工业控制系统中的网络安全问题

Z. Szabó
{"title":"工业控制系统中的网络安全问题","authors":"Z. Szabó","doi":"10.1109/SISY.2018.8524613","DOIUrl":null,"url":null,"abstract":"Incidents with a high level of damage that have been perceived worldwide increasingly indicate that compliance with international information security standards and statutory compliance, periodically revised, does not in itself mean full protection against attackers using prepared and targeted methods. When building a risk management system to address the challenge, we must be able to decide what extra solutions need to be spent money on, in addition to meeting the compliance requirements, for more effective data protection. This is not possible without the underlying threats of the particular business environment and infrastructure and the vulnerabilities of the systems involved. Today's challenges require complex cyber protection. This paper deals with security issues in industrial control systems through case studies.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"3 1","pages":"000231-000234"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cybersecurity Issues in Industrial Control Systems\",\"authors\":\"Z. Szabó\",\"doi\":\"10.1109/SISY.2018.8524613\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Incidents with a high level of damage that have been perceived worldwide increasingly indicate that compliance with international information security standards and statutory compliance, periodically revised, does not in itself mean full protection against attackers using prepared and targeted methods. When building a risk management system to address the challenge, we must be able to decide what extra solutions need to be spent money on, in addition to meeting the compliance requirements, for more effective data protection. This is not possible without the underlying threats of the particular business environment and infrastructure and the vulnerabilities of the systems involved. Today's challenges require complex cyber protection. This paper deals with security issues in industrial control systems through case studies.\",\"PeriodicalId\":6647,\"journal\":{\"name\":\"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)\",\"volume\":\"3 1\",\"pages\":\"000231-000234\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SISY.2018.8524613\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SISY.2018.8524613","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

全球范围内发生的严重损害事件日益表明,遵守定期修订的国际信息安全标准和法律合规性,本身并不意味着对使用准备好的和有针对性的方法的攻击者提供全面保护。在构建风险管理系统以应对这一挑战时,我们必须能够决定,除了满足合规性要求外,还需要在哪些额外的解决方案上投入资金,以实现更有效的数据保护。如果没有特定业务环境和基础设施的潜在威胁以及所涉及系统的漏洞,这是不可能的。当今的挑战需要复杂的网络保护。本文通过案例分析探讨了工业控制系统中的安全问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cybersecurity Issues in Industrial Control Systems
Incidents with a high level of damage that have been perceived worldwide increasingly indicate that compliance with international information security standards and statutory compliance, periodically revised, does not in itself mean full protection against attackers using prepared and targeted methods. When building a risk management system to address the challenge, we must be able to decide what extra solutions need to be spent money on, in addition to meeting the compliance requirements, for more effective data protection. This is not possible without the underlying threats of the particular business environment and infrastructure and the vulnerabilities of the systems involved. Today's challenges require complex cyber protection. This paper deals with security issues in industrial control systems through case studies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信