当前位置:网站首页>Summary of research on endogenous information security technology of industrial measurement and control equipment
Summary of research on endogenous information security technology of industrial measurement and control equipment
2022-07-29 09:05:00 【Midoer technology house】
Abstract : Industrial measurement and control equipment is the nerve center of industrial control system , Its information security is directly related to the safety of industrial control system . Traditional information security protection technology has limitations , The network cannot block the access of physical media transmission data and physical devices , Even physically isolated industrial measurement and control equipment , It can also be an attack target , There is an urgent need to enhance the endogenous safety protection ability of industrial measurement and control equipment . This paper combines relevant international standards and national standards , The endogenous information security protection technology of industrial measurement and control equipment is divided into static reinforcement technology and dynamic protection technology , The seven types of information security protection technologies involved are logically classified , The term definition of endogenous information security of industrial measurement and control equipment is given , And specific analysis 、 The advantages and disadvantages of the existing relevant theoretical research and key technologies are evaluated . Last , The development trend of endogenous information security protection technology of industrial measurement and control equipment is prospected .
key word : Industrial measurement and control equipment Information security Data encryption Access control Integrity assurance
边栏推荐
- Reptile practice (10): send daily news
- LeetCode刷题(6)
- 预训练模型与传统方法在排序上有啥不同?
- 6.3 references
- Retinal Vessel Segmentation via a Semantics and Multi-Scale Aggregation Network
- 分组背包
- [unity entry program] collection of common learning websites
- Arfoundation Getting Started tutorial 7-url dynamically loading image tracking Library
- Curl -v | JQ
- 2022 P cylinder filling test simulation 100 questions simulation test platform operation
猜你喜欢

Restful style details

Data is the main body of future world development, and data security should be raised to the national strategic level

ERROR 1045 (28000): Access denied for user ‘ODBC‘@‘localhost‘ (using password: NO)

Leetcode deduction topic summary (topic No.: 53, 3, 141, interview question 022, the entry node of the link in the sword finger offer chain, 20, 19, Niuke NC1, 103, 1143, Niuke 127)
Data representation and calculation (base)

Intel will gradually end the optane storage business and will not develop new products in the future

How does xjson implement four operations?

正则表达式校验版本号

Flowable 基础篇1

2022危险化学品经营单位主要负责人操作证考试题库及答案
随机推荐
Common query optimization technology of data Lake - "deepnova developer community"
Group Backpack
On the charm of code language
The biggest upgrade of Bluetooth over the years: Bluetooth Le audio is about to appear in all kinds of digital products
Asp graduation project - based on C # +asp Design and implementation of enterprise investment value analysis system based on. Net + sqlserver (graduation thesis + program source code) -- enterprise in
Analysis of zorder sampling partition process in Hudi - "deepnova developer community"
Sword finger offer 26. substructure of tree
What is the difference between the pre training model and the traditional method in sorting?
2022危险化学品经营单位主要负责人操作证考试题库及答案
Leetcode question brushing (6)
MySQL error summary
英语高频后缀
[unity entry program] C # and unity - understand classes and objects
Data is the main body of future world development, and data security should be raised to the national strategic level
BI data analysis practitioners learn financial knowledge from scratch? What introductory books are recommended
Database system design: partition
Demonstration and solution of dirty reading, unrepeatable reading and unreal reading
Memory leaks and common solutions
One article tells you the salary after passing the PMP Exam
Count the list of third-party components of an open source project