11
1 De mogelijke keerzijde van Big Data… Big Data Expo (Jaarbeurs Utrecht) 21 st of September 2016 Jort Kollerie Enterprise Security Specialist @JortAtDell Evolution

Dell jort kollerie

Embed Size (px)

Citation preview

1

De mogelijke keerzijdevan Big Data…Big Data Expo (Jaarbeurs Utrecht)

21st of September 2016

Jort Kollerie

Enterprise Security Specialist

@JortAtDell

Evolution

2

3

The rise of connectivity…

Source: ITU (May 2015, http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2015.pdf

0110

00

11100

111100

111010

011010010001000110001100010

3

5So

cia

l Me

dia

Inte

rne

t

IoT

Big

Dat

aContent Drivers

6

• Bluetooth Personal Area Network

• 3/4G/WiFi Wide Area Network

• GPS

• Storage

• Sync/Push notifications

• Pulse, temp monitor

• Silent alarms

• Pedometer, sleep monitoring

• Compass

• Camera

• Mic/earphones

• Heads up display

• Emotion/Attention monitor

The Instrumented Human

4

• Bluetooth Personal Area Network

• 3G/WiFi Wide Area Network

• GPS

• Storage

• Pulse, temp monitor

• Silent alarms

• Pedometer, sleep monitoring

• Compass

• Camera

• Mike/earphones

• Heads up display

• Emotion/Attention monitor

The Instrumented World

Every minute of every day…

This year, the digital universe will equal 1.7Mb a minute for every person on earth- IDC (April 2014)

Volume of data storedZettabytes- IDC (April 2014)

5

With all due respect…

Aren’t we stupid?• Followers• Too optimistic• Easily tricked into believing technologies• The ease people give up their privacy without knowing the consequences

6

11

Paying with your Privacy

• “Free” doesn’t exist on the internet

• “Private” doesn’t exist on the internet

• Google & Facebook know more about you than your family will ever know

• Acquired Instagram for $1 billion (2012)

• Acquired WhatsApp for $19 billion (2014)

• Investment in datacenter p/y: $2 billion

(Big) Data breaches

7

13

World's Biggest Data Breaches(Selected losses greater than 30,000 records)

Source: Information is beautiful (September 2016),

http://www.informationisbeautiful.net/visualizations/worlds-biggest-

data-breaches-hacks/

14source: http://www.hackmageddon.com/2016/09/19/august-2016-cyber-attacks-statistics/

Motivation behind attacks…

8

15

The fappening (2014)

16

The Impact Team

9

17

Jason Spaltro (2007): "I will not invest $10 million to avoid a possible $1 million loss.“

“It’s a valid business decision to accept the risk”

Source: http://www.cio.com/article/2904364/security0/why-you-should-be-spending-more-on-security.html

Sony will pay employees $8 million in hacking settlement (2015)

Source:http://uk.businessinsider.com/ap-sony-settles-hacking-lawsuit-to-pay-up-to-8-million-2015-10

The impact of a hack!

Incorrect Data

Risk Profiling

Discriminate

Temporary Patterns

Control State

Privacy Concerns

Ageing (Quality vs. Quantity)

Identity Fraud

Big Data threats…

10

19

Interests

Identity profiling leads to fraud…Employer Country Last Name Home Town

Political Skills Relationship Phone Email

Friends Preferences Credit Card Details Birth Place First Name

Lifestyle Gender Activities Photos Birth Date

Bank Account Nr. Interests Check-InsSocial Security

NumberBlood Type

Marital Status Fingerprint Member Health Status History

Education Password Experience Criminal Record Behaviour

20

2016 Underground Hacker Marketplace Report

source: https://www.secureworks.com/resources/rp-2016-underground-hacker-marketplace-report

11

21

Big Data?Security & Privacy are business enablers!

Thank you!Jort Kollerie

Enterprise Security Specialist

@JortAtDell