当前位置:网站首页>Summary of research on endogenous information security technology of industrial measurement and control equipment
Summary of research on endogenous information security technology of industrial measurement and control equipment
2022-07-29 09:05:00 【Midoer technology house】
Abstract : Industrial measurement and control equipment is the nerve center of industrial control system , Its information security is directly related to the safety of industrial control system . Traditional information security protection technology has limitations , The network cannot block the access of physical media transmission data and physical devices , Even physically isolated industrial measurement and control equipment , It can also be an attack target , There is an urgent need to enhance the endogenous safety protection ability of industrial measurement and control equipment . This paper combines relevant international standards and national standards , The endogenous information security protection technology of industrial measurement and control equipment is divided into static reinforcement technology and dynamic protection technology , The seven types of information security protection technologies involved are logically classified , The term definition of endogenous information security of industrial measurement and control equipment is given , And specific analysis 、 The advantages and disadvantages of the existing relevant theoretical research and key technologies are evaluated . Last , The development trend of endogenous information security protection technology of industrial measurement and control equipment is prospected .
key word : Industrial measurement and control equipment Information security Data encryption Access control Integrity assurance
边栏推荐
- Information system project manager must recite the quality grade of the core examination site (53)
- What should I pay attention to now? Excuse me, is it safe to open a stock account by mobile phone?
- mysql怎么换成中文
- Simple unit testing idea
- Leetcode: interview question 08.14. Boolean operation
- Regular expression verification version number
- 分组背包
- Travel notes in 2022 (ongoing)
- Use disco diffusion to generate AI artwork in moment pool cloud
- 预训练模型与传统方法在排序上有啥不同?
猜你喜欢

Floweable advanced

Leetcode deduction topic summary (topic No.: 53, 3, 141, interview question 022, the entry node of the link in the sword finger offer chain, 20, 19, Niuke NC1, 103, 1143, Niuke 127)

Could not receive a message from the daemon

Count the list of third-party components of an open source project

SAP ooalv-sd module actual development case (add, delete, modify and check)

2022.7.9 quick view of papers

MySQL statement mind map

ERROR 1045 (28000): Access denied for user ‘ODBC‘@‘localhost‘ (using password: NO)

C # use database to bind listview control data

(视频+图文)机器学习入门系列-第3章 逻辑回归
随机推荐
smart-webcomponents 14.2.0 Crack
What is the key to fast multi tag user profile analysis?
Notes on network principles (five layer network)
Using logistic regression and neural network to deal with complex binary classification problems
LeetCode刷题(6)
Complete knapsack problem from simplicity to ultimate
201803-3 CCF URL映射 满分题解
Quaternion and its simple application in unity
2022危险化学品经营单位主要负责人操作证考试题库及答案
2022.7.9 quick view of papers
[unity entry program] C # and unity - understand classes and objects
Fastjson's tojsonstring() source code analysis for special processing of time classes - "deepnova developer community"
多标签用户画像分析跑得快的关键在哪里?
Tesseract text recognition -- simple
Safety is no longer the only selling point. Test drive "slash youth" Volvo C40
解决Base64 报错 Illegal base64 character
Sword finger offer 32 - ii Print binary tree II from top to bottom
文件上传及拓展
Asp graduation project - based on C # +asp Design and implementation of enterprise investment value analysis system based on. Net + sqlserver (graduation thesis + program source code) -- enterprise in
Sublime text create page