With the application and development of 5G technology, from the utilities of water power, electricity and government affairs to smart medical devices and automatic driving cars in the personal life city, 5G has made a disruptive change in city’s mode of production and operation, bringing not only convenience but also new network security challenges.

As we all know, the typical characteristics of 5g technology are high bandwidth and low delay. In the past, only 20m data could be transmitted in one second, and most enterprises only needed to process a small part of data in real time. However, in the new technology environment, 1g or more data can be transmitted in one second. The exponential improvement of computing power makes it possible for industries with high requirements for data response speed, such as automatic driving and telemedicine. It is necessary to ensure the high-frequency real-time processing ability of data and avoid the risk of data security.

This is a new issue that enterprises urgently need to solve. On the one hand, the faster the business runs, the stronger the security response to the business. In the era of stand-alone PC, the time to solve a system vulnerability can be t + 1 or even longer; In the mobile Internet era, network threats become real-time responses, finding and solving one; However, in the 5g era, the traditional network security boundary disappears, and the active defense system with the capabilities of automatic perception, real-time response, tracking and threat trapping replaces the traditional passive defense mechanism.

On the other hand, 5g technology may also be used by attackers. In the past, attackers mainly used servers or fixed networks to launch attacks, but 5g technology is mature, which provides convenient mobility. For example, they can also launch attacks on “highways”; In addition, high-quality network system will also become a tool for attackers. A study at Princeton University shows that Internet of things devices such as intelligent air conditioner or intelligent water heater may be attacked by hackers and become botnets, which will bring down the whole power grid.

Facing the new network security challenges brought by big data, how should enterprises deal with them? In a popular word, it is to use the ability of big data to solve the challenge of big data and “treat people with their own way”.

The improvement of enterprise big data processing capacity means that the secure processing capacity is also improving, and the computing power behind the two is consistent. On the basis of artificial intelligence and cloud computing capabilities, enterprises can calculate where and at what point in time enterprise systems and software may be attacked during operation through previous big data.

To achieve this, there are three requirements for enterprises: first, in terms of security concept, the security capability of each company must match the business capability, and pay equal attention to the processing of business data and security data; Second, in terms of data compliance, it must be implemented in strict accordance with national standards and relevant laws and regulations, which is the core of data governance and the basis of data security; Third, Internet companies are becoming the backbone of network security. In the face of the complex network situation, enterprises should unite to promote interaction and interoperability, joint defense and co defense. For this reason, starting from 2018, we hope to combine the strength of academia and the industry to improve the overall network security level of the industry by establishing a security emergency response center platform.

As ordinary users, we should be clear: the future network security protection is no longer the protection of hardware terminals such as computers or mobile phones, but the protection of their privacy and data from abuse.

Before providing personal information authorization, every user should spend a minute thinking about whether the personal information I provide is necessary to use this product? Once we find that personal information is improperly used, we should reverse deduce and think for the first time. From which channel may these abused personal information be leaked? If every user can establish a mode of thinking and behavior to protect personal privacy and data, it will be a great positive impetus for the whole industry to establish compliant, legal and legitimate data use norms. The state is also actively preparing to formulate laws and regulations and establish a legal basis for the implementation of big data security compliance, such as the personal information protection law and the data security law.

When laws and regulations delimit the security boundary for big data, excellent enterprises will tap new opportunities to better serve users from the circulation and application of big data and maximize their technical advantages, which is also an era dividend for our generation of Internet and security practitioners.

Leave a Reply

Your email address will not be published. Required fields are marked *