At the SyScan360 Asia Pacific Forward Information Security Technology Conference held in Shanghai, the 360 ​​Vehicle Network Security Center was officially established. The center was established by 360 companies in conjunction with a number of universities, auto and parts companies. It is the first professional car and car in China. A cross-industry partnership for networked security protection.
Information security becomes a weakness in the car, and the safety of the car network is in a hurry
With the application of technologies such as the Internet, artificial intelligence, wireless networks, cloud computing, and big data, today's cars are becoming more intelligent and networked, and automobiles have become a veritable intelligent terminal device in the era of the Internet of Everything. At present, the car has 25 to 200 ECUs (electronic control units), the limousine has 144 ECU connections, the software code exceeds 65 million lines, and the unmanned software code exceeds 200 million lines. Five years later, The amount of data generated by each smart car every day is around 4000GB.
According to Liu Jianwei, a security expert at the 360 ​​Vehicle Network Security Center, the computing and networking systems used in automobiles follow the existing computing and networking architectures, thus inheriting the natural security flaws of these systems. As the number of ECUs and connections in the car increases, the attack surface of the hacker on the car will be greatly increased. Especially after the car is connected to the cloud through the communication network, each computing, control and sensing unit has a connection path. It may be exploited by hackers due to security breaches to achieve attack and control of the car.
In recent years, there have been many car information security incidents. In July 2015, two US hackers remotely cracked and controlled Chrysler's JEEP car, and Chrysler recalled 1.4 million cars.
In August 2015, a cloud service of a domestic auto manufacturer was also leaked, which could lead to the leakage of information and the remote control of the car;
In 2015, researchers at two European universities said that through wireless modules and antennas, it is possible to track all vehicles in a small city with a tracking cost of less than $500,000;
In August 2016, the 360 ​​Auto Safety Lab first cracked the Tesla Autopilot system through a sensor leak.
Liu Jianwei said that as an important part of the public transportation system, after the car is controlled by hackers, it will not only leak the personal information and privacy of the driver, but also directly bring personal and property damage and loss, and even directly affect public safety.
The automotive industry begins to act and launches a variety of programs and measures
The new safety hazards of automobiles caused by information systems or network connections have already attracted the attention of the automotive industry. Many automakers such as GM, Tesla and Volkswagen have publicly recruited security personnel, established security companies or cooperated with security agencies. To deal with the information security of cars.
In November 2016, the National Highway Traffic Safety Administration officially released the “Best Network Security Guide for Automobiles” to help automakers deal with the security threats that cyber attacks may pose to connected cars, and provide information on how to prevent car access. Authorized networks, protection of critical security systems and personal data, and how to quickly recover from cyber attacks, and conducted extensive network security testing.
Recently, Japanese automakers have announced that they will start a common working group in 2017 to share information on hacking and data leakage to enhance car information security protection.
China attaches great importance to the safety of the Internet of Vehicles. The "Made in China 2025" formulated by the State Council has carried out research on automotive information security as a key basic issue. In October 2016, China's "Energy Conservation and New Energy Vehicle Technology Roadmap" was officially released, information security. Became an important part of the roadmap and made clear plans for vehicle-related information security and vehicle lifecycle information security protection technologies.
A survey of the domestic automotive industry shows that information security has attracted the attention of major auto manufacturers. Most auto manufacturers have begun to establish corresponding systems and take corresponding measures to protect information security, but subject to investment, personnel, Insufficient technical ability and experience, it is still impossible to ensure the information security of the entire life cycle of the car through a sound system.
The first car network security center was established to protect automotive information security through cross-industry cooperation
When intelligence and network association have become the theme of automobiles, information security of automobiles has become an important part of Internet security. The protection of automobile information requires the cooperation and participation of the automotive industry and the network security industry.
The reporter learned that as the largest Internet security company in China, 360 has entered the field of automotive information security since 2013. In 2014, the world first discovered the security hole of Tesla, and this year, the world's first automatic cracking of Tesla's automatic. Driving function. 360 also has in-depth cooperation and joint research with Beijing Aerospace University, Zhejiang University, Tesla, Changan Automobile, BYD, Great Wall, BOSCH, VisualThreat and other research institutions, automobile manufacturers and automotive information security related manufacturers, in the car network security The research field has accumulated rich experience and achievements, and has also formed a complete and groundable solution in the safety practice of the vehicle network. It can truly and effectively solve the safety problem of the vehicle network, and form a complete protection product capability and a full life cycle for the vehicle. Automotive information security best practices.
"We have accumulated three years in the field of automotive information security, and have conducted in-depth cooperation with the automobile industry chain including government authorities, and participated in many major scientific research projects such as the national 'Intelligent Networking Automotive Technology Roadmap'", 360 Tan Xiaosheng, vice president and chief security officer of the company, said, "The purpose of setting up the 360 ​​car network security center is to deepen the automotive industry and fully export the security and attack, vulnerability mining, security products, security services in the field of network security accumulated over 360 years to the automotive industry. Safety response, safety data capabilities and experience, using the world's leading automotive information security research capabilities, product innovation and service capabilities to provide life-cycle information security protection for the automotive, transportation and related fields of the Internet of Everything."
It is reported that 360 Car Network Security Center has two car information security attack and defense research teams, three laboratories, one joint research institute and one car information security professional security team, launched 360 car guards, CANPICK and other car safety protection. And detection products, 360-network security operation platform based on safety big data has also been put into operation. This is the first comprehensive information operation platform for automobile information security that enters the time-sensitive operation in China, and can export vehicle network security to the automotive industry and network security industry. Threat intelligence.

Welded Gabion Mesh

hot dipped galvanized welded rock cage

Welded gabions are wire mesh containers welded with high quality steel mesh.They can be filled on site with hard durable stone materials to form mass gravity retaining structures. Owing to their inflexibility, welded gabion can not adapt to differential settlement or be used in water courses ,In comparison with woven wire gabions, welded gabion offer a higher strength. In order to meet different project requirements, various wire diameters and unit sizes are available for welded gabion. It is composed of Welded Mesh panel and spring steel lacing wire.

As a highly-accomplished wire mesh exporter, Kingdelong was established jointly by China and South Korea in 1986, Our strategic location in Anping County,Hebei province is only 300KM away from Beijing and Tianjin, which offers us very competitive advantages both in trade and logistics. Through two decades of hard work, Kingdelong company had evolved into one of China`s largest wire mesh manufacturing companies,Covering an area of over 200,000㎡, certificated by ISO 9001 & ISO 14001,as well as more than 450 diversified production machines, which are either imported from foreign countries or developed in-house.Wire mesh products find applications in a wide range of industries, from Pharmacy to petroleum and chemical to textile.

Welded Gabion Mesh,Welded Wire Mesh,Mesh Welded Gabion Wire,Gabion Retaining Wall Wire

ANPING KINDELONG WIRE MESH CO.,LTD. , https://www.wire-mesh.org