当前位置:网站首页>Is your IOT security strong enough?
Is your IOT security strong enough?
2022-06-28 03:12:00 【Software test network】
According to a new study by Kaspersky ,64% Of enterprises use the Internet of things (IoT) Solution , among 57% Of companies said their biggest concern about the technology was network security vulnerabilities .
Network attack is one of the most destructive things that can happen to any enterprise , It takes away valuable resources for mission critical tasks , And weaken the company's brand image . IOT devices are attack vectors that many organizations have never considered before , therefore , If your business is concerned about network security , that , You have to go beyond protecting networks and traditional devices . In the following sections , We will explore what you can do to improve the security of the Internet of things .

The Internet of things in specific industries
Before solving the security problems of the Internet of things , It is important to understand how it is used in your industry . Here are some examples .
- Health care : People with chronic diseases use fitness trackers 、 Wearable Internet of things devices such as pulse oximeter and sphygmomanometer can monitor your condition , And send relevant information to healthcare professionals . Hospitals use other types of equipment to monitor patient status and medical devices .
- manufacturing : To enhance production operations , IOT sensors can be connected to machines and devices , To collect data and ensure optimal operation . This data enables manufacturers to plan and schedule maintenance according to business processes and order requirements 、 Repair and replacement .
- logistics . IOT sensors are used to monitor the movement of goods , Provide various data of inventory items , And monitor the real-time status of warehouse and transportation .
- automobile . Networking devices enable cars and trucks to keep in touch with valuable services such as safety assistance , Autopilot , Remind the driver that maintenance is required , And track vehicles, etc .
- retail . The function based on the Internet of things enables physical retail stores to provide new customer experience , For example, the optimized fitting room 、 In store shopping guide 、 Auto checkout, etc .
Ask for information
In the past , The number of cyber criminals' attack portals is limited . Now? , With billions of IOT devices put into use , This creates a large number of additional attack media for hackers to enter the commercial network , Lead to DDoS Attacks continue to grow . These attacks will prevent the website from running , This leads to incalculable loss of revenue and reputation . Other types of attacks may result in data loss and proprietary information being disclosed or shared with competitors .
Ensure strong security of the Internet of things , And the first step in preventing this is to understand the entire digital ecosystem , From cargo containers or sensors on the workshop assembly line to smart refrigerators in the lounge . Since each department may have deployed its own smart devices , therefore IT All this information needs to be put together , Create a database for each device , And evaluate the risk factors of each equipment .
measures
- Use strict access policies : according to TechRepublic A recent article ,“ The zero trust security method assumes that every network will be breached , Every device will be invaded , Every user ( Unintentionally or not ) At risk .”
- Create a vulnerability management plan . The vulnerability management plan establishes an ongoing mechanism to identify and reduce vulnerabilities , And fix the holes .
- Use a dedicated Internet of things gateway . The gateway of the Internet of things is to connect the Internet of things devices ( Such as sensor 、 IOT modules and smart devices ) Physical or virtual platforms connected to the cloud .
- Ensure Internet of things governance . This approach involves rigorous checks and authentication of each new device 、 Follow the manufacturer's guidelines 、 Give priority to data privacy and ensure compliance with security requirements .
- Develop network immune methods . Network immunity means that Internet of things devices are connected through other devices , No additional safety features required , Protect the system from certain network attacks .
Reduce third party risk
Even if you make every effort to provide strong network security internally , You may also encounter other problems related to third-party suppliers , for example , Supplier employees may have access to your network . So , You must treat them like your employees , And take zero confidence measures . Failure to do so would put the entire organization at risk .
In addition to creating an internal security review and repair process , You must also assess the security situation of your partner company , And make sure they are willing to work within your safety parameters , And make this step part of the review process for each new potential supplier . Besides , Be sure to review your current supplier , To ensure that they comply with your policy .
Create a safety action manual
Once you recognize the specific risk factors in your industry , Also evaluated your digital ecosystem , Measures to reduce internal and third-party risks have been developed , Then please record all this information in the cybersecurity playbook that outlines your policy . It should include how to protect your system 、 Detect and respond to threats 、 Communication between team members , And how to recover data in case of vulnerability .
边栏推荐
- You got 8K in the 3-year function test, but were overtaken by the new tester. In fact, you are pretending to work hard
- Flow based depth generation model
- Intel Ruixuan A380 graphics card will be launched in China
- [issue 21] face to face experience of golang engineer recruited by Zhihu Society
- Reading makes people quiet
- Apache, IIS6 and ii7 independent IP hosts screen and intercept spider crawling (applicable to VPS virtual machine servers)
- [today in history] June 20: the father of MP3 was born; Fujitsu was established; Google acquires dropcam
- 测试要掌握的技术有哪些?软件测试必懂的数据库设计大全篇
- Get 5 offers after being notified of layoffs
- 2021年软件测试工具总结——模糊测试工具
猜你喜欢

【Kotlin】在Android官方文档中对其语法的基本介绍和理解

Arduino esp8266 web LED control

Le routage des microservices de la passerelle a échoué au chargement des ressources statiques des microservices
![[kotlin] basic introduction and understanding of its syntax in Android official documents](/img/44/ec59383ddfa2624a1616d13deda4a4.png)
[kotlin] basic introduction and understanding of its syntax in Android official documents

业内首个!可运行在移动设备端的视频画质主观体验MOS分评估模型!

【iptables&icmp】iptables默认策略中关于icmp协议的说明

Initial linear regression

The first in the industry! MOS sub evaluation model for subjective video quality experience that can run on mobile devices!

PSM总结
![[today in history] June 20: the father of MP3 was born; Fujitsu was established; Google acquires dropcam](/img/54/df623fc1004e1dca5d369b4ed2608c.png)
[today in history] June 20: the father of MP3 was born; Fujitsu was established; Google acquires dropcam
随机推荐
ADB double click the power key command
> Could not create task ‘:app:MyTest. main()‘. > SourceSet with name ‘main‘ not found. Problem repair
被校园暴力,性格内向的马斯克凄惨而励志的童年
Usage details of staticlayout
RichView TRVStyle ParaStyles
Heartless sword Chinese English bilingual poem 004 Sword
Différences d'utilisation entre IsEmpty et isblank
买股票通过券商经理的开户链接开户资金是否安全?想开户炒股
CMU提出NLP新范式—重构预训练,高考英语交出134高分
Interview: how do lists duplicate objects according to their attributes?
LiveData 面试题库、解答---LiveData 面试 7 连问~
[today in history] June 23: Turing's birthday; The birth of the founder of the Internet; Reddit goes online
[today in history] June 17: the creator of the term "hypertext" was born; The birth of Novell's chief scientist; Discovery channel on
为什么大厂压力大,竞争大,还有这么多人热衷于大厂呢?
Publicity of the third batch of shortlisted enterprises! Annual Top100 smart network supplier selection
分布式事务解决方案Seata-Golang浅析
How to judge that the thread pool has completed all tasks?
Gateway微服務路由使微服務靜態資源加載失敗
Packet capturing and sorting out external Fiddler -- understanding the toolbar [1]
Raspberry pie - environment settings and cross compilation