Hello, welcome to Anhui Hope Network Technology Co., Ltd. official website!
Site map About us Contact us Hotline: 18919659329

Do the official website, find hope

Focus on enterprise website optimization19

National unified hotline:

18919659329

Contact us

  • Address: 5th Floor, Building D7, Innovation Industrial Park, No.800 Wangjiang West Road, Shushan District, Hefei City
  • 邮编:230088
  • 电话:18919659329
  • Email: 362755336@qq.com

What is the security threat of edge computing

Source: Popularity: 1244 Published time: 2019-04-26 13:26:58

In the era of networking, whether it is the emergence of 4G and 5G, people are very interested in软件Internet speed requirements are getting higher and higher。The so-called edge computing is a technology that deploits a universal server on the network access side to provide computing power for the terminal on the network, and its basis is that it must be close to the user, which is the key scenario of 5G。

What is the security threat of edge computing

Edge computing is a hot topic these days。So what is the security threat of edge computing?With the advent of the 5G era of high bandwidth and low latency, the landing of edge computing has gradually entered the schedule。However, due to the architectural characteristics of "strong place, weak central" of edge computing, it is more vulnerable to attacks by hackers and criminals。

Here, hackers can break into the network through edge computing platforms or even applications to steal sensitive data or carry out (D)DOS attacks。This is a problem that enterprises involved in the edge computing domain must think about。Specifically, there are the following points:

1.Physical attacks on infrastructure, vulnerabilities in virtualization software and operating systems can be used by hackers or criminals。

2.Trojan horse or virus attacks on the MEC platform。Unauthorized access to MEC platform through ME app, tampering with or stealing business data between MEC Platform and ME app。

3.Trojan horses or viruses attack MEC to orchestrate and manage system nes, tamper with, intercept or replay data transmitted on the related interfaces of nes。

4.Trojans or viruses attack the data plane gateway, launch physical attacks on the data plane gateway, or tamper with and intercept the data transmitted between the data plane gateway and the MEC platform。

Generally speaking, in the era of edge computing, a lot of important data will be completed near the user end, avoiding the risk of information disclosure after uploading to the cloud, but in fact, the security risks here are even worse。In the era of cloud computing, the operator's room is under its own perfect monitoring, generally speaking, the guarantee has a high guarantee。However, in the era of edge computing, due to the fact that most of its services are processed locally, the data is completely exposed outside the network, and the operator's control can not cover every edge end, making the universal server at the access network lack perfect protection, quite a sense of being beyond the reach。





I want to know
The problems your business is facing right now?
One-touch dialing
" class="hidden">湖北美术学院