The main objective of this small article is to give my point of view on internet privacy and stolen information.
PERSONAL DATA AND INFORMATION
This is not new for a computer professional that conversations and information can be stolen on many ways which may be using technical flaws, the insecurity of the internet protocols, networks resources, and others.
The revelation of Edward Snowden of people being monitored by the CIA and NSA, brought up to the internet users, the alert of being aware of what is shared on the internet. Edward Snowden considered one of the most extraordinary delators of the History. Never before someone revealed such quantity of secret files of the more powerful intelligence institution of the world, in order to make it public. And that is what he did (Harding, 2014).
WAYS TO STORE DATA
Today, there are many ways of storing such big quantity of information about users and make it to use with business intelligence, data mining and many others techniques. The list below shows some of them:
Hadoop: “It is an open-source software framework for storing data and running applications on clusters of commodity hardware. It provides massive storage for any kind of data, enormous processing power and the ability to handle virtually limitless concurrent tasks or jobs” (SAS, 2016).
NoSQL Databases: A new way of storing data in a document oriented, key/value or graphs models. This new database paradigm brings the possibility of storing high quantity of data and information using a horizontal approach in instead of verticalization, which is very common in relational databases (Sadalage, 2012).
WHO CAN AND HOW INFORMATION CAN BE ACCESSED
The confidentiality of stored user information and who can access it is very sensible. There are thousands of robots running on the internet today and getting many information from websites. You may one day received an unknown contact request on skype or facebook, I personally believe this is one way of the robots to access your personal information and store in pirate databases, which may be used for privilege of others.
In spite of sensible data to be guaranteed by big corporations such as Facebook and Google, for instance, there is always the possibility of this data to be stolen and published or kept with hackers and bad intentioned people.
Today, we need to be careful with what kind of data we share on the internet, be very careful with sensible information and beware of unknown contacts and relationships on the internet. I recommend people to usually change credit card numbers and do not make it available personal account data on untrusted websites.
Harding, L., 2014. The Snowden Files. 1st ed. London: The Guardian Books.
What is Hadoop?. 2016. SAS. [ONLINE] Available at: http://www.sas.com/en_us/insights/big-data/hadoop.html. [Accessed 14 February 2016].
Sadalage, P. J., 2012. NoSQL Distilled. 1st ed. USA: Addison-Wesley.