The establishment of the government and enterprises are exploring the safety compliance system, in 2014 the Ministry of Public Security issued the network access control industry standard "terminal access control product safety technical requirements" to help organizations build network compliance system. Surplus high-tech as the only domestic manufacturers to participate in the standard setting.
Enterprises in the formulation of the Internet of things security program, but also need to consider from four aspects: 1, adaptability of various networks; 2, adaptability of various terminals; 3, personnel certification and calibration; 4, statements, statistics and traceability.
In the interconnected network environment, different types of devices may enter the network, so the basis of security protection should be identification and discovery, and keep abreast of the dynamic of each device in the network. Therefore, to make a large number of surplus of high-tech achievements, and these technologies are successfully applied to the surplus of high-tech network access control system (ASM network specification management system), the system can well adapt to the networking environment, effectively promote the Internet Security protection.
Surplus high-tech network access control system, specifically from the following aspects to protect the Internet of things security:
1) through advanced equipment fingerprint identification technology, from terminal prevention and control.
When the device is connected to the network, it can collect various inherent information of the device by means of network scanning, scanning and passive monitoring. The integrated operation forms the only "fingerprint" information of the device". When the device is illegally replaced, the information will be displayed as a different value, so that it is possible to determine whether or not the forged device is illegally connected. Once found, alarms will be carried out and network blocked.
2) display the whole network topology through the detailed network perspective function.
The network boundary management function can fully maintain the integrity of network boundaries. When there is illegal access network NAT equipment, HUB equipment, WIFI networking equipment, ASM through the analysis of network data in the network, collecting the information of network equipment, can quickly show the network boundary device. For illegal border devices, network blocking can be carried out to prevent them from accessing the network, resulting in security risks.
3) real time security state discovery in the Internet of things
Unlike common vulnerability scanners, the ASM's real-time security state discovery capability is a fully automated process. When the device access, status changes, feature information updates are found, the automatic status scanning is started immediately. Implementation of security status discovery at 0.
With the popularization of Internet of things and the change of information technology, our security measures should be changed accordingly. Enterprises and institutions also need to systematically protect the technology, considering the use of advanced technology to protect the Internet of things. Nip in the bud is the foundation of safety.