{"id":5024,"date":"2014-02-10T17:51:28","date_gmt":"2014-02-10T16:51:28","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5024"},"modified":"2019-12-31T11:19:23","modified_gmt":"2019-12-31T10:19:23","slug":"prism-une-success-story-pour-le-big-data","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/02\/prism-une-success-story-pour-le-big-data\/","title":{"rendered":"PRISM, une success story pour le Big data!"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\">Depuis les r\u00e9v\u00e9lations d\u2019Edward Snowden, le <a title=\"SolucomINSIGHT - articles sur PRISM\" href=\"http:\/\/www.solucominsight.fr\/?s=PRISM\" target=\"_blank\" rel=\"noopener noreferrer\">programme PRISM<\/a> de surveillance \u00e9lectronique de la NSA est au centre de questions d\u00e9ontologiques et id\u00e9ologiques. Si nous mettons de c\u00f4t\u00e9 ces aspects, ce programme et l\u2019ensemble de ceux port\u00e9s par la NSA se r\u00e9v\u00e8lent \u00eatre une application plus que r\u00e9ussie du <a title=\"SolucomINSIGHT - dossier Big data\" href=\"http:\/\/www.solucominsight.fr\/category\/dossiers\/big-data-dossiers\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Big data<\/em><\/a>&#8230; Au-del\u00e0 des questions id\u00e9ologiques, PRISM illustre ainsi pleinement les opportunit\u00e9s offertes par cette nouvelle technologie pour la surveillance s\u00e9curit\u00e9.<\/p>\n<h2>\u00a0Les 3V<sup>1<\/sup>\u00a0du projet PRISM<\/h2>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.solucominsight.fr\/2014\/02\/prism-une-success-story-pour-le-big-data\/les-3v-du-projet-prism\/\" rel=\"attachment wp-att-5029\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-5029\" title=\"Les 3V du projet PRISM\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2014\/02\/Les-3V-du-projet-PRISM.png\" alt=\"\" width=\"289\" height=\"260\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Les-3V-du-projet-PRISM.png 688w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Les-3V-du-projet-PRISM-212x191.png 212w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Les-3V-du-projet-PRISM-43x39.png 43w\" sizes=\"auto, (max-width: 289px) 100vw, 289px\" \/><\/a><\/p>\n<p><strong>Vari\u00e9t\u00e9\u00a0:<\/strong> appels t\u00e9l\u00e9phoniques, VoIP, conversations vid\u00e9o, e-mails, transferts de donn\u00e9es, donn\u00e9es de navigation sont quelques exemples parmi tant d\u2019autres de donn\u00e9es de particulier collect\u00e9es par ces programmes. Souvent, seules les m\u00e9tadonn\u00e9es sont recueillies\u00a0: dans le cas d\u2019un appel t\u00e9l\u00e9phonique, PRISM se contentera ainsi de savoir qui a contact\u00e9 qui, de quel lieu, \u00e0 quel moment et pendant combien de temps\u2026 avant approfondissement si besoin.<\/p>\n<p><strong>Volume\u00a0:<\/strong> tous ces types de donn\u00e9es sont rassembl\u00e9s. De plus la NSA r\u00e9alise des captures de trafic sur les c\u00e2bles transatlantiques ou lors d\u2019attaques cibl\u00e9es. Au total IDC estime que ce sont 5 zettabytes (10<sup>12<\/sup> GB) de donn\u00e9es que le datacenter de la NSA sera capable de stocker en 2015, soit le double de la quantit\u00e9 totale de donn\u00e9es mondiales existantes en 2012.<\/p>\n<p><strong>V\u00e9locit\u00e9\u00a0:<\/strong> la NSA dispose des outils capables d\u2019analyser en temps-r\u00e9el ces donn\u00e9es collect\u00e9es, de r\u00e9aliser des requ\u00eates tr\u00e8s fines pour interroger ses serveurs et croiser ces informations. Il est ainsi possible d\u2019identifier en temps r\u00e9el \u00ab\u00a0qui a fait une requ\u00eate avec tels mots cl\u00e9s dans une langue \u00e9trang\u00e8re au lieu o\u00f9 il r\u00e9side\u00bb.<\/p>\n<h2>Quelles le\u00e7ons pour les projets Big data\u00a0?<\/h2>\n<p>Si les moyens et le budget consacr\u00e9s aux diff\u00e9rents programmes par la NSA (5,6 milliards d\u2019euros) ne sont aucunement comparables \u00e0 ceux mobilisables par les entreprises, celles-ci peuvent certainement en retenir les proportions\u00a0:<\/p>\n<ul>\n<li>45% du budget est consacr\u00e9 \u00e0 la collecte des donn\u00e9es<\/li>\n<li>30% aux traitements des donn\u00e9es (partie logicielle)<\/li>\n<li>25% \u00e0 l\u2019analyse des donn\u00e9es (partie humaine)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Par ailleurs, au-del\u00e0 des aspects budg\u00e9taires, se pose la question des comp\u00e9tences\u00a0: il est n\u00e9cessaire de pouvoir mobiliser des data scientists \u00e0 m\u00eame d\u2019identifier les donn\u00e9es pertinentes \u00e0 utiliser et de les faire parler. Et la NSA regorge depuis des ann\u00e9es des sp\u00e9cialistes sur ces questions.<\/p>\n<p>Enfin, ces programmes sont concentr\u00e9s sur un seul et unique champ de donn\u00e9es d\u00e9termin\u00e9, celles relatives aux individus et \u00e0 leurs communications quelle qu\u2019en soit la forme. Chercher \u00e0 \u00e9tendre l\u2019utilisation du <em>Big data<\/em> \u00e0 l\u2019ensemble des attributions d\u2019une entreprise semble \u00eatre un objectif tr\u00e8s ambitieux et se concentrer sur un seul champ de donn\u00e9es semble plus raisonnable, au moins dans un premier temps.<\/p>\n<h2>Le SIEM du futur\u00a0?<\/h2>\n<p>Face aux limites constat\u00e9es des <a title=\"SolucomINSIGHT - Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM \" href=\"http:\/\/www.solucominsight.fr\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">SIEM<\/a> actuels qui peinent \u00e0 corr\u00e9ler l\u2019ensemble des donn\u00e9es qui leur sont disponibles, les syst\u00e8mes <em>Big data<\/em> pourraient s\u2019av\u00e9rer \u00eatre une solution efficace permettant\u00a0alors :<\/p>\n<ul>\n<li>De corr\u00e9ler l\u2019ensemble des traces du syst\u00e8me d\u2019information\u00a0: logs applicatifs, DLP, historiques, \u2026<\/li>\n<li>D\u2019int\u00e9grer les informations venues de l\u2019ext\u00e9rieur\u00a0: <em>threat<\/em> intelligence, \u2026<\/li>\n<li>De d\u00e9tecter en temps r\u00e9el les signaux faibles encore trop souvent invisibles aujourd\u2019hui.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Le <em>Big data<\/em> pourrait s\u2019imposer comme un outil efficace face \u00e0 la complexification des syst\u00e8mes d\u2019information, \u00e0 l\u2019intensification de la <a title=\"SolucomINSIGHT - Dossier cybercriminalit\u00e9\" href=\"http:\/\/www.solucominsight.fr\/category\/dossiers\/cybercrime\/\" target=\"_blank\" rel=\"noopener noreferrer\">cybercriminalit\u00e9<\/a> et aux enjeux croissants de s\u00e9curit\u00e9. Mais attention tout ceci ne doit pas faire oublier que la NSA a oubli\u00e9 d\u2019appliquer tous ces principes en interne, en effet la fuite de donn\u00e9es majeures r\u00e9alis\u00e9e par Edward Snowden n\u2019a pas \u00e9t\u00e9 d\u00e9tect\u00e9\u2026<\/p>\n<p>Reste maintenant \u00e0 se confronter \u00e0 l\u2019ensemble des contraintes l\u00e9gales, \u00e9thiques et techniques inh\u00e9rentes au <em>Big data<\/em> qui, pour certaines d\u2019entre elles, n\u2019ont, semble-t-il pas constitu\u00e9 un point de pr\u00e9occupation pour la NSA \u2026<\/p>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div>\n<p><sup>1<\/sup> Une technologie est g\u00e9n\u00e9ralement cat\u00e9goris\u00e9e <em>Big data<\/em> si elle respecte la d\u00e9finition de Gartner des 3V : Volume car les quantit\u00e9s de donn\u00e9es \u00e0 traiter se comptent parfois en petabytes (10<sup>6<\/sup> GB) ou exabytes (10<sup>9<\/sup> GB), Vari\u00e9t\u00e9 car les donn\u00e9es proviennent de sources tr\u00e8s diff\u00e9rentes et peuvent \u00eatre structur\u00e9es ou non, et V\u00e9locit\u00e9 car la cr\u00e9ation de donn\u00e9es se fait \u00e0 tr\u00e8s haute fr\u00e9quence et que leur traitement doit suivre cette cadence.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Depuis les r\u00e9v\u00e9lations d\u2019Edward Snowden, le programme PRISM de surveillance \u00e9lectronique de la NSA est au centre de questions d\u00e9ontologiques et id\u00e9ologiques. Si nous mettons de c\u00f4t\u00e9 ces aspects, ce programme et l\u2019ensemble de ceux port\u00e9s par la NSA se&#8230;<\/p>\n","protected":false},"author":21,"featured_media":5026,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[3322],"coauthors":[807,1524],"class_list":["post-5024","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-big-data-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PRISM, une success story pour le big data!<\/title>\n<meta name=\"description\" content=\"Depuis les r\u00e9v\u00e9lations d\u2019Edward Snowden, le programme PRISM de surveillance \u00e9lectronique de la NSA est au centre de questions d\u00e9ontologiques et id\u00e9ologiques. Si nous mettons de c\u00f4t\u00e9 ces aspects, ce programme et l\u2019ensemble de ceux port\u00e9s par la NSA se r\u00e9v\u00e8lent \u00eatre une application plus que r\u00e9ussie du Big Data... Au-del\u00e0 des questions id\u00e9ologiques, PRISM illustre ainsi pleinement les opportunit\u00e9s offertes par cette nouvelle technologie pour la surveillance s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PRISM, une success story pour le big data!\" \/>\n<meta property=\"og:description\" content=\"Depuis les r\u00e9v\u00e9lations d\u2019Edward Snowden, le programme PRISM de surveillance \u00e9lectronique de la NSA est au centre de questions d\u00e9ontologiques et id\u00e9ologiques. Si nous mettons de c\u00f4t\u00e9 ces aspects, ce programme et l\u2019ensemble de ceux port\u00e9s par la NSA se r\u00e9v\u00e8lent \u00eatre une application plus que r\u00e9ussie du Big Data... Au-del\u00e0 des questions id\u00e9ologiques, PRISM illustre ainsi pleinement les opportunit\u00e9s offertes par cette nouvelle technologie pour la surveillance s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-10T16:51:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:19:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gabriel Amirault, Selim Boussetta\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gabriel Amirault, Selim Boussetta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/\"},\"author\":{\"name\":\"Gabriel Amirault\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca\"},\"headline\":\"PRISM, une success story pour le Big data!\",\"datePublished\":\"2014-02-10T16:51:28+00:00\",\"dateModified\":\"2019-12-31T10:19:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/\"},\"wordCount\":772,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"keywords\":[\"big data security\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/\",\"name\":\"PRISM, une success story pour le big data!\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"datePublished\":\"2014-02-10T16:51:28+00:00\",\"dateModified\":\"2019-12-31T10:19:23+00:00\",\"description\":\"Depuis les r\u00e9v\u00e9lations d\u2019Edward Snowden, le programme PRISM de surveillance \u00e9lectronique de la NSA est au centre de questions d\u00e9ontologiques et id\u00e9ologiques. Si nous mettons de c\u00f4t\u00e9 ces aspects, ce programme et l\u2019ensemble de ceux port\u00e9s par la NSA se r\u00e9v\u00e8lent \u00eatre une application plus que r\u00e9ussie du Big Data... Au-del\u00e0 des questions id\u00e9ologiques, PRISM illustre ainsi pleinement les opportunit\u00e9s offertes par cette nouvelle technologie pour la surveillance s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg\",\"width\":1800,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PRISM, une success story pour le Big data!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca\",\"name\":\"Gabriel Amirault\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gabriel-amirault\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PRISM, une success story pour le big data!","description":"Depuis les r\u00e9v\u00e9lations d\u2019Edward Snowden, le programme PRISM de surveillance \u00e9lectronique de la NSA est au centre de questions d\u00e9ontologiques et id\u00e9ologiques. Si nous mettons de c\u00f4t\u00e9 ces aspects, ce programme et l\u2019ensemble de ceux port\u00e9s par la NSA se r\u00e9v\u00e8lent \u00eatre une application plus que r\u00e9ussie du Big Data... Au-del\u00e0 des questions id\u00e9ologiques, PRISM illustre ainsi pleinement les opportunit\u00e9s offertes par cette nouvelle technologie pour la surveillance s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/","og_locale":"en_US","og_type":"article","og_title":"PRISM, une success story pour le big data!","og_description":"Depuis les r\u00e9v\u00e9lations d\u2019Edward Snowden, le programme PRISM de surveillance \u00e9lectronique de la NSA est au centre de questions d\u00e9ontologiques et id\u00e9ologiques. Si nous mettons de c\u00f4t\u00e9 ces aspects, ce programme et l\u2019ensemble de ceux port\u00e9s par la NSA se r\u00e9v\u00e8lent \u00eatre une application plus que r\u00e9ussie du Big Data... Au-del\u00e0 des questions id\u00e9ologiques, PRISM illustre ainsi pleinement les opportunit\u00e9s offertes par cette nouvelle technologie pour la surveillance s\u00e9curit\u00e9.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/","og_site_name":"RiskInsight","article_published_time":"2014-02-10T16:51:28+00:00","article_modified_time":"2019-12-31T10:19:23+00:00","og_image":[{"width":1800,"height":1350,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","type":"image\/jpeg"}],"author":"Gabriel Amirault, Selim Boussetta","twitter_misc":{"Written by":"Gabriel Amirault, Selim Boussetta","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/"},"author":{"name":"Gabriel Amirault","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca"},"headline":"PRISM, une success story pour le Big data!","datePublished":"2014-02-10T16:51:28+00:00","dateModified":"2019-12-31T10:19:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/"},"wordCount":772,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","keywords":["big data security"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/","name":"PRISM, une success story pour le big data!","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","datePublished":"2014-02-10T16:51:28+00:00","dateModified":"2019-12-31T10:19:23+00:00","description":"Depuis les r\u00e9v\u00e9lations d\u2019Edward Snowden, le programme PRISM de surveillance \u00e9lectronique de la NSA est au centre de questions d\u00e9ontologiques et id\u00e9ologiques. Si nous mettons de c\u00f4t\u00e9 ces aspects, ce programme et l\u2019ensemble de ceux port\u00e9s par la NSA se r\u00e9v\u00e8lent \u00eatre une application plus que r\u00e9ussie du Big Data... Au-del\u00e0 des questions id\u00e9ologiques, PRISM illustre ainsi pleinement les opportunit\u00e9s offertes par cette nouvelle technologie pour la surveillance s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/02\/Fotolia_61093468_Subscription_Monthly_XL-e1417689554197.jpg","width":1800,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/02\/prism-une-success-story-pour-le-big-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"PRISM, une success story pour le Big data!"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca","name":"Gabriel Amirault","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gabriel-amirault\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5024"}],"version-history":[{"count":10,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5024\/revisions"}],"predecessor-version":[{"id":12438,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5024\/revisions\/12438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/5026"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5024"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}