Q: Can the open Security Protocol of ARM Iot ensure security ?, Confused arm
As Iot continues to develop, Iot smart devices are constantly increasing, and problems such as botnets, DDoS attacks, and leakage of Personal Data/privacy have aroused concerns, mirai botnets are the best proof. However, security vendors do not pay enough attention to the risks of Internet of Things network attacks.
Network Attacks attached to IOT will not be easily pushed back. This requires a powerful Iot solution. One way to solve these problems is to launch an Iot security framework. ARM (the world's leading semiconductor intellectual property IP provider) and Symantec proposed an open security agreement for Iot in 2017. The two companies promise to use trusted code management and other proven technologies in the financial industry and other sensitive applications.
Many security experts have supported the proposal. They believe that using ARM technology will greatly improve the security of Iot. Integrating ARM with Symantec's Security Solutions brings many benefits, but it also raises concerns from an objective perspective.
Compatibility problems for old Iot Devices
According to a Gartner study, about 5.5 million Iot devices are connected to each other every day, most of which may not be compatible with the tools required by the new security standards. Once any Protocol becomes a widely used standardized protocol, old devices may not be able to connect to certain networks.
Although ARM and Symantec are among the best in the industry, security vulnerabilities are inevitable. Once a hacker discovers a vulnerability, before the security patch is released, all Iot will be like "Getting started ".
Some security experts support the distributed Iot security framework. Tens of thousands of different types of devices depend on different Iot security infrastructure, which may increase the difficulty of cracking, even if the security is poor. In this way, network attackers need to find the security vulnerabilities of each Iot device, and it is difficult to deploy automatic attacks on a large scale.