LK Automation Limited LK Automation Limited
Home >> Industry news
Future information security will become the core competitiveness of enterprises
http://m.lk166.com
Article source: Chinese industrial network Release time: 6-6-2017

2017 information security report released to expose American telecom operators Verizon days ago in the case of a university in the United States were distributed denial of service (DDoS) attacks information security, tracing the source information security, found the school about 5000 things (IoT) equipment core competitiveness, including street lighting core competitiveness, vending machine core competitiveness, the culprit is actually the paralysis of the school network.

 

Into the Internet of things era, network cameras, routers, networking TV, networked refrigerators and other networking devices, has been intended to use as a security crime accomplice, is no longer the Arabian nights.

 

In order to improve the enterprise information security alert, and also proposed legislation to heavy penalties security vulnerabilities of the enterprise, the enterprises not only face the threat of future safety crime as well as the government's ransom, plus fine Zha, goodwill is impaired, face and lining multiple losses. Security issues are imminent and urgent.

 

There are many information and communication enterprises, because the design of information security products lack adequate, by FTC (Federal Trade Commission) to court, demanding a ban on enterprises are unfair and deceptive behavior, or service providers of personal information leakage events occurred in the course of dispute, not only caused the product may not be able to continue to sell, but also bring intangible losses it is difficult to calculate the goodwill of the brand. How to effectively protect the Internet of things security?

 

Even if it is just an intelligent factory built on an intranet or an enterprise that provides products and services only in the country, there is a chance to be a hacker if any device is connected to the network.

 

For example, the Iran nuclear power plant had been exposed to security risks, because the maintenance engineer into the factory to repair the notebook computer with the ATM last year; or the automatic dispenser, display any devices that can connect to the network, they are exposed to security risks in the environment, especially in the world of the Internet era, more information must be the security of things, the major issues included in the survival of the enterprise.

 

The most effective way to prevent the risk of a security threat from happening is to start at the source. Security is among the key and thoughtful design is an important key to the success of the product; safety design into the product development life cycle, can avoid many future caused by ill design security incidents caused by the loss.

 

The era of things, from the sensing layer, network layer to the platform layer, each layer has a variety of hardware and software, must use as the final application to measure risk index, decided to do what level of information security protection, but also to the information security into the design of time to think, to avoid "mending the net" the dilemma.

 

For example, some things sensing device is little harm after the invasion, the device itself only in software protection, also from the gateway level add multiple protection; but if it is implanted in the human body physiology signal chip, once hacked may endanger the user's heart rate, wave adjustment situation, need more tight guard, from sensor you should use the hardware encryption chip, hardware and software from all levels to protect.

 

The United States consumer survey has begun appraisal of "information security" project will be included in the washing machine and other consumer electronic products, increase network products in the future, the information security will become the core competitiveness of the key enterprise.

 

Related news