{"id":2166,"date":"2014-06-30T15:29:41","date_gmt":"2014-06-30T15:29:41","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2166"},"modified":"2020-02-26T10:52:31","modified_gmt":"2020-02-26T15:52:31","slug":"big-abuse-and-reservations","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/big-abuse-and-reservations\/2166\/","title":{"rendered":"Big Abuse and reservations"},"content":{"rendered":"<p><em>This is a final post of our Big Data Week, launched exactly a week ago. Previous posts of the series are listed below:<\/em><\/p>\n<ol>\n<li><a href=\"https:\/\/business.kaspersky.com\/whats-so-big-about-big-data\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>What\u2019s So Big About Big Data<\/em><\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-deal-when-machines-know-better\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Big Deal: When Machines Know Better<\/em><\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-data-vs-big-fraud\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Big Data vs. Big Fraud<\/em><\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-security-the-larger-canvas\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Big Security: The Larger Canvas<\/em><\/a><\/li>\n<li><em><a href=\"https:\/\/business.kaspersky.com\/in-the-age-of-big-data-risks-are-big-too\/\" target=\"_blank\" rel=\"noopener nofollow\">In The Age Of Big Data Risks Are Big Too<\/a><\/em><\/li>\n<\/ol>\n<p>The last thing we\u2019ll talk about here is, well, security <em>from<\/em> Big Data. There is an increasing number of publications where authors cover questionable ways of using Big Data. Most of them are related to violation of privacy, of course, which is a hot topic more than ever these days. But it\u2019s not about privacy alone.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p>As shown <a href=\"https:\/\/business.kaspersky.com\/big-deal-when-machines-know-better\/\" target=\"_blank\" rel=\"noopener nofollow\">in the first post<\/a>, Big Data analytics results may indeed be potentially (ab)used for malicious purposes while attacking a business; amounts of the potential loss of data may lead to a disaster as well. Besides, top-notch cybercriminals are reading the same books as the white-hat security experts, and if they find a way to avoid security systems relying on Big Data, for instance, they will do it. The question here, actually, is rather not \u201cif\u201d but \u201cwhen\u201d: <em>how soon is now<\/em>.<\/p>\n<p>While privacy is the foremost concern for most of the critics, Jamal Khawaja of Dataconomy <a href=\"http:\/\/dataconomy.com\/big-datas-potential-abuse\/\" target=\"_blank\" rel=\"noopener nofollow\">points out<\/a> that essentially Big Data \u201c<em>\u2026is an endless sea of information that can be used for the forces of good or the forces of evil.<\/em>\u201d\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Sauron\u2019s One Ring or a Swiss Army Knife? #BigData<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fd9S5&amp;text=Sauron%26%238217%3Bs+One+Ring+or+a+Swiss+Army+Knife%3F+%23BigData\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In essence it is all about people and how they use Big Data analytics, for what purposes \u2013 and how they protect the information they get from it. There is no reason to see Big Data as a panacea for anything. It\u2019s a tool. A new and a large-scale multitool, usable for a lot of things, but, regardless, it\u2019s rather a Swiss Army knife (which, by the way, requires at least some maintenance, especially in harsh conditions), and never a Sauron\u2019s One Ring.<\/p>\n<p>Going back to the beginning, \u201cPerson of Interest\u201d series\u2019 main character Harold Finch has intentionally put brick-wall limits on what information his Machine would yield to the interested parties: no matter how much data is crunched it puts out only a Social Security Number of a person with an <em>anomaly<\/em> associated. Then it is down (or up) to humans to figure out, who is this \u201cperson of interest\u201d \u2013 a victim, a perpetrator or an individual \u201crelevant to the national security\u201d (i.e. a potential terrorist or an act of terror\u2019s victim). Finch believed that only humans may decide the other human\u2019s fate, no matter what kind of data Machine provided on him or her, and in what amounts.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Even really Big, data are mere data; it\u2019s up to humans on how it\u2019s used.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fd9S5&amp;text=Even+really+Big%2C+data+are+mere+data%3B+it%26%238217%3Bs+up+to+humans+on+how+it%26%238217%3Bs+used.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It\u2019s quite symbolical that the premise of the series\u2019 primary antagonist is directly the opposite.<\/p>\n<p>P.S. Tell us what you think! We\u2019re truly eager to hear your opinions on this matter.<\/p>\n<p><a href=\"https:\/\/business.kaspersky.com\/in-the-age-of-big-data-risks-are-big-too\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>&lt;&lt; Previous Post<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wrapping up our Big Data Week, in this post we talk about potential of abuse of Big Data, which is arguably extreme.<\/p>\n","protected":false},"author":209,"featured_media":15780,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1042,279,189,961],"class_list":{"0":"post-2166","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-big-data","10":"tag-cyber-security","11":"tag-data-security","12":"tag-leaks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/big-abuse-and-reservations\/2166\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/big-abuse-and-reservations\/2166\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/big-abuse-and-reservations\/2166\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/big-data\/","name":"big data"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2166"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2166\/revisions"}],"predecessor-version":[{"id":33209,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2166\/revisions\/33209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15780"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}