Traditional Culture Encyclopedia - Hotel accommodation - 5G, the industrial internet is exciting, but it ignores a problem that may subvert the whole situation.

5G, the industrial internet is exciting, but it ignores a problem that may subvert the whole situation.

With the aura of the protagonist in the second half of the Internet, the industrial Internet is becoming the direction of Internet giants and traditional industries. With the advent of the 5G era, the industrial Internet has accelerated into the fast lane, and network security issues have become increasingly serious. What is worrying is that this problem that may "subvert the whole" has been ignored.

Bonus hunter, the data leakage is shocking, and the security needs to be "upgraded"

"In the past, almost 80% and 90% of the customer equity funds we paid for marketing activities were lost by the' wool party' (editor's note: online buzzwords refer to those who specially choose marketing activities of Internet companies in exchange for high returns at low cost or even zero cost). Many banks and financial institutions are stared at by the' wool party' almost all the year round. Basically, as soon as your marketing campaign is launched, 1 will be eliminated within 2 minutes. The leaders of our head office often say that there is only one reason why a bank can be overturned in an instant, and that is information security. " Li Zhao, president of China Postal Savings Bank Shenzhen Bay Sub-branch, told China Economic Weekly.

The financial industry is one of the fastest growing fields of industrial Internet, and it is also one of the industries that will cause the most serious consequences once the network security problem appears.

In Li Zhao's view, in many industries, including banks, business is ahead, technology is behind, and safety is at the end. "Our understanding of network security is often not in place. For example, students on the business side hope that the product will go online in a month or two, and students on the security side will say no, and they can only go through in-depth testing, attack and defense, and vulnerability scanning, otherwise there will be many security problems in the future. " He said.

The reality is that the project manager can't wait to concentrate all his energy on the realization of the function, while the safety aspect is mentioned less. However, a painful example is in front of us: the data of hundreds of millions of bank card customers of the first capital of the seventh largest commercial bank in the United States was leaked, which is estimated to bring losses of 654.38 billion to 654.38 billion US dollars; Marriott Hotel has been hacked for a long time, resulting in the data leakage of more than 500 million customers around the world. Marriott was subsequently fined by governments of various countries and collectively claimed by customers for more than $10 billion ... but as long as security problems did not happen to them, everyone's consciousness would be difficult to change.

"Why do we have to take security to a new level today? This is because the whole security environment has changed dramatically. From government, enterprises to individuals, the process of digitalization is accelerating, which means that our original security model must be changed and upgraded. " Ma Bin, vice president of Tencent Group, told China Economic Weekly.

Ma Bin believes that both safety practitioners and non-safety practitioners, such as business personnel, must "improve safety", and the most important thing is to change the concept of safety. "It is conservatively estimated that black products can pocket 654.38+00 billion yuan a year, but the scale of the industry it affects may reach 654.38+0 trillion. However, the safety output value we invest each year is less than 50 billion. " He said.

"As a bank, we hope that Tencent, which has more than 20 years of experience in cracking down on criminals, will empower security. At present, 23 cooperation projects in nine categories have been carried out, and the effect is very good. Take violent cracking as an example. There used to be 20,000 to 30,000 times a day, but now there are 70,000 to 80,000 times. Now it has basically dropped to less than 1 0,000, and the effect is very good and obvious. In the offensive and defensive drills, we can also maintain a record of zero scores. " Li Zhao revealed.

5G security is a double-edged sword, and we should face up to the challenges it brings.

With the rapid development of the Internet, all kinds of security problems that have never appeared have followed, and the network security of enterprises is facing unprecedented new challenges.

"5G security is a' double-edged sword', both good and bad. Enterprises need to face up to the challenges and prepare in advance. " Wu, Chairman of internet society of china and Academician of China Academy of Engineering, said at the 5th Internet Security Leaders Summit (CSS 20 19).

Compared with 4G, the peak rate of 5G is increased by 30 times, and the user experience data rate is increased by 10 times. However, compared with the simple and relatively safe "fool" network in the past, after the network function is virtualized, the hardware is white-boxed, and the management system is centralized, the equipment will be more vulnerable to attacks, and the impact of system attacks will become greater.

Wu believes that in the past, the protocol of mobile communication was closed. Now 5G adopts the Internet protocol, and many existing applications of the Internet can be directly ported to 5G, which brings business flexibility, but it increases the possibility that 5G will be attacked by the outside world, and needs to pay a security price. "The 5G operation management support system is becoming more and more complicated, and it is impossible for network management personnel to operate it. Must be independently adjusted by the network. He Hezhen emphasized that the intelligent operation and maintenance center of 5G is the hub of 5G and the focus of security defense. " He said.

He Hequan takes the Internet of Vehicles as an example. He believes that the Internet of Vehicles is the best application of 5G at present. 5G plus edge computing can meet the low delay requirements of vehicle-to-vehicle communication, vehicle-to-cloud traffic lights and vehicle-to-parking lot. In terms of high reliability, high bandwidth and Dalian connection, the Internet of Vehicles faces more security challenges.

"The Internet of Vehicles requires extremely low latency, but if the encryption security measures are too complicated, it is a great challenge to ensure low latency and high reliability encryption. Therefore, we should also give new consideration to the whole encryption protocol, simplify the management process of the original security context, and support edge computing and the protection of private data. " Wu said to:

He Hezhen said that 5G has realized the integration of computing and communication, and network operation and maintenance based on big data and artificial intelligence has reduced human error. Intelligent monitoring is conducive to improving the security level of the network, but the virtualization and software definition capabilities of 5G have also introduced new security risks, and it is necessary to face up to the security challenges brought by 5G.

The securities market ushered in 100 billion development opportunities.

"In the process of digital technology promoting industrial upgrading, the importance of network security has become increasingly prominent. For example, medical care, finance, Internet of Things, and even energy and industry. In these industries, the degree of digitization is relatively high, and the demand for security is the most urgent. He predicted that in the next 3-5 years, safety will accelerate into the fast lane of industrial development. " Tang Daosheng, president of Tencent Cloud and Smart Industry, said.

According to the forecast of IDC, an authoritative market research and analysis organization in the United States, the total expenditure on security solutions in China is expected to reach 6.95 billion dollars in 20 19, and the compound annual growth rate during the forecast period of 20 18-2022 is 25.6%, which is much higher than the global average. By 2022, the security market is expected to grow to 1000 billion.

"The development of the industrial Internet era has brought the cloud demand of enterprises and brought many incremental market opportunities to the development of the security industry; In the past, China's traditional security only accounted for about 3% of enterprise IT investment, but in the practice of Tencent Smart Government and other projects, it was found that the security ratio of some new business scenarios was much greater than this ratio, and the security market variables brought about by the digital development of the industry became increasingly apparent. Tencent hopes to join hands with security industry chain partners to build and enjoy the incremental dividend of industrial security. " Ding Ke, vice president of Tencent, told China Economic Weekly.

In the era of digital industry, security is more important than ever, which is becoming the knowledge of the whole industry.

"In the era of industrial digitalization, enterprises need to improve their security and defense capabilities. To solve this problem, we should not only think from a technical point of view, but also establish systematic thinking. Amazon puts security in a strategic priority and systematically builds a better security protection system to protect the safety of itself and corporate customers. " Werner vogels, vice president and chief technology officer of Amazon, said at the 5th Internet Security Leaders Summit (CSS 20 19) that he was the head of technological innovation in Amazon, including cloud computing, and had led the Amazon cloud service team to great success.

"The driving factor behind the digital transformation is the speed of safe execution. In the past, it was passive defense thinking, but now it should be active planning, putting the construction of safety protection system ahead. Safety is a promoting factor, not an obstacle. " Werner vogels said.

Editor: Zhang Wei