Second, the security of personal property. Internet finance has been developing rapidly in the past two years, and financial tools are gradually shifting from PC to mobile and even wearable devices. On the one hand, the development of technology brings more convenient interaction and lifestyle, but at the same time, the network security hazards of mobile devices and smart hardware will also threaten the security of personal property.
Third, the safety of the person. Unlike smartphones, many smart hardware products will no longer provide services through application software, but through the hardware itself. 360 security team has studied the Tesla Model S car, found that the use of a certain loophole in the car's software can be used to remotely control the vehicle; the famous U.S. hacker Barnaby Jack has demonstrated at the hacking conference to demonstrate that 9 meters away from invading implanted pacemaker and other wireless medical devices, and then send a series of high voltage to them, and then send a series of high voltage to them, and then send a series of high voltage to them. Barnaby Jack, a famous hacker in the United States, demonstrated at a hacking conference that he could hack into wireless medical devices such as implanted pacemakers from nine meters away, and then send a series of high-voltage electric shocks to them, making "remote-controlled killing" a reality.
Fourth, enterprise security. In addition to the network security threats posed to individual users, the Internet of Everything (IoE) era also poses potential risks to enterprise network security. At present, many enterprises support BYOD (Bring Your Own Device, bring your own device office), in addition, there are many employees will carry a variety of connectivity Wi-Fi, 3G/4G, Bluetooth and other networks of smart devices into the office. Therefore, compared to the network security threats faced by enterprises in the past, the current enterprise network security boundaries are becoming increasingly blurred, with more and more access points.
In order to cope with the challenges and threats of future Internet security, Zhou Hongyi in the seventh China-US Internet Forum has said that 360 put forward three principles of user protection: First, user data should be owned by the user; second, the user has the right to know and the right to choose, the user has the right not to allow the network company to use their own data; third, the company has a greater responsibility to protect the user's data, safe storage and safe transmission.