$GTCHD The keys to protecting sensitive operationa
Post# of 40256
“As we are working on designing a tracking application using our Infinia, Long Range Radio, a high level of cybersecurity technology is needed to protect its sensitive data. Along with high performance network operation requirement extra attention is needed to protect the network’s data; particularly, with tracking system implementation. We plan to evaluate few encryption methods among then is an AES based algorithm. The Infinia System is comprised of radio operated components, including base, mobile and repeater units, we plan to ensure a secured, adequate network interoperability functionality. Data encryption algorithms have the capability of preventing unauthorized disclosure of sensitive information, yet, it’s not enough. Especially, with today’s wireless networks vulnerabilities we plan to integrate our AI system to manage and supervise the security protocol. Additionally, the intelligent system will be performing on-going scanning, constantly searching for possible intrusion or unauthorized access. In light of today’s wireless networks potential security risks and interoperability challenges, a machine learning cryptography module will be protecting the internal network communication with high performance and reliability,” said Danny Rittman, the Company’s CTO.
https://stockhouse.com/news/press-releases/20...r-tracking