dell jort kollerie
TRANSCRIPT
1
De mogelijke keerzijdevan Big Data…Big Data Expo (Jaarbeurs Utrecht)
21st of September 2016
Jort Kollerie
Enterprise Security Specialist
@JortAtDell
Evolution
2
3
The rise of connectivity…
Source: ITU (May 2015, http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2015.pdf
0110
00
11100
111100
111010
011010010001000110001100010
3
5So
cia
l Me
dia
Inte
rne
t
IoT
Big
Dat
aContent Drivers
6
• Bluetooth Personal Area Network
• 3/4G/WiFi Wide Area Network
• GPS
• Storage
• Sync/Push notifications
• Pulse, temp monitor
• Silent alarms
• Pedometer, sleep monitoring
• Compass
• Camera
• Mic/earphones
• Heads up display
• Emotion/Attention monitor
The Instrumented Human
4
• Bluetooth Personal Area Network
• 3G/WiFi Wide Area Network
• GPS
• Storage
• Pulse, temp monitor
• Silent alarms
• Pedometer, sleep monitoring
• Compass
• Camera
• Mike/earphones
• Heads up display
• Emotion/Attention monitor
The Instrumented World
Every minute of every day…
This year, the digital universe will equal 1.7Mb a minute for every person on earth- IDC (April 2014)
Volume of data storedZettabytes- IDC (April 2014)
5
With all due respect…
Aren’t we stupid?• Followers• Too optimistic• Easily tricked into believing technologies• The ease people give up their privacy without knowing the consequences
6
11
Paying with your Privacy
• “Free” doesn’t exist on the internet
• “Private” doesn’t exist on the internet
• Google & Facebook know more about you than your family will ever know
• Acquired Instagram for $1 billion (2012)
• Acquired WhatsApp for $19 billion (2014)
• Investment in datacenter p/y: $2 billion
(Big) Data breaches
7
13
World's Biggest Data Breaches(Selected losses greater than 30,000 records)
Source: Information is beautiful (September 2016),
http://www.informationisbeautiful.net/visualizations/worlds-biggest-
data-breaches-hacks/
14source: http://www.hackmageddon.com/2016/09/19/august-2016-cyber-attacks-statistics/
Motivation behind attacks…
9
17
Jason Spaltro (2007): "I will not invest $10 million to avoid a possible $1 million loss.“
“It’s a valid business decision to accept the risk”
Source: http://www.cio.com/article/2904364/security0/why-you-should-be-spending-more-on-security.html
Sony will pay employees $8 million in hacking settlement (2015)
Source:http://uk.businessinsider.com/ap-sony-settles-hacking-lawsuit-to-pay-up-to-8-million-2015-10
The impact of a hack!
Incorrect Data
Risk Profiling
Discriminate
Temporary Patterns
Control State
Privacy Concerns
Ageing (Quality vs. Quantity)
Identity Fraud
Big Data threats…
10
19
Interests
Identity profiling leads to fraud…Employer Country Last Name Home Town
Political Skills Relationship Phone Email
Friends Preferences Credit Card Details Birth Place First Name
Lifestyle Gender Activities Photos Birth Date
Bank Account Nr. Interests Check-InsSocial Security
NumberBlood Type
Marital Status Fingerprint Member Health Status History
Education Password Experience Criminal Record Behaviour
20
2016 Underground Hacker Marketplace Report
source: https://www.secureworks.com/resources/rp-2016-underground-hacker-marketplace-report