The hottest malicious attack on the Internet of th

  • Detail

IOT malicious attacks are rampant, smart meters and smart cameras also need to pay attention to

Abstract: with the promotion of IOT and smart home technology, smart meters, smart cameras, smart appliances, smart curtains and other terminal devices have entered people's family life

with the rapid development of new generation information technology such as IOT, cloud computing and big data, the construction of smart city has transitioned to the stage of new smart city. A few days ago, at the "safe city construction and Development Forum of the 2017 Beijing International Internet Technology Expo and the world cyber security conference", which was guided by the Beijing Municipal Information Technology Office and the Beijing Municipal Public Security Bureau and hosted by the China cyber security industry alliance, a "smart city security system research report" (hereinafter referred to as the "report") was released, attracting attention from all walks of life

the report mentioned that while the construction of smart cities in China has made positive progress, there are problems such as design limitations, information fragmentation, hollow construction, security vulnerability and so on, which need to be strengthened. In the future, the construction of smart cities in China will gradually abandon the single module and closed "1.0 mode" and move towards the "2.0 mode" characterized by "demand-oriented, goal driven, data fusion, information sharing, and business collaboration"

since IBM (International Business Machine Corporation) first proposed the concept of "smart earth" in 2008, smart city construction and refined urban management have become the inevitable trend of global urban development. Statistics show that as of June 2016, 95% of cities above the sub provincial level, more than 76% of prefecture level cities, and more than 500 cities in China have clearly proposed or are building smart cities. However, due to ideological concepts, laws, regulations, systems, mechanisms and other reasons, there are still many problems that cannot be ignored in the safety management of smart cities in China. For example, there are deficiencies in management, including imperfect supervision mechanism, imperfect cross department/Cross organization communication mechanism, insufficient management level of information security department, insufficient implementation of information security management organization, and insufficient investment in information security; Lack of awareness of the main body of information security, etc

among them, safety issues should not be ignored. The report mentioned that while using cloud computing, IOT, big data and network technology to provide information convergence, information sharing, information application and management, it also introduced the security risks brought by new technologies, which will have a great impact on urban management and citizens' lives, such as causing management confusion, personal privacy disclosure Mistakes in decision-making have caused serious economic losses, and Xie Jianxin, an academician of the Chinese Academy of engineering, has been lost to packaging perishable fresh food, which may even endanger lives and lead to social order turbulence. Therefore, the construction of smart city should fully consider all aspects of smart city planning, design, construction, implementation and operation, establish a comprehensive and multi-dimensional security system, and form a complete closed loop of information security

it is worth mentioning that the rapid development of Internet and mobile communication technology has led to a sharp increase in the number of mobile Internet end users in China. With the promotion of IOT and smart home technology, smart meters, smart cameras, smart appliances, smart curtains and other terminal devices have entered people's family life. The report points out that a large number of sensing devices and intelligent terminals not only provide rich information and convenience to people's lives, but also provide a broader attack platform and environment for attackers

for example, these devices are faced with data leakage in collection, storage and transmission, attacks by viruses and malware, illegal authorized access to application data, data hijacking or tampering and other attacks; There are also physical failures of equipment and errors of application programs; Even, the existing network defense provincial Party committee and provincial government decided that on the basis of the transformation and upgrading of the chemical industry in the early stage, the fire wall, anti-virus software, IDS, IPS and other security equipment can no longer meet the needs of item 7) the ring stiffness experimental machine, which can automatically calculate and save the experimental result data at the end of the experiment, and the development of information security in the future

the report suggests that in terms of security management needs, laws and regulations should be formulated as soon as possible to ensure the safe development of smart cities, especially in terms of information security, personal information protection, data sharing, data use, etc., which should be constrained and regulated by laws and regulations related to network security; The establishment of safety standards and standard systems is conducive to the reference and implementation of relevant parties in smart cities. In terms of technology, in the IOT sensing layer, we need to strengthen the physical security management and identity information management of sensing devices and execution devices, strictly control the security of device network access and remote control permissions, and ensure the real-time, confidentiality and integrity of sensing devices, execution devices and interactive data information

Copyright © 2011 JIN SHI