SlideShare a Scribd company logo
1 of 11
Download to read offline
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Ramiro Cid | @ramirocid
Internet of Things, Big Data & Mobility
vs.
Data Privacy
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
2
Index
1. Concepts Page 3
2. The relationship between these 4 concepts Page 4
3. Internet of Things and Privacy Data Page 5
4. Big Data and Privacy Data Page 6
5. Mobility and Privacy Data Page 7
6. Conclusions Page 9
7. Sources used and webs to expand knowledge Page 10
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
3
Concepts
Before start talking about the relationship between these 4 concepts: Internet of Things, Big Data, Mobility
and Data Privacy it is necessary to do a short definition of them: (all definitions come from Wikipedia)
Internet of Things: Called simply “IoT” and sometimes “Internet of things and services” is the
interconnection of uniquely identifiable embedded computing devices within the existing Internet
infrastructure. The interconnection of these embedded devices, in the near future, is expected to usher
in automation in nearly ALL fields.
Big Data: Is a broad term for data sets so large or complex that traditional data processing applications
are inadequate. Include analysis, capture, data curation, search, sharing, storage, transfer, visualization,
and information privacy.
Mobility: Concept in relation with Mobile computing. Is a human–computer interaction by which a
computer is expected to be transported during normal usage. Mobile computing involves mobile
communication, mobile hardware, and mobile software.
Data Privacy: Data privacy, Information privacy or data protection, is the relationship between
collection and dissemination of data, technology, the public expectation of privacy, and the legal and
political issues surrounding them.
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
4
The relationship between these 4 concepts
In this presentation the focus is on the relationship between 4 concepts: Internet of Things, Big Data,
Mobility and Data Privacy
We can also think about these 4 concepts in these terms:
Nowadays, and even more in the future, Internet of Things, Big Data and Mobility will be present (they are
already now) in our personal and professional life. The more these concepts grow, the more risk we are
assuming about misuse of our privacy data, so more effort we will need to do to improve our privacy.
We can do a resume of the actual/future status like this:
Internet of Things and/or Big Data and/or Mobility Data Privacy
References:
= Increment = Reduction = Produce
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
5
Internet of Things and Privacy Data
Internet of Things definitely is a big relationship between physical World and virtual World.
In the future (already now) the extensive use of our data in this new “virtual World” causes a huge risk of
misuse of our private data.
There are some uses of Internet of Things:
Environmental Monitoring
Energy Management
Infrastructure Management
Industrial Applications
Building and Home Automation
Transport Systems
Large Scale Deployments
Medical and Healthcare Systems
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
6
Big Data and Privacy Data
Big Data is a broad term for data sets so large or complex that traditional data processing applications are
inadequate, including analysis and so many actions including information privacy.
In the future (already now) the use of our data in Big data analysis environments will causes a huge risk of
misuse of our private data (examples: sale database, hacking attacks which produce data leaks).
There are some actions done in Big Data:
Data Analysis
Capture of data
Data curation
Search of data
Data sharing
Data storage
Data transfer
Data visualization
Information privacy use
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
7
Mobility and Privacy Data
Mobility or Mobile computing have almost an infinite list of uses of our data doing data processing, data
sharing, data transfer, data publishing, etc. using Apps in our smart phones, tablets and other mobile
devices, wearables to manage all these data, including also critical privacy data in e-Health applications.
Apps installed in our mobile devices do too many actions including access to our privacy data. Protect our
privacy seems to be impossible without knowing the IT security controls all these Apps have applied (who
knows what all these Apps do with our data?).
Think for a moment about pacemakers and defibrillators connected to Internet and a huge number of
telemedicine devices, many of them with patient data.
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
8
Mobility and Privacy Data (continue)
Some big risks are:
1. Hacking data leak in our mobile devices
2. Sale database
3. Vulnerabilities into Apps code which create IT security threats
In the future (already now) an extensive use of our data in mobile computing environments will causes a
huge risk of misuse of our private data.
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
9
Conclusions
We can easily think that Internet of Things, Big Data and Mobility will give us a big number of problems
about our privacy, some of them with big impact (in virtual and real world).
It is clear that we are “opening” many doors (too many?) to give opportunities to do a misuse of our data and
maybe we can also think all it is not logical because it is an attitude with too much risk appetite.
In one hand maybe all this reasoning is right, but in the other hand, we can not stop this 4th Industrial
Revolution so we need to live with it and to do as much improvement as possible to protect our Data from
misuse, unauthorized access, etc.
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
“How Fast Is The Internet Growing?” - Author The Connectivist | URL: http://www.theconnectivist.com/2014/05/infographic-the-
growth-of-the-internet-of-things/
“Ever Feel like Somebody is Watching You? They Are!” – Author: Privacy Professor
URL: http://privacyguidance.com/blog/ever-feel-like-somebody-is-watching-you-they-are/
“What is Internet of Things (IoT)?” Author: Margaret Rouse | URL: http://whatis.techtarget.com/definition/Internet-of-Things
“Protection of personal data” | Author: European Commission | URL: http://ec.europa.eu/justice/data-protection/index_en.htm
“Little privacy in the age of big data” | Author: theguardian.com | URL: http://www.theguardian.com/technology/2014/jun/20/little-
privacy-in-the-age-of-big-data
“Internet of Things” - Autor: Wikipedia | URL: http://en.wikipedia.org/wiki/Internet_of_Things
“Big Data” - Autor: Wikipedia | URL: https://en.wikipedia.org/wiki/Big_data
“Mobility Computer” - Autor: Wikipedia | URL: https://en.wikipedia.org/wiki/Mobile_computing
“Data Privacy” - Autor: Wikipedia | URL: https://en.wikipedia.org/wiki/Information_privacy
Sources used and webs to expand knowledge
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Questions ?
Many thanks !
Ramiro Cid
CISM, CGEIT, ISO 27001 LA, ISO 22301 LA, ITIL
ramiro@ramirocid.com
@ramirocid
http://www.linkedin.com/in/ramirocid
http://ramirocid.com http://es.slideshare.net/ramirocid
http://www.youtube.com/user/cidramiro

More Related Content

What's hot

Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 
Social engineering
Social engineeringSocial engineering
Social engineeringBola Oduyale
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexAndreanne Clarke
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification courseNishaPaunikar1
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 

What's hot (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 

Similar to Internet of things, big data & mobility vs privacy

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Gerd Leonhard
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are EverywhereChristos Beretas
 
The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...Ramiro Cid
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Securityijceronline
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Big data introduction by quontra solutions
Big data introduction by quontra solutionsBig data introduction by quontra solutions
Big data introduction by quontra solutionsQUONTRASOLUTIONS
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van TolTalentEvent
 
Big Data Courses in Pune
Big Data Courses in PuneBig Data Courses in Pune
Big Data Courses in PuneClassboat.com
 
Internet of things
Internet of thingsInternet of things
Internet of thingsRamiro Cid
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 

Similar to Internet of things, big data & mobility vs privacy (20)

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Big Data Ethics
Big Data EthicsBig Data Ethics
Big Data Ethics
 
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are Everywhere
 
The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
9th
9th9th
9th
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Big data introduction by quontra solutions
Big data introduction by quontra solutionsBig data introduction by quontra solutions
Big data introduction by quontra solutions
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
 
Big Data Courses in Pune
Big Data Courses in PuneBig Data Courses in Pune
Big Data Courses in Pune
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 

More from Ramiro Cid

Seminario sobre ciberseguridad
Seminario sobre ciberseguridadSeminario sobre ciberseguridad
Seminario sobre ciberseguridadRamiro Cid
 
Captación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenCaptación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenRamiro Cid
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?Ramiro Cid
 
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Ramiro Cid
 
Lean Six Sigma methodology
Lean Six Sigma methodologyLean Six Sigma methodology
Lean Six Sigma methodologyRamiro Cid
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500Ramiro Cid
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationRamiro Cid
 
Drones and their use on critical infrastructure
Drones and their use on critical infrastructureDrones and their use on critical infrastructure
Drones and their use on critical infrastructureRamiro Cid
 
Space computing
Space computingSpace computing
Space computingRamiro Cid
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Risk optimization management inside it governance
Risk optimization management inside it governanceRisk optimization management inside it governance
Risk optimization management inside it governanceRamiro Cid
 
Summit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceSummit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceRamiro Cid
 
ISO 31000 Risk Management
ISO 31000 Risk ManagementISO 31000 Risk Management
ISO 31000 Risk ManagementRamiro Cid
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementRamiro Cid
 
Ley Orgánica de Protección de datos - LOPD
Ley Orgánica de Protección de datos - LOPDLey Orgánica de Protección de datos - LOPD
Ley Orgánica de Protección de datos - LOPDRamiro Cid
 
Gestión de servicios IT, fundamentos de ITIL
Gestión de servicios IT, fundamentos de ITILGestión de servicios IT, fundamentos de ITIL
Gestión de servicios IT, fundamentos de ITILRamiro Cid
 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013Ramiro Cid
 

More from Ramiro Cid (20)

Seminario sobre ciberseguridad
Seminario sobre ciberseguridadSeminario sobre ciberseguridad
Seminario sobre ciberseguridad
 
Captación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenCaptación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagen
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
 
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
 
Lean Six Sigma methodology
Lean Six Sigma methodologyLean Six Sigma methodology
Lean Six Sigma methodology
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Drones and their use on critical infrastructure
Drones and their use on critical infrastructureDrones and their use on critical infrastructure
Drones and their use on critical infrastructure
 
Space computing
Space computingSpace computing
Space computing
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Risk optimization management inside it governance
Risk optimization management inside it governanceRisk optimization management inside it governance
Risk optimization management inside it governance
 
Summit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceSummit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governance
 
ISO 31000 Risk Management
ISO 31000 Risk ManagementISO 31000 Risk Management
ISO 31000 Risk Management
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity Management
 
Ley Orgánica de Protección de datos - LOPD
Ley Orgánica de Protección de datos - LOPDLey Orgánica de Protección de datos - LOPD
Ley Orgánica de Protección de datos - LOPD
 
Gestión de servicios IT, fundamentos de ITIL
Gestión de servicios IT, fundamentos de ITILGestión de servicios IT, fundamentos de ITIL
Gestión de servicios IT, fundamentos de ITIL
 
ISO/IEC 27001:2013
ISO/IEC 27001:2013ISO/IEC 27001:2013
ISO/IEC 27001:2013
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Internet of things, big data & mobility vs privacy

  • 1. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Ramiro Cid | @ramirocid Internet of Things, Big Data & Mobility vs. Data Privacy
  • 2. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 2 Index 1. Concepts Page 3 2. The relationship between these 4 concepts Page 4 3. Internet of Things and Privacy Data Page 5 4. Big Data and Privacy Data Page 6 5. Mobility and Privacy Data Page 7 6. Conclusions Page 9 7. Sources used and webs to expand knowledge Page 10
  • 3. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 3 Concepts Before start talking about the relationship between these 4 concepts: Internet of Things, Big Data, Mobility and Data Privacy it is necessary to do a short definition of them: (all definitions come from Wikipedia) Internet of Things: Called simply “IoT” and sometimes “Internet of things and services” is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. The interconnection of these embedded devices, in the near future, is expected to usher in automation in nearly ALL fields. Big Data: Is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Include analysis, capture, data curation, search, sharing, storage, transfer, visualization, and information privacy. Mobility: Concept in relation with Mobile computing. Is a human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Data Privacy: Data privacy, Information privacy or data protection, is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
  • 4. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 4 The relationship between these 4 concepts In this presentation the focus is on the relationship between 4 concepts: Internet of Things, Big Data, Mobility and Data Privacy We can also think about these 4 concepts in these terms: Nowadays, and even more in the future, Internet of Things, Big Data and Mobility will be present (they are already now) in our personal and professional life. The more these concepts grow, the more risk we are assuming about misuse of our privacy data, so more effort we will need to do to improve our privacy. We can do a resume of the actual/future status like this: Internet of Things and/or Big Data and/or Mobility Data Privacy References: = Increment = Reduction = Produce
  • 5. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 5 Internet of Things and Privacy Data Internet of Things definitely is a big relationship between physical World and virtual World. In the future (already now) the extensive use of our data in this new “virtual World” causes a huge risk of misuse of our private data. There are some uses of Internet of Things: Environmental Monitoring Energy Management Infrastructure Management Industrial Applications Building and Home Automation Transport Systems Large Scale Deployments Medical and Healthcare Systems
  • 6. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 6 Big Data and Privacy Data Big Data is a broad term for data sets so large or complex that traditional data processing applications are inadequate, including analysis and so many actions including information privacy. In the future (already now) the use of our data in Big data analysis environments will causes a huge risk of misuse of our private data (examples: sale database, hacking attacks which produce data leaks). There are some actions done in Big Data: Data Analysis Capture of data Data curation Search of data Data sharing Data storage Data transfer Data visualization Information privacy use
  • 7. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 7 Mobility and Privacy Data Mobility or Mobile computing have almost an infinite list of uses of our data doing data processing, data sharing, data transfer, data publishing, etc. using Apps in our smart phones, tablets and other mobile devices, wearables to manage all these data, including also critical privacy data in e-Health applications. Apps installed in our mobile devices do too many actions including access to our privacy data. Protect our privacy seems to be impossible without knowing the IT security controls all these Apps have applied (who knows what all these Apps do with our data?). Think for a moment about pacemakers and defibrillators connected to Internet and a huge number of telemedicine devices, many of them with patient data.
  • 8. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 8 Mobility and Privacy Data (continue) Some big risks are: 1. Hacking data leak in our mobile devices 2. Sale database 3. Vulnerabilities into Apps code which create IT security threats In the future (already now) an extensive use of our data in mobile computing environments will causes a huge risk of misuse of our private data.
  • 9. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 9 Conclusions We can easily think that Internet of Things, Big Data and Mobility will give us a big number of problems about our privacy, some of them with big impact (in virtual and real world). It is clear that we are “opening” many doors (too many?) to give opportunities to do a misuse of our data and maybe we can also think all it is not logical because it is an attitude with too much risk appetite. In one hand maybe all this reasoning is right, but in the other hand, we can not stop this 4th Industrial Revolution so we need to live with it and to do as much improvement as possible to protect our Data from misuse, unauthorized access, etc.
  • 10. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid “How Fast Is The Internet Growing?” - Author The Connectivist | URL: http://www.theconnectivist.com/2014/05/infographic-the- growth-of-the-internet-of-things/ “Ever Feel like Somebody is Watching You? They Are!” – Author: Privacy Professor URL: http://privacyguidance.com/blog/ever-feel-like-somebody-is-watching-you-they-are/ “What is Internet of Things (IoT)?” Author: Margaret Rouse | URL: http://whatis.techtarget.com/definition/Internet-of-Things “Protection of personal data” | Author: European Commission | URL: http://ec.europa.eu/justice/data-protection/index_en.htm “Little privacy in the age of big data” | Author: theguardian.com | URL: http://www.theguardian.com/technology/2014/jun/20/little- privacy-in-the-age-of-big-data “Internet of Things” - Autor: Wikipedia | URL: http://en.wikipedia.org/wiki/Internet_of_Things “Big Data” - Autor: Wikipedia | URL: https://en.wikipedia.org/wiki/Big_data “Mobility Computer” - Autor: Wikipedia | URL: https://en.wikipedia.org/wiki/Mobile_computing “Data Privacy” - Autor: Wikipedia | URL: https://en.wikipedia.org/wiki/Information_privacy Sources used and webs to expand knowledge
  • 11. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Questions ? Many thanks ! Ramiro Cid CISM, CGEIT, ISO 27001 LA, ISO 22301 LA, ITIL ramiro@ramirocid.com @ramirocid http://www.linkedin.com/in/ramirocid http://ramirocid.com http://es.slideshare.net/ramirocid http://www.youtube.com/user/cidramiro