Wunsch, 2023 - Google Patents
Guide for the enforcement of IT security in automation systemsWunsch, 2023
View PDF- Document ID
- 6052048639670497642
- Author
- Wunsch L
- Publication year
External Links
Snippet
In this bachelor thesis, a guide is created that helps users to improve the IT security of automation systems according to the standard IEC 62443. Through the targeted use of information about the automation system, the guide provides the user with a list of …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Panchal et al. | Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures | |
CN111917714B (en) | Zero trust architecture system and use method thereof | |
Abou el Kalam | Securing SCADA and critical industrial systems: From needs to security mechanisms | |
CN103441926B (en) | Security gateway system of numerically-controllmachine machine tool network | |
Rani et al. | Cyber security techniques, architectures, and design | |
CN109564603B (en) | System and method for securely changing network configuration settings of a multiplexer in an industrial control system | |
CN114553540B (en) | Zero trust-based Internet of things system, data access method, device and medium | |
KR20140019574A (en) | System for privacy protection which uses logical network division method based on virtualization | |
WO2015187716A1 (en) | Secure mobile framework with operating system integrity checking | |
Jin et al. | P-verifier: Understanding and mitigating security risks in cloud-based IoT access policies | |
Varadharajan et al. | Techniques for enhancing security in industrial control systems | |
DesRuisseaux | Practical overview of implementing IEC 62443 security levels in industrial control applications | |
Braband | What's Security Level got to do with Safety Integrity Level? | |
Wunsch | Guide for the enforcement of IT security in automation systems | |
Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
CN108347411B (en) | Unified security guarantee method, firewall system, equipment and storage medium | |
Conte de Leon et al. | Cybersecurity | |
Verma | Cybersecurity and Privacy Fundamentals | |
Alhasawi | ICSrank: A Security Assessment Framework for Industrial Control Systems (ICS) | |
Brenner et al. | Security Analysis and Improvement of Data Logistics in AutomationML-Based Engineering Networks | |
Kaur et al. | Important Aspects of Cybersecurity | |
Zhang et al. | Controlling Network Risk in E-commerce | |
Penttilä | Cyber threats in maritime container terminal automation systems | |
Prudnikova | Standardized security assessment framework for ICS devices and pilot project | |
Арустамов et al. | Профессиональный иностранный язык для специалистов в области компьютерной безопасности: учебное пособие |