So much data, so little security -- what happens if your city gets hacked?
Microsoft's Craig Mundie offers security suggestions to MIT Emtech conference; other experts tout smart cities technology
Computerworld - CAMBRIDGE, MA -- Businesses and individuals had better brace themselves for new security realities as society moves away from traditional data sharing equations that have worked well for a couple of decades.
To date, users have agreed to give away certain discrete pieces of information -- such as a name or email addresses -- in exchange for something -- a product or a service, for instance.
That situation is no longer viable, Craig Mundie, senior advisor to Microsoft CEO Steve Ballmer, told attendees at the Emtech conference held at the Massachusetts Institute of Technology (MIT) here today.
Mundie said that today, significant amounts of data are collected, much of it without the user's knowledge, and is used in ways not always clear at the time of collection.
For instance, a mobile phone app may ask for permission to use your location data, but it isn't always apparent or disclosed how that data will be used downstream. Your answer to such a request may depend on whether the data will be posted to Facebook or used to guide you via GPS to a meeting. So a straight yes or no answer may not be enough, and you need to be able to control this, Mundie said.
"We're talking about the legal acquisition of data," Mundie said. "We need a usage-based way of controlling it, with a cryptographic wrapper and then policies and laws that govern usage."
He called for a new class of felony for people or organizations that subvert these policies. Without such a change, "the penalty is too low" and people will continue to subvert the laws.
Also, Mundie said, a cryptographic wrapper will be needed for each classification of personal data that is collected that states the rules about where and how it can be shared. Sometimes the individual will control access to the data. In other cases, society may mandate, for example, that some types of health, security or other types of remain available, even anonymized, for the greater good. "This is going to go both ways."
The wrappers would be akin to the digital rights management systems that now protect movie or music ownership, where people or companies hold keys that allow appropriate use of the information.
Such rules won't be static, he said.
"You need to be able to change your mind as an individual and as a society. You can't write the rules in advance, you have to wait until the app emerges and gets to scale, that you can figure out you don't like it," Mundie said.
On a corporate level, the stakes are rising as well, he said.
In the past 12 months there's been a shift away from what Mundie called "nuisance" attacks toward "we don't like you and we're going to take you down."
Companies need to decide what assets are of critical value, where their loss would be of such a nature that the company could go out of business. Mundie termed it "life or death. It's a survivability question of what happens if you lose certain things." Today's traditional IT security methods are no longer adequate, he said.
One Mundie suggestion: Partition the essential information "so it doesn't exist in any one place at the same time."
- Snowden leaks erode trust in Internet companies, government
- NSA phone metadata collection program renewed for 90 days
- NSA isn't evil, says noted civil libertarian
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts