Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented at the 2014 Gravitec Store Location Conference by James Puffer.

Similar presentations


Presentation on theme: "Presented at the 2014 Gravitec Store Location Conference by James Puffer."— Presentation transcript:

1

2 Presented at the 2014 Gravitec Store Location Conference by James Puffer

3 Last December Target was hacked for 40 million records In January Target reports another hack for 70 million records Total hack: 110 million records! Was this done by a global cybercrime group? … or by one employee making a bad choice?

4 Presented at the 2014 Gravitec Store Location Conference by James Puffer Edward Snowden He worked for the CIA and then NSA and leaked thousands of classified documents to media outlets. The documents showed details of a global surveillance program, especially the mass collection of phone data. Robert Gates: “He’s a traitor that should face the music.” SXSW Festival: “He’s a whistleblower and a hero.” You think we’re divided on this issue?

5 Presented at the 2014 Gravitec Store Location Conference by James Puffer

6 These Two Incidents Raise Questions About: ► What data are being collected? ► How are the data being collected ? ► How are the data being used ? ► How secure (private) are the data ? How can we deal with all of this information responsibly?

7 Presented at the 2014 Gravitec Store Location Conference by James Puffer Objectives: Better understand the complex issues of big data security and privacy Make better personal decisions about personal data Implement better corporate policies regarding collection, use and safeguard of customer data Overall goal: Produce better, pro-active solutions

8 Presented at the 2014 Gravitec Store Location Conference by James Puffer Why is This Important to Us? Because all of us are tangled up in big data at every level: We are collecting data Our data are being collected We are using BIG DATA in one way or another Our privacy and confidentiality are at risk Each of us has a LOT to gain … or lose!

9 Presented at the 2014 Gravitec Store Location Conference by James Puffer The Current Situation: More Data! How much is too much? What data should NOT be collected? What techniques of collection step over the “line”? What kinds of analysis are out of bounds? Security is not improving as fast as hacking. We are allowing technology to drive our boundaries!

10 Presented at the 2014 Gravitec Store Location Conference by James Puffer Are We Headed Towards “Impossible Privacy”? Case: Who Has Your Social Security Number? Social Security Administration Your bank IRS Your retirement accounts Your insurance companies Your credit card companies Your mortgage company Law enforcement? Your health care providers Your spouse, kids? ? ? ? Your employer

11 Presented at the 2014 Gravitec Store Location Conference by James Puffer Are We Headed Towards “Impossible Privacy”? Another Case: Google Google has every single you ever sent using Gmail. They have it stored, indexed, and they have built models of your behavior. Yahoo and Facebook have been doing similar things. How secure do you feel?

12 Presented at the 2014 Gravitec Store Location Conference by James Puffer Are We Headed Towards “Impossible Privacy”? “Pretty Sure?” Really?

13 Presented at the 2014 Gravitec Store Location Conference by James Puffer Why is This Important to Us Professionally? Professional information is being collected about you, much more than you think, probably more than you would approve. What are the corporate risks? Your company’s data collection and security will affect customer perception. Company data collections are hackable: Store designs Prospective sites Sales history Consumer/loyalty data Forecasting models and casing data Employee data

14 Presented at the 2014 Gravitec Store Location Conference by James Puffer Understanding Data Context Data fields have privacy context Data fields have utility context Data analysis has context The IRS can collect my SSN, but not a grocer. My photo has great value for my passport, but not for Amazon. Use my purchase history to generate relevant coupons, but not for determining price.

15 Presented at the 2014 Gravitec Store Location Conference by James Puffer Understanding Data Context 1. Data fields have privacy context Collecting with permission: customer addresses, phones, purchases, IRS data, medical info (at health provider), banking, schools. Collecting with “sort of” permission: Internet visits (cookies), credit history, security cameras, satellite imagery, unreadable EULAs. Collecting without permission: NSA’s PRISM program, viruses, worms, key logging, store casings, drones, smart phones, tablets, hacking, purchases of data from other sources.

16 Presented at the 2014 Gravitec Store Location Conference by James Puffer Understanding Data Context 2. Data fields have utility context Wide Utility: customer addresses, phones, addresses, purchases, EULAs, demographics. Medium Utility: Internet visits (cookies), credit card info, security cameras, satellite imagery, store casings, credit history, SSN. Narrow Utility: NSA’s PRISM program, key logging, drones, medical information.

17 Presented at the 2014 Gravitec Store Location Conference by James Puffer Understanding Data Context 3. Data analysis has context

18 Presented at the 2014 Gravitec Store Location Conference by James Puffer The Data Rubik Cube Privacy Utility Analysis

19 Presented at the 2014 Gravitec Store Location Conference by James Puffer Big Data and Security Topics ● The Best Security ● Biometrics ● Hacking ● The “Cloud” ● Wireless Data & Encryption ● Social Networks

20 Presented at the 2014 Gravitec Store Location Conference by James Puffer Big Data and Security Topics The Best Security Starts with a really good plan Incorporates multiple tiers Utilizes best technology like firewalls, encryption, etc. Emphasizes well-trained employees Multiple recovery plans, rehearsed Well-defined accountability Still, there are random influences: No security is perfect Lavabit had a special secure with 2,500 character encryption. NSA sued to get the key, and they won. Instead of turning over the key, Lavabit folded.

21 Presented at the 2014 Gravitec Store Location Conference by James Puffer Big Data and Security Topics Biometrics Legal status of gathering and using biometrics is unclear. Police started using biometrics in 2011 to recognize offenders. DNA databases and recognition are far more common. FBI is building next generation database with fingerprints, iris scans, palm prints, voice data and facial recognition. NYC “Domain Awareness System” has 3,000 cameras that can recognize and track people and cars. Who owns your biometric data? It’s easy to replace a stolen credit card, but how about fingerprints or DNA?

22 Presented at the 2014 Gravitec Store Location Conference by James Puffer Big Data and Security Topics Hacking A Brief History: In the “early days” hacking was a hobby that could get a little cash or mail-order item. Hacking moved to larger scale, getting lots of info and selling it. Hackers then built great software for sale. Now hackers can make a great living hacking for government covert ops. e.g. Snowden’s TAO Remember when hackers were criminals?

23 Presented at the 2014 Gravitec Store Location Conference by James Puffer Big Data and Security Topics Hacking Hacking is not a hobby: it is a profession with specialties and a very good income. Nearly every home computer has been hacked. Hacking technology is never very far behind security, and it always catches up quickly. Many governments are very active hackers: The STUXNET virus disrupted Iran’s enrichment program. The Chinese government has a hacker building.

24 Presented at the 2014 Gravitec Store Location Conference by James Puffer The “Cloud” Definition: Expandable storage on network servers. No cloud: Storage is duplicated on every device.

25 Presented at the 2014 Gravitec Store Location Conference by James Puffer The “Cloud” Definition: Expandable storage on network servers. Using the cloud: One copy serves every device. This kind of storage encourages you to buy more devices from the same manufacturer. “The cloud” or “the leash”?

26 Presented at the 2014 Gravitec Store Location Conference by James Puffer The “Cloud” Many companies offer free cloud storage: up to 10 Gb. You could buy a 1Tb drive for less than $100. That makes 100 “gifts” of storage for $1 each. If all your pictures, music, data, books are in the cloud, you could use up your wireless data limit quickly. Apple and Microsoft are really pushing cloud storage, beginning to limit non-cloud choices. Apple devices will now only sync contacts wirelessly Microsoft requires CloudDrive account to get apps.

27 Presented at the 2014 Gravitec Store Location Conference by James Puffer The “Cloud”: The Risks Internet security breaches happen often. If the server goes down, your devices can’t access data. (Both Amazon and Gmail have gone dark). Lack of access if you have no Internet access. Syncing and redundancy bugs are common. If a hacker gets your password, you may be locked out of all your devices. Your security is only as good as the weakest link in the chain.

28 Presented at the 2014 Gravitec Store Location Conference by James Puffer Wireless Data and Encryption Includes: cell phones, tablets, laptops, desktops, car systems, security cameras, printers, headphones, speakers, mice and keyboards, GPS, gaming systems, pet training, musical instruments, RFID devices, walkie- talkies, marine radios, fans, air conditioners, heaters, lights, door locks, smoke alarms, garage door openers, … Scrappy remote control garbage disposal.

29 Presented at the 2014 Gravitec Store Location Conference by James Puffer Wireless Data and Encryption Most wireless data is secure (encrypted), but data are almost never encrypted entirely from start to end-point. That makes data susceptible to “man-in-the-middle”. If computer on either end is compromised, then encryption keys can be stolen, as well as data. Some magnetic things can be sensed from a distance. Some companies have helped NSA get past their own encryption technology..

30 Presented at the 2014 Gravitec Store Location Conference by James Puffer Wireless Data and Encryption Snoopy Drone: Can move around and pinch data from your smart phone or tablet without you even being aware of what’s happening. Which is scarier? The fact that we have the technology to do this? The fact that the manufacturer shows it openly and has demonstrated its abilities to the media?

31 Presented at the 2014 Gravitec Store Location Conference by James Puffer Social Networks The NSA is able to access most using “back door” technique. (Or How to be Stupid With a Lot of Company) Digital wiretapping is easy and allows access to every keystroke. Most photos from phones are now geo-tagged. Just assume that everyone has (or will have) access to everything you do on a social site. Also assume that anything you give anyone will eventually be uploaded to a social site for everyone’s access.

32 Presented at the 2014 Gravitec Store Location Conference by James Puffer The Future: Option-1 We allow technology to continue without data boundaries, never completely aware of what data are collected, how they are collected, or how they are used. We allow consumer reactions to provide controls. There are lots of companies that remove consumer reactions!

33 Presented at the 2014 Gravitec Store Location Conference by James Puffer The Future: Option-2 We get more alert and aggressive with our understanding and react quickly to create boundaries. This is absolutely necessary, but not enough. This would be entirely reactive, not proactive. Consumers rarely have the complete picture. Example: The new iPhone has a million permission switches for your phone apps. That looks good for Apple, but do you really know what the phone is doing?

34 Presented at the 2014 Gravitec Store Location Conference by James Puffer The Future: Option-3 We begin to anticipate the direction of data collection and use, and we create the boundaries before technology arrives at those points. Can we make laws that require data reporting, perhaps including data licensing and annual reports, similar to the SEC? Can we make laws that limit the type of data collected based on its eventual purpose? Both of the above ideas would rely on very heavy consequences for violations, including government agencies. We need to carefully define data ownership at the source, and “data theft.”

35 Presented at the 2014 Gravitec Store Location Conference by James Puffer The Perfectly-secure Computer


Download ppt "Presented at the 2014 Gravitec Store Location Conference by James Puffer."

Similar presentations


Ads by Google