"14220" . "RIV/00216224:14220/14:00076670!RIV15-MSM-14220___" . "RIV/00216224:14220/14:00076670" . . . . "2" . "Cyber Security of Tomorrow & Personal Data of Yesterday"@en . "This paper aims to present new strategies of maintaining security that are powered by the (big) data. In its first part, the paper introduces the general idea of the big data analysis being used to empower security while stating obvious lack of progress in the data protection legislation. In its second part, the paper presents standard perimeter-based security and cyber security and, based on the available literature, states that it disproportionately enhances risks for computer systems. In its third part, the paper provides an overview of the intelligence-driven security, which is largely understood by the industry as the only way to maintain security facing advanced persistent threats. The last part briefly discusses possible outcome of functional separation, which protects the privacy, but renders big data for the purpose of security almost useless."@en . . . "Cyber Security of Tomorrow & Personal Data of Yesterday" . "11"^^ . "9493" . "CZ - \u010Cesk\u00E1 republika" . "Hara\u0161ta, Jakub" . "[D8C31712883B]" . . "Masaryk University Journal of Law and Technology" . . "S" . "Cyber Security of Tomorrow & Personal Data of Yesterday"@en . . "Cyber Security of Tomorrow & Personal Data of Yesterday" . . "This paper aims to present new strategies of maintaining security that are powered by the (big) data. In its first part, the paper introduces the general idea of the big data analysis being used to empower security while stating obvious lack of progress in the data protection legislation. In its second part, the paper presents standard perimeter-based security and cyber security and, based on the available literature, states that it disproportionately enhances risks for computer systems. In its third part, the paper provides an overview of the intelligence-driven security, which is largely understood by the industry as the only way to maintain security facing advanced persistent threats. The last part briefly discusses possible outcome of functional separation, which protects the privacy, but renders big data for the purpose of security almost useless." . . "8" . . "1802-5951" . . "1"^^ . . . . "1"^^ . "cyber security; personal data; big data; intelligence-driven security"@en .