Current location - Loan Platform Complete Network - Big data management - Research on Big Data Security Problems and Response Ideas
Research on Big Data Security Problems and Response Ideas

Research on Big Data Security Issues and Response Ideas

With the rapid development of the Internet, the Internet of Things, cloud computing and other technologies, the amount of global data has seen explosive growth. At the same time, cloud computing provides a storage and computing platform for these massive and diverse data, and data mining technologies such as distributed computing make the ability to analyze the laws of big data and study trends greatly enhanced. At the same time that big data continues to penetrate into various industries and profoundly affect the country's politics, economy, people's livelihood and national defense, its security issues will also bring great potential threats to personal privacy, social stability and national security, and how to cope with the huge challenges.

I. Key Issues in Big Data Security

With the deepening of the digitization process, big data has gradually penetrated into various traditional industries such as finance, automotive, manufacturing, healthcare, etc., and even to every corner of the social life, and the impact of big data security issues is also increasing.

(I) Massive loss of national data resources. The cross-border flow of massive data on the Internet has exacerbated the massive loss of big data as a national strategic resource, and all kinds of massive data from around the world are being continuously aggregated to the United States, with no sign of transformation visible in the short term. With the wide application of big data in the future, a large number of data resources in the government and utility sectors involving national security will also be further opened up, but at present, due to the relevant supporting laws and regulations and regulatory mechanisms are not yet sound, it is very likely to result in the loss of key national data resources.

(ii) Serious threats to user privacy and security in the big data environment. With the continuous development of big data mining and analyzing technology, personal privacy protection and data security have become very urgent. First, people's control over personal information in the big data environment has significantly decreased, resulting in personal data being able to be collected and analyzed extensively and in detail. Second, big data is applied to attack methods, hackers can maximize the collection of more useful information to prepare for launching an attack, and big data analysis allows hackers to be more precise in their attacks. Third, with the development of big data technology, more information can be used for personal identification, the scope of personal identification information is difficult to define, and the scope of data for privacy protection becomes vague. Fourth, the previous personal information protection system based on the principles of "clear purpose, prior consent, and restriction of use" has become increasingly difficult to operate in the big data scenario.

(3) National security threats based on big data mining technology are becoming increasingly serious. In the era of big data, the U.S. intelligence agencies have seized the first opportunity, the United States through the NSA listening agencies around the world, such as ground satellite stations, domestic listening stations, overseas listening stations and other collection of a variety of information, the collection of massive amounts of data for rapid pre-processing, decryption and restoration, analysis and comparison, deep mining, and to generate relevant intelligence for decision-making by the upper echelons. at the end of June 2013, the U.S. Central Intelligence Agency, former employee of the CIA, Snowden, broke the news that the U.S. Intelligence agencies through the Cisco routers on the Chinese mainland mobile operators, China's education and scientific research computer network and other backbone network implementation of long-term monitoring for four years, in order to obtain the network of massive SMS data and traffic data.

(4) Inadequate infrastructure security protection capability triggers uncontrolled data assets. First, the lack of independent control of the key products of the basic communications network has become a big data security gap. China's operating enterprise network, foreign vendors equipment of the current network stock is very large, foreign products exist native backdoor and other hidden dangers, once remotely utilized, a large amount of data and information there is a security risk of being stolen. Secondly, China's big data security system is not sound, defense means capacity building is in its infancy, has not yet established a monitoring and analysis mechanism for foreign network data and traffic, prism eavesdropping and other deep, complex, highly covert security threats are difficult to effectively defend, discover and dispose of.

Two, foreign big data security-related initiatives and China's response to the idea

At present, countries around the world are promoting the application of big data through the introduction of a national strategy to promote data convergence and openness, and increase financial investment. In contrast, the security initiatives of various countries in relation to big data security have just begun, mainly focusing on strengthening the protection of private data through legislation. Germany amended and put into effect the Federal Data Protection Act in 2009, which covers the Internet and other electronic communication fields and aims at preventing privacy violations caused by the leakage of personal information; India approved the national data **** enjoyment and openness policy in 2012, and at the same time, it drew up a list of non-*** enjoyment of data in order to protect data and information related to national security, citizens' privacy, trade secrets and intellectual property rights; the United States in May 2014, the United States has adopted the National Data Security Act to protect data and information related to national security, privacy of citizens, trade secrets and intellectual property rights. data information; the U.S. released a white paper "Big Data: Seizing Opportunities, Guarding Values" in May 2014, stating that while big data plays a positive value, it should be alert to the negative impact of big data applications on privacy, fairness and other long-term values, and suggesting to advance the Consumer Privacy Act, pass the National Data Breach Legislation, and revise the Electronic Communications Privacy Act.

China, while laying out, encouraging and promoting the development and application of big data, should also plan ahead and actively respond to the security challenges posed by big data, and deal with the security of big data in terms of strategy formulation, laws and regulations, and infrastructure protection.

(1) Raise the protection of big data resources to a national strategy and establish a hierarchical security management mechanism. First, the data resources are regarded as national strategic resources, and the protection of big data resources is incorporated into the framework of the national cyberspace security strategy, so as to build an information security system under the big data environment, improve the emergency response capability and security prevention capability, and enhance the service capability and operational efficiency. Secondly, through the strategic layout at the national level, the overall planning and near- and long-term focus of the protection of big data resources are clarified. Third, the domestic big data resources according to the implementation of hierarchical classification security protection ideas, to ensure data security, reliable, and actively carry out big data security risk assessment work, in order to strengthen security prevention for different levels of big data characteristics. Fifthly, we will formulate as soon as possible the security norms and standards for key aspects of big data collection, storage, backup, migration, processing and release at different levels, and improve the corresponding regulatory measures.

(2) Improve laws and regulations, and increase the supervision of personal information protection. First, actively promote the legislation of personal information protection laws, explore technical standards, industry self-regulation and other means to solve the problem of personal information protection before the introduction of the law. Accelerate the introduction of the Network Security Law, and make a clear legal definition of the protection of user information in the telecommunications and Internet industries in the Network Security Law, so as to provide a legal basis for the relevant work to be carried out. Secondly, the administrative supervision of personal privacy protection should be strengthened, and at the same time, the crackdown on the infringement of personal privacy should be intensified, the measurement mechanism of personal privacy protection should be established, and the self-discipline and supervision of the big data industry should be promoted.

(3) Strengthening the protection of national information infrastructure, and enhancing the ability to safeguard and prevent big data security. First, promote technological research and innovation, and through increased financial support, incentivize the government and state-owned enterprises and institutions related to national security and stability to adopt safe and controllable products, and improve the safety and controllability of key equipment in China's infrastructure. Secondly, we will strengthen the construction of big data information security system, design and configure corresponding security products for the process of collecting, processing, analyzing and mining big data, and form a unified and controllable security system, and promote the establishment of a national and enterprise-level network personal information protection situation awareness, monitoring and early-warning, and evaluation and certification platform. Third, make full use of big data technology to cope with network attacks, through big data processing technology to achieve the identification and analysis of abnormal network behavior, intelligence-driven security model based on big data analysis, to turn passive after-the-fact analysis into proactive pre-defense; based on the tracking of network attacks, to achieve the traceability of network attack behavior.

The above is what I shared with you about the study of big data security issues and response ideas, more information can be concerned about the Global Green Ivy to share more dry goods