360 Zhou Hongyi: The Internet security situation in the Internet of Things era is more severe

After the mobile Internet, we began to usher in the IOT (Internet of Things) era of the Internet of Everything. At the Wuzhen World Internet Conference held recently, 360 Chairman Zhou Hongyi said: In the Internet of Things era, the network security situation has not weakened, but will become more and more severe. First, more connected devices, prevention is more difficult; second, the Internet of Things and the Internet connect the virtual world with the real world, and future attacks in the online world may become real harm in the physical world.

According to Zhou Hongyi, in late October 2016, there was a large-scale Internet disconnection incident on the east coast of the United States. Hundreds of important websites such as Twitter and Amazon were inaccessible. The major public services, social platforms and popular Internet services in the United States were rampant. According to 360 global network attack real-time monitoring and early warning system tracking and monitoring, hackers invaded and controlled more than 100,000 intelligent hardware devices around the world, formed a botnet, and carried out DDoS attacks on DYN, the US Internet domain name resolution service provider, which led to this disaster. "The attacks launched by more than 100,000 devices have already caused half of the United States to connect, and billions of devices are enough to make the world awkward if they are controlled."

With the development of the Internet and artificial intelligence, we began to enter the IOT era, from smart watches to unmanned cars, and billions of IOT devices will help users enjoy the convenience of the Internet of Everything. In the IOT era, the cybersecurity situation has not diminished, but will become more and more severe. In the future, hundreds of millions of smart devices are connected to the Internet, and the number continues to grow. Information security, physical security, and personal security can be cross-border and integrated. If these intelligent hardware devices are maliciously exploited by security vulnerabilities or defects, then attacks in the online world may harm personal safety. This also makes the cyber security challenge of personal information and data unprecedented.

"Through this incident in the United States, we found that cyberattack weapons are similar to weapons of mass destruction. In the future, in the process of building a network of destiny, cybersecurity will play a very important supporting role." Zhou Hongyi said. The IOT era responds to cybersecurity threats and requires close collaboration between all parties involved. For enterprises, the three principles of protecting users' personal information should be followed. First, personal information belongs to user assets. Second, the principle of equal exchange, users have the right to know and to choose. Third, enterprises must ensure the secure storage and transmission of user data.

In the future of 360 security business development, Zhou Hongyi said that the consumer service will continue to pursue a free strategy, while the security services revenue for the government and enterprises will account for half of the 360 ​​security business revenue. “Because in the future cybersecurity, in addition to enterprises being vulnerable to attacks, national government departments are also vulnerable to attack. This includes not only sensitive national infrastructure, but also many basic services for government departments. For example, the database for precision poverty alleviation. There are detailed information on poverty alleviation objects. If these materials are obtained by criminals, the rate will be very high."

Speaking of the recent change of 360 mobile phone business, Zhou Hongyi bluntly said that the recent re-adjustment of the mobile phone business is no longer a simple pursuit of sales, but will pursue the ultimate cost performance, explore in terms of security, and make differentiated products and innovative experiences. . According to him, the next version of the 360 ​​mobile phone will add iris recognition in terms of security.

Connection Cable

Connection cables widely used for connecting Sensors and actuators . Based on different situations , we can provide M5 Connection Cable , M8 Connection Cable , M12 Connection Cable , 7/8" connection cable . For these cables , we can provide 3 to 17 cores .

Img 20210426 142921Img 3863

valve cable , M8 cable , M12 cable , 7/8" cable

Kunshan SVL Electric Co.,Ltd , https://www.svlelectric.com