Q: Can the open Security Protocol of ARM Iot ensure security ?, Confused arm

Source: Internet
Author: User

Q: Can the open Security Protocol of ARM Iot ensure security ?, Confused arm

As Iot continues to develop, Iot smart devices are constantly increasing, and problems such as botnets, DDoS attacks, and leakage of Personal Data/privacy have aroused concerns, mirai botnets are the best proof. However, security vendors do not pay enough attention to the risks of Internet of Things network attacks.

Network Attacks attached to IOT will not be easily pushed back. This requires a powerful Iot solution. One way to solve these problems is to launch an Iot security framework. ARM (the world's leading semiconductor intellectual property IP provider) and Symantec proposed an open security agreement for Iot in 2017. The two companies promise to use trusted code management and other proven technologies in the financial industry and other sensitive applications.

Many security experts have supported the proposal. They believe that using ARM technology will greatly improve the security of Iot. Integrating ARM with Symantec's Security Solutions brings many benefits, but it also raises concerns from an objective perspective.

Compatibility problems for old Iot Devices

According to a Gartner study, about 5.5 million Iot devices are connected to each other every day, most of which may not be compatible with the tools required by the new security standards. Once any Protocol becomes a widely used standardized protocol, old devices may not be able to connect to certain networks.

Although ARM and Symantec are among the best in the industry, security vulnerabilities are inevitable. Once a hacker discovers a vulnerability, before the security patch is released, all Iot will be like "Getting started ".

Some security experts support the distributed Iot security framework. Tens of thousands of different types of devices depend on different Iot security infrastructure, which may increase the difficulty of cracking, even if the security is poor. In this way, network attackers need to find the security vulnerabilities of each Iot device, and it is difficult to deploy automatic attacks on a large scale.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.