[go: up one dir, main page]

Wunsch, 2023 - Google Patents

Guide for the enforcement of IT security in automation systems

Wunsch, 2023

View PDF
Document ID
6052048639670497642
Author
Wunsch L
Publication year

External Links

Snippet

In this bachelor thesis, a guide is created that helps users to improve the IT security of automation systems according to the standard IEC 62443. Through the targeted use of information about the automation system, the guide provides the user with a list of …
Continue reading at opus4.kobv.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Similar Documents

Publication Publication Date Title
Panchal et al. Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures
CN111917714B (en) Zero trust architecture system and use method thereof
Abou el Kalam Securing SCADA and critical industrial systems: From needs to security mechanisms
CN103441926B (en) Security gateway system of numerically-controllmachine machine tool network
Rani et al. Cyber security techniques, architectures, and design
CN109564603B (en) System and method for securely changing network configuration settings of a multiplexer in an industrial control system
CN114553540B (en) Zero trust-based Internet of things system, data access method, device and medium
KR20140019574A (en) System for privacy protection which uses logical network division method based on virtualization
WO2015187716A1 (en) Secure mobile framework with operating system integrity checking
Jin et al. P-verifier: Understanding and mitigating security risks in cloud-based IoT access policies
Varadharajan et al. Techniques for enhancing security in industrial control systems
DesRuisseaux Practical overview of implementing IEC 62443 security levels in industrial control applications
Braband What's Security Level got to do with Safety Integrity Level?
Wunsch Guide for the enforcement of IT security in automation systems
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
CN108347411B (en) Unified security guarantee method, firewall system, equipment and storage medium
Conte de Leon et al. Cybersecurity
Verma Cybersecurity and Privacy Fundamentals
Alhasawi ICSrank: A Security Assessment Framework for Industrial Control Systems (ICS)
Brenner et al. Security Analysis and Improvement of Data Logistics in AutomationML-Based Engineering Networks
Kaur et al. Important Aspects of Cybersecurity
Zhang et al. Controlling Network Risk in E-commerce
Penttilä Cyber threats in maritime container terminal automation systems
Prudnikova Standardized security assessment framework for ICS devices and pilot project
Арустамов et al. Профессиональный иностранный язык для специалистов в области компьютерной безопасности: учебное пособие