2019年12月17日星期二

The future development of the Internet of Things is difficult

On January 9, Apple Computer urgently released iOS12.2.2, and MacOS10.13.2 update program, and rarely "advise all users to install." Why? This is due to the fact that the security industry recently discovered the so-called "chip crisis."

The computer software industry has a saying that “there is no perfect software in the world”, so the software needs to be updated from time to time; the same is true for hardware, and the hardware is also designed to have problems. Not only will the software be hacked, but also hardware. The eruption of the "chip crisis" is the best example. The cause of this wave of chip crisis is that the world’s major computer processor manufacturers, including Intel, AMD, and ARM, have appeared on the bottom layer of the processor chip. Loopholes. As the products of these three processors spread across personal computers, smart phones, tablet computers, and cloud service servers, the discovery of vulnerabilities has also triggered an uproar in the technology community.

What are the hardware problems that the three processor manufacturers have? In simple terms, one is known as Meltdown and the other is called Spectre. Melting this loophole exists only on Intel's chips. It allows hackers to bypass the obstacles set by the hardware to steal private data stored in the computer's memory, such as login information on the browser, such as account passwords, and Personal files, e-mails, photos, messaging, etc. The ghost hole is commonly found on desktops, laptops, web servers, and portable devices that use Intel, AMD, and ARM processors. Hackers may exploit ghost holes and use hardware to break into the operating system to steal important information from users within the application.

This difference, in fact, has little effect, because we can find that the current major information devices, processors will not be able to take off these three major companies; moreover, the affected devices are spread across desktops, laptops, servers, and even portable devices. This is basically almost all information equipment, all of which will be affected and it is difficult to escape.

However, this is not the most striking loophole in computer hardware design. In October last year, information personnel in Belgium discovered that the current WPA2 next-generation encryption protocol used by Wi-Fi wireless networks in Puerto Rico also showed loopholes. At present, most of the Wi-Fi base stations in the world use the WPA2 encryption protocol. In simple terms, if there is a loophole in the WPA2 encryption protocol, it means that when users use encrypted wireless networks to transmit information, they may still be cracked by hackers to steal data. This is certainly a big warning to the development of wireless networks. Because of this online vulnerabilities, it will also affect various operating systems on various information devices. It is a matter of great concern. The relevant research institutes must wait until they have developed a patching plan in order to worry about causing panic. , of course, also need to release operating system patches to save. When this news was exposed, it really caused great shock to the outside world, because no one thought that such a trustworthy and trustworthy, fourteen-year-old network-based online encryption system actually had inherent loopholes.

From the above two examples, we can see that although there is no perfect software in this world, there is also no perfect hardware. After the booming of the wireless network, people can access the Internet at any time and anywhere, making the Internet an indispensable and important part of modern life. However, the computer hardware and software technology crisis that broke out one after another has shown that the network is still tantamount to crossing the river in the direction of the Internet of Things and even the so-called Industrial 4.0. There are still considerable risks. When the wireless network has become so pervasive in personal life and widely used by everyone, how to effectively maintain its security becomes a more important issue. In fact, network technology, just like the airplane, train or rapid transit system, enjoys the convenience it brings, but it does not mean that it has no risk. This is what we must understand. Therefore, when we optimistically look forward to the wireless network is enough to allow us to build the so-called Internet of Things, and we will also move towards the so-called industry 4.0, we must also face many unknown hardware and software issues, and we need to be active. Discover and overcome.

In the past, most of the security focuses were on software. Now we are more aware of the fact that hardware will in fact have security loopholes and will give interested people an opportunity. Of course, we must not waste our food. Because of inevitable defects, we will block the pace of advances in information technology. However, we must also realize that there are still many stumbling blocks in the technology of network hardware and software that we need to find and overcome. . How to formulate a contingency record once a problem arises may be the direction we must incorporate when we are trying to develop the Internet of Things and Industry 4.0.

Power Cord

Power Cable ,AC Power Cord ,Right Angle Power Cord ,Power Cable Types

Electric Wire & Cable Co., Ltd. , http://www.nbcables.com

没有评论:

发表评论