Things security pain points

REVIEW The rise of the Internet of Things (IoT) technology has brought many benefits to our personal lives - but the benefits it gives hackers and cyber criminals to bring is enormous. So, if we ignore the physical security of networked devices What happens? This article will cover three main threats.

Over the years, network security has become a serious problem, especially since online services have become in our lives more and more entrenched. In our homes, offices and personal life, the number of networked devices is growing at an alarming rate, in fact, networking equipment is growing so fast that in 2017 for the first time exceeded the number of the world's population. With the start of Things technology is used in many fields of health care, industrial control systems and automobile manufacturing, the statistics will continue to grow rapidly.
Things security pain points of Things security pain points

The rise of the Internet of Things (IoT) technology has brought many benefits to our personal lives - but the benefits it gives hackers and cyber criminals to bring is enormous.
Things security nightmare has begun. Over the years, hackers have been using weak security system embedded in things device, steal user data and property. However, there is new evidence that companies and individuals now pay more attention to network security threats were more than a decade ago.
So, if we ignore the physical security of networked devices What happens This article will cover three main threats?:

Hackers look for entry point

If you are a thief, and you want to take away someone else's property, you will have targeted a large dog, camera and security system house? The same logic applies to cyber-criminals. In other words, they lingered on the network, looking for weaknesses, and trying to find new victims.
Sometimes, these people may just be looking for specific information, other times, they may be interested to find anything. In general, banks, family and personal information is the most wanted criminals.
However, in some cases, hackers will get health information from the hospital, so they can get some of the patient's personal information. They may be trying to access information stored on the vehicle software systems, so that they can track your location and your car to take over the remote control panel.
The idea behind this hacking tool is not acquiring data, but a small part steal information about your life. For example, your bank information may give hackers access to your financial situation, your personal information on your network can provide social security account for the cyber criminals, identity information and vehicle information control panel or GPS systems. The latter to show them your most active place, which usually tell you where they work and live, which is all the information needed to steal your identity.

Privacy is a major problem

Things equipment generates large amounts of data, some of which may be confidential data, which is why it is usually protected by law. Automobile, household appliances and other data generated by wireless gadgets may not be so sensitive, but when these data with refrigerator, data, motion sensors and intelligent household items together, it would reveal too much information about your personal life. This makes privacy a major problem.
In addition, data storage and network security distribution methods will become very complicated, which is why it has always been a controversial topic. For the vast majority of smart devices, the data stored on the cloud server, then the service provider used to find ways to improve the user experience.
Despite all the regulations, but the data protection and cloud security is not enough to solve the security problems of things. Cloud server vendors should have permission to how much data they collect? How encryption and protection law should protect user security? And who they can share this information? These are technical experts and legislators need to answer the question.

safe question

If someone contact you, claiming that they have a hundred percent foolproof solution, not the letter. This is because safety issues and things ransomware far beyond data theft, financial network attacks and hacker attacks. So how do you protect yourself and your personal information from ransomware attacks?
The easiest way to solve this problem is to try to use a manufacturing company recommended safety measures to adapt, implement and practice. For example, keep in mind some basic safety points include checking the reliability of the site, set up a dual identity for a specific user account authentication and password management. Other security point users should consider include:

Be sure to use the network firewall protection devices. 
Be sure to remove the suspicious device from the network. 
Update your device, and ensure attention to network vulnerabilities. 
For security purposes, change the factory settings and all common password. 
Effective management of your equipment.

Things ransomware may heartbreaking. While security software option does not guarantee complete safety, but they do fill the many gaps due to the negligence of the user. In addition, no one can deny the fact that things will soon become an important part of our lives, so our security needs seriously.

 

This switched: https://www.linuxprobe.com/lot-safety-pain-point.html

Guess you like

Origin www.cnblogs.com/it-artical/p/11403692.html