Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Big Data Flows vs. Wicked Leaks
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Big Data Flows vs. Wicked Leaks
Security

Big Data Flows vs. Wicked Leaks

JeffJonas
JeffJonas
4 Min Read
SHARE

I was invited to deliver a short keynote about “big data” at today’s OECD roundtable focused on the economics of personal data and privacy.  My presentation here.

Most big data flows by design.  But when big data leaks the consequences can be wicked. 

I was invited to deliver a short keynote about “big data” at today’s OECD roundtable focused on the economics of personal data and privacy.  My presentation here.

Most big data flows by design.  But when big data leaks the consequences can be wicked. 

That said … protecting big data from wicked leaks is not going to be easy.  Defending against external cyber penetrations and insider threats are both hard problems.

Now with the Wikileaks disclosures it is clear the game has changed.  Historically, public disclosure of classified data has been limited and infrequent – let’s even say, to a degree, tolerable.  Contrast that with the scope of the recently leaked cables.  The volume of the leakage so significant and intolerable; I will not be surprised if a number of governments around the world attempt to enact new, wide-sweeping, anti-leak legislation directed at not only those engaged in the initial theft of the data, but the distribution points (e.g., Wikileaks) and the publishers (e.g., the media)?  The principle being if one knowingly receives and benefits from stolen property, they are accomplices.  This pendulum could swing so far (backwards) the future will have far fewer media leaks than the historical (tolerable) volumes – i.e., this whole fiasco resulting in less transparency and accountability.

BTW: I suppose it could have been worse.  What if the 250,000 classified cables where selectively and quietly passed around to various foreign intelligence services?  What if the US thought these were secrets?  Imagine believing one has a certain security posture … when one does not.  Would that be worse? 

Organizations with big data worth protecting must employ extraordinary controls to reduce the risk of unintended disclosure.  On that note, I closed with a few ideas related to protecting big data from wicked leaks, including:

Central indexes.  There are actually a number of scenarios where a single, central catalog of pointers is better than lots of copies of the same data scattered all over the place – the advantage being fewer copies of the data and uniform access controls and audit logs.

Anonymization.  Despite the imperfections of data anonymization, when it comes to reducing the risk of unintended disclosure, most would agree that data anonymization is still better than clear text.

Immutable audit logs.  Tamper resistant audit logs can be used to help prove the users of the system are complying with law and policy.

Real-time active audits.  It is now going to be essential that user activity be more rigorously analyzed, in real-time, for inappropriate behavior.  Audit logs have actually been part of the problem – just another big pile of data – evidence of misuse hiding in plain sight against the backdrop of millions and millions of benign audit records.

TAGGED:wikileaks
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

street address database
Why Data-Driven Companies Rely on Accurate Street Address Databases
Big Data Exclusive
predictive analytics risk management
How Predictive Analytics Is Redefining Risk Management Across Industries
Analytics Exclusive Predictive Analytics
data analytics and gold trading
Data Analytics and the New Era of Gold Trading
Analytics Big Data Exclusive
student learning AI
Advanced Degrees Still Matter in an AI-Driven Job Market
Artificial Intelligence Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

What does Wikileaks mean for open data initiatives?

0 Min Read

Grab your Popcorn…Things are about to get really weird

2 Min Read

What if WikiLeaks Hacked Your Company?

8 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?