There are many terms thrown around about data, such as big data, data privacy, data protection, data compliancy and data security.
Generating more and more data
The volume of data gathered is ever increasing, whether it’s in the commercial world or our personal world. As ways of generating data increases thorough social networking, photos get larger through greater megapixels, the number of internet connected devices we carry increase from zero to three or more, as media such as books, magazines and music become digital, we can readily see why there has been phenomenal growth in data generation.
With the many streams of data we generate and have access to, the challenges of collecting, manipulating, aggregating this data become all too apparent, and these are the challenges of big data.
Keeping it private
With all this data, there should be concerns with who sees it. Ensuring the necessary controls are in place can be difficult, whether it’s who sees our photographs on a social media site, or when data leaves a controlled environment and into uncontrolled public cloud storage facilities.
Most people don’t want their personal information made public. This may be home addresses, email addresses, telephone numbers, passport numbers, etc. This is the sort of information most people would like to keep private.
Keeping data where only the right people, can see the right information, but ensuring the privacy of that data is maintained, are the challenges of data privacy and data protection.
There must be laws in place to protect information. There are a number of legislations to protect us, along with industry bodies policing certain industry verticals. If these legislations or compliance bodies are ignored or contravened, then fines or dismissal can be the penalty.
Using the legal system or industry bodies to monitor and police the data, could be considered data compliancy.
There are many technical solutions that can help protect the data, whether it’s by encryption, password protection, two factor authentication access, VLANs, data segmentation, database security solutions, data leakage prevention solutions, etc.
These solutions are just that. It is more important to understand the challenges and issues, before jumping in with a technical solution.
Working in Information Security, many people will refer to the CIA triad. This is where Confidentiality, Integrity and Availability are considered the cornerstones and core principles of Information Security.
The considerations will all data, are:
Confidentiality – Define and enforce the appropriate access controls to the data
Integrity – Ensure the data has not been manipulated from when it was captured
Availability – Ensure the data is accessible when it is required
Emergency Data Laws in the UK
Currently in the UK, emergency data laws are being rushed in. The reasons for needing to capture this data is important for national security. The concerns are speed with which legislation has been passed, as with many IT projects, when they are rushed, they either go over budget, or elements are overlooked.
There is vast amount of data that will need to be collected, aggregated, stored and interrogated. There will also be a need to protect the various databases holding this data, and the need to encrypt this data, so if it were to leave this environment, it would be unusable.
This data will need to be made available, so there will be a need to keep this data in multiple locations, but also ensuring the data that has been captured has not been manipulated maintain the data integrity.
The biggest concern should be confidentially. There have been many reports of lost data, inappropriate access to data, but the rise in the reports of hacking leading to the exfiltration of data from government sources.
Data is important in our lives, but let’s ensure that our data is protected correctly, whether it's held by a social networking site or by the government.