1 overseas business headquarters. 2 >>world population by 2050 there will be 9 billion people...
TRANSCRIPT
1
Smart CitySecurity issues
Smart CitySecurity issues
Overseas Business HeadquartersOverseas Business Headquarters
2
>>World population>>World population
By 2050 there will be 9 billion people on earth (CNN Wire Staff). Six billion of these people will be in urban areas. Out of necessity, this future population will dwell in urban centers.
Your Logo
3
>>Smartcity Network>>Smartcity Network
• Smart City is a very large and complex systems
• Networks, cloud computing, big data and other high-tech application and development are facing complex network environment
4
Data security is needed because Smart CityData security is needed because Smart City Development is a necessity for the exploding population of earth and this development can be seriously impaired if data security is not taken into account when designing urbanized living areas.
>>Smartcity>>Smartcity
Data security
Smart City
5
>>Smartcity data>>Smartcity data
The combination of useful data being used by smart tools allows for the rise of smart cities.
But secured data is imperative. Security is vital to protect sensitive information about populations, companies or governments.
6
Smart cities security challengesSmart cities security challenges
Malicious network attacks
Urban management information leaks
Disclosure of personal information Business continuity and disaster recovery of security threats
7
>>Protection>>Protection
1111111111How to secure? Selection of algorithms that scale for
sensor communication
1111111111Where to add security? The wireless access link The backone infrastucture The servers
1111111111What to secure? Confidential information Non repudiation of source and/or
information The infrastructure against DoS attacks
8
Information security systemInformation security system
3
Information Security
Management Security System
4
information security
organization security system
6
Information security system to protect the
system
Information security system
5
information security
technology security system
Information Security Disaster Recovery
System
information security risk assessment, evaluation mechanism
2
1
9
ProtectionProtection
• Man-made• Accidental• Environmental or natural
• Corruption of data:• Accidental • Terrorism based
10
ProtectionProtection
11
• Information security infrastructure
achievements
• Cryptographic devices,
• Security terminals
• Network security devices
• Other series of information security
tools:
Encryption machine
Products and solutions
12
SSR Product
Inspur SSR operating system security enhancement system
is a tool for the reinforcement of the host operating system
software, mainly to solve the known and unknown viruses,
hacker attacks damage to the operating system.
13
Inspur server security software - SSR
Inspur SSR is operating system kernel layer reinforced security
software, hardware, based on the multi-layer security
Immune the server operating system against known or unknown
virus program, ROOTKIT level backdoor threat.
Ensure the security, confidentiality, data assets of the business
system user availability, continuity.
SSR
14
Products and solutions
Including environmental safety, equipment safety and other aspects of security and media
Physical security check
Including rules and regulations, security organization, asset classification and control other aspects of security personnel
safety management
systemIncluding aspects of the network architecture, network equipment and security equipment
Network security
Including information systems server operating system, database, application software, etc.Server security
Including aspects of strategic accounts, disk partitions, and desktop anti-virus software programs, etc.
Terminal computer security
15
ProtectionProtection
• Definition of the object of protection (ISIR) and categories of protected information;
• Description of the process (simulation) of information security ISIR;
• Programming the required level of information security; • Setting the required level of information security; • Identification of measures to protect the ISIR predetermined
level; • Assessment and control level of information security.
16
China's response to security issues
Inspur break the U.S. monopoly:Under the guidance of the Ministry of Industry, made the host system industry alliance established in Beijing, which is China's first IT Industry Alliance,
K relocation project: the national security risks from the "root" rule :
• January 2014, Inspur in Beijing held a grand press conference, officially launched the "K relocation project", comprehensively promote the Inspur K1-scale alternative IOH (IBM, Oracle and HP) minicomputers
1717Module und Variations_E
THANKS Inspur Group Co .,LtdOverseas Business Headquarters
Tel: +86-531-8510 6660Fax: +86-531-8510 6749
Web: en.inspur.com