网络安全:集现超变态传奇私服代技术和商业威胁为一体
2021-02-20
Cybersecurity, Modern Technology and Business Threats
数据观 | 张青青(译)
The year 2020 is overcome with the COVID-19. But the virus isn’t the only threat to our security. 2020 is also set to revolutionize the world with advancements that will shape the future of lives and businesses, alike. We now have 5G and IoT to Artificial Intelligence, Cloud technology, and Machine Learning. These technologies will become an integral part of our daily lives in creating efficiency, saving time, reducing costs, and unlocking new opportunities.
2020年新冠病毒席卷全球,但这并非是危及人类安全的唯一威胁。2020年也是某些先进技术改变世界的一年,这些先进的技术变革将会改变未来人类社会的生活方式和商业模式。如今,我们已经掌握了5G技术、物联网、人工智能、云科技和机器学习。诸类科技将会帮助我们提高工作效率,节约工作时间,降低生产成本,并创造新的商机,变成我们日常生活中必不可少的一部分。
Though this optimistic language is something you hear quite often (and it’s not untrue to a large degree), the more the world transforms towards a digital future, the higher the rise in threats of Cyberattacks.
尽管关于技术的乐观论调可谓老生常谈,但长远来看,这并非完全正确,即——“世界向未来数字化发展的程度越高,所带来的网络攻击风险也就越大。”
Modern technology is set to increase the amount of data we create online, and protecting this data will be one of the defining arcs of this decade. From system security to network security, businesses will face challenges in optimizing their cybersecurity to prevent malicious attacks from being successful.
现代技术将增加我们在线创建的数据量,保护这些数据资料,将会成为未来十年重中之重的主要任务,从系统安全到网络安全,企业将面临优化网络安全问题的挑战——能否成功地防止恶意网络攻击。
It is hard to prevent malicious attacks because these technologies are new, vulnerabilities are less known, scalability harder due to a lack of familiarity, thereby making all of these ambiguities an excellent target for bad actors to exploit.
随着科技发展日新月异,网络安全的漏洞难以洞察,因此我们很难阻止恶意网络攻击,并且由于我们对网络攻击缺乏充分地了解而导致计算机防护技术的发展变得更加困难,这片灰色地带成为恶意攻击者的绝佳目标。
So let’s take a look at some of these technologies, modern regulations in place, and what businesses can do to combat this threat with regards to their cybersecurity.
因此,让我们回顾某些当下的技术、现代法规以及企业在网络安全方面可以采取哪些措施来应对网络安全威胁。
The Advent of 5G and It’s Cybersecurity Vulnerabilities 5G的到来及网络安全隐患
As 5G trials and roll-outs happen, we are entering a new era of communication and innovative consumer services. As the adoption of 5G will require companies and people to switch to all-software networks, the cycle of constant updates might result in security vulnerabilities.
随着5G试运行和全面实行的到来,我们正进入通信和创新型消费者服务的新阶段。由于5G的运行需要公司和其人员切换到全软件网络,因此持续运作更新的网络闭环可能会导致网络安全隐患。
These frequent updates are similar to the updates of smartphone software, but those about 5G networks can lead to security risks. Risks are something that early adopters will have to deal with since the number of 5G connected devices that send and receive information increases and remote access becomes much more commonplace, cybersecurity experts will have a huge challenge in front of them.
这些频繁的更新类似于智能手机软件的更新,但是关于5G网络的更新可能会引发安全风险。由于发送和接收信息的5G连接设备数量增加,且远程访问变得更加普遍,因此早期5G使用者必须应对5G技术所带来的安全风险。但跟5G使用者比起来,网络安全专家更应当未雨绸缪。
With increased users and use, expanding the bandwidth for 5G will present opportunities for experts looking to exploit these vulnerabilities. As enterprises and cities become 5G powered, the attack surface will become much larger, putting the burden on governments and private enterprises to pump up and revolutionize their security tools and strategies to safeguard their devices, networks, and applications against malicious attackers.
随着用户和使用率的提高,5G宽带的扩展将会为研究网络安全漏洞的专家提供发展机会。随着5G全面覆盖企业和城市,网络攻击的覆盖面将变得加宽泛,这将使政府和私营企业必须大力推广和革新其安全工具和策略,以保护其设备、网络和应用程序免受恶意攻击。
One problem that early adopters might face due to a lack of security infrastructure could be the authorization and identification of a 5G network. Access to the system can allow a significant threat to data and security, and perhaps these early users might adopt a stringent no-trust policy with regards to 5G network access.
由于网络安全基础设施的缺乏,早期的使用者可能会面临5G网络的授权和识别问题。访问系统可能会对数据和安全性造成严重的威胁,也许这些早期的5G用户可能会对5G网络访问表现出极大的不信任和排斥。
Don’t Think Phishing Is Over 网络钓鱼并没有结束
Though technology is evolving rapidly in the digital landscape, cybersecurity experts will have to deal with phishing attacks. These attacks are often targeted to penetrate a network or infect the users of the network itself.
尽管数字领域技术飞速发展,但网络安全专家还是不得不应对网络钓鱼攻击。 这些攻击的目标通常是渗透网络或感染网络本身的用户。