{"title":"工业物联网系统信息安全组织","authors":"E. Saksonov, Yury Leokhin, V. Azarov","doi":"10.1109/IT&QM&IS.2019.8928442","DOIUrl":null,"url":null,"abstract":"Different approaches to providing security in IIoT systems of the enterprises with the use of basic methods of information protection and equipment are shown. The possibilities of use of different structure variants, network technologies and cryptographic methods are shown. Different variants of use of the solutions, described in article, are presented. The results can be useful to designers and administrators of IIoT systems.","PeriodicalId":285904,"journal":{"name":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Organization of Information Security in Industrial Internet of Things Systems\",\"authors\":\"E. Saksonov, Yury Leokhin, V. Azarov\",\"doi\":\"10.1109/IT&QM&IS.2019.8928442\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Different approaches to providing security in IIoT systems of the enterprises with the use of basic methods of information protection and equipment are shown. The possibilities of use of different structure variants, network technologies and cryptographic methods are shown. Different variants of use of the solutions, described in article, are presented. The results can be useful to designers and administrators of IIoT systems.\",\"PeriodicalId\":285904,\"journal\":{\"name\":\"2019 International Conference \\\"Quality Management, Transport and Information Security, Information Technologies\\\" (IT&QM&IS)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference \\\"Quality Management, Transport and Information Security, Information Technologies\\\" (IT&QM&IS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IT&QM&IS.2019.8928442\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IT&QM&IS.2019.8928442","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Organization of Information Security in Industrial Internet of Things Systems
Different approaches to providing security in IIoT systems of the enterprises with the use of basic methods of information protection and equipment are shown. The possibilities of use of different structure variants, network technologies and cryptographic methods are shown. Different variants of use of the solutions, described in article, are presented. The results can be useful to designers and administrators of IIoT systems.