µÚÒ»Õ£ºÈí¼þÒþ˽Ìõ¿îϵÄÒþÃØÌõ¿î
ÊÐÃæÊ¢ÐеÄÅ®ÐÔÇå¾²ÀàÓ¦Óã¬81%±£´æÌ«¹ýË÷ȨÎÊÌâ¡£µ±Óû§µã»÷"ÔÞ³É"ʱ£¬ÏÖʵÒÑÊÚȨÈí¼þ¶ÁȡͨѶ¼£¨Contact List£©¡¢×¼È·¶¨Î»£¨Geolocation£©¡¢ÉõÖÁÏà²áÎļþ¡£Ä³×ÅÃûÐÄÀíÆÚ×·×ÙAPPµÄÒþ˽Õþ²ßÏÔʾ£¬»á½«ÆäÍøÂçµÄ¼¤ËØË®Æ½Êý¾ÝתÂô¸øÒ©ÆóÓÃÓÚÊг¡ÆÊÎö¡£¸üÒþ²ØµÄΣº¦ÔÚÓÚ£¬²¿·ÖÈí¼þͨ¹ý"¹²Ïí¹¦Ð§"ÓÕµ¼Óû§ÉÏ´«Ç×ÃÜÓ°Ïñ£¬ÔƶËЧÀÍÆ÷È´±£´æÑÏÖØµÄÊý¾Ý¼ÓÃÜÎó²î¡£
µÚ¶þÕ£ºÈ¨Ï޹ܿØÖеÄÏÝÚåʶ±ðÒªÁì
Çø·ÖÇå¾²Èí¼þµÄÒªº¦ÊÇ¿´¶®È¨ÏÞÉêÇëÂß¼¡£Õý¹æAPPÓ¦×ñÕÕ×îСȨÏÞÔÔò£¨Least Privilege Principle£©£¬ºÃ±ÈÃÀ×±ÀàÈí¼þË÷ÒªÉãÏñͷȨÏÞͨÇé´ïÀí£¬µ«ÒªÇó¶ÁÈ¡¶ÌОʹæÒÉ¡£²âÊÔ·¢Ã÷£¬Ä³ÏÂÔØÁ¿ÆÆ°ÙÍòµÄ"·À͵Åļì²âÆ÷"ÔÚÓû§¹Ø±Õ¶¨Î»È¨ÏÞºó£¬ÈÔͨ¹ý»ùÕ¾Èý½Ç¶¨Î»£¨Cell Tower Triangulation£©Ò»Á¬×·×ÙλÖÃÐÅÏ¢¡£´Ëʱ¿É½èÖúϵͳ×Ô´øµÄȨÏÞ¼à¿Ø¹¦Ð§£¬¼ì²âÓ¦Óúǫ́µÄÕæÊµÑéΪ¡£
µÚÈýÕ£ºÃô¸ÐÊý¾Ý¼ÓÃܵÄÕæÊµÐÔÑéÖ¤
ºÅ³Æ½ÓÄÉÒøÐм¶¼ÓÃÜ£¨AES-256£©µÄÈí¼þ£¬ÊµÔò±£´æÃÜÔ¿ÖÎÀíÎó²î¡£×¨¼Ò½¨Òé´ÓÈý¸öά¶ÈÑéÖ¤£ºÉó²éÊý×ÖÖ¤Êé½ÒÏþ»ú¹¹¡¢²âÊÔ¶ÏÍøÊ¹Óù¦Ð§¡¢¼ì²éÊý¾Ýͬ²½ËÙÂÊ¡£Ä³É罻ƽ̨ÄÚÖõÄ"˽ÃÜÏà²á"ЧÀÍ£¬ÍâòÉÏʹÓÃÇø¿éÁ´´æ´¢£¬µ«Çå¾²É󼯷¢Ã÷Æä˽Կ£¨Private Key£©¾¹È»Ã÷ÎÄ´æ·ÅÔÚÊÖ»ú»º´æÖС£ÕâÀàα¼ÓÃÜЧÀÍÓÌÈçδÉÏËøµÄ°ü¹Ü¹ñ£¬ÍþвԶ´óÓÚͨË×Ó¦Óá£
µÚËÄÕ£ºÉúÎïʶ±ðÊÖÒÕµÄÁ½ÃæÐÔÆÊÎö
Ãæ²¿Ê¶±ð£¨Facial Recognition£©ºÍÖ¸ÎÆ½âËø¿´ËÆÇå¾²£¬ÊµÔò´´Á¢ÐµÄΣº¦µã¡£Ñо¿·¢Ã÷£¬23%µÄÒþ˽±£»¤ÀàAPP»á»º´æÉúÎïÌØÕ÷Êý¾Ý£¬¶øÕâЩÊý¾ÝÒ»µ©Ð¹Â¶ÎÞ·¨ÏñÃÜÂë°ãÐ޸ġ£Ä³ÃÀÑÕÏà»úÊÕÂÞµÄÃæ²¿ÌØÕ÷Êý¾Ý£¬±»ÆØÓÃÓÚѵÁ·µÚÈý·½µÄÈËÁ³Ö§¸¶Ä£×Ó¡£¸üÑÏÖØµÄÊÇ£¬µ±ÉúÎïÌØÕ÷ÓëÒ½ÁÆ¿µ½¡Êý¾Ý¹ØÁªºó£¬¿ÉÄܱ»ÓÃÓÚÉÌÒµÒ½Áưü¹ÜµÄÆçÊÓÐÔ¶¨¼Û¡£
µÚÎåÕ£º½¨ÉèË«²ã·À»¤ÏµÍ³µÄÐëÒªÐÔ
×ÊÉîÍøÂçÇå¾²ÕÕÁÏÍÆ¼öµÄÈý²ã·ÀÓùϵͳֵµÃ½è¼ø£ºµÚÒ»²ãʹÓÃÓ²¼þ¸ôÀëµÄɳºÐÇéÐΣ¨Sandbox Environment£©£¬µÚ¶þ²ãÉèÖö¯Ì¬ÐéÄâºÅÂ루Disposable Virtual Number£©£¬µÚÈý²ãÆôÓÃË«ÒòËØÈÏÖ¤£¨Two-Factor Authentication£©¡£ÊµÑéÊý¾ÝÏÔʾ£¬ÕâÀà×éºÏ·ÀÓù¿É½«Êý¾Ýй¶¸ÅÂʽµµÍ92%¡£ÒÔijÓïÒôÈÕÖ¾Ó¦ÓÃΪÀý£¬Óû§Â¼ÒôÎļþ¾ù¾ÓÉÍâµØÐ¾Æ¬¼ÓÃܺó²Å¾ÙÐÐÔÆ¶Ë±¸·Ý¡£
ÔÚÏíÊܿƼ¼±ãµ±ÓëÊØ»¤Ð¡ÎÒ˽¼ÒÒþ˽µÄÌìÆ½ÉÏ£¬ÏûºÄÕßÐèÒª½¨ÉèȫеÄÈÏ֪ά¶È¡£Ñ¡Ôñͨ¹ý¹ú¼ÊÇå¾²ÈÏÖ¤£¨ÈçISO27001£©µÄÈí¼þ²úÆ·£¬°´ÆÚÉó²éÓ¦ÓõÄÔËÐÐȨÏÞ£¬Ê¹ÓüÓÃÜÍâÖô洢Æ÷ÉúÑÄÃô¸ÐÎļþ£¬ÕâЩ¿´ËÆ·±ËöµÄ²Ù×÷£¬ÊµÔò¹¹½¨ÆðÕæÕýµÄÊý×Ö»¤³ÇºÓ¡£¼Ç×Å£¬×îǿʢµÄÇå¾²·ÀµØÊ¼ÖÕÔ´×ÔÓû§×ÔÉíµÄÌá·ÀÒâʶÓë׼ȷ²Ù×÷ϰ¹ß¡£µÚÒ»Õ£ºÈí¼þÒþ˽Ìõ¿îϵÄÒþÃØÌõ¿î
ÊÐÃæÊ¢ÐеÄÅ®ÐÔÇå¾²ÀàÓ¦Óã¬81%±£´æÌ«¹ýË÷ȨÎÊÌâ¡£µ±Óû§µã»÷"ÔÞ³É"ʱ£¬ÏÖʵÒÑÊÚȨÈí¼þ¶ÁȡͨѶ¼£¨Contact List£©¡¢×¼È·¶¨Î»£¨Geolocation£©¡¢ÉõÖÁÏà²áÎļþ¡£Ä³×ÅÃûÐÄÀíÆÚ×·×ÙAPPµÄÒþ˽Õþ²ßÏÔʾ£¬»á½«ÆäÍøÂçµÄ¼¤ËØË®Æ½Êý¾ÝתÂô¸øÒ©ÆóÓÃÓÚÊг¡ÆÊÎö¡£¸üÒþ²ØµÄΣº¦ÔÚÓÚ£¬²¿·ÖÈí¼þͨ¹ý"¹²Ïí¹¦Ð§"ÓÕµ¼Óû§ÉÏ´«Ç×ÃÜÓ°Ïñ£¬ÔƶËЧÀÍÆ÷È´±£´æÑÏÖØµÄÊý¾Ý¼ÓÃÜÎó²î¡£
µÚ¶þÕ£ºÈ¨Ï޹ܿØÖеÄÏÝÚåʶ±ðÒªÁì
Çø·ÖÇå¾²Èí¼þµÄÒªº¦ÊÇ¿´¶®È¨ÏÞÉêÇëÂß¼¡£Õý¹æAPPÓ¦×ñÕÕ×îСȨÏÞÔÔò£¨Least Privilege Principle£©£¬ºÃ±ÈÃÀ×±ÀàÈí¼þË÷ÒªÉãÏñͷȨÏÞͨÇé´ïÀí£¬µ«ÒªÇó¶ÁÈ¡¶ÌОʹæÒÉ¡£²âÊÔ·¢Ã÷£¬Ä³ÏÂÔØÁ¿ÆÆ°ÙÍòµÄ"·À͵Åļì²âÆ÷"ÔÚÓû§¹Ø±Õ¶¨Î»È¨ÏÞºó£¬ÈÔͨ¹ý»ùÕ¾Èý½Ç¶¨Î»£¨Cell Tower Triangulation£©Ò»Á¬×·×ÙλÖÃÐÅÏ¢¡£´Ëʱ¿É½èÖúϵͳ×Ô´øµÄȨÏÞ¼à¿Ø¹¦Ð§£¬¼ì²âÓ¦Óúǫ́µÄÕæÊµÑéΪ¡£
µÚÈýÕ£ºÃô¸ÐÊý¾Ý¼ÓÃܵÄÕæÊµÐÔÑéÖ¤
ºÅ³Æ½ÓÄÉÒøÐм¶¼ÓÃÜ£¨AES-256£©µÄÈí¼þ£¬ÊµÔò±£´æÃÜÔ¿ÖÎÀíÎó²î¡£×¨¼Ò½¨Òé´ÓÈý¸öά¶ÈÑéÖ¤£ºÉó²éÊý×ÖÖ¤Êé½ÒÏþ»ú¹¹¡¢²âÊÔ¶ÏÍøÊ¹Óù¦Ð§¡¢¼ì²éÊý¾Ýͬ²½ËÙÂÊ¡£Ä³É罻ƽ̨ÄÚÖõÄ"˽ÃÜÏà²á"ЧÀÍ£¬ÍâòÉÏʹÓÃÇø¿éÁ´´æ´¢£¬µ«Çå¾²É󼯷¢Ã÷Æä˽Կ£¨Private Key£©¾¹È»Ã÷ÎÄ´æ·ÅÔÚÊÖ»ú»º´æÖС£ÕâÀàα¼ÓÃÜЧÀÍÓÌÈçδÉÏËøµÄ°ü¹Ü¹ñ£¬ÍþвԶ´óÓÚͨË×Ó¦Óá£
µÚËÄÕ£ºÉúÎïʶ±ðÊÖÒÕµÄÁ½ÃæÐÔÆÊÎö
Ãæ²¿Ê¶±ð£¨Facial Recognition£©ºÍÖ¸ÎÆ½âËø¿´ËÆÇå¾²£¬ÊµÔò´´Á¢ÐµÄΣº¦µã¡£Ñо¿·¢Ã÷£¬23%µÄÒþ˽±£»¤ÀàAPP»á»º´æÉúÎïÌØÕ÷Êý¾Ý£¬¶øÕâЩÊý¾ÝÒ»µ©Ð¹Â¶ÎÞ·¨ÏñÃÜÂë°ãÐ޸ġ£Ä³ÃÀÑÕÏà»úÊÕÂÞµÄÃæ²¿ÌØÕ÷Êý¾Ý£¬±»ÆØÓÃÓÚѵÁ·µÚÈý·½µÄÈËÁ³Ö§¸¶Ä£×Ó¡£¸üÑÏÖØµÄÊÇ£¬µ±ÉúÎïÌØÕ÷ÓëÒ½ÁÆ¿µ½¡Êý¾Ý¹ØÁªºó£¬¿ÉÄܱ»ÓÃÓÚÉÌÒµÒ½Áưü¹ÜµÄÆçÊÓÐÔ¶¨¼Û¡£
µÚÎåÕ£º½¨ÉèË«²ã·À»¤ÏµÍ³µÄÐëÒªÐÔ
×ÊÉîÍøÂçÇå¾²ÕÕÁÏÍÆ¼öµÄÈý²ã·ÀÓùϵͳֵµÃ½è¼ø£ºµÚÒ»²ãʹÓÃÓ²¼þ¸ôÀëµÄɳºÐÇéÐΣ¨Sandbox Environment£©£¬µÚ¶þ²ãÉèÖö¯Ì¬ÐéÄâºÅÂ루Disposable Virtual Number£©£¬µÚÈý²ãÆôÓÃË«ÒòËØÈÏÖ¤£¨Two-Factor Authentication£©¡£ÊµÑéÊý¾ÝÏÔʾ£¬ÕâÀà×éºÏ·ÀÓù¿É½«Êý¾Ýй¶¸ÅÂʽµµÍ92%¡£ÒÔijÓïÒôÈÕÖ¾Ó¦ÓÃΪÀý£¬Óû§Â¼ÒôÎļþ¾ù¾ÓÉÍâµØÐ¾Æ¬¼ÓÃܺó²Å¾ÙÐÐÔÆ¶Ë±¸·Ý¡£
ÔÚÏíÊܿƼ¼±ãµ±ÓëÊØ»¤Ð¡ÎÒ˽¼ÒÒþ˽µÄÌìÆ½ÉÏ£¬ÏûºÄÕßÐèÒª½¨ÉèȫеÄÈÏ֪ά¶È¡£Ñ¡Ôñͨ¹ý¹ú¼ÊÇå¾²ÈÏÖ¤£¨ÈçISO27001£©µÄÈí¼þ²úÆ·£¬°´ÆÚÉó²éÓ¦ÓõÄÔËÐÐȨÏÞ£¬Ê¹ÓüÓÃÜÍâÖô洢Æ÷ÉúÑÄÃô¸ÐÎļþ£¬ÕâЩ¿´ËÆ·±ËöµÄ²Ù×÷£¬ÊµÔò¹¹½¨ÆðÕæÕýµÄÊý×Ö»¤³ÇºÓ¡£¼Ç×Å£¬×îǿʢµÄÇå¾²·ÀµØÊ¼ÖÕÔ´×ÔÓû§×ÔÉíµÄÌá·ÀÒâʶÓë׼ȷ²Ù×÷ϰ¹ß¡£