Tech for All > Security

Four Pillars of Cyber Security and Security Building Process

Four Pillars of Our Cyber Security Control

  •  
    Preventing & Hardening
    Our security system is built to meet stringent standards
    •  

      Equip our devices with hardware chipsets to prepare for physical hacking

    •  

      Offer separate security processors

  •  
    Detection
    We remain vigilant at all times
    •  

      Monitor activities around devices and networks

    •  

      Promptly activate defense systems against any possible malicious intrusions

    •  

      Detect and proactively block cyber security threats in daily lives, such as malware and phishing

  •  
    Response
    We respond quickly and accurately
    •  

      Accurately analyze detected problems, vulnerabilities and projected damage

    •  

      Promptly block cyberattack attempts detected through the security control system

    •  

      Offer optimized security patches and up-to-date security solutions

  •  
    Prediction
    We are ready for the future
    •  

      Verify the validity of our solutions through regular simulation tests

    •  

      Security expertise + big data analysis + AI technology = Offer optimal security system offered

We run our own security building process to provide reliable security solutions.

  • Step 1
     
    Plan
    • Define and review security requirements
    • Analyze privacy/security risks
  • Step 2
     
    Design & Analysis
    • Perform threat modeling
    • Review security design
  • Step 3
     
    Implement
    • Review complementing security codes
    • Examine open-source security
    • Review threat and mitigation with code
  • Step 4
     
    Test
    • Carry out vulnerability testing
    • Perform penetration testing
  • Step 5
     
    Operation and Maintenance
    • Conduct monitoring and incident response
    • Update security patches
Last updatedJune 28, 2024