{"id":14972,"date":"2014-06-27T14:00:12","date_gmt":"2014-06-27T14:00:12","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2153"},"modified":"2020-02-26T10:52:21","modified_gmt":"2020-02-26T15:52:21","slug":"in-the-age-of-big-data-risks-are-big-too","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/in-the-age-of-big-data-risks-are-big-too\/14972\/","title":{"rendered":"In the age of Big Data risks are big too"},"content":{"rendered":"<p><em>Our Big Data Week, a series of posts dedicated to usage and security of larger amounts of data, continues<\/em><\/p>\n<p><em>Published so far:<\/em><\/p>\n<ul>\n<li><a href=\"https:\/\/business.kaspersky.com\/whats-so-big-about-big-data\/\" target=\"_blank\" rel=\"noopener nofollow\">What\u2019s so big about Big Data<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-deal-when-machines-know-better\/\" target=\"_blank\" rel=\"noopener nofollow\">Big Deal: when Machines know better<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-data-vs-big-fraud\/\" target=\"_blank\" rel=\"noopener nofollow\">Big Data vs. Big Fraud<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-security-the-larger-canvas\/\" target=\"_blank\" rel=\"noopener nofollow\">Big Security: the larger canvas<\/a><\/li>\n<\/ul>\n<p><em>And it will be <a href=\"https:\/\/business.kaspersky.com\/big-abuse-and-reservations\/2166\/\" target=\"_blank\" rel=\"noopener nofollow\">continued<\/a>.<\/em><\/p>\n<p>Everyone remembers a big hoopsie of Sony PlayStation Network in 2011, but it\u2019s long <a href=\"http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/\" target=\"_blank\" rel=\"noopener nofollow\">overshadowed by leaks from eBay and Adobe<\/a> with, respectively, 152 and 145 million user records leaking away. It even dwarved Target\u2019s tragic losses.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p>In the age of Big Data losses are big, too. Especially when they are not prevented in a timely manner.<\/p>\n<p>Actually, these millions of records aren\u2019t that big when expressed in \u201cabsolute figures\u201d \u2013 i.e. in bytes: troves of personal and\/or payment data make up, perhaps, several hundred megabytes or a few gigabytes. We\u2019ve probably yet to see the petabyte-scale leaks in the near (or not so near) future: for now it\u2019s clearly a problem of Web bandwidth capacity.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>In the age of Big Data losses can be really big too.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FfK3L&amp;text=In+the+age+of+Big+Data+losses+can+be+really+big+too.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>However, it\u2019s quite logical to assume that potential perpetrators are more interested in the already filtered information \u2013 results of the analysis, and not the raw data, that requires computation power to deal with. So, the question of securing Big Data is closely related to security of cloud (which is already a less exotic matter than it was a few years ago).<\/p>\n<p>Two years ago, for instance, Cloud Security Alliance released a white paper entitled <a href=\"http:\/\/www.isaca.org\/Groups\/Professional-English\/big-data\/GroupDocuments\/Big_Data_Top_Ten_v1.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Top Ten Bg Data Security and Privacy Challenges<\/a>. They are:<\/p>\n<p>1. Secure computations in distributed programming frameworks<\/p>\n<p>2. Security best practices for non-relational data stores<\/p>\n<p>3. Secure data storage and transactions logs<\/p>\n<p>4. End-point input validation\/filtering<\/p>\n<p>5. Real-time security\/compliance monitoring<\/p>\n<p>6. Scalable and composable privacy-preserving data mining and analytics<\/p>\n<p>7. Cryptographically enforced access control and secure communication<\/p>\n<p>8. Granular access control<\/p>\n<p>9. Granular audits<\/p>\n<p>10. Data provenance<\/p>\n<p>Familiar topics, most of them, aren\u2019t they?\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Cyber resilience and preparedness strategies are crucial for big data. \u2013 S. Durbin<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FfK3L&amp;text=Cyber+resilience+and+preparedness+strategies+are+crucial+for+big+data.+%E2%80%93+S.+Durbin\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Mentioned above, Steve Durbin quotes <a href=\"https:\/\/www.securityforum.org\/\" target=\"_blank\" rel=\"noopener nofollow\">Information Security Forum\u2019s<\/a> (ISF\u2019s) January 2012 report, \u201cCyber Security Strategies: Achieving Cyber Resilience,\u201d stating that \u201c<em>today\u2019s cyber criminals are better organized, more professional and have access to powerful tools and capabilities, which they use to identify, target and attack. When things go wrong, they can go wrong big time for an organization. It\u2019s not the one-off data breaches or hacker attacks stories that hit the headlines, but those with far-reaching consequences that can mean reputational damage, legal liability and even financial ruin. Cyber resilience and preparedness strategies are crucial for big data.<\/em>\u201d<\/p>\n<p><em>To be continued.<\/em><\/p>\n<p style=\"text-align: center\"><strong>Big Data Week<\/strong><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/business.kaspersky.com\/big-security-the-larger-canvas\/\" target=\"_blank\" rel=\"noopener nofollow\">&lt;&lt; Previous Post<\/a>\u00a0| <a href=\"https:\/\/business.kaspersky.com\/big-abuse-and-reservations\/2166\/\" target=\"_blank\" rel=\"noopener nofollow\">Final Post &gt;&gt;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.<\/p>\n","protected":false},"author":209,"featured_media":15869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1042,279,961],"class_list":{"0":"post-14972","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-big-data","10":"tag-cyber-security","11":"tag-leaks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/in-the-age-of-big-data-risks-are-big-too\/14972\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/in-the-age-of-big-data-risks-are-big-too\/14972\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/in-the-age-of-big-data-risks-are-big-too\/14972\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/big-data\/","name":"big data"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14972"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14972\/revisions"}],"predecessor-version":[{"id":33203,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14972\/revisions\/33203"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15869"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}