官术网_书友最值得收藏!

Security considerations for the functional viewpoint

Following are some of the security consideration for the functional viewpoint:

  • Security audit: To collect, store, and analyze security-related information.
  • Identity verification: In communications, it protects the integrity of communications within the IIoT system.
  • Cryptographic support: This involves software and hardware for encryption and decryption.
  • Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
  • Authentication and identity management: This ensures users only have access to the functions and data for which they are authorized.
  • Physical protection: This enforces security policies to prevent tampering and unauthorized observation.
主站蜘蛛池模板: 怀化市| 禹州市| 诸城市| 玉树县| 东至县| 崇阳县| 黄陵县| 盐池县| 磐安县| 湖南省| 甘肃省| 新沂市| 密山市| 乌拉特中旗| 梁山县| 黔江区| 宿松县| 乌什县| 博兴县| 上饶县| 城步| 旺苍县| 龙门县| 新巴尔虎右旗| 达州市| 乌拉特后旗| 哈密市| 青田县| 龙海市| 姚安县| 抚松县| 长顺县| 阳泉市| 郸城县| 永嘉县| 英德市| 英吉沙县| 原平市| 民县| 巴塘县| 甘南县|