当前位置:网站首页>Is your IOT security strong enough?
Is your IOT security strong enough?
2022-06-28 03:12:00 【Software test network】
According to a new study by Kaspersky ,64% Of enterprises use the Internet of things (IoT) Solution , among 57% Of companies said their biggest concern about the technology was network security vulnerabilities .
Network attack is one of the most destructive things that can happen to any enterprise , It takes away valuable resources for mission critical tasks , And weaken the company's brand image . IOT devices are attack vectors that many organizations have never considered before , therefore , If your business is concerned about network security , that , You have to go beyond protecting networks and traditional devices . In the following sections , We will explore what you can do to improve the security of the Internet of things .

The Internet of things in specific industries
Before solving the security problems of the Internet of things , It is important to understand how it is used in your industry . Here are some examples .
- Health care : People with chronic diseases use fitness trackers 、 Wearable Internet of things devices such as pulse oximeter and sphygmomanometer can monitor your condition , And send relevant information to healthcare professionals . Hospitals use other types of equipment to monitor patient status and medical devices .
- manufacturing : To enhance production operations , IOT sensors can be connected to machines and devices , To collect data and ensure optimal operation . This data enables manufacturers to plan and schedule maintenance according to business processes and order requirements 、 Repair and replacement .
- logistics . IOT sensors are used to monitor the movement of goods , Provide various data of inventory items , And monitor the real-time status of warehouse and transportation .
- automobile . Networking devices enable cars and trucks to keep in touch with valuable services such as safety assistance , Autopilot , Remind the driver that maintenance is required , And track vehicles, etc .
- retail . The function based on the Internet of things enables physical retail stores to provide new customer experience , For example, the optimized fitting room 、 In store shopping guide 、 Auto checkout, etc .
Ask for information
In the past , The number of cyber criminals' attack portals is limited . Now? , With billions of IOT devices put into use , This creates a large number of additional attack media for hackers to enter the commercial network , Lead to DDoS Attacks continue to grow . These attacks will prevent the website from running , This leads to incalculable loss of revenue and reputation . Other types of attacks may result in data loss and proprietary information being disclosed or shared with competitors .
Ensure strong security of the Internet of things , And the first step in preventing this is to understand the entire digital ecosystem , From cargo containers or sensors on the workshop assembly line to smart refrigerators in the lounge . Since each department may have deployed its own smart devices , therefore IT All this information needs to be put together , Create a database for each device , And evaluate the risk factors of each equipment .
measures
- Use strict access policies : according to TechRepublic A recent article ,“ The zero trust security method assumes that every network will be breached , Every device will be invaded , Every user ( Unintentionally or not ) At risk .”
- Create a vulnerability management plan . The vulnerability management plan establishes an ongoing mechanism to identify and reduce vulnerabilities , And fix the holes .
- Use a dedicated Internet of things gateway . The gateway of the Internet of things is to connect the Internet of things devices ( Such as sensor 、 IOT modules and smart devices ) Physical or virtual platforms connected to the cloud .
- Ensure Internet of things governance . This approach involves rigorous checks and authentication of each new device 、 Follow the manufacturer's guidelines 、 Give priority to data privacy and ensure compliance with security requirements .
- Develop network immune methods . Network immunity means that Internet of things devices are connected through other devices , No additional safety features required , Protect the system from certain network attacks .
Reduce third party risk
Even if you make every effort to provide strong network security internally , You may also encounter other problems related to third-party suppliers , for example , Supplier employees may have access to your network . So , You must treat them like your employees , And take zero confidence measures . Failure to do so would put the entire organization at risk .
In addition to creating an internal security review and repair process , You must also assess the security situation of your partner company , And make sure they are willing to work within your safety parameters , And make this step part of the review process for each new potential supplier . Besides , Be sure to review your current supplier , To ensure that they comply with your policy .
Create a safety action manual
Once you recognize the specific risk factors in your industry , Also evaluated your digital ecosystem , Measures to reduce internal and third-party risks have been developed , Then please record all this information in the cybersecurity playbook that outlines your policy . It should include how to protect your system 、 Detect and respond to threats 、 Communication between team members , And how to recover data in case of vulnerability .
边栏推荐
猜你喜欢

Writing C program with GCC and makefile for the first time

R语言惩罚逻辑回归、线性判别分析LDA、广义加性模型GAM、多元自适应回归样条MARS、KNN、二次判别分析QDA、决策树、随机森林、支持向量机SVM分类优质劣质葡萄酒十折交叉验证和ROC可视化

视频编解码性能优化与实现

Simple elk configuration to realize production level log collection and query practice

Arduino Esp8266 Web LED控制

腾讯游戏发布40多款产品与项目 其中12款为新游戏

字节跳动面试官:一张图片占据的内存大小是如何计算

> Could not create task ‘:app:MyTest. main()‘. > SourceSet with name ‘main‘ not found. Problem repair
![[today in history] June 20: the father of MP3 was born; Fujitsu was established; Google acquires dropcam](/img/54/df623fc1004e1dca5d369b4ed2608c.png)
[today in history] June 20: the father of MP3 was born; Fujitsu was established; Google acquires dropcam

The first place on the list - the carrying rate of front-end equipment is up to 10%, and the top 10 suppliers of digital key solutions
随机推荐
PSM summary
分布式事务TCC浅析
微信小程序中生成二维码
[today in history] June 17: the creator of the term "hypertext" was born; The birth of Novell's chief scientist; Discovery channel on
为什么大厂压力大,竞争大,还有这么多人热衷于大厂呢?
Apache - about Apache
【活动早知道】LiveVideoStack近期活动一览
暴雨去哪儿?天气预报不准谁的锅?
Reading makes people quiet
【522. 最长特殊序列 II】
目标检测|SSD原理与实现
be fond of the new and tired of the old? Why do it companies prefer to spend 20K on recruiting rather than raise salaries to retain old employees
简单ELK配置实现生产级别的日志采集和查询实践
PHP 代码 微信、公众号、企业微信 发送表情符号 [U+1F449]
Review the submission of small papers for 2022 spring semester courses
Simple elk configuration to realize production level log collection and query practice
抓包整理外篇fiddler————了解工具栏[一]
Single page application (SPA) hash route and historical API route
CMU提出NLP新范式—重构预训练,高考英语交出134高分
Raspberry pie - environment settings and cross compilation