Wan Ping: Business Intelligence Analyst, Risk Measurement and Modeling R&D Specialist
In the era of big data, it has become very difficult for ordinary customers to alleviate the worries about the so-called privacy security and information security on their own. The author has been committed to enterprise data analysis and data application, especially from the perspective of enterprise data use to talk about the thinking of data security.
One, professional analysis of data, the use of the right data
In the process of big data utilization, enterprises should be clear about the data attributes and data use. For companies do not often use but involves customer privacy information to be strictly confidential, such as name, ID number, cell phone, e-mail, work unit, home address, license plate number and other basic information, these customers for the absolute uniqueness of the customer's most critical private information, but essentially does not have any analytical function for the enterprise to study the consumer habits, social networks, market preferences, product development, service operations and so on its significance. In terms of research and development, service operation, etc., its significance is not direct, but from the point of view of customer information security, which is the most important, need to be strictly encrypted, and general common information is stored in isolation to ensure security.
Two, do not arbitrarily abuse the uniqueness of the customer's information
Enterprises strive to obtain and analyze the customer's consumption habits, trading behavior, social networks, product preferences and other data to improve their operational services, product offerings, pricing strategy is not understandable, which is the performance of the enterprise's competitiveness in the marketplace, but living in the age of the Internet has been a variety of marketing text messages, Fraudulent calls have been trapped for a long time. The emergence of this predicament, whether it is the enterprise's own or stolen by lawless elements, are at will, the abuse of customers' private information, is the customer's person, property, security, an unethical trampling behavior.
Third, the era of big data, the law should emphasize the protection of the weak
Despite the era of big data on the security protection of personal information with a variety of advanced technology, but it is far from enough. For example, there are reports that depositors encountered in the bank account of missing funds, ATM machine to withdraw counterfeit money, credit card theft, mastered audio, video, transaction records and other big data of the bank, but asked the customer to prove, which undoubtedly let the customer is reduced to the weak, while the law has no provisions, which is clearly unscientific. At the same time, for intentional fraudulent financial institutions, debts and runaway scoundrels, the public security organs to fully unite the various industries big data to maintain justice.
Big data, is the inevitable product of the progress of the times, but the accompanying information security is an important aspect of the test of corporate ethics and the soundness of the social legal system. Therefore, we must, on the one hand, with the help of big data to improve the product quality and service quality of enterprises; on the other hand, we must also effectively protect the information security of customers.
In the era of big data, customer privacy will become less and less
Shi Yun: Executive Director of CC-CMM Standards Organization, Director of Research and Development
A few days ago, there was a story circulating on the Internet: a customer called to order a pizza, and customer service agents reported his home address and all his phone numbers based on his membership card number, and then reported his home address and all his phone numbers based on his "Big data" is not just about the size of the data, but also about the power of data capture, integration and analysis. Undeniably, big data in the life for us to bring convenience at the same time also for the enterprise to bring immeasurable business value, especially the arrival of the mobile Internet, so that everyone no matter when and where can be connected to the Internet with different terminal entrances, all the data are captured by the enterprise in a variety of forms, integration and analysis. As a result, enterprises know every move we make, and based on your interests and your location information, they can send you advertisements and promotions anytime, anywhere. In this era, data security, especially the issue of personal privacy, is increasingly troubling more and more people around us. There is no doubt that the more data a customer has, the more information can be analyzed and obtained, but the privacy of the customer in it becomes less and less. How to protect customer data and privacy in the era of big data is a problem we have to face.
Enterprise big data and big data security primer
CHENG Xueyong: General Manager of Huayuan Zhide (Beijing) Technology Co., Ltd, Senior Consultant of Enterprise Performance Management
Big data is not a new concept, and any enterprise continues to create and own big data from the moment of its birth. The primary task of data security in the big data environment is still the prevention of illegal access to data and intrusion, but due to the characteristics of big data, its security architecture is also different from the traditional enterprise information system security. For big data security, enterprises will face more and more difficult challenges, for example, it is difficult for enterprises to trace the cause of file loss, and it is difficult to confirm whether an unstructured file (such as Word, Excel file) containing sensitive data information has been passed on to someone who should not have it.
Even so, the emergence of big data technologies has brought opportunities for big data security. The current big data technology is able to target structured and unstructured data collection, data collection, categorization, and real-time monitoring and analysis in accordance with predetermined rules, which greatly improves the enterprise's technical means of illegal access to big data and intrusion detection. Driven by this background, the future of data security monitoring object will not only information systems accounts, permissions, data security, in the enterprise exists in a variety of carriers under the form of data will become the object of security management, such as e-mail, the content of the tender quotation and so on.
In this structure, in addition to big data technology, with the help of business intelligence information security visualization also for the enterprise information security prevention help. The establishment of a unified data security view of the enterprise, so that in accordance with the security characteristics, security objects, business objects under the classification of multi-dimensional security screening clues, evidence of the display of more easy for administrators to understand the security issues occurring nodes, causes and possible security risk trends, in order to formulate a more complete security strategy.
Enterprise and Personal Privacy Protection in the Era of Big Data
Huang Chengming: Data-based Management Consultant and Trainer
From 2014 onwards, everyone really feels the advent of the era of big data, and everyone can name a few cases of big data, for example, big data helped Barack Obama's reelection success, and Microsoft's big data successfully predicted the 21 Oscars, Big Data measured the hit TV series "House of Cards", Baidu predicted the 2014 college entrance exam essay and so on.
But the side effect of big data is that there is no place to hide one's privacy. We generate all kinds of data every day, which can basically be captured by machines, programs, and so on. Web browsing records can be tracked by machines, consumption records of buying things can be utilized by merchants, and walking on the street can be tracked by the ubiquitous Wi-Fi ......
So how can individuals protect their privacy in the era of big data?
1, improve personal security awareness, do not easily upload their personal information to the network or leave it to merchants. Now merchants do a membership card hate you to fill in all the family information, for example, not long ago I just did a fitness card, the application for registration even asked to fill in the ID card number, which of course I refused. Important personal information includes cell phone number, microblogging number, QQ number, ID card number, bank card number, social security number and so on.
2, develop the habit of removing useless information at any time, such as deleting the history of their own Internet access at regular intervals, recording their own important information in the document (including call records, bank card statements, etc.) and then threw the shredded and threw it into a different garbage basket, and so on.
3. Don't download unfamiliar software, don't add unfamiliar accounts such as WeChat, don't scan QR codes, and be cautious about using social networks.
For enterprises, the protection of business secrets is also a top priority:
1, the need to establish a set of enterprise information confidentiality system, for example, will be important information hierarchical management, training and supervision of employees to seriously implement. Possibly, the enterprise can establish a privacy officer position.
2, the enterprise must deploy network security equipment, first, to prevent being attacked from the outside, and second, can also track the flow of corporate information.
Read the original article
Useful?
|
Share
Customer data management system, the value of the good hot, on Taobao, rest assured that the purchase!
Customer data management system, buy things on Taobao, a huge amount of must-buy good things! The best price, no worry about the return, easy shopping! The most important thing to remember is that you can't afford to lose your money on a branded product. The most important thing to remember is that you should be able to get a good deal on the products you want to buy, and you should be able to get a good deal on the products that you want to buy.
Taobao hot ads
2022Entry Baidu Love Sourcing - Let Your Order Get Soft
Worth a look at the customer information related to the information recommended
The B2B platform - Baidu Love Sourcing, designed to help users directly to the commodity information and high-quality merchants at the same time for the seller to provide a wealth of matching RFQ information to help sellers to quickly match the buyer, expand the Effective transaction volume