be put on the agenda.
Based on these problems, it is not surprising that the Prism incident occurred in the era of big data. It would be strange if the Americans did not do so.Actually, Americans are not the only ones doing this, aren't they?It's not just the heads of state that are being threatened, is it?In this intelligence scandal that shocked the world, some people saw the appearance of the "clown", but others have already seen that behind the Prism Gate incident is a revolution destined to have far-reaching influence, a global revolution related to big data. change.
In this transformation, aggregation and big data analysis are like a treasure trove of marketing intelligence. Whether it is a country, a company or an individual, we may suffer from it, and we are more likely to benefit from it in an excellent way.It is difficult to ignore the impact of big data on our thinking and technological innovation, such as marketing and management.
When this change comes, we should maintain agility and prepare for the opportunity before it arises, and seize the opportunity decisively when it comes, instead of waiting for the opportunity to miss and then trying to fix it.Of course, for many countries and companies, everything is still in its infancy, and there are not many external requirements to force it to improve data processing technology to ensure information security.However, the scale of data processed by enterprises every day is still growing. Big data analysis will not wait for you to approach it actively, but will actively approach you under the influence of globalization.It makes business decisions more and more rely on raw data, making the quality of information more and more important.
Likewise, there is data security that you cannot ignore.Sophisticated analysis can be applied to relevant information security, helping you strengthen the gate of your data warehouse, so as to prevent it from becoming a free treasure trove extracted by powerful institutions at will.We can popularize these solutions to the whole society, encourage Chinese enterprises and ordinary users to use big data analysis to prevent fraud and conduct network security detection, use social analysis technology of big data and multi-channel real-time monitoring of security issues.
In general, big data is of infinite value to China.From the Prism Gate incident, we have seen its huge risks and potential safety hazards, but we have also experienced a "revolutionary change" that is about to come.The world is fair. China has missed the era of great voyages, but God has given us a chance so that we will not miss the era of big data.
☆Full display--Big data background of Prism Gate
Edward Snowden is a former employee of the CIA. The PRISM program he disclosed is a top-secret electronic monitoring project implemented by the US National Security Agency (NSA) since the time of George W. Bush.According to this plan, U.S. intelligence agencies have been conducting data mining through Internet companies, analyzing personal contacts and actions from audio, video, pictures, emails, documents, and connection information.
There are 10 types of monitoring: email messages, instant messages, videos, photos, stored data, voice chats, file transfers, video conferencing, login times, details of social network profiles.It also includes two covert surveillance programs:
1. Call records of public telephone calls;
2. People's network activities.According to Snowden's disclosure, from Europe to Latin America, from traditional allies to partners, from the calls of heads of state to the minutes of daily meetings, including citizens' personal information, US intelligence agencies are all monitoring.The NSA has access to vast amounts of personal chat logs, stored data, voice communications, file transfers, and personal social network data.For example, the U.S. government requires telephone companies to provide millions of private phone records, detailing the duration of individual calls, the location of the call, and the phone numbers of both parties. All this information is collected for analysis, and then key monitoring targets are selected.A U.S. senator confirmed that the NSA's phone records database is at least seven years old.
The annual cost of the project is US$2000 million.In 2012, as part of the President's daily briefing, the program data was cited a whopping 1477 times, showing how often it is used.The U.S. government argues that preventing terrorism takes precedence over protecting the right to privacy.Obama said: "You can't have 100% privacy and 100% convenience while having 100% security." The ally Britain also stood up and said: "British law-abiding citizens will never know that government departments are trying to stop you. have their identities stolen or thwart terrorist attacks.”
It sounds like they are very wronged, but user data has been leaked, and more than 99% of the people in it have nothing to do with terrorism.These global data are not only stored in the user's own country, but are even sent back to the United States for analysis by the National Security Agency. For example, Facebook stated in its privacy policy that all users must agree to their data being "transferred and stored in the United States." ".The "Patriot Act" gave the US government the power to use this data.Since the world's major technology companies are all headquartered in the United States, as long as they are connected to the Internet or use networking equipment provided by American companies such as Google and Cisco, people's privacy may be violated by the Prism project, and it will be transferred and stored in the relevant information of the US government. database.
Snowden said his exposure was motivated by privacy concerns.In this regard, he said frankly: "I don't want to live in a society that does those things. I don't want to live in a world where every word and deed is recorded." When he resolutely took the first step to expose the action, we suddenly It turns out that data collection technology has developed to such a horrifying level.
☆Reality--changes caused by technical reserves
"Prism" is a very high-end big data weapon at the technical level, and it is the result of the big data revolution, which of course requires strong technical reserves to achieve.The United States collects big data through powerful data channels and rich data sources.The exposed information shows that there are multiple projects in the United States related to the collection of Prism data, such as the "Blarney Project" that collects data from Internet backbone hubs, the "Upstream Project" that collects data from optical fiber networks, and so on.The success of these plans is due to the fact that the United States has the most backbone telecommunications network in the world.
First, the technical advantage of bandwidth.
Because the network infrastructure construction of the United States is ahead of the world, the bandwidth between North America and Europe, Asia-Pacific, and Latin America far exceeds other intercontinental bandwidth.Compared with sending data directly from the Asia-Pacific region to Europe, it will be faster and cheaper to transit through the United States. Therefore, the United States has become a passing station for data transmission, which provides the most basic conditions for it to monitor data.
(End of this chapter)
You'll Also Like
-
Fairy tale: Little Red Riding Hood's wolf mentor
Chapter 209 7 hours ago -
Naruto: Uchiha is not the Raikage!
Chapter 139 7 hours ago -
Mount and Blade System: Start from Pioneer Lords
Chapter 319 8 hours ago -
Myth Card Supplier: Nezha the Third Prince
Chapter 551 9 hours ago -
Gensokyo Detective, but surrounded by Shura Field
Chapter 287 9 hours ago -
Refining Oneself Into A Corpse
Chapter 24 9 hours ago -
Mortal Mirror
Chapter 508 9 hours ago -
Online Game: I Am The God Of Wealth, What's Wrong With My Pet Having Hundreds Of Millions Of Po
Chapter 513 1 days ago -
Help! I changed the gender of the male protagonist in the yandere game
Chapter 91 1 days ago -
The Goddess Brings The Baby To The House, Awakening The Daddy System!
Chapter 368 1 days ago