The Situation of Information Security in 2016

2016, destined to add a splendid page in history of information technology, has already impressed us in the first half. Wearable devices went up to the wrist of every tech fans; a company will feel disgrace for launching a flagship without fingerprint identification; everyone could order everything with a few taps on the screen. This, was inconceivable ever before, even in 2015.

This thesis, which is based on my limited knowledge, is written to share some thoughts about the situation of information security in 2016. I'll introduce you to the anatomy of information security events happened recently from my own perspective. Mistakes are highly possible. Please do not hesitate to inform me of them.

Let's come straight to the point. In a word, 2016, information security is of unprecedented importance, and is in unprecedented threat. Let me remind you of a few things.

The ghost events. Some potential risks lurk in the boom of online meal ordering and delivery service. To allay people's concerns, lots of platforms in this industry paste the licences of meal providers directly on the web page. But do these so-called qualified providers, even exist? With a revelation from CCTV, a significant number of ghost restaurants come to our attention. These restaurants are some ineligible meal providers using fake licences. Thanks to the boom of this industry, platforms are too busy to check the qualifications of each restaurant. As a result, the ghost restaurants are fish escaping from the net. The same phenomenon exists in online car-hailing. Recent cyber exposure shows some screenshots of Uber app, indicating the existance of ghost cars. The drivers of these cars only grab orders without showing up, leaving passengers waiting.

The ghost events typically represent the deceptive and unsafe info on the web, which may put every netizen in jeopardy.

The safety loopholes of wearable devices. Short for Internet Data Corporation, IDC predicts that in 2016, wearable devices shipment will jump to 100 million, up nearly 8 times from a year ago. [1] Some first-class wearable devices such as Apple Watch, Samsung Galaxy Gear and Fitbit health trackers are well-known. But not everyone can afford the uneconomical prices of these smart gadgets. To meet this piece of blue sea, and with the help of the reducing costs of chips and parts, certain manufacturers launched some both economical and multifunctional wearable devices. But how do they cut down the price? The first sacrifice is the safety. These manufacturers are unwilling to employ qualified security experts to tackle potential threats, thus, personal info might be given away. The NOP survey found that the bluetooth signal emitted by most wearable devices, including Xiaomi, Jawbone and Mio, is easy to hack. [2] Again, our info is at risk.

The crisis of mobile payment. Red-envelope war attracted the attention of every Chinese the year before last, while in 2016, mobile payment reaches an even higher level. eMarketer [3] forecasts 210% growth in the total value of mobile payment transactions this year. Most people steep themselves in the flourish of this industry, completely unaware of the danger. However, the risks of mobile payment are not far to seek. On the one hand, the OSes and apps themselves are not strong enough. Xinhua reported that the full disk encryption of Android 5.0 or later is under terrible threat of malevolent brute force attack. [4] Disappointingly, safty is still a perennial problem of Android. On the other hand, worldwide netizens have not attached deserved importance to their network security consciousness. Crimes concerning mobile payment emerge in endless stream.

Nevertheless, there're someone who spare no effort to surmount the cruelty of information security in 2016.

Apple plays a preeminent role throughout years. The iPhone 5s unveiled in 2013 was the first phone feature the technology of reliable fingerprint identification. Several months ago, Apple introduced the second generation Touch ID, which is even safer and faster. With a built-in hardware chip and mass capital investment, Apple made it the best in this industry, safeguarding huge amount of personal data in 2016. Followed by a dozens of companies like HTC and Samsung, Apple is not alone.

Other measures are taken to ensure the safty of information. Secure phone and trusted OS lead the new trend. We take 360 as an example. 360 launched a brand new smartphone two months ago, claiming that it's capable of multi-defense using a 'bank level' hardware security chip. This piece of chip is running outside the entire Android ecosystem. It encrypts independently, stores your passwords independently and identifies your fingerprints independently. There is no way to root your phone, to erase your info, let alone accessing to info without authority.

So in the second half of 2016, what are the rules of thumb (well, in my opinion) to ensure information security? For the governments, it is unlikely to tackle with all attacks, so education play an essential part in thawing the tense atmosphere, teaching the tech guys being loyal to their country. The enterprises and companies must face the survival of the fittest in natural selection. In other words, technology is the hard truth. For us individuals, good network security consciousness is quite enough. In order to achieve this, we need to pay close attention to the media, and always be acquisitive to information security knowledge.

Generally speaking, the importance of information security reaches the peak in 2016, so does the level of information threat. With the boom of several emerging industries including online meal ordering and online car-hailing, and the fashion of wearable devices and mobile payment, building up the Great Wall for information security seems arduous. Yet in 2016, we also witnessed the efforts of several companies, fighting to defend our privacy.

References:

  1. Data from the official website of IDC: link.
  2. Information from the non-profit organisation Open Effect: link.
  3. eMarketer is a reliable and professional provider of data and research on digital.
  4. The link for the news is following: link.

在我博客上面的鏈接:傳送門

最后編輯于
?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請(qǐng)聯(lián)系作者
  • 序言:七十年代末劳澄,一起剝皮案震驚了整個(gè)濱河市,隨后出現(xiàn)的幾起案子,更是在濱河造成了極大的恐慌,老刑警劉巖,帶你破解...
    沈念sama閱讀 217,406評(píng)論 6 503
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件叛本,死亡現(xiàn)場(chǎng)離奇詭異,居然都是意外死亡,警方通過查閱死者的電腦和手機(jī)在塔,發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 92,732評(píng)論 3 393
  • 文/潘曉璐 我一進(jìn)店門,熙熙樓的掌柜王于貴愁眉苦臉地迎上來拨黔,“玉大人蛔溃,你說我怎么就攤上這事±橛” “怎么了贺待?”我有些...
    開封第一講書人閱讀 163,711評(píng)論 0 353
  • 文/不壞的土叔 我叫張陵,是天一觀的道長(zhǎng)零截。 經(jīng)常有香客問我麸塞,道長(zhǎng),這世上最難降的妖魔是什么涧衙? 我笑而不...
    開封第一講書人閱讀 58,380評(píng)論 1 293
  • 正文 為了忘掉前任哪工,我火速辦了婚禮,結(jié)果婚禮上弧哎,老公的妹妹穿的比我還像新娘雁比。我一直安慰自己,他們只是感情好撤嫩,可當(dāng)我...
    茶點(diǎn)故事閱讀 67,432評(píng)論 6 392
  • 文/花漫 我一把揭開白布偎捎。 她就那樣靜靜地躺著,像睡著了一般。 火紅的嫁衣襯著肌膚如雪茴她。 梳的紋絲不亂的頭發(fā)上寻拂,一...
    開封第一講書人閱讀 51,301評(píng)論 1 301
  • 那天,我揣著相機(jī)與錄音败京,去河邊找鬼兜喻。 笑死,一個(gè)胖子當(dāng)著我的面吹牛赡麦,可吹牛的內(nèi)容都是我干的朴皆。 我是一名探鬼主播,決...
    沈念sama閱讀 40,145評(píng)論 3 418
  • 文/蒼蘭香墨 我猛地睜開眼泛粹,長(zhǎng)吁一口氣:“原來是場(chǎng)噩夢(mèng)啊……” “哼遂铡!你這毒婦竟也來了?” 一聲冷哼從身側(cè)響起晶姊,我...
    開封第一講書人閱讀 39,008評(píng)論 0 276
  • 序言:老撾萬榮一對(duì)情侶失蹤扒接,失蹤者是張志新(化名)和其女友劉穎,沒想到半個(gè)月后们衙,有當(dāng)?shù)厝嗽跇淞掷锇l(fā)現(xiàn)了一具尸體钾怔,經(jīng)...
    沈念sama閱讀 45,443評(píng)論 1 314
  • 正文 獨(dú)居荒郊野嶺守林人離奇死亡,尸身上長(zhǎng)有42處帶血的膿包…… 初始之章·張勛 以下內(nèi)容為張勛視角 年9月15日...
    茶點(diǎn)故事閱讀 37,649評(píng)論 3 334
  • 正文 我和宋清朗相戀三年蒙挑,在試婚紗的時(shí)候發(fā)現(xiàn)自己被綠了宗侦。 大學(xué)時(shí)的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片。...
    茶點(diǎn)故事閱讀 39,795評(píng)論 1 347
  • 序言:一個(gè)原本活蹦亂跳的男人離奇死亡忆蚀,死狀恐怖矾利,靈堂內(nèi)的尸體忽然破棺而出,到底是詐尸還是另有隱情馋袜,我是刑警寧澤男旗,帶...
    沈念sama閱讀 35,501評(píng)論 5 345
  • 正文 年R本政府宣布,位于F島的核電站欣鳖,受9級(jí)特大地震影響察皇,放射性物質(zhì)發(fā)生泄漏。R本人自食惡果不足惜观堂,卻給世界環(huán)境...
    茶點(diǎn)故事閱讀 41,119評(píng)論 3 328
  • 文/蒙蒙 一让网、第九天 我趴在偏房一處隱蔽的房頂上張望。 院中可真熱鬧师痕,春花似錦、人聲如沸而账。這莊子的主人今日做“春日...
    開封第一講書人閱讀 31,731評(píng)論 0 22
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽。三九已至笔横,卻和暖如春竞滓,著一層夾襖步出監(jiān)牢的瞬間,已是汗流浹背吹缔。 一陣腳步聲響...
    開封第一講書人閱讀 32,865評(píng)論 1 269
  • 我被黑心中介騙來泰國(guó)打工商佑, 沒想到剛下飛機(jī)就差點(diǎn)兒被人妖公主榨干…… 1. 我叫王不留,地道東北人厢塘。 一個(gè)月前我還...
    沈念sama閱讀 47,899評(píng)論 2 370
  • 正文 我出身青樓茶没,卻偏偏與公主長(zhǎng)得像,于是被迫代替她去往敵國(guó)和親晚碾。 傳聞我的和親對(duì)象是個(gè)殘疾皇子抓半,可洞房花燭夜當(dāng)晚...
    茶點(diǎn)故事閱讀 44,724評(píng)論 2 354

推薦閱讀更多精彩內(nèi)容

  • PLEASE READ THE FOLLOWING APPLE DEVELOPER PROGRAM LICENSE...
    念念不忘的閱讀 13,471評(píng)論 5 6
  • **2014真題Directions:Read the following text. Choose the be...
    又是夜半驚坐起閱讀 9,495評(píng)論 0 23
  • 葉在風(fēng)的懷抱中舞蹈, 地在葉的渲染中斑斕格嘁。 天在樹的縫隙中破碎笛求, 當(dāng)風(fēng)帶著葉遠(yuǎn)走高飛, 當(dāng)天與地融合為一體糕簿, 當(dāng)秋...
    千古東方閱讀 115評(píng)論 0 7
  • 奇異果是日常生活中不少朋友都愛吃的水果探入,在很多地方又被叫做“獼猴桃”。它不僅蘊(yùn)含著補(bǔ)充人體需求的豐富維生素懂诗,同樣也...
    執(zhí)筆青衫閱讀 689評(píng)論 0 5
  • 我想寫一點(diǎn)關(guān)于生活的蜂嗽,關(guān)于成長(zhǎng)的 我想通過我自己的記錄 記下我生命中出現(xiàn)的人 發(fā)生的事 我想等我自己老的時(shí)候偶爾翻...
    仒歺呝蝁齾閱讀 203評(píng)論 1 1