Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How does the Internet of things secure cloud computing?

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

How does the Internet of things secure cloud computing? In order to let you know more about the Internet of things and cloud computing, the editor summarizes the following. Let's take a look at it.

The global application of the Internet of things has reached billions of devices, and the number is increasing. Many Internet of things devices in development and deployment lack key security features for hackers and botnet targets. Without proper security measures, Internet of things devices can lead to catastrophic events. How to solve these problems?

First, data theft, find loopholes, network attackers can steal data stored on Internet of things devices, including personal information, passwords, and even credit card information. To make matters worse, in some cases, hackers use Internet of things devices to collect data. A smart TV with a microphone and camera becomes a monitoring device that collects audio and video information. The device can sniff network traffic and leak it for offline analysis and draw a network layout diagram to find other attack targets.

Second, the data is damaged, and the Internet of things devices collect data from various sensors. Then transfer the data to the cloud computing system for analysis, and input it to various business systems. If an Internet of things device is attacked by a hacker, the data generated by the device will not be trusted. In addition, many Internet of things devices lack strong authentication measures. Cloud computing systems that collect data from these devices cannot trust the data. Hackers can easily clone or cheat devices to feed back bad data to cloud computing systems, thereby disrupting related business processes.

Third, to steal network credentials, hackers have been able to extract Wi-Fi passwords from almost all smart devices, such as light bulbs, door locks, doorbells, baby monitors, and even toys. Once a hacker invades an Internet of things device, it can usually be used as an entrance to network attacks and to extract data found in the network. In 2017, for example, hackers stole 10 GB of important data from a casino through a Wi-Fi-enabled fish tank.

IV. Denial of service attack

Internet of things devices with static or default credentials increase the number of large Internet of things botnets. The Mirai botnet is the birthplace of the botnet of Internet of things devices. It infects millions of Internet of things devices and is used to launch large-scale, coordinated, denial-of-service attacks against multiple targets, including domain name system provider DYN, resulting in large-scale Internet paralysis in Europe and North America. The Mirai botnet scans a lot of the Internet for open Telnet ports, and then tries to log in with a list of known default username / password combinations. This enables it to gather more than 600,000 Internet of things devices to attack targets, including DYN, and to make a large number of requests to take a large number of servers offline.

Fifth, physical attacks, Internet of things devices control key infrastructure in manufacturing, medical, transportation and other industries. Examples of physical attacks include an attack on the control system of a German steel mill, resulting in damage to the blast furnace, attacks on the power grids of the United States and Ukraine, cyber attacks on aircraft control systems, and the ability to remotely control a Cherokee jeep off the road. Various control systems in the data center, including power, HVAC and building security systems, are vulnerable to network attacks. Attacks on these systems can directly affect data centers and cloud-based computing operations.

Sixth, loopholes in Internet of things devices, bringing new Internet of things devices to market will lead to design loopholes, such as the use of hardware to edit passwords, control interfaces that do not require user authentication, and communication protocols that send sensitive information in clear text. This deficiency can result in a lack of secure boot capabilities or authenticated remote firmware updates.

Modern homes have dozens or more devices connected to cloud computing, each of which is infected as an attack robot against networks, businesses, and organizations. Manufacturers must begin to address these security vulnerabilities, first assess the vulnerabilities of their devices, determine the protective measures to be taken, and then determine the required security features.

VII. Safety capability

Adding some basic security functions to the devices of the Internet of things can significantly reduce the risk of network attacks. These functions can be built into the design phase to ensure the security identity and integrity of the device in multiple use cases, including the Industrial Internet of things, automotive, aviation, smart cities, energy, healthcare, and so on.

VIII. Safe start-up

Secure startup uses password code signing technology to ensure that the device only executes the code generated by the original equipment manufacturer or other trusted party. The use of secure boot technology prevents hackers from replacing firmware with malicious versions, thereby preventing a variety of attacks. Secure remote firmware updates, which ensure that the device can be updated, but only with the firmware of the original equipment manufacturer's device or other trusted party. As with secure startup, secure firmware updates ensure that the device always runs trusted code and prevent any attempt to take advantage of the device's firmware update process.

The use of security protocols such as TLS, DTLS, and IPSec adds authentication and dynamic data protection to Internet of things devices. Because critical data is not sent in clear text, it is difficult for hackers to eavesdrop on communications and obtain passwords, device configurations, or other sensitive information.

Embedded firewall, embedded firewall provides rule-based filtering and intrusion detection. Stateful packet inspection (SPI) protects devices from attacks by building firewall technology directly into the device. An embedded firewall can view incoming messages from a network or home network and reject any previously unapproved messages through a built-in blacklist that is updated regularly. Stateful packet inspection (SPI) filtering rejects packets that attempt to exploit weaknesses in the TCP protocol as part of a denial of service attack.

The responsibility for the security of the Internet of things lies with enterprises. Enterprises only need to buy equipment with a high level of security, and then they can put their manpower and resources into business operations. If secure boot, firewall, or intrusion detection is used alone or in any combination, the camera that is infected and used as a botnet program in a Mirai botnet infection is protected from this attack. By adding some basic functions the security of any Internet of things device can be significantly improved. Protect supported data centers and cloud platforms by protecting Internet of things edge devices.

After reading the above, do you have a general understanding of how the Internet of things protects the security of cloud computing? If you want to know more, welcome to follow the industry information channel!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report