当前位置:网站首页>Code of conduct for industrial control safety
Code of conduct for industrial control safety
2022-06-09 07:08:00 【cnsinda_ sdc】
Smart IOT is composed of a large number of machines and intelligent terminals , Lack of effective human monitoring of equipment , And it's huge , Device clusters , So in addition to having Internet And the traditional network security problems of mobile communication networks , There are also some special security problems , Mainly in the following aspects :
1) The openness of the smart Internet of things makes it easy to be contacted . The Internet of things can replace people to complete some complex tasks 、 Dangerous and mechanical work , Therefore, the data acquisition and sensing nodes of the Internet of things are mostly deployed in unattended scenes , Attackers can easily access these smart devices , To invade them , interfere , Coercion and destruction , The embedded program even changes the software and hardware of the machine through local operation .
2) The vulnerability of the system will always exist, no matter how you patch it , How to encrypt channels , It is difficult for intelligent terminals to have complex security protection capabilities , Unknown , Known system vulnerabilities have always existed .
3) The means of controlling or impersonating is still based on users 、 Program 、 The common intrusion methods of scripts are to obtain the control of a terminal through vulnerabilities, etc , And then based on the user 、 Program 、 Scripts expand the scope of control . Or simply replace the fake terminal and attack the business platform directly .
I am very sure , Give Way CISO What keeps us awake at night is ,“ How can I ensure the security of software definition boundary , And can be accessed by users ?”
According to the GB/T 25070《 Information security technology technical requirements for security design of network security level protection - The first 4 part : Internet of things security requirements 》 The requirements of , Shenxinda Network Technology Co., Ltd According to the characteristics of intelligent interconnection, the R & D team , After in-depth strengthening, we have successfully developed LMDS The last meter data security protection system . Lock the intelligent Internet service platform, intelligent terminal and communication pipeline , Improve its security .
Shenxinda MCK Reinforcement host software system Adopt kernel level in-depth protection technology embedded in the middle of the operating system , Through to OS strengthening 、 Executable modules are trusted 、 Data access control and data area encryption , Improve the security level of the server , The system is subject to security risks , In particular, the system has been invaded , Even lost administrator privileges , On the premise that the intruder can log in to the system , Carry out the final security defense , Prevent malicious destruction and data theft . characteristic
⊙ Easy integration
Shenxinda host reinforcement system software , For intelligent terminal devices 、 Sensitive data in embedded terminal system , A system for anti disclosure protection of important data such as database data , Without affecting its own intelligent terminal , Under the premise of normal operation of hardware equipment , There is no need to make special changes to the system , It can realize the anti disclosure protection of the core data on the equipment terminal .
⊙ Safety maintenance
Through intelligent identification function , Only the operation and maintenance personnel can connect and access LMDS The classified area of , updated 、 debugging 、 A series of work such as maintenance . During the connection of operation and maintenance personnel , All operations will be audited , Operation and maintenance data is not audited , The operation and maintenance personnel cannot take it away , The whole operation and maintenance process will realize granular content log audit .
⊙ System security
When non maintenance personnel visit , When hackers invade the terminal , When accessing classified data , The host reinforcement system will record such illegal acts in all aspects , And directly to the manufacturer's operation and maintenance personnel and user's operation and maintenance personnel , Conduct email alarm , Inform relevant personnel to deal with as soon as possible .
边栏推荐
- UML series articles (23) advanced behavior -- process and thread
- 云原生的本手、妙手和俗手
- The new colleagues optimized the project performance once, trembling
- It is so simple to realize the rotation chart!!!
- 【SDU项目实训2019级】个人主页页面展示+个人总结
- 分布式消息中间件--消息队列介绍
- ROS compilation error genmsg/cmake/genmsg-extras Cmake:307 solution
- InfoWorld article - applying data orchestration technology to AI model training
- Technology sharing | discussion on the design of dispatching platform
- 政务大厅导航系统功能解读
猜你喜欢

Simple analysis of performance inflection point

Use postman to simulate a request to carry a token

How to store the MOOG servo valve? Simple methods

数据可视化之特别案例的运用与分析

Poor math can you learn machine learning?

Database operation statement

InfoWorld article - applying data orchestration technology to AI model training

Summarize the key knowledge of multithreading.

【踩大坑指南】CSharp_Process_运行之后提示:No Such File或者PyInstaller提示BadZip等

UML series articles (19) basic behavior - interaction diagram
随机推荐
What should Parker hydraulic motor pay attention to?
Error (119013): Current license file does not support the EP4CE10F17C8 device解决方法
【PPO姿态控制】基于强化学习(Proximal Policy Optimization)PPO训练的无人机姿态控制simulink仿真
For an experienced software engineer, what would be a preferred new programming language to learn?
Matlab: difference between tf2zp and tf2zpk
Batch writing tidb to improve writing efficiency
DeFi 去风险:分析去中心化系统中的系统性风险
Recruitment | go to work, kill werewolves after work, and recruit people every day. I'm afraid it's going to happen!
Thread scheduling and thread priority
UML series articles (25) high level behavior - state diagram
10. 正则表达式匹配
Error (119013): current license file does not support the ep4ce10f17c8 device solution
Common classes - overview of string classes
【系统分析师之路】第十八章 复盘系统安全分析与设计(加密与解密)
Poor math can you learn machine learning?
Comparison between hummingbird e203 hardware rv-star and nucleus ddr200t and MCU 200t
The Sandbox 和 Ikonia 达成合作,在元宇宙中还原足球传奇人物皮尔洛的壁画
The pure English voxedit competition is coming
实现轮播图就是这么简单!!!
Top view all processes