{"id":783,"date":"2018-06-13T11:37:59","date_gmt":"2018-06-13T11:37:59","guid":{"rendered":"https:\/\/www.ibertech.org\/?p=783"},"modified":"2018-07-11T11:12:12","modified_gmt":"2018-07-11T11:12:12","slug":"big-data-y-seguridad-2","status":"publish","type":"post","link":"https:\/\/www.ibertech.org\/en\/big-data-y-seguridad-2\/","title":{"rendered":"Big Data and Security"},"content":{"rendered":"<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">Talking about IoT or Big Data involves talking about activities that generate data, such as being present on social Media, using cloud and mobile devices, banking data or professional data. Any type of device with Internet access or data on the network can be attacked, as there is no absolute security when talking about computers.<\/span><\/p>\n<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">In order to talk about Big Data we must manage the data, have access to them, make sense of them and have a BI software that does it in a safety way. Social media, cloud, IoT or Big Data imply a change of personal information that we had never seen before.<\/span><\/p>\n<p><b><u><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">Security as a pillar of a project<\/span><\/u><\/b><\/p>\n<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">To date, a security breach, causes a great lack of credibility in addition to mistrust.<\/span><\/p>\n<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">Ensuring data protection is critical to any project because these threats can happend at any time and in any environment.<\/span><\/p>\n<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">In addition, 90% of consumers have the feeling that they do not control their data. Therefore, to gain confidence, the solution goes through making transparent use of the data.<\/span><\/p>\n<p><b><u><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">Key Big Data Security Challenges<\/span><\/u><\/b><\/p>\n<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">There are many challenges to deal with in security matters, some of them are the followings:<\/span><\/p>\n<ul type=\"disc\">\n<li style=\"margin: 0px 0px 10.66px; color: #333333; line-height: 18pt; font-family: 'Georgia',serif; font-size: 12pt; font-style: normal; font-weight: normal;\"><span style=\"margin: 0px; font-family: 'Georgia',serif; font-size: 12pt;\">Anonymization: We have behavioral data, traffic data or camera recordings. Therefore, we must have control over the data. Protecting such personal information is indispensable.<\/span><\/li>\n<\/ul>\n<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">\u00a0<\/span><\/p>\n<ul type=\"disc\">\n<li style=\"margin: 0px 0px 10.66px; color: #333333; line-height: 18pt; font-family: 'Georgia',serif; font-size: 12pt; font-style: normal; font-weight: normal;\"><span style=\"margin: 0px; font-family: 'Georgia',serif; font-size: 12pt;\">Variety: The variety as we have commented is one of the Big Data\u00b4s feature. Having data coming from many different sources makes it necessary to add protection measures in each one of them.<\/span><\/li>\n<\/ul>\n<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">\u00a0<\/span><\/p>\n<ul type=\"disc\">\n<li style=\"margin: 0px 0px 10.66px; color: #333333; line-height: 18pt; font-family: 'Georgia',serif; font-size: 12pt; font-style: normal; font-weight: normal;\"><span style=\"margin: 0px; font-family: 'Georgia',serif; font-size: 12pt;\">Loss of data: More or less frequently we can read news related to both data theft or email accounts. The loss of data can lead to bankruptcy of the business or distrust of users in governments and organizations<\/span><\/li>\n<\/ul>\n<p><b><u>REFERENCES<\/u><\/b><\/p>\n<ul type=\"disc\">\n<li>\u00c1ngel Rayo., (2016), Principales retos de seguridad en proyectos Big Data. 21 de julio de 2016. http:\/\/www.netmind.es\/knowledge-center\/principales-retos-seguridad-big-data\/<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul type=\"disc\">\n<li>Instituto de Ingenier\u00eda del Conocimiento., (2016), Seguridad en Big Data, privacidad y protecci\u00f3n de datos. 12 de julio de 2016. http:\/\/www.iic.uam.es\/innovacion\/seguridad-big-data\/<\/li>\n<\/ul>\n<p><span style=\"margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Talking about IoT or Big Data involves talking about activities that generate data, such as being present on social Media, using cloud and mobile devices, banking data or professional data.<\/p>\n","protected":false},"author":1,"featured_media":787,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"wps_subtitle":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/posts\/783"}],"collection":[{"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/comments?post=783"}],"version-history":[{"count":10,"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/posts\/783\/revisions"}],"predecessor-version":[{"id":927,"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/posts\/783\/revisions\/927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/media\/787"}],"wp:attachment":[{"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/media?parent=783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/categories?post=783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ibertech.org\/en\/wp-json\/wp\/v2\/tags?post=783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}