Thứ Bảy, 4 tháng 6, 2016

About security risks ahead of next-generation security

Current terminal is not only personal computers but also mobile devices, TVs, refrigerators, washing machines ... making the threats becoming more complex and unpredictable.

  • The first time through hacker attacks ... fridge
People are more and more connected to the world through intelligent IP devices, ranging from household appliances, medical devices to industrial equipment. The new device is connected brings new ways to share information and change lives. Technological transformation process that is called Internet of Things (the Internet of Things - IoT).
When life is connected to develop and become richer, the demand for a strong security model becomes more urgent, require innovative solutions to ensure that IoT promote maximum potential energy safely, while maintaining the convenience that it brings.
About security was ready for the attack in the Internet of Things world.
About security was ready for a new type of attacks in the Internet of Things world.
In early 2014, the researchers discovered a group at Proofpoint hacker has infiltrated more than 100,000 electronic devices such as routers and even televisions, refrigerators and other appliances connected to the Internet and using these systems send more than 750,000 e-mails containing malicious software to businesses and individuals worldwide. the attack took place between 23.12.2013 to 01.06.2014 with a frequency of three times a day and the hacker is not difficult to infiltrate these devices often by the owners to setup mode and default passwords.
Workshops - National Security World Exhibition 2014 takes place on 18-19 / 3 in Hanoi, Phan Thanh Son, Chief Technology Officer and partner of Cisco Vietnam, said the current home appliances most used by housewives and they have formed a habit that products that are not harmful in terms of security and confidentiality. Therefore, it takes time for people to get acquainted and to change the perception. The security company should also have a strategy, a new security solution to proactively and towards addressing the risk of generation took place in each.
"The old system used the simple method of attack, and most have been able to identify. Hackers are looking forward to be the day before their discovery because they see it as a pride, a victory. But the malicious nestled far back as deeply as possible and gnawing, until the victim bleed heavily damaged know, "Son explained.
Hackers are also using many different resources to attack, even tracking the user behavior on social networks. Previously, network security and network took place on the terminal, such as computers, but mobile phones have become more powerful with many different functions. The majority of users are using smartphones young for the job but ignore the security methods, inadvertently creating security loopholes in business, leading to the risk of huge attacks
Besides mobile devices, businesses are also faced with new risks when switching to cloud computing. "Cybersecurity is one of the most identifiable factor to ensure the reliable flow of information, continuously from the terminal to the server and from the user to the application. In the future, when computing technology cloud is widely applications, there will be a big pressure to ensure that the transition to enterprise cloud computing environment safely, "Son said.
Although security in the current business has been more concerned, the problem of insecurity of information still on the rise and with it the consequences from the database and information infrastructure business confidence was attacked. The trend of new technologies used in the enterprise, such as bringing personal devices (smartphones, tablets ...) to work, cloud computing, social computing no security measures effective information security. The problem posed to leaders in information technology (CIO) and information security leaders (CSOs) in the new phase is to strengthen information security capability of enterprises, application of new technologies to ensure safe , secure, while reducing the complexity of security infrastructure and promote business growth.
"With network security threats are changing, forms of cyberattacks is changing, and the goal of these attacks is also changing, from politics to protectionism, from money to private hackers ", David Francis, Director of Huawei network security in Britain, said. "The network security threats never stop, so we would never be allowed to stop."
Workshop - Exhibition on Security Security Security World 2014 takes place in two days 18-19 / 3 2014 in Hanoi. The event by the Ministry of Public Security and Emergency Response Centre Vietnam (VNCERT) under the Ministry of Information and Communication Technology Centre and Network Security Monitoring Board cipher of the government and the International Data Group ( IDG) co-organized.
Is held annually in Vietnam since 2007, the Security World has become the national forum on security and confidentiality of information, helping to connect, share experiences and update new technology solutions to help build a strategic safety strategy effective information security.

Không có nhận xét nào:

Đăng nhận xét