Four is to deal with the dialectical relationship between the advantages of inheritance and mechanism innovation, to promote the security assessment of the Internet of things from the past ' single,

As an emerging technology field, the speed of the development of the Internet of things has never been the same, new technologies and applications, industrial Internet, car networking, smart home appliances, smart homes, smart wearable devices and other applications are profoundly changing the traditional industry patterns and people's way of life. September 16 World IoT Expo Information Security Summit Forum and the 11th session of the Information security vulnerability Analysis and risk Assessment Conference, deputy director of China Information Security Assessment Center Expert Committee Huang, speaking on the new changes in the Internet of things applications, said, ' The Internet of things, as a revolutionary ideal, is accelerating towards us at an unprecedented pace, and into all aspects of people's production and life.

'

The three most noteworthy changes According to the research agency IDC, the IoT market is expected to reach $1.7 trillion by 2020, with 20 billion IoT devices. Very impressive data size, visible connected virtual space and the real world of the Internet of Things is to create a new engine for economic prosperity, and constantly unleash the new potential of cyberspace.

Huang also said that the internet of things has brought about a lot of new changes in people's social life, and he mentioned that there are three changes most noteworthy.

Huang, deputy director of China Information Security Assessment Center Expert Committee First, the status quo of the development of the practice, the intelligent application of the Internet of things has changed from obscurity to the attention to change.

With the Internet of things and smart cities, smart industry, intelligent life and other industries, it contains trillion market effect.

Second, the application of the Internet of things from the network interconnection model, the integration of Internet of things has changed from the Internet of things to the connected people, to build a community of human destiny, to open the new era of all things, to create the future, more global development and progress, has laid a limitless potential of the ' cornucopia '. Thirdly, the integration of the Internet of things and the application of new technologies makes network security transition from border protection to borderless security governance.

The future of the Internet of things and artificial intelligence, blockchain, such as the integration of advanced technology, IoT security will be the expansion and extension of Internet security, the interconnection of all things will open up the security governance of Xinjiang soil, highlighting the problem of borderless security, making security protection from static to dynamic, from the boundless to have edge rapid progress.

The ' new challenge ' that most needs to be vigilant ' Joy ' and ' sorrow ' always coexist.

With the growing scale of the IoT industry, the Internet of things attacks have also occurred repeatedly: in October 2016, the US network infrastructure service was subjected to large-scale DDoS attacks using IoT devices, causing a small half of the United States to be paralyzed, and the security of IoT has aroused strong social concern. In the era of Internet of things, it can be predicted that security threats will become the norm in the Internet of Things world.

The current IoT device base is large, but security protection is generally fragile: a large number of IoT devices such as webcams, routers and other direct exposure to the Internet; a large proportion of devices have weak password or vulnerability risk; IoT hardware equipment manufacturers security concept is weak, security investment is insufficient, the general user's safety awareness also needs to be improved. "From a technical level, the realization of Internet of things technology makes the network security old disease stubborn, tendencies, new disease and birth." The Huang analysis said that the core technologies of the Internet of things, as well as key equipment, cowgirl the ' can deal ' risk. This year's ZTE incident exposes the core technology and short Board of our network, including the core destiny of the information technology industry, which includes the internet of things equipment, which makes our development heart bottomless.

' On the other hand, the intelligent control of the IoT will put a time bomb on the privacy leak. Once a bit of hacking, amplification of the chain effect, will help to push the network hacker leakage, multi-dimensional control of the citizens of massive sensitive information, in personal security, the intelligence of the Internet of things further amplified the serious consequences of cyber attacks. Its attack on the effect of four or two, or will shake the security foundation of social stability. Huang is very concerned about this, ' IoT infrastructure has become an important target for malicious cyber attacks. A series of real events tell us that IoT events are small, but once they happen, the damage to the overall social and economic situation cannot be underestimated.

' In addition, the lack of security governance in the Internet of things can lead to a ' domino effect ', and its destructive power is unpredictable. Leverage the Internet of things to crack anything, attack anywhere, and improve the real-time performance of cyber warfare.

Each person makes use of the intelligent weapons made by the Internet of Things to realize intelligence collection, combat synergy and threaten the national security ability of other countries.

Need to deal with four relationship transformation When the internet of things has gradually become the ' hardest hit ' in cybersecurity, ' IoT governance ' has been rapidly being put on the agenda, and the new mission of governance is calling for a ' new mindset ' for security.

We should cultivate the new thinking of intelligent, dynamic and scientific system security under the whole work Safety view and the strategic thought of the network powerful country, Huang pointed out that we should keep up with the times to deal with the four relationship transformation problem actively and steadily. The first is to deal with the dialectical relationship between development and security, attach importance to national coordination and top-level design, realize the strategic transformation from ' development first ' to ' safe parallel ', and second, to deal with the dialectical relationship between absolute security and relative security, and realize the transformation from one-sided pursuit of ' absolute security ' to ' dynamic defense ' system thinking concept; Absorbing the dialectical relationship of re-innovation, at the same time, we should attach great importance to the core technology research, realize the transformation from ' can deal risk ' to ' self-controllable ' development.

2016 GoodChinaBrand | ICP: 12011751 | China Exports