Download Protection

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Information privacy law wikipedia , lookup

Unix security wikipedia , lookup

Cyberwarfare wikipedia , lookup

Multilevel security wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Distributed firewall wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Wireless security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Security printing wikipedia , lookup

Airport security wikipedia , lookup

Information security wikipedia , lookup

Mobile security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Transcript
Smart City
Security issues
Overseas Business Headquarters
1
>>World population
By 2050 there will be
9 billion people on
earth (CNN Wire
Staff). Six billion of
these people will be
in urban areas. Out of
necessity, this future
population will dwell
in urban centers.
Your Logo
2
>>Smartcity Network
•
•
Smart City is a very large
and complex systems
Networks, cloud computing,
big data and other high-tech
application and
development are facing
complex network
environment
3
>>Smartcity
Smart City
Data security
Data security is
needed because
Smart City
Data security is
needed because
Smart City
Development is a
necessity for the
exploding
population of earth
and this
development can
be seriously
impaired if data
security is not
taken into account
when designing
urbanized living
areas.
4
>>Smartcity data
The combination of useful
data being used by smart
tools allows for the rise of
smart cities.
But secured data is imperative.
Security is vital to protect
sensitive information about
populations, companies or
governments.
5
Smart cities security challenges
Malicious network attacks
Urban management information
leaks
Disclosure of personal
information
Business continuity and disaster
recovery of security threats
6
>>Protection
What to secure?
1111111111
 Confidential information
 Non repudiation of source and/or
information
 The infrastructure against DoS attacks
Where to add security?
1111111111
 The wireless access link
 The backone infrastucture
 The servers
How to secure?
1111111111
 Selection of algorithms that scale for sensor
communication
7
Information security system
Information
Security
Management
Security System
Information
security system to
protect the system
1
information
security
organization
security system
3
2
information security
technology security
system
4
Information
security
system
5
Information Security
Disaster Recovery
System
6
information security
risk assessment,
evaluation
mechanism
8
Protection
•
•
•
Man-made
Accidental
Environmental or natural
•
•
•
Corruption of data:
Accidental
Terrorism based
9
Protection
10
Products and solutions
Encryption machine
• Information security infrastructure
achievements
• Cryptographic devices,
• Security terminals
•
Network security devices
• Other series of information security tools:
11
SSR Product
Inspur SSR operating system security enhancement system is a tool
for the reinforcement of the host operating system software, mainly to
solve the known and unknown viruses, hacker attacks damage to the
operating system.
12
Inspur server security software - SSR
SSR
 Inspur SSR is operating system kernel layer reinforced security software,
hardware, based on the multi-layer security
 Immune the server operating system against known or unknown virus
program, ROOTKIT level backdoor threat.
 Ensure the security, confidentiality, data assets of the business system user
availability, continuity.
13
Products and solutions
Physical security
check
safety
management
system
Including environmental safety, equipment safety
and other aspects of security and media
Including rules and regulations, security
organization, asset classification and control other
aspects of security personnel
Including aspects of the network architecture,
Network security network equipment and security equipment
Server security
Including information systems server operating
system, database, application software, etc.
Including aspects of strategic accounts, disk
partitions, and desktop anti-virus software
Terminal
computer security programs, etc.
14
Protection
•
•
•
•
•
•
Definition of the object of protection (ISIR) and categories of
protected information;
Description of the process (simulation) of information security ISIR;
Programming the required level of information security;
Setting the required level of information security;
Identification of measures to protect the ISIR predetermined level;
Assessment and control level of information security.
15
China's response to security issues
Inspur break the U.S. monopoly:
Under the guidance of the Ministry of
Industry, made the host system industry
alliance established in Beijing, which is
China's first IT Industry Alliance,
K relocation project: the
national security risks from the
"root" rule :
•
January 2014, Inspur in
Beijing held a grand press
conference, officially
launched the "K relocation
project", comprehensively
promote the Inspur K1-scale
alternative IOH (IBM, Oracle
and HP) minicomputers
16
THANKS
Inspur Group Co .,Ltd
Overseas Business Headquarters
Tel:+86-531-8510 6660
Fax:+86-531-8510 6749
Web:en.inspur.com
Module und Variations_E
1717