Brief description of the correct method to protect the security of the Internet of Things

Just like flying cars, the Internet of Things will eventually become a reality. As we imagined, we will have IP-connected cars, not to mention IP-connected bathrooms, gardens, dog collars, shoes, etc. Imagine that we did not obtain an IPv6 with 3.4 × 1038 specific IP addresses connected to the computer.

To be sure, the Internet of Things is full of security holes. Most people who code these "things" may lack security training than most readers of this article. Not to mention threat model analysis attacks, they may never have heard of attack techniques such as buffer overflow, DDoS [Note], or certificate theft. They are only good at designing firmware to allow "things" to talk to each other.

The user does not have to be an expert familiar with all the attacks that have occurred. Attacks that once appeared on PCs such as worms, viruses, and Trojans may appear on the Internet of Things. Despite years of careful preparation, these attacks have appeared on mobile devices and mobile phones.

Almost all people who study the Internet of Things have not carried out threat model analysis, which has led to a large number of security problems. Developers have not realized that their hardware devices will be interactive. They did not design input detection strong enough, nor were they able to figure out all foreign networks and new agreements between points A and Z. These developers also cannot predict in advance how the device is being abused. They only have Liao Shengyu's event log. At the same time, the user's privacy is also threatened, because the device knows all the user's information, including financial information, which may be obtained by cybercriminals.

On the contrary, almost everyone in the field of computer security is aware of these challenges. But it seems that society has misunderstood this, and many experts in the field of computer security will almost never jump out of this circle until they retire.

So how to solve this problem? Shelly Bird said that what we need is device identification. In order to protect the security of the Internet of Things, we must be able to reliably identify device identities and take appropriate security controls on these devices. At the same time, we also need to be able to identify problematic devices and repair them.

I seem to have seen the day when thousands of ovens launched a massive DoS attack on the InfoWorld website. The best solution is to perform universal authentication on the device. We can never solve the vulnerabilities that exist on all devices, or even make a single device free of vulnerabilities. Trying to solve a loophole on a platform is undoubtedly like playing a gopher game on the endless grassland.

The practical solution is to reduce the rate of Internet crime and leave nowhere for criminals who carry out malicious attacks. Once these criminals realize that they may be caught, even if they are lucky enough to escape and will not make a lot of money, the Internet crime rate will drop.

We must build a wide range of identification measures into the Internet infrastructure, but there is no other way. Although we have not solved the big problems in the field of Internet security in the past decade, if there are challenges that must be solved, we will eventually solve them, and the Internet of Things may be what we need to solve with computer security knowledge. challenge.

Printer Head And Interior Cleaning Kits

54X86Mm Cleaning Card,Cr80 Ipa Cleaning Card,Cr80 Adhesive Cleaning Card,54X86Mm Cr80 Cleaning Card

Miraclean Technology Co., Ltd. , https://www.mrccleanroom.com