当前位置:网站首页>Analysis of how to prevent virus in industrial computer
Analysis of how to prevent virus in industrial computer
2022-07-02 16:37:00 【CNSINDA_ HK】
With the Internet of things 、 big data 、 Artificial intelligence and other advanced technologies IT The rapid development of technology , Manufacturing industry is to reshape the core competitiveness of enterprises , Positive acceleration IT And OT Fusion , Transform the traditional production relations and business processes , From product development 、 From business management to production workshop, promote the development of enterprises in an all-round way Digital transformation And intelligent manufacturing . stay Digitization 、 Under the general trend of networking and intelligence , Industrial networks have moved from closed to open , Industrial control Security issues have gradually been concerned by all sectors of society .
IT、OT Fusion acceleration , The risk of industrial control safety has increased
In the traditional manufacturing enterprise information network , Due to the independent networking of production area and office area , Field equipment in the production area of the enterprise 、 control 、 The monitoring network and internal management network are relatively isolated from the external Internet , Formed a relatively closed environment , Good network security . But as the IT And OT Accelerated fusion of , In order to better realize the horizontal and vertical integration of the data information of internal and external enterprises and upstream and downstream enterprises in the supply chain , The equipment inside the enterprise needs to be 、 The application and information system is connected with the external network . In the process , Enterprises need to adopt standardized and general methods IT technology 、 Unified industrial protocol and open application interface , Break the isolation boundary of industrial control network , Make the industrial network from closed to open .
With the increasing openness of industrial networks , Information security risks continue to spread to the industrial field , Industrial control system (ICS) Our security protection system is facing a huge security threat . Big data era , Many enterprises protect key production and operation data as their core assets , In case of leakage , It will bring great losses to the enterprise . what's more , Industrial control system Carrying important industrial data related to social economy and even national security , Once stolen 、 Tamper with or flow abroad , Will pose a serious threat to national security . at present , The industry of the enterprise Control system (ICS) Security faces three major challenges , It is embodied in :
(1) Sabotage by hackers . With the advent of the Internet era , More and more industrial control systems and equipment , Exposure to the Internet without protective measures , Easily detected by hackers . Some hackers with ulterior motives , In order to achieve certain economic and even political interests , Intrude into the industrial gateway through the Internet , Wanton attack on industrial control systems in important departments and fields .
(2) Its own loopholes emerge one after another . Software and hardware update of industrial control system 、 The current situation of difficult replacement makes many vulnerabilities hidden and can not be repaired , For example, in SCAD Systems software 、 operating system 、 Network communication protocol 、 There are some loopholes in the security policy and management process , Hard to detect . Besides , Many industrial control systems , It is also difficult to avoid the unintentional and deliberate modification of internal technicians .
(3) Vulnerability of self-protection system . Most of the ICS The network only ensures the relative isolation between industrial network and office network by deploying firewall , each industrial automation Lack of reliable secure communication mechanism between units , For example, based on DCOM Programming is standard OPC It's almost impossible to use traditional interfaces IT Firewall to ensure its security . The effect of data encryption is poor , The identification ability of industrial control protocol is not ideal , In addition, there is a lack of industry standards and management systems , The security defense capability of industrial control system is very limited .
Personal suggestion is to use the way of host reinforcement to strengthen the industrial computer , To resist the virus
The core points of host reinforcement :
1、 System reinforcement
Lock the debugged system , Become a trusted system .
In a trusted system , Illegal procedure 、 Scripts can't run . And it will not affect data access .
Even if the system has vulnerabilities , Even administrator privileges are lost , This trusted system is secure .
2、 Program reinforcement
The executable program is signed by trusted signature 、 Start the script in real time hash Value verification , If the verification fails, the startup is rejected , And trusted programs cannot be disguised .
3、 Document reinforcement
Protect files of the specified type from tampering .
4、 Disk encryption
Create a safe sandbox , The sandbox is isolated from the outside , Encrypt the data in the sandbox , Ensure that the data can only be used under the premise of effective authorization management , To be decrypted . If there is no authorization , Even administrators cannot copy and use this data , Even system cloning does not work .
5、 Database hardening ( Structured data )
first floor : Database files are forbidden to be accessed and tampered with by unfamiliar programs . Ensure database file level security .
The second floor : Database port access trusted filtering , Only business programs are allowed to connect to the database port , At the end of the connection string IP+ port + In the account password , Append process identification .
The third level : Database connection SQL Intelligent filtering of text , Prevent critical data from being retrieved and accessed , Prevent the data in the database from being accessed illegally , Prevent dangerous operations of database forms .
The core points of host reinforcement :
1、 System reinforcement
Lock the debugged system , Become a trusted system .
In a trusted system , Illegal procedure 、 Scripts can't run . And it will not affect data access .
Even if the system has vulnerabilities , Even administrator privileges are lost , This trusted system is secure .
2、 Program reinforcement
The executable program is signed by trusted signature 、 Start the script in real time hash Value verification , If the verification fails, the startup is rejected , And trusted programs cannot be disguised .
3、 Document reinforcement
Protect files of the specified type from tampering .
4、 Disk encryption
Create a safe sandbox , The sandbox is isolated from the outside , Encrypt the data in the sandbox , Ensure that the data can only be used under the premise of effective authorization management , To be decrypted . If there is no authorization , Even administrators cannot copy and use this data , Even system cloning does not work .
5、 Database hardening ( Structured data )
first floor : Database files are forbidden to be accessed and tampered with by unfamiliar programs . Ensure database file level security .
The second floor : Database port access trusted filtering , Only business programs are allowed to connect to the database port , At the end of the connection string IP+ port + In the account password , Append process identification .
The third level : Database connection SQL Intelligent filtering of text , Prevent critical data from being retrieved and accessed , Prevent the data in the database from being accessed illegally , Prevent dangerous operations of database forms .
Which host reinforcement brands are worth recommending :
At present, several brands that have done well in the field of host reinforcement are known in the market :
1、 Xinda's MCK Host reinforcement and CBS Sebo lock .
2、 Wisteria cloud security .
3、 Luoan Technology .
4、 wave .
5、 Anheng .
6、 Convinced .
7、 Tian Rong Xin .
In no particular order . Personal recommendations MCK Mainframe reinforcement +CBS Plan , Because what our company buys is MCK Mainframe reinforcement +CBS. It is said that their sandbox encryption is also an old brand in the industry , You can rely on .
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
边栏推荐
- Add user-defined formula (time sharing t+0) to mobile app access as an example
- Remove the underline in router link
- 云原生的 CICD 框架:Tekton
- TCP拥塞控制详解 | 2. 背景
- Yyds dry inventory method of deleting expired documents in batch
- Unity使用UGUI设置一个简单多级水平方向下拉菜单(不需要代码)
- ⌈ 2022 ⌋ how to use webp gracefully in projects
- 中国信通院《数据安全产品与服务图谱》,美创科技实现四大板块全覆盖
- Aike AI frontier promotion (2.15)
- dried food! Understand the structural vulnerability of graph convolution networks
猜你喜欢

数据安全产业系列沙龙(三)| 数据安全产业标准体系建设主题沙龙

JS learning notes - operators

Yyds dry goods inventory has not revealed the artifact? Valentine's Day is coming. Please send her a special gift~

JS learning notes - variables

Rock PI Development Notes (II): start with rock PI 4B plus (based on Ruixing micro rk3399) board and make system operation

Yyds dry goods inventory # look up at the sky | talk about the way and principle of capturing packets on the mobile terminal and how to prevent mitm

Unity uses ugui to set a simple multi-level horizontal drop-down menu (no code required)

Trigger: MySQL implements adding or deleting a piece of data in one table and adding another table at the same time

Seal Library - installation and introduction

SSM整合-异常处理器及项目异常处理方案
随机推荐
What is the difference between self attention mechanism and fully connected graph convolution network (GCN)?
渗透工具-内网权限维持-Cobalt strike
Sqlserver queries which indexes are underutilized
Vscade set multi line display of tab
What if the win11 app store cannot load the page? Win11 store cannot load page
JS learning notes - process control
Yyds dry inventory executor package (parameter processing function)
SQL solves the problem of continuous login deformation holiday filtering
Solve * * warning * *: your ApplicationContext is unlikely to start due to a @componentscan of the defau
[North Asia data recovery] data recovery case of raid crash caused by hard disk disconnection during data synchronization of hot spare disk of RAID5 disk array
La boîte de connexion du hub de l'unit é devient trop étroite pour se connecter
Which software is good for machine vision?
Multi task prompt learning: how to train a large language model?
IDEA中设置背景图片(超详细)
Compress words (kmp/ string hash, double hash)
Data security industry series Salon (III) | data security industry standard system construction theme Salon
Original God 2.6 server download and installation tutorial
电脑管理员权限在哪里可以打开
How to solve the failure of printer driver installation of computer equipment
Practice of traffic recording and playback in vivo