Summary: | 碩士 === 國立交通大學 === 管理學院科技管理學程 === 106 === With the advent of the Internet of Things, we are entering, or going to enter, a smart life full of digitization and intelligence. However, when all the information is transmitted through the Internet, and then through the cloud to provide convenient services, it also represents our security and privacy are exposed on this open network platform, thus we may be attacked by the hackers at anytime and anywhere. Therefore, along with the progress of the Internet of Things, both terminal devices and cloud services are actively seeking cost-effective security solutions. Is the existing program sufficient to withstand most hacking attacks? Can cost-effectiveness continue to be optimized? It has also become one of the topics most concerned by the Internet of Things industry. However, referring to security, most of people would intuitively believe that relying on the main chip or secure element can solve all security problems, but often overlooked one of the key components of on the PCBA - flash memory. This study analyzes the possible threats of Internet of Things through secondary data analysis, and other primary data case studies and in-depth interviews with experts. Based on the Harvard Business School's description in note of marketing strategies, from market analysis 5C’s, STP, 4P’s, gradually deriving the marketing strategy of secure flash memory in the Internet of Things industry. I also hope that the Internet of Things industry will come out more cost-effective products in the near future to improve our safety and quality while facilitating our lives.
|