安全公司报告
文库搜索
切换导航
文件分类
频道
文件分类
批量下载
2019 工业控制系统信息安全保障框架m i g u th 5 b o .c © 绿盟科技 关于绿盟科技 北京神州绿盟信息安全科技股份有限公司(以下简称绿盟科技),成立于 2000 年 4 月,总 部位于北京。在国内外设有 40 多个分支机构,为政府、运营商、金融、能源、互联网以及教育、 医疗等行业用户,提供具有核心竞争力的安全产品及解决方案,帮助客户实现业务的安全顺畅运行。 基于多年的安全攻防研究,绿盟科技在检测防御类、安全评估类、安全平台类、远程安全运 维服务、安全 SaaS 服务等领域,为客户提供入侵检测 / 防护、抗拒绝服务攻击、远程安全评估 以及 Web 安全防护等产品以及安全运营等专业安全服务。 北京神州绿盟信息安全科技股份有限公司于 2014 年 1 月 29 日起在深圳证券交易所创业板上 市交易,股票简称:绿盟科技,股票代码:300369。 u th i g 特别声明 5 b 为避免合作伙伴及客户数据泄露,所有数据在进行分析前都已经过匿名化处理,不会在中 间环节出现泄露,任何与客户有关的具体信息,均不会出现在本报告中。 m o .c 2019 工业控制系统信息安全保障框架 目录 1. 工控信息安全的发展 ············································································································································1 1.1 工业智能化发展概述 ·································································································································································· 2 1.1.1 工业控制的基本架构·················································································································································································· 3 1.1.2 工业 4.0 的发展 ·························································································································································································· 4 1.1.3 工业互联网的发展 ······················································································································································································ 5 1.1.4 国内工业控制系统的发展 ········································································································································································· 6 m o .c 1.1.5 泛在化的工业设施 ······················································································································································································ 7 1.2 工控信息安全的发展 ·································································································································································· 8 1.2.1 工控信息安全与 IT 信息安全的差异 ························································································································································ 9 1.2.2 工控信息安全在国内的发展 ···································································································································································11 5 b 1.2.3 国外工控信息安全的发展 ·······································································································································································18 1.3 工控信息安全的技术趋势 ························································································································································ 20 1.3.1 工控信息安全技术趋势············································································································································································20 u th 1.3.2 主流工控信息安全产品介绍 ···································································································································································20 1.3.3 工控信息安全技术面临的问题和困难 ···················································································································································22 2. 工控信息安全态势 ··············································································································································23 i g 2.1 典型工业信息安全事件 ···························································································································································· 24 2.2 工业控制系统恶意软件介绍 ···················································································································································· 26 2.2.1 恶意软件 Industroyer 的介绍··································································································································································26 2.2.2 Dragonfly2.0 恶意软件介绍 ····································································································································································28 2.2.3 新型 ICS 攻击框架 "TRITON" 简介 ·························································································································································29 2.3 工控资产的脆弱性 ············································································
绿盟 2019工业控制系统信息安全保障框架
文档预览
中文文档
103 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
赞助5.2元下载(无需注册)
温馨提示:本文档共103页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
下载文档到电脑,方便使用
赞助5.2元下载
本文档由 路人甲 于
2022-07-17 01:17:35
上传分享
举报
下载
原文档
(6.5 MB)
分享
友情链接
ISO 20252 2019 Market, opinion and social research, including insights and data analytics — Vocabulary and service requirements.pdf
ISO-IEC 29110-5-6-4 2025 Systems and software engineering - Life cycle profiles for very small entities (VSEs) - Part 5-6-4 Systems engineering guidelines for the generic Advanced profile.pdf
ISO-IEC 18046-5 2025 Information technology - Radio frequency identification device performance test methods - Part 5 Test methods for the environmental characteristics of RFID tags used in sporting g.pdf
ISO-IEC TR 30189-1 2025 Internet of Things (IoT) IoT-based management of tangible cultural heritage assets Part 1 Framework.pdf
ISO-IEC 22592-3 2025 Office equipment - Print quality measurement methods for colour prints - Part 3 Physical durability measurement methods.pdf
ISO-IEC 20153 2025 Information technology - OASIS Common Security Advisory Framework (CSAF) v2.0 Specification.pdf
ISO-IEC 23090-25 2025 Information technology - Coded representation of immersive media - Part 25 Conformance and reference software for carriage of visual volumetric video-based coding data.pdf
ISO TS 81001-2-1 2025 Health software and health IT systems safety effectiveness and security - Part 2-1 Coordination - Guidance for the use of assurance cases for safety and security.pdf
ISO-IEC 23093-5 2025 Information technology - Internet of media things - Part 5 IoMT autonomous collaboration.pdf
ISO-IEC 21617-1 2025 Information technology - JPEG Trust - Part 1 Core foundation.pdf
GB-T 18697-2002 声学 汽车车内噪声测量方法.pdf
GB-T 21868.4-2008 颜料和体质颜料 评定分散性用的分散方法 第4部分 用砂磨分散.pdf
GB-T 21795-2008 化学品 模拟试验 污水好氧处理 生物膜法.pdf
GB-T 43144-2023 无损检测 声发射检测 钢筋混凝土梁损伤评定的检测方法.pdf
GB-Z 42153-2022 波浪能转换装置预样机测试规程.pdf
GB-T 5779.3-2000 紧固件表面缺陷 螺栓、螺钉和螺柱 特殊要求.pdf
GB-T 11888-2021 首饰 指环尺寸 定义、测量和命名.pdf
GB-T 30211-2013 飞机 压力加滑油接头.pdf
GB-T 21481.1-2008 船舶与海上技术 船舶和海上结构物上生活用水供应 第1部分 规划和设计.pdf
GB-T 7568.6-2002 纺织品 色牢度试验 丝标准贴衬织物规格.pdf
1
/
3
103
评价文档
赞助5.2元 点击下载(6.5 MB)
回到顶部
×
微信扫码支付
5.2
元 自动下载
官方客服微信:siduwenku
支付 完成后 如未跳转 点击这里 下载
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们
微信(点击查看客服)
,我们将及时删除相关资源。