{"title":"企业物联网安全策略","authors":"Michal Trziszka","doi":"10.54941/ahfe1001836","DOIUrl":null,"url":null,"abstract":"The aim of the article is to discuss the risks resulting from expanding access to the network of new devices, and at the same time to show to what extent the implementation of procedures in the field of data security and architecture of systems used for data processing may affect the security of the continuity of the company's technological processes, but also data protection. The author draws attention to the fact that the problem of data and process security in the Internet of Things should be considered not only in terms of the protection of the content of information, but also its authenticity and topicality. On the other hand, inadequate formulation of the rules of the Internet of Things security policy in a given enterprise may mean limiting the availability of solutions and access to data, often eliminating the possibility of obtaining and processing them altogether. Enterprises must therefore act in such a way as to help maintain both the functionality and security of their systems.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Internet of Things Security Policy in Enterprises\",\"authors\":\"Michal Trziszka\",\"doi\":\"10.54941/ahfe1001836\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of the article is to discuss the risks resulting from expanding access to the network of new devices, and at the same time to show to what extent the implementation of procedures in the field of data security and architecture of systems used for data processing may affect the security of the continuity of the company's technological processes, but also data protection. The author draws attention to the fact that the problem of data and process security in the Internet of Things should be considered not only in terms of the protection of the content of information, but also its authenticity and topicality. On the other hand, inadequate formulation of the rules of the Internet of Things security policy in a given enterprise may mean limiting the availability of solutions and access to data, often eliminating the possibility of obtaining and processing them altogether. Enterprises must therefore act in such a way as to help maintain both the functionality and security of their systems.\",\"PeriodicalId\":285612,\"journal\":{\"name\":\"Cognitive Computing and Internet of Things\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cognitive Computing and Internet of Things\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54941/ahfe1001836\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cognitive Computing and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54941/ahfe1001836","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The aim of the article is to discuss the risks resulting from expanding access to the network of new devices, and at the same time to show to what extent the implementation of procedures in the field of data security and architecture of systems used for data processing may affect the security of the continuity of the company's technological processes, but also data protection. The author draws attention to the fact that the problem of data and process security in the Internet of Things should be considered not only in terms of the protection of the content of information, but also its authenticity and topicality. On the other hand, inadequate formulation of the rules of the Internet of Things security policy in a given enterprise may mean limiting the availability of solutions and access to data, often eliminating the possibility of obtaining and processing them altogether. Enterprises must therefore act in such a way as to help maintain both the functionality and security of their systems.