首页| 行业标准| 论文文档| 电子资料| 图纸模型
购买积分 购买会员 激活码充值

您现在的位置是:团子下载站 > 通信网络 > Strengthening the Weakest Link

Strengthening the Weakest Link

  • 资源大小:0.10 MB
  • 上传时间:2021-08-04
  • 下载次数:0次
  • 浏览次数:35次
  • 资源积分:1积分
  • 标      签: 集中器 网络接口 物联网

资 源 简 介

Strengthening the Weakest Link   “物联网”构成了物联网需要高效的安全技术,可以防止篡改,使设备进行身份验证,从而防止未经授权的访问网络。   在物联网(物联网)的应用程序是容易受到黑客攻击在多个地点,如端点和网络集中器,网络接口,移动应用程序和云服务。黑客的意图是一样的物联网本身的多样性,并可能范围从报告的能源使用情况下的公用事业提供商,窃取数据,如密码或财务信息,或更严重的行为,如工业破坏或国际恐怖主义。   正如活动,如在线商务需要改进的安全性,为用户提供保证,他们的财务数据受到保护,物联网世界也来了解非常真实的安全风险,目前。      The IoT Security Learning Curve   ConnecTIng small computerized devices such as smart appliances, smart energy meters or industrial SCADA systems to a network has highlighted many advantages compared with tradiTIonal scenarios in which equipment has not been interconnected or has been deployed in closed networks using proprietary or specialized communicaTIon protocols. Widespread connecTIvity using industry-standard protocols such as IP, often over Ethernet or over wireless links like Bluetooth® or ZigBee®, allows easier control and reporting as well as new features such as remote monitoring and control via a mobile device.   On the other hand, extending connectivity presents opportunities for hackers to gain unauthorized access. IoT devices such as mobiles, wearables, and smart devices installed in customer premises or publicly accessible areas are vulnerable to physical tampering in addition to unauthorized access via a network connection.
VIP VIP