Ensuring Safety in the Internet of Things

The Internet of Things must be a security network.

Joint prevention and control, close collaboration, truly build a “cloud + network + terminal” three-dimensional defense system, making security a public good for all Internet of Things users.

Does installing surveillance cameras make homes safer? Recently, a reporter’s investigation found that spending a hundred yuan to buy cracking software can invade someone else’s home smart camera, and similar “peeping” has formed a gray industry chain. Not long ago, the National Quality Supervision Administration also issued a warning that 80% of randomly inspected smart cameras have hidden dangers. The risks of smart cameras indicate that the security vulnerabilities hidden in the Internet of Things cannot be ignored.

As smart terminals gradually become popular, the “era of everything interconnected” is quietly approaching. However, while people enjoy the convenience brought by technology, the ghost of security risks also arrives unexpectedly. The traditional internet mainly has two types of access points: computers and mobile phones, which can eliminate most security risks through antivirus software and firewalls. The Internet of Things connects all smart terminals, from generators and cars to televisions, chandeliers, glasses, and wristbands; each device is a network access point. The more access points, the more unknown vulnerabilities and backdoors, and the greater the possibility of being hacked. If precautions are not taken, the interconnected world may lead to universal “danger”.

In some movie works, similar scenes are no longer unfamiliar. In “Absolute Control”, the Reagan family owns a smart mansion, but their smart appliances cannot escape the manipulation of hackers, resulting in disturbances in their lives, exposure of privacy, and even failure of the car’s brakes. In “Fast and Furious 8”, a high-ranking official traveling in a bulletproof car on a secure route never expected that he would be stopped by a “zombie car” controlled by hackers. Movies are not reality, but their warning significance is worth noting: In the near future, every smart device that is hacked could become a dangerously powerful “weapon”.

In reality, some lessons are not far away. The smart car Tesla has been proven multiple times that hackers can turn it into a “remote-controlled car”. Last October, large-scale internet outages occurred in Boston, New York, Philadelphia, and Washington due to attacks by hackers controlling cameras and other smart hardware. Previously, hackers had also invaded Ukraine’s power grid, causing power outages in multiple regions, leaving about 1.4 million households without electricity. Because the Internet of Things is closely integrated with real life, the harm of being “hacked” is far greater than traditional information internet.

Currently, the security of the Internet of Things has not received enough attention. Whether users or enterprises, the general awareness of security is weak, often harboring a fluke mentality. A large number of users lack security habits, set weak password levels, never read user agreements, and casually connect to unknown WiFi; many enterprises would rather spend more money on smart design than on security prevention, focusing only on protecting their own business systems while basically ignoring user information security. In this context, targeted security products are difficult to promote, and relevant defense technologies are also relatively basic. Of course, preventing security risks in the Internet of Things cannot solely rely on ordinary users to improve their professional level; the key still lies in relying on relevant smart hardware manufacturers to strengthen firewalls. Enterprises should update their security concepts because security can not only attract users but also generate user stickiness; it may not directly generate profits but can become a brand barrier. More importantly, we must also formulate and improve security standards and procedures for the Internet of Things, truly making security a public good for all Internet of Things users.

Without network security, intelligent living will be fraught with traps, and the development of the Internet of Things will be hindered. Today, the Central Cybersecurity and Informatization Leading Group has long been established, and China’s cybersecurity law and related regulations have been implemented, continuously patching up network security. To respond to the security challenges of the Internet of Things, we need to start from a new starting point and take new actions. In the era of the Internet of Things, potential “enemies” come from all directions, and the idea that relying on a few security devices or software can solve all problems is outdated. Simply relying on the single strength of users, enterprises, or the government cannot solve all security issues. Different participating entities should work together in joint prevention and control, closely collaborate, and truly build a “cloud + network + terminal” three-dimensional defense system to jointly construct a community of Internet of Things security.

“The wise listen in silence, the enlightened see in the formless.” Network security is holistic, not fragmented; it is dynamic, not static; it is open, not closed; it is relative, not absolute; it is common, not isolated. Establishing a correct view of network security and maintaining clarity about the security situation at all times, we can take multiple measures and manage together to build a stronger security line and better embrace the arrival of the Internet of Things era.

Leave a Comment

×