官术网_书友最值得收藏!

  • Architecting the Industrial Internet
  • Shyam Nath Robert Stackowiak Carla Romano
  • 119字
  • 2021-07-02 23:59:26

Security considerations for the functional viewpoint

Following are some of the security consideration for the functional viewpoint:

  • Security audit: To collect, store, and analyze security-related information.
  • Identity verification: In communications, it protects the integrity of communications within the IIoT system.
  • Cryptographic support: This involves software and hardware for encryption and decryption.
  • Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
  • Authentication and identity management: This ensures users only have access to the functions and data for which they are authorized.
  • Physical protection: This enforces security policies to prevent tampering and unauthorized observation.
主站蜘蛛池模板: 长丰县| 洛隆县| 余干县| 英德市| 玉山县| 彩票| 紫金县| 定南县| 阿克陶县| 五寨县| 高雄市| 建湖县| 仲巴县| 杨浦区| 北海市| 大洼县| 双峰县| 太仆寺旗| 平罗县| 巴林左旗| 平原县| 万州区| 莫力| 上饶县| 柳州市| 安顺市| 虞城县| 巫山县| 鹤峰县| 汝城县| 盐亭县| 团风县| 昌邑市| 沁阳市| 孝感市| 溆浦县| 青冈县| 集贤县| 教育| 广德县| 泽普县|