- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 119字
- 2021-07-02 23:59:26
Security considerations for the functional viewpoint
Following are some of the security consideration for the functional viewpoint:
- Security audit: To collect, store, and analyze security-related information.
- Identity verification: In communications, it protects the integrity of communications within the IIoT system.
- Cryptographic support: This involves software and hardware for encryption and decryption.
- Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
- Authentication and identity management: This ensures users only have access to the functions and data for which they are authorized.
- Physical protection: This enforces security policies to prevent tampering and unauthorized observation.
推薦閱讀
- Oracle從新手到高手
- 大學計算機基礎實驗教程
- Hands-On Image Processing with Python
- SQL for Data Analytics
- Learn WebAssembly
- MATLAB定量決策五大類問題
- 深度強化學習算法與實踐:基于PyTorch的實現
- INSTANT Passbook App Development for iOS How-to
- Python Web數據分析可視化:基于Django框架的開發實戰
- Kotlin編程實戰:創建優雅、富于表現力和高性能的JVM與Android應用程序
- 微信小程序開發與實戰(微課版)
- Procedural Content Generation for C++ Game Development
- Kotlin極簡教程
- 區塊鏈架構之美:從比特幣、以太坊、超級賬本看區塊鏈架構設計
- 精通Spring:Java Web開發與Spring Boot高級功能