物联网数据 时序数据库_有关防止物联网数据泄露的方法的最终清单

物联网数据 时序数据库

物联网的力量 (The Power of the Internet of Things)

A popular definition says that IoT is “the extension of Internet connectivity into physical devices and everyday objects.” From someone’s pacemaker to a fitness device, any gadget or device can become interconnected to make our lives easier.

一个流行的定义说, 物联网是“将Internet连接扩展到物理设备和日常对象中”。 从某人的起搏器到健身设备,任何小工具或设备都可以互连,从而使我们的生活更轻松。

What’s more, IoT is not only about consumers’ smart devices — it has now been raised to a whole new level and is affecting multitudes. Take Industrial IoT, for example. Industrial IoT (IIoT) is reshaping manufacturing processes and products.

更重要的是,物联网不仅涉及消费者的智能设备,而且现在已提升到一个全新的水平,并正在影响众多人群。 以工业物联网为例。 工业物联网(IIoT)正在重塑制造流程和产品。

By integrating an IoT platform with legacy control systems, factory managers can now transform a semi-automated factory into a digitally active facility. Also, by integrating IoT technology with the city’s infrastructure, cities can overcome different urbanization challenges.

通过将IoT平台与传统控制系统集成,工厂经理现在可以将半自动化工厂转变为数字化活动设施。 此外,通过将物联网技术与城市基础设施相集成,城市可以克服不同的城市化挑战。

From the distribution of electricity, water, and gas to the deployment of emergency services and traffic management, a city can leverage the IoT in a variety of ways. As a result, it becomes a well-organized system delivering a better quality of life for its residents.

从电力,水和天然气的分配到应急服务和交通管理的部署,城市可以通过多种方式利用物联网。 结果,它成为一个组织良好的系统,为居民提供了更好的生活质量。

So, we can say that IoT has successfully entered almost every aspect of our society. However, any disruption of that harmony wreaks havoc — from small hiccups to severe data breaches and even loss of business.

因此,可以说物联网已经成功地进入了我们社会的几乎所有方面。 但是,这种和谐的破坏会造成严重破坏,从小小的打to到严重的数据泄露,甚至是业务损失。

网络攻击:我们应该如何保护自己? (Cyber Attacks: How Should We Protect Ourselves?)

In this new digital environment where cyber threats can take various forms, security is imperative. It is up to you to follow adequate procedures meticulously and protect yourself accordingly. Take a look at some simple ways to ensure that you do not fall victim to a cyberattack:

在这种新的数字环境中,网络威胁可以采取各种形式,因此安全性势在必行。 您应认真遵守适当的程序并相应地保护自己。 看一下一些简单的方法来确保您不会成为网络攻击的受害者:

1.避免使用蓝牙 (1. Avoid Using Bluetooth)

Bluetooth is a wireless technology for sharing data over a short distance without the use of the Internet. Still, it is not 100% safe as there are several hacking methods designed especially for Bluetooth.

蓝牙是一种无线技术,可在不使用Internet的情况下短距离共享数据。 但是,它并不是100%安全的,因为有几种专门为Bluetooth设计的黑客方法

To minimize your exposure to real vulnerabilities, you need to:

为了最大程度地减少对实际漏洞的暴露,您需要:

  • Ensure that Bluetooth is turned off when not in use. You can do this by setting the Bluetooth configuration to “non-discoverable.” In this way, people searching for nearby devices can’t see yours.

    不使用蓝牙时,请确保关闭蓝牙。 您可以通过将蓝牙配置设置为“不可发现”来实现。 这样,搜索附近设备的人就看不到您的设备。
  • Ignore or decline unknown requests that pop-up through a Bluetooth connection, such as an offer to “pair with a device.”

    忽略或拒绝通过蓝牙连接弹出的未知请求,例如“与设备配对”的提议。
  • Minimize the range of devices to the shortest reasonable distance.

    将设备范围最小化到最短的合理距离。
  • Install anti-virus and personal firewall software on each Bluetooth device.

    在每个蓝牙设备上安装防病毒软件和个人防火墙软件。

While Bluetooth is an excellent addition to your business productivity toolbox, it should be closely managed because it can increase the risk to business information assets.

蓝牙虽然是您的企业生产力工具箱的绝佳补充,但应对其进行严密管理,因为它会增加企业信息资产的风险。

2.使用强密码 (2. Use a Strong Password)

The next IoT way of protection is a strong password. Apply all those rules you have known for so long. Use numbers, random capital, and lowercase combination of letters. Also, make sure you do not have only one password for all your devices.

IoT的下一种保护方式是使用强密码。 应用您已经知道很长时间的所有规则。 使用数字,大写字母和小写字母组合。 另外,请确保您所有设备的密码都不只有一个。

3.定期更新设备 (3. Update Your Devices Regularly)

No system is 100% safe. Once the hackers are in, the secret is out. In that event, the way to penetrate an app becomes common knowledge in the cyber community. There is even a website that goes by the name WiGLE which offers lists of very vulnerable wireless spots.

没有系统是100%安全的 。 一旦黑客进入,秘密就暴露出来了。 在这种情况下,渗透应用程序的方式已成为网络社区的常识。 甚至有一个名为WiGLE的网站,其中提供了非常脆弱的无线点的列表。

Updating your device constantly can be a real pain in the neck. However, by postponing or ignoring the operating system and app updates, you can easily become exposed to a data breach.

不断更新设备可能是脖子上的真正痛苦。 但是,通过推迟或忽略操作系统和应用程序更新,您很容易面临数据泄露的风险

Luckily, all the important updates often have improved safety features that will help your mobile phone or a computer run more smoothly. Don’t put off updating your software for too long — the sooner you update, the sooner you’ll feel confident that your device is secure. If you are forgetful, change the settings to automatic updates so you don’t have to worry about potential cyber-attacks.

幸运的是,所有重要更新通常都具有改进的安全功能,这些功能将帮助您的手机或计算机更平稳地运行。 不要推迟太长时间更新软件-更新得越早,您就越会自信设备安全。 如果您忘记了,请将设置更改为自动更新,这样就不必担心潜在的网络攻击。

4.使用VPN进行最大程度的保护 (4. Use a VPN for Maximum Protection)

One of the most popular ways to protect your data is to turn to virtual private network providers for their services. VPNs are extremely practical, useful, and safe because they provide encrypted data which prospective attackers see as streams of incomprehensible characters.

保护数据最流行的方法之一是求助于虚拟专用网络提供商。 VPN非常实用,有用和安全,因为它们提供了加密的数据,潜在的攻击者将其视为无法理解的字符流。

Furthermore, a virtual private network can mask your IP address — use a VPN and make your exact location unknown. By activating a VPN on your Wi-Fi router, you immediately protect all your IoT devices which are on the network. There are plenty of excellent VPNs on the market that offer excellent cybersecurity features. Plus, they are compatible with most smart devices such as routers, game consoles, cell phones, smart TVs, and similar.

此外,虚拟专用网络可以掩盖您的IP地址-使用VPN并让您的确切位置未知。 通过在Wi-Fi路由器上激活VPN,您可以立即保护网络上的所有IoT设备。 市场上有许多出色的VPN提供出色的网络安全功能。 另外,它们与大多数智能设备兼容,例如路由器,游戏机,手机,智能电视等。

However, not all VPNs on the market offer the privacy and security they promise. It is, therefore, essential to choose top-notch service providers. For example, service providers like ExpressVPN and NordVPN do not seem to have compromised user data so far even though they have some differences in terms of security, speed, and pricing.

但是,并非市场上所有的VPN都能提供它们所承诺的隐私和安全性。 因此,选择一流的服务提供商至关重要。 例如,到目前为止,即使ExpressVPN和NordVPN之类的服务提供商在安全性,速度和价格方面存在一些差异,它们似乎也并未损害用户数据。

5.不要立即单击“我同意” (5. Don’t Click “I Agree” Instantly)

Many users are happy to share their personal data in exchange for access to a certain service without being truly aware of what agreeing to share their data really means. Although there are a lot of devices and software out there asking for your location and similar information, this does not mean that all of them store your data properly.

许多用户乐于共享他们的个人数据,以换取对某种服务的访问,而没有真正意识到同意共享其数据的真正含义。 尽管那里有很多设备和软件会询问您的位置和类似信息,但这并不意味着它们都正确存储了您的数据。

Luckily, there are some practical steps you can take to limit day-to-day privacy risks:

幸运的是,您可以采取一些实际步骤来限制日常隐私风险:

6.在符合GDPR的IoT平台之上构建IoT解决方案 (6. Build Your IoT Solution on Top of a GDPR Compliant IoT Platform)

The introduction of GDPR has been one of the hottest topics in the digital world for some time now. Many businesses who focus their efforts on building an IoT project have to make sure they are GDPR compliant.

一段时间以来,GDPR的引入一直是数字世界中最热门的主题之一。 许多致力于构建物联网项目的企业必须确保它们符合GDPR。

In light of these events, many IoT Platform vendors had to adapt their products to meet their clients’ business needs and protect their data. Thus, one of the ways to ensure the safety of your data in your IoT project is to invest in a GDPR compliant IoT platform that will:

鉴于这些事件,许多物联网平台供应商不得不调整其产品,以满足其客户的业务需求并保护其数据。 因此,确保物联网项目中数据安全的方法之一就是投资符合GDPR的物联网平台,该平台将:

In this way, you will know that your data is handled responsibly.

这样,您将知道负责任地处理您的数据。

后果 (The Consequences)

It is essential that you use as many protection layers as possible. If you can add any security level to your solution, do it. Otherwise, you risk compromising your personal data, which can be followed by grave consequences.

必须使用尽可能多的保护层。 如果可以在解决方案中添加任何安全级别,请执行此操作。 否则,您可能会损害您的个人数据,并可能导致严重后果。

Take famous cyberattack testing, for example. Two professional hackers conducted an experiment. They wanted to demonstrate how hundreds and thousands of vehicles can be hacked and sabotaged. They took advantage of an exposed unit like an Internet-connected computer in a dashboard.

著名的网络攻击测试为例。 两名专业黑客进行了一项实验。 他们想展示如何对成千上万的车辆进行黑客攻击和破坏。 他们利用了仪表板中的暴露单元,例如连接互联网的计算机。

They were able to take complete control over a moving vehicle in the middle of the highway. As a consequence, the driver could not regain control over the steering wheel, transmission, or the brakes.

他们能够完全控制高速公路中间的行驶中的车辆。 结果,驾驶员无法重新控制方向盘,变速器或制动器。

Industrial facilities are highly vulnerable to cyber attacks, too. A typical example is the case of a German steel mill. Its production system was penetrated with the combination of spear phishing and social engineering. We can only guess how it affected the revenues. Not to mention the instances when companies are blackmailed into making a deal with hackers.

工业设施也极易受到网络攻击。 一个典型的例子是德国一家钢铁厂 。 鱼叉网络钓鱼和社会工程学的结合渗透了其生产系统。 我们只能猜测它如何影响收入。 更不用说勒索公司与黑客达成交易的情况了

底线 (The Bottom Line)

To sum up, data privacy is imperative. In the wake of a variety of cyber attacks and data privacy issues, it is vital you take protective measures without any delay. This is mainly due to enormous usage and the incredible amount of generated, transferred, and stored data.

综上所述,数据保密势在必行。 在发生各种网络攻击和数据隐私问题之后,至关重要的是您必须立即采取保护措施。 这主要是由于大量使用以及生成,传输和存储的数据量惊人。

To prevent data leakage and make sure you stay ahead of the game, you need to have an in-depth knowledge of all the ways your privacy can get compromised. Finally, you need to react accordingly by using some of the mechanisms we have outlined in this article.

为了防止数据泄漏并确保您在游戏中处于领先地位,您需要对隐私受到破坏的所有方式有深入的了解。 最后,您需要通过使用我们在本文中概述的一些机制做出相应的React。

It’s time you took preventive measures and held on to your data. What’s your move?

是时候采取预防措施并保留您的数据了。 你怎么了

Image for post
Maja Budinski
玛雅·布丁斯基(Maja Budinski)

The Ultimate Checklist on Ways to Prevent IoT Data Compromise was originally published on ReadWrite on October 9, 2019 by Maja Budinski.

防止物联网数据泄露的最终方法清单 最初 Maja Budinski 于2019年10月9日 发布在 ReadWrite

翻译自: https://medium.com/readwrite/the-ultimate-checklist-on-ways-to-prevent-iot-data-compromise-28f6cded5999

物联网数据 时序数据库

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值