Internet Of Things 简明教程

Internet of Things - Liability

物联网的安全缺陷及其执行某些任务的能力为任何关联责任打开了大门。人们关注的三个主要领域是设备故障、攻击和数据盗窃。这些问题可能造成各种各样的损害。

The security flaws of IoT and its ability to perform certain tasks open the door to any associated liability. The three main areas of concern are device malfunction, attacks, and data theft. These issues can result in a wide variety of damages.

Device Malfunction

物联网引入了更深层次的自动化,该自动化可以控制关键系统,以及影响生命和财产的系统。当这些系统出现故障或故障时,它们可能会造成重大损害;例如,如果物联网炉子控制系统出现故障,它可能会导致无人居住的房屋发生故障并造成管道结冰和水管损坏。这迫使组织采取措施来应对它。

IoT introduces a deeper level of automation which can have control over critical systems, and systems impacting life and property. When these systems fail or malfunction, they can cause substantial damage; for example, if an IoT furnace control system experiences a glitch, it may fail in an unoccupied home and cause frozen pipes and water damage. This forces organizations to create measures against it.

smart thermostat

Cyber Attacks

物联网设备将整个网络和直接受到影响的一切暴露在攻击风险中。尽管这些连接提供了强大的集成和生产力,但也为混乱创造了绝佳的机会,例如入侵的炉灶或消防喷淋系统。针对此类问题的最佳措施是解决最脆弱的点,并提供自定义保护措施,例如监视和访问权限。

IoT devices expose an entire network and anything directly impacted to the risk of attacks. Though those connections deliver powerful integration and productivity, they also create the perfect opportunity for mayhem like a hacked stove or fire safety sprinkler system. The best measures against this address the most vulnerable points, and provide custom protections such as monitoring and access privileges.

一些最有效的反攻击措施被证明很简单−

Some of the most effective measures against attacks prove simple −

  1. Built-in Security − Individuals and organizations should seek hardened devices, meaning those with security integrated in the hardware and firmware.

  2. Encryption − This must be implemented by the manufacturer and through user systems.

  3. Risk Analysis − Organizations and individuals must analyze possible threats in designing their systems or choosing them.

  4. Authorization − Devices, whenever possible, must be subject to privilege policies and access methods.

bitdefender box

Data Theft

数据,物联网的优势和弱点,对许多人来说具有不可抗拒的吸引力。这些人对物联网感兴趣的原因有很多− 个人数据对市场营销/广告的价值、身份盗窃、陷害个人犯罪、跟踪,以及一种奇特的满足感。用于对抗攻击的措施在管理此威胁方面也非常有效。

Data, IoT’s strength and weakness, proves irresistible to many. These individuals have a number of reasons for their interest − the value of personal data to marketing/advertising, identity theft, framing individuals for crimes, stalking, and a bizarre sense of satisfaction. Measures used to fight attacks are also effective in managing this threat.