HC Security Network News On August 15, the 3rd China Internet Security Leadership Summit (CSS2017) was officially held in Beijing. As the world's largest Internet industry security exchange event, the world's top security big coffee and leaders from all walks of life explored the world from multiple dimensions. The latest development trend of network security. This is also the largest scale, strongest lineup, and highest level of leadership in China's Internet security since the official implementation of the Cyber ​​Security Law.
In the morning opening speech, Tencent’s chief operating officer Ren Yuxi delivered a speech. He said that information security has now become the nervous system of the digital economy. The threats and challenges of information security have been intensifying. In the new situation, information security has occurred. Structural changes. In fact, it is true. Nowadays, all aspects of our life have been surrounded by intelligent hardware and the Internet of Things. The security of the Internet of Things has become a topic that cannot be ignored.
There is no doubt that the Internet of Things will significantly improve efficiency and productivity, and it will also bring us more and more convenient "smart life." Through the Internet of Things, we can remotely operate air conditioners and water heaters at home; we can also turn on the air conditioners on the way home, and we can enjoy the right temperature directly when we get home. We can also open the curtains automatically when we wake up in the morning. Microwave oven automatically makes breakfast...
The benefits of the Internet of Things are self-evident, but everyone should not underestimate the risks posed by the Internet of Things. At the end of last year, a zombie virus called Mirai caused a lot of fierce distributed blocking service attacks (DDoS), which eventually made everyone realize that the Internet of Things has made our lives smarter. fragile.
How serious is the security of IoT devices? Let me give you an example of smart medical devices. At present, the world's largest companies producing health care equipment are vigorously developing and promoting smart medical devices with Bluetooth or Wi-fi capabilities. At the 2015 DEFCON hacking conference, the attackers demonstrated on the spot that the patient's pacemaker was turned off by remote means. Think about how terrible it is.
In reality, some lessons are not far away. Tesla electric vehicles have been proven many times that hackers can turn them into "remote control cars." In October last year, large-scale Internet disconnection occurred in Boston, New York, Philadelphia, Washington, etc., which was caused by hackers attacking intelligent hardware such as cameras. Earlier, hackers also invaded the Ukrainian power grid, causing power outages in multiple areas, resulting in about 1.4 million homes without electricity. The Internet of Things is closely integrated with real life, and its “blackened†harm is far greater than the traditional information Internet.
In the future, every big city has a huge infrastructure that connects citizens with water, electricity, transportation and other important resources. These systems are increasingly connected through the network. Once hacked into the system, it is very It may make the whole city paralyzed in a short time.
According to Gartner Consulting's report, by 2010, there will be 2.04 billion IoT devices connected to each other, and an average of 5.5 million devices will be connected to the entire network every day. In addition, by 2020, more than half of the new commercial devices and systems will include IoT components. This number is amazing, and it also shows that standard PC security and anti-virus solutions will not meet the threat of cyber attacks that may be encountered by future connected IoT devices.
With the gradual popularization of smart terminals, the "Internet of Everything" is quietly coming. The Internet of Things can be interconnected with all intelligent terminals, from generators to cars to televisions, chandeliers, glasses, and bracelets. Each device is a network access point. But the more access points, the more unknown vulnerabilities and backdoors, the greater the likelihood of being compromised. If you do not take precautions, the Internet of Everything may cause everything to be "critical."
In the face of many threats, how should we ensure the healthy development of smart life?
In the CSS2017 intelligent hardware and IoT security sub-meeting, Guo Xiujuan, vice chairman and secretary-general of China Intelligent Application Alliance, raised concerns about the security risks of the Internet of Things. In her view, "from intelligent hardware to the Internet of Things, to 2020 In the year, it is expected that the global IoT nodes will reach tens of billions of dollars. Such a huge network needs the edge of the device to the cloud, a complete, end-to-end security protection system to support. We enjoy the Internet of Things to bring dividends This security is of paramount importance to us, a topic that has a long way to go."
In fact, the Internet of Things and smart devices are still an emerging field. Many manufacturers are only focusing on the realization of core functions. Therefore, when designing IoT products, security is neglected from the beginning, which is often true. These IoT smart devices typically sell their exploited operating system along with the old software, which ultimately makes it easier for hackers to master the data and sometimes control the device.
And because of the potential damage caused by the Internet of Things, security is essential for any company that is committed to making breakthroughs in the Internet of Things. In fact, Internet-related enterprises including Tencent, Jingdong, Ali, Baidu, etc. have launched actions this year to speed up the construction of the IoT security system and launch network security platforms based on the Internet of Things.
Among them, Tencent's layout in the security ecology of the Internet of Things is the most complete. At the beginning of this year, Tencent first launched the Guardian Defence Program, which is a complete security service capability output solution, mainly based on the TUSI (Tencent User Security Infrastructure) certification standard, the Guardian platform and the QKey hardware certification device. It has built a secure and open platform for mobile payment and smart home industries. This solution not only provides a software platform, but also uses a mobile Internet and IoT requirements based on a more secure login to provide a hardware device. The product layout starts from both software and hardware, which obviously reduces network security. Hidden dangers.
As we all know, the Internet of Things can form the Internet of Everything, and all of this is inseparable from the cloud. It is also based on this, at the CSS2017 conference, Tencent also launched a big data-driven AI security engine, data security solution number shield and DDoS protection alliance.
According to Tencent Cloud Vice President, Tencent Cloud Social Network and Tencent Cloud Security Leader Li Wei, Tencent Cloud Security's entire AI core is driven by big data and AI algorithms, and is built into the security domain including social graph analysis and image automating. Identification, natural language processing, knowledge representation reasoning and other AI general capabilities, forming intelligent identification, threat intelligence analysis, abnormal traffic detection, network attack traceability, human-machine behavior recognition, malicious image recognition, garbage text detection and other seven technical applications.
For us, this may be good news. In fact, there are huge security risks in the Internet of Things, largely because vendors do not have the ability to implement appropriate technologies to provide appropriate safeguards. Song Yuxi, a senior researcher at the lab, said, "Intelligent devices do not currently have perfect standards. That is to say, even if a large number of enterprises want to improve its security, there is no means to evaluate its security and control its security. And the giants in the security field like Tencent have introduced these underlying capabilities, which will greatly enhance the security of vendors.
What kind of opportunities and challenges does the new technology and new situation bring to the security of the Internet of Things?
VintCerf, the father of the Internet and pioneering engineer, once said that insecurity can lead users away from connected devices. “Unless manufacturers are working hard to protect the interests of their users, reliability and security will face many risks. The increase in connectivity is impossible to avoid, see the reliance on Google Maps now, or on mobile phones and the past 10 years. The dependencies of the application can be known. Reliability will be very important. If a system proves to be unreliable, people will leave."
Future applications of the Internet of Things will involve cars, retail vending machines, ATMs, security cameras, smart phones, VR glasses and robots. The various devices used by users may be an IoT terminal. Safeguarding data security will become an important direction for the future development of the Internet of Things.
The Korea Industrial Research Institute said in a survey that "by 2020, the economic losses caused by IoT information security issues will reach $18 billion." But ensuring the security of IoT devices is a very tricky business. Because the shape, size, and functionality of IoT devices are often quite different, traditional endpoint security models are somewhat impractical. The Internet of Things has to be widely popular, and users must be removed from their concerns about security. These devices have a lifespan of few years, so providing continuous updates to hardware and software may be the only way to ensure security.
IoT-related vendors must also provide better system solutions. The government must also establish regulations in real time to prevent data abuse in order to protect overall security and privacy. Since IoT applications involve multiple levels such as terminal devices, application software, back-end service platforms, and the Internet, each level may face data security threats, requiring a wide range of security protections, gestating huge market demands, and related industries. Leading companies will open up a new blue ocean.
In 2015, the security costs incurred to address IoT security issues were less than 1% of the industry's annual budget. According to Gartner's forecast, this ratio needs to increase to 20% by 2020. As mentioned above, today's IoT security work has just begun, and many existing mature technologies will lose their effectiveness. This industry will create a lot of opportunities for innovation.
In the era of Internet of Everything, this means that the number of IoT devices will be ten or even hundreds of times that of the mobile Internet, which means that the entire information security market will be expanded by dozens of times. This brings great challenges to the IoT security work and brings new opportunities.
Editor in charge: Zhang Zequn
Burner Stove Accessories,Gas Burner Replacement Parts,Burner Stainless Steel,Stainless Steel Grill Burners
Jiangmen Merit Metal Electric Appliance Co.,Ltd. , https://www.meritbbq.com