Protection

January 25, 2018 | Author: Anonymous | Category: Science, Health Science, Immunology
Share Embed Donate


Short Description

Download Protection...

Description

Smart City Security issues

Overseas Business Headquarters

1

>>World population

By 2050 there will be 9 billion people on earth (CNN Wire Staff). Six billion of these people will be in urban areas. Out of necessity, this future population will dwell in urban centers.

Your Logo 2

>>Smartcity Network





Smart City is a very large and complex systems Networks, cloud computing, big data and other high-tech application and development are facing complex network environment 3

>>Smartcity Smart City

Data security

Data security is needed because Smart City Data security is needed because Smart City Development is a necessity for the exploding population of earth and this development can be seriously impaired if data security is not taken into account when designing urbanized living areas. 4

>>Smartcity data

The combination of useful data being used by smart tools allows for the rise of smart cities.

But secured data is imperative. Security is vital to protect sensitive information about populations, companies or governments. 5

Smart cities security challenges

Malicious network attacks Urban management information leaks Disclosure of personal information Business continuity and disaster recovery of security threats

6

>>Protection

What to secure? 1111111111

 Confidential information  Non repudiation of source and/or information  The infrastructure against DoS attacks

Where to add security? 1111111111

 The wireless access link  The backone infrastucture  The servers

How to secure? 1111111111

 Selection of algorithms that scale for sensor communication 7

Information security system

Information Security Management Security System Information security system to protect the system

1 information security organization security system

3

2

information security technology security system

4

Information security system

5

Information Security Disaster Recovery System

6 information security risk assessment, evaluation mechanism

8

Protection

• • •

Man-made Accidental Environmental or natural

• • •

Corruption of data: Accidental Terrorism based

9

Protection

10

Products and solutions Encryption machine

• Information security infrastructure achievements • Cryptographic devices, • Security terminals



Network security devices

• Other series of information security tools:

11

SSR Product Inspur SSR operating system security enhancement system is a tool for the reinforcement of the host operating system software, mainly to solve the known and unknown viruses, hacker attacks damage to the operating system.

12

Inspur server security software - SSR SSR

 Inspur SSR is operating system kernel layer reinforced security software, hardware, based on the multi-layer security

 Immune the server operating system against known or unknown virus program, ROOTKIT level backdoor threat.  Ensure the security, confidentiality, data assets of the business system user availability, continuity.

13

Products and solutions Physical security check safety management system

Including environmental safety, equipment safety and other aspects of security and media

Including rules and regulations, security organization, asset classification and control other aspects of security personnel

Including aspects of the network architecture, Network security network equipment and security equipment

Server security

Including information systems server operating system, database, application software, etc.

Including aspects of strategic accounts, disk partitions, and desktop anti-virus software Terminal computer security programs, etc. 14

Protection

• • • • • •

Definition of the object of protection (ISIR) and categories of protected information; Description of the process (simulation) of information security ISIR; Programming the required level of information security; Setting the required level of information security; Identification of measures to protect the ISIR predetermined level; Assessment and control level of information security. 15

China's response to security issues

Inspur break the U.S. monopoly: Under the guidance of the Ministry of Industry, made the host system industry alliance established in Beijing, which is China's first IT Industry Alliance,

K relocation project: the national security risks from the "root" rule : •

January 2014, Inspur in Beijing held a grand press conference, officially launched the "K relocation project", comprehensively promote the Inspur K1-scale alternative IOH (IBM, Oracle and HP) minicomputers

16

THANKS Inspur Group Co .,Ltd Overseas Business Headquarters Tel:+86-531-8510 6660 Fax:+86-531-8510 6749 Web:en.inspur.com

Module und Variations_E

1717

View more...

Comments

Copyright � 2017 NANOPDF Inc.
SUPPORT NANOPDF