* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Protection
Information privacy law wikipedia , lookup
Unix security wikipedia , lookup
Cyberwarfare wikipedia , lookup
Multilevel security wikipedia , lookup
Next-Generation Secure Computing Base wikipedia , lookup
Distributed firewall wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Wireless security wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Security printing wikipedia , lookup
Airport security wikipedia , lookup
Information security wikipedia , lookup
Mobile security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Social engineering (security) wikipedia , lookup
Cybercrime countermeasures wikipedia , lookup
Smart City Security issues Overseas Business Headquarters 1 >>World population By 2050 there will be 9 billion people on earth (CNN Wire Staff). Six billion of these people will be in urban areas. Out of necessity, this future population will dwell in urban centers. Your Logo 2 >>Smartcity Network • • Smart City is a very large and complex systems Networks, cloud computing, big data and other high-tech application and development are facing complex network environment 3 >>Smartcity Smart City Data security Data security is needed because Smart City Data security is needed because Smart City Development is a necessity for the exploding population of earth and this development can be seriously impaired if data security is not taken into account when designing urbanized living areas. 4 >>Smartcity data The combination of useful data being used by smart tools allows for the rise of smart cities. But secured data is imperative. Security is vital to protect sensitive information about populations, companies or governments. 5 Smart cities security challenges Malicious network attacks Urban management information leaks Disclosure of personal information Business continuity and disaster recovery of security threats 6 >>Protection What to secure? 1111111111 Confidential information Non repudiation of source and/or information The infrastructure against DoS attacks Where to add security? 1111111111 The wireless access link The backone infrastucture The servers How to secure? 1111111111 Selection of algorithms that scale for sensor communication 7 Information security system Information Security Management Security System Information security system to protect the system 1 information security organization security system 3 2 information security technology security system 4 Information security system 5 Information Security Disaster Recovery System 6 information security risk assessment, evaluation mechanism 8 Protection • • • Man-made Accidental Environmental or natural • • • Corruption of data: Accidental Terrorism based 9 Protection 10 Products and solutions Encryption machine • Information security infrastructure achievements • Cryptographic devices, • Security terminals • Network security devices • Other series of information security tools: 11 SSR Product Inspur SSR operating system security enhancement system is a tool for the reinforcement of the host operating system software, mainly to solve the known and unknown viruses, hacker attacks damage to the operating system. 12 Inspur server security software - SSR SSR Inspur SSR is operating system kernel layer reinforced security software, hardware, based on the multi-layer security Immune the server operating system against known or unknown virus program, ROOTKIT level backdoor threat. Ensure the security, confidentiality, data assets of the business system user availability, continuity. 13 Products and solutions Physical security check safety management system Including environmental safety, equipment safety and other aspects of security and media Including rules and regulations, security organization, asset classification and control other aspects of security personnel Including aspects of the network architecture, Network security network equipment and security equipment Server security Including information systems server operating system, database, application software, etc. Including aspects of strategic accounts, disk partitions, and desktop anti-virus software Terminal computer security programs, etc. 14 Protection • • • • • • Definition of the object of protection (ISIR) and categories of protected information; Description of the process (simulation) of information security ISIR; Programming the required level of information security; Setting the required level of information security; Identification of measures to protect the ISIR predetermined level; Assessment and control level of information security. 15 China's response to security issues Inspur break the U.S. monopoly: Under the guidance of the Ministry of Industry, made the host system industry alliance established in Beijing, which is China's first IT Industry Alliance, K relocation project: the national security risks from the "root" rule : • January 2014, Inspur in Beijing held a grand press conference, officially launched the "K relocation project", comprehensively promote the Inspur K1-scale alternative IOH (IBM, Oracle and HP) minicomputers 16 THANKS Inspur Group Co .,Ltd Overseas Business Headquarters Tel:+86-531-8510 6660 Fax:+86-531-8510 6749 Web:en.inspur.com Module und Variations_E 1717