Home >Operation and Maintenance >Safety >What do you know about the security risks of the Internet of Things?

What do you know about the security risks of the Internet of Things?

王林
王林forward
2020-12-29 10:35:386160browse

What do you know about the security risks of the Internet of Things?

Introduction:

Introduction to the Internet of Things:

(Learning video sharing: Programming video)

The Internet of Things refers to the real-time collection of various required information such as any objects or processes that need to be monitored, connected, and interacted through various information sensing devices, and is combined with the Internet to form a huge network. Its purpose is to realize the realization of things and things, and things. The connection with people, all items and the network facilitates identification, management and control. The Internet of Things is a highly integrated and comprehensive application of a new generation of information technology. It has become the core driver of a new round of global technological revolution and industrial transformation and the key foundation and important engine for green, intelligent, and sustainable economic and social development.

The security of the Internet of Things has risen to the level of national security. This topic analyzes the three aspects of "cloud, pipe, and end" security of the Internet of Things, expounds the main security threats currently faced by the Internet of Things, and provides an introduction to the Internet of Things. Security control analysis. Internet of Things security management and control also need to be adapted to the development trend of the Internet of Things, and can protect the healthy, stable, and rapid development of the Internet of Things.

1. Internet of Things Terminal Security

As a representative product of the deep integration of information space and physical space, Internet of Things terminals have rapidly expanded from pioneering products for personal consumption to various economic and social fields, empowering New service methods in education, medical care, retail, energy, construction, automobiles and many other industries support the improvement of basic urban functions such as government offices, public safety, transportation and logistics. Existing IoT terminal equipment focuses on function implementation, while traditional equipment manufacturers lack security capabilities or consider factors such as time and cost, and generally ignore security issues in terminal design. IoT terminals can be divided into smart terminals and non-smart terminals. Most smart terminal devices have embedded operating systems and terminal applications, while most non-smart terminal devices have a single structure and function and only perform functions such as data collection and transmission. Smart terminals Devices pose greater information security threats.

According to the research on IoT smart terminals, such as home appliances, smart devices, web cameras, etc., it is found that there are four main security threats to the security of IoT smart terminals.

1. Internet of Things intelligent terminal security threats

Security threats

1) Internet of Things intelligent terminal devices have weak password problems;

2) Internet of Things There are security vulnerabilities in the operating systems, built-in Web applications, databases, etc. of smart terminal devices and are used to steal data, launch DDoS attacks, send spam, or be manipulated to attack other networks and other serious security incidents;

3) Internet of Things The identity authentication of smart terminal devices is weak;

4) IoT smart terminal devices are implanted with malicious code or become a botnet.

Security Threat Characteristics

1) There are a huge number and types of weak passwords in IoT smart terminal devices, with wide coverage;

2) IoT smart terminal devices are maliciously controlled Afterwards, it can directly affect personal life, property, privacy, and life safety;

3) Simple malicious use;

4) The later reinforcement of IoT smart terminal equipment is difficult and needs to be done in the design Security issues began to be considered during the development stage;

5) IoT smart terminal devices are widely distributed and used in different scenarios, making it difficult to carry out unified upgrades, patches and reinforcements;

6) Identity forgery and counterfeiting It can then carry out malicious attacks; 7) Used to steal data, launch DDoS attacks, send spam or be manipulated to attack other networks and other serious security incidents.

2. Analysis of security control of IoT smart terminals

In the design and development stage of IoT smart terminals, security control measures should be considered in the design and safety control measures; security protection testing should be done synchronously before terminal production and release; During the terminal release and put-in-use phase, firmware vulnerability update management and smart terminal security monitoring are performed simultaneously. The specific IoT terminal security management and control analysis is as follows:

1) In view of the wide distribution range and large number of IoT smart terminals, the IoT should carry out virus perception and detection on the network side.

2) Corresponding specifications should be established for the information retention of IoT smart terminals to limit the type, duration, methods, encryption methods, access measures, etc. of information retention.

3) The identity authentication strategy of IoT smart terminals should establish strong identity authentication measures and a complete password management strategy.

4) Before the production and release of IoT smart terminals, security testing should be done. After the terminal is released, firmware updates and vulnerability management should be carried out in a timely manner, and network access permission should be granted if necessary.

5) Build a security inspection platform or build corresponding security monitoring methods for IoT smart terminals, which can detect abnormal terminals, isolate suspicious applications or prevent the spread of attacks.

3. Security threats of non-intelligent terminals in the Internet of Things

According to the research on non-intelligent terminals in the Internet of Things, such as sensors, radio frequency identification (RFID), etc., the current non-intelligent terminals in the Internet of Things are in network security No security threats were found at the physical security level, and there were security threats from physical manipulation by attackers at the physical security level.

2. Internet of Things Pipeline Security

The "pipeline" of the Internet of Things is the pipe connecting the "cloud" and the "end". The security of the "pipeline" of the Internet of Things is large-capacity and intelligent. Information pipeline security. According to the research on the IoT information pipeline, it was found that there are four main security threats to the security of the IoT pipeline.

1. Internet of Things pipeline security threats

IoT pipeline security threats

1) There is no unified Internet of Things communication protocol standard, and your own protocols can be used for communication;

2) The IoT card supervision system is not sound;

3) IoT pipelines are diverse, and some technologies are not included in security control, such as Bluetooth, infrared, and NFC;

4) IoT Man-in-the-middle attack on pipelines.

IoT pipeline security threat characteristics

1) Risks such as leakage of sensitive information;

2)Difficulties in compatibility between different IoT communication protocols;

3) There are differences with existing Internet communication protocols, and existing security tools cannot be transplanted to the Internet of Things;

4) There is a risk that IoT special cards and IoT industry cards are used illegally, leading to the Internet of Things Card abuse and cannot be traced;

5) Traditional network security management faces challenges;

6) Internet of Things pipeline attack methods are diverse;

7) Attacks can lead to relationships The important production system of the national economy and people's livelihood is abnormal;

8) The attack will cause greater destructive power.

2. Analysis of safety management and control of IoT pipelines

In the design stage of IoT pipelines, safe communication protocols, transmission media, etc. should be considered. In the construction stage of IoT pipelines, safety monitoring, Corresponding data interfaces are reserved for situational awareness, and security monitoring of the IoT information pipeline should be done during the stage when the IoT pipeline is put into use. The specific IoT pipeline safety management and control analysis is as follows:

1) Developers, manufacturers, and management departments should formulate IoT communication protocol standards as soon as possible.

2) Establish access control facilities for the Internet of Things system, especially access to important Internet of Things systems related to the national economy and people's livelihood. Distinguish whether there is IoT signal transmission in traditional networks and build IoT signal monitoring methods.

3. Internet of Things Cloud Service Security

In layman’s terms, Internet of Things cloud services are used when sharing information with other parties’ resources. Therefore, protecting the security of cloud services also protects the security of the Internet of Things. key link.

According to a survey of current mainstream cloud products, it was found that there are eight major security threats to the security of IoT cloud services.

1. Internet of Things cloud service security threats

IoT cloud service security threats

1) Data leakage;

2) Login credentials stolen and Identity authentication forgery;

3)API (Application Programming Interface) is attacked by malicious attackers;

4)System vulnerability exploitation;

5)System vulnerability exploitation;

6) Malicious personnel;

7) Permanent data loss of the system;

8) Denial of service attack threat;

9) Cloud service sharing technology, Shared risks.

Characteristics of security threats

1) Large amount of leaked data;

2) Easy to form an APT (Advanced Persistent Threat) attack target;

3 ) The value of leaked data is high;

4) It has a large impact on individuals and society;

5) It is easy to forge identities in the Internet of Things;

6) If credentials are not properly controlled, data Isolation protection cannot be performed;

7) There are many IoT API interfaces and are easily attacked by malicious attackers;

8) The types of IoT API interfaces are complex and attacks are diversified;

9) The vulnerability of the IoT cloud service system has a great impact after being attacked by malicious attackers;

10) Malicious behavior of insiders on data;

11) Attack threats from outsiders;

12) Cloud data damage will cause damage to the entire IoT system

13) Affect the national economy and people’s livelihood;

14) Cause abnormal service of the IoT system;

15 ) Virus attacks caused by shared technologies.

2. Analysis of security management and control of IoT cloud services

In projects such as new construction, reconstruction, and expansion of IoT cloud service systems, security protection facilities for the IoT cloud service system should be constructed simultaneously, and Conduct acceptance and put into operation simultaneously with the main project. The specific security management and control analysis of IoT cloud services is as follows:

1) IoT cloud services implement an access system. IoT cloud service systems should be registered and allowed to access the network after security assessment.

2) The identity authentication strategy for IoT cloud services should establish strong identity authentication measures and a complete password management strategy.

3) IoT cloud services should have attack defense capabilities and perception capabilities.

4) Establish a backup mechanism for IoT cloud services.

5) Regularly conduct risk assessments for the Internet of Things cloud service system;

6) Carry out certification for management and operation personnel of important and sensitive information systems, and establish a management and control mechanism for personnel in important positions.

Related recommendations: Website Security Tutorial

The above is the detailed content of What do you know about the security risks of the Internet of Things?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:csdn.net. If there is any infringement, please contact admin@php.cn delete
Previous article:What does firewall mean?Next article:What does firewall mean?