You are on page 1of 15

How to protect data privacy

in the era of big data?


Dr. Amirudin bin Abdul Wahab
CHIEF EXECUTIVE OFFICER, cybersecurity malaysia
SERI KEMBANGAN, SELANGOR,
MALAYSIA

Copyright © 2016 CyberSecurity Malaysia


PRESENTATION AGENDA

 An Overview to Big Data Analytics


 Data Privacy & Security
 Other Concerns
 Conclusion

Copyright © 2016 CyberSecurity Malaysia 2


Overview of Big Data

"The goal is to turn data into information, and


information into insight.”
– Carly Fiorina, former chief executive of Hewlett-Packard Company.

Copyright © 2016 CyberSecurity Malaysia 3


Big Data Analytic Techniques

“The ability to take data - to be able to understand it, to process it, to extract value from it, to
visualize it, to communicate it — that’s going to be a hugely important skill in the next
decades.”
- Hal R. Varian – Economist, UC Berkeley School of Information
Copyright © 2016 CyberSecurity Malaysia 4
Expected Values From Big Data Analytics

Copyright © 2016 CyberSecurity Malaysia 5


PRESENTATION AGENDA

 An Overview to Big Data Analytics


 Data Privacy & Security
 Other Concerns
 Conclusion

Copyright © 2016 CyberSecurity Malaysia 6


Data Privacy Principle

PRIVACY BY DESIGN
make privacy part of the
DNA of the organisation SECURE THE DATA
only keep the data really
required to do business
with, and keep it as secure
as possible

RADICAL TRANSPARENCY
inform customers about the data collect about them and what exactly it is used
for
SIMPLICITY BY DESIGN
keep it simple and understandable for consumers;

Copyright © 2016 CyberSecurity Malaysia 7


Big Data and Infrastructure Security

1 APPLICATION ACCESS
DATA
INSIGHT
DATA

Ensuring privacy of data is a matter of defining


VISUALIZATION
DASHBOAR
DC and enforcing information security rules – not

Language Processing
Statistical Analysis just rules about data collection, but about data

Machine Learning

Data Mining
use and retention. People should have the ability
to manage the flow of their private information
across massive, third-party analytical systems.

Large-Scale 2 DATA ACCESS


Data Storage &

3 DATA ENCRYPTION
Data
Management
Web Data
Extractor

BIG DATA INFRA Copyright © 2016 CyberSecurity Malaysia 8


Big Data and Personal Identifiable Identity

Privacy protections aren’t enough any more. Big data analytics can compromise
identity by allowing data-driven organisation to moderate and even determine who
we are before we make up our own minds. We need to begin to think about the kind
of big data predictions and inferences that we will allow, and the ones that we should
not. Copyright © 2016 CyberSecurity Malaysia 9
Big Data and Insights

“Open Source Intelligence (OSINT) is form of intelligence collection


management that involves finding, selecting and acquiring information from
publicly available sources and analyzing it to produce actionable
intelligence.”
Copyright © 2016 CyberSecurity Malaysia 10
PRESENTATION AGENDA

 An Overview to Big Data Analytics


 Data Privacy & Security
 Other Concerns
 Conclusion

Copyright © 2016 CyberSecurity Malaysia 11


Breached Data On the Internet

Copyright © 2016 CyberSecurity Malaysia 12


PRESENTATION AGENDA

 An Overview to Big Data Analytics


 Data Privacy & Security
 Other Concerns
 Conclusion

Copyright © 2016 CyberSecurity Malaysia 13


Conclusion

Copyright © 2016 CyberSecurity Malaysia 14


Copyright © 2016 CyberSecurity Malaysia 15

You might also like