Lei Hu, Hailong Li, Zhenhua Wei, Siqi Dong, Zhao Zhang
{"title":"Summary of Research on IT Network and Industrial Control Network Security Assessment","authors":"Lei Hu, Hailong Li, Zhenhua Wei, Siqi Dong, Zhao Zhang","doi":"10.1109/ITNEC.2019.8729052","DOIUrl":null,"url":null,"abstract":"The difference between traditional IT network and industrial control network determines the different methods of network security assessment. In the face of increasingly serious cybersecurity status, network security assessment research faces new challenges. This paper compares the composition, function and possible damage of IT network and industrial control network, and discusses the existing standards and key technologies related to IT network and industrial control network security assessment. It analyzes the challenges faced by the security assessment of the two networks and looks forward to future research.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC.2019.8729052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
The difference between traditional IT network and industrial control network determines the different methods of network security assessment. In the face of increasingly serious cybersecurity status, network security assessment research faces new challenges. This paper compares the composition, function and possible damage of IT network and industrial control network, and discusses the existing standards and key technologies related to IT network and industrial control network security assessment. It analyzes the challenges faced by the security assessment of the two networks and looks forward to future research.