纪念我的 First Eassy ——2021.08.27如何解决未来城市发展中的数字信息安全问题？
In today's era of advanced information, big data has penetrated almost every aspect of people's lives, affecting people's lifestyles, behaviors, and thinking. According to statistics, hundreds of thousands of sensors appear in our lives every year, responsible for collecting and sensing our lives. However, in recent years, the increase in personal information leakage and the security issues it brings has made us aware of the importance of data security. How to build a complete, sustainable, and modern information data system that is conducive to management is a continuing problem to be solved in the construction of a smart city. In this article, I will discuss the impact of information security leakage on personal economic and social sustainability in the first part. In the next chapter, I will introduce digital encryption technology and Internet of Things technology (IoT), then explore them through detailed specific cases to find a balance between the growth of digital sensors in future cities and the protection of human privacy.
In fact, more and more user information such as payment records, emails, and travel habits are collected and uploaded to the Internet through desktop computers and social software. This situation occurs in many places in the city except for mobile phones, street lights, elevators, restaurants, and even hotels. However, because these data sensors come from different platforms, there is no unified regulatory standard, and it is difficult to conduct centralized management. In addition, some databases do not have enough technology and funds to maintain customer data, so it is easy to cause leakage. According to Marshall, J. P.(2015) survey, mobile phone software can obtain a large amount of our personal data and trade this information to a third party to obtain benefits from it. It is conceivable that when information such as exercise steps, travel routes, weather conditions, road coordinates and other information collected by thousands of users in the same city obtained by criminals, the situation will become very dangerous, which may affect economic stability and even national security. In this way, information security will undoubtedly affect the sustainable development of the region and the modernization of urban informatization.
The leakage of personal information affected the safety of personal property and tensed the economic development and sustainable operation of mobile communications industry. According to Ismail N(2018), 43% of telecommunication companies in England suffered DNS malware attrack and the top four cybercrime attacks were Phishing scams, Cyberstalking, Online Harassment and Invasion. In addition, most users whose personal information was stolen have changed operators and expressed concern about the security of their personal information stored on the network. Moreover, when the user opens sharing permission, sensitive data such as web search history, shopping history, chat history may be collected and used for fraud, crime and advertising. Finally, mobile communication operators need to spend expensive equipment and hire experts to check the security vulnerabilities in the information cloud system, and users also need to pay more to store their important private information safely to avoid being stolen. Therefore, the economic problem caused by information leakage is a cycle and a sustainability problem that needs to be addressed in the future.
In urban development, improper protection of information security also threatens the sustainable development of a good information environment and the stability of social security. Firstly, if people find that their online shopping records, conversation records, and taxi information were quietly collected and turned into many targeted advertising links appearing in their lives, they will be wary of their mobile devices and reduce Records of their sensitive and private information. When users turn off the data collection permissions on their devices, there is no doubt that this is not conducive to the further development of the information service industry. What’s more, Harford T(2014) mentioned that these relevant and potentially useful data can be collected and simulated by big data statistics, and without strict supervision, these data are most likely to be used by criminals. For example, spies from other countries can use this information for regional transportation, energy use investigations, national defense building positioning or intelligence surveillance, which will seriously affect the stable development of the region and the lives of residents. Therefore, the protection of personal information is not only a technical problem between users and operators, but also a problem to be solved to ensure the stable and sustainable development of society.
Since the COVID-19 pandemic, more and more medical institutions had chosen to use databases with digital encryption technology to prevent cyber attackers from attacking people's medical data and using them for economic benefits. As recorded by (Gewirtz.D 2020), within two months of 2020 alone, the number of attacks on medical information institutions had increased by 400%, and with the increase in remote desktop connections, employees had to continue at an unprecedented speed Changes introduced new technologies. This new digital encryption technology can firstly update the protection standards, and then convert the original data into ciphertext through a key and a set of specific algorithms. This method can make the data in the database more random and concealed, just like tearing off the cover of each book, making it difficult for attackers to find the specific files they want. According to a survey conducted by Erdozain, JC (1999), in more than half of the network attack cases experienced by enterprises in April 2020, digital encryption technology had helped them successfully intercept more than 70% of attacks such as: loss of confidential data, ransomware.
The Internet of Things(IoT) refers to a virtual network, the difference with encryption technology is that IoT could connect everyday devices and things together in a unified standard, complete system. This virtual network can manage and protect data while allowing various devices in our lives to collect and share data, which greatly improves the speed and security of data sharing. As Shao G(2013) reported that the cost of sensors had declined and these sensors could be located anywhere: buildings; roads; doors; vehicles. According to Weinberg(2015), promoting unified deployment among different devices can facilitate the management of all kinds of data in our lives, then support the future urban informatization construction and sustainable development of smart cities.
Although the implementation of digital encryption technology does help to solve the problem of serious leakage of important user information, its long-term maintenance and upgrading still face huge economic challenges.The investment funds of individual users are often limited and outside of the critical period, even large organizations can hardly insist on paying large amounts of information security funds. In this case, in order to smoothly implement the development of digital encryption technology, this problem should be solved by rationally arranging government subsidies, strengthening the interaction between enterprises and individuals, and reasonably allocating the proportion of funds. On the other hand, as more and more people realize the importance of information security and strengthen personal awareness through technology, it is positive for the whole society.
In addition, one of the problems facing the development of IoT in cities is that it is difficult to complete the unification of various communication equipment and sensor systems. According to the survey estimated that between 2014 and 2020, the number of IoT devices put into use worldwide range from 16 billion to 50 billion(Cham 2020). This means it is difficult for the government to keep up with the market's growth rate and the increase in demand because of the production technology advancement has also increased the overall management difficulty of the system. Most citizens do not yet fully understand and trust the IoT technology, and it will take some time for the popularization of the technology, so the development of the Internet of Things in the cities are some way off.
To summarize, this essay has explored the possible information security issues in the construction of urban digital information, made an analysis which focuses on the analysis of the impact of digital information leakage on economic and social security, and put forward some sustainable solutions from the perspective of technology and ecological construction. In any case, the offensive and defensive war on information security will continue for a long time. Upgrading traditional digital encryption technology can help individuals or companies avoid data loss in a short period of time, Internet companies and governments should also strengthen cooperation to provide support for long-term technical maintenance. At the same time, the government should also call on consumers to join the construction of the urban Internet of Things and build a sustainable city plan. Although this still has a long way off, with the continuous advancement of sensor technology and communication fields, that day will be realized soon.
- Batty, M. Axhausen KW. Giannotti F. et al. (2012). Smart cities of the future.
- Cham. (2020). Industrial IoT: challenges, design principles, applications, and security.
- Erdozain. (1999). Encryption technologies and digital signatures. International Busines Lawyer.
- Goodspeed, R. (2015). Smart cities: moving beyond urban cybernetics to tackle wicked problems.Cambridge J Regions Econ Soc 8:79–92.
- Gewirtz, D. (2020). COVID cybercrime: 10 disturbing statistics to keep you awake tonight. Retrieved from ZDNet.
- Harford, T. (2014). Big data: are we making a big mistake?
- Ismail, N. (2018). Telcos struggling to mitigate the threats of cyber attacks. Available at:https://www.information-age.com/telcos-cyber-attacks-123476699.
- Marshall. Zowghi D. et al. (2015). Disorder and the disinformation society: The social dynamics of information, networks and software. Routledge, Taylor & Francis Group.
- Su, X. Shao G. Vause, J. et al (2013). An integrated system for urban environmental monitoring and management based on the Environmental Internet of Things. Int J Sustain Dev World.