- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 119字
- 2021-07-02 23:59:26
Security considerations for the functional viewpoint
Following are some of the security consideration for the functional viewpoint:
- Security audit: To collect, store, and analyze security-related information.
- Identity verification: In communications, it protects the integrity of communications within the IIoT system.
- Cryptographic support: This involves software and hardware for encryption and decryption.
- Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
- Authentication and identity management: This ensures users only have access to the functions and data for which they are authorized.
- Physical protection: This enforces security policies to prevent tampering and unauthorized observation.
推薦閱讀
- iOS面試一戰(zhàn)到底
- 軟件項(xiàng)目管理(第2版)
- SQL for Data Analytics
- Scratch 3游戲與人工智能編程完全自學(xué)教程
- YARN Essentials
- Hands-On Reinforcement Learning with Python
- 速學(xué)Python:程序設(shè)計(jì)從入門(mén)到進(jìn)階
- Python深度學(xué)習(xí)原理、算法與案例
- 動(dòng)手學(xué)數(shù)據(jù)結(jié)構(gòu)與算法
- Python 3 Object:oriented Programming(Second Edition)
- Python Digital Forensics Cookbook
- 趣學(xué)數(shù)據(jù)結(jié)構(gòu)
- Natural Language Processing with Python Cookbook
- Learning Gerrit Code Review
- Unreal Engine 4 Game Development Essentials