Industrial Router Information Security Risk Analysis

  1. Five attributes of industrial 4G router information security and their meanings.
    (1) Confidentiality: means ensuring that only those who are granted specific privileges have access to the information. (2) Integrity: Refers to the correctness and completeness of the information and processing methods. (3) Usability: means ensuring that those users who have been authorized determine that they have access to the information they need when they need it. (4) Non-repudiation: The non-repudiation of industrial router information is also called non-repudiation, non-repudiation, and is an extension of the traditional undeniable demand in the information society. (5) Controllability: refers to the way in which people or topics that use information resources can be controlled.
  1. The difference between information security and network security. [4g wireless router]
    Information security covers network security. The information network system includes two types of entities, line and point, namely network resources and information resources. The line represents the network itself, including industrial 4G wireless router network lines and network equipment, industrial-grade 4G wireless router information is transmitted through the line (network); and the point refers to various types of application devices connected by wires. Information is stored and processed in points. The main consideration of network security is the line problem, that is, how to solve the security problem of information transmission in the transmission process through reasonable 4G industrial router network architecture, configuration and management, and improve the security level to ensure the overall security operation of the application service; The scope of industrial 3G router information security is not only the security issue of the line, that is, the security problem of communication in network transmission, but also the inherent security problems of the computer itself, such as system hardware, operating system, application software, and operation flow.

  1. Threats and classifications faced by industrial-grade 3G routers
    Security threats can sometimes be divided into intentional and accidental. Intentional threats such as counterfeiting, tampering, etc., occasional threats such as information being sent to the wrong address, misuse, etc. Intentional threats can be further divided into active attacks and passive attacks. Example—Active attack: Interruption (meaning that the source of the threat is a damaged or unusable resource of the system, thereby suspending the dual-card router flow or service of the data), and tampering [refers to an FDD-LTE router) The threat source successfully accessed and changed a resource without permission, thus falsifying the information service provided -], “fabrication” means that a threat source of the entire Netcom industrial grade router is in the system without permission. Created false news, false information or services];
    Passive attack: Interception [refers to a threat source that gains access to a resource without permission and steals useful information or services from it].
  2. The three stages of information security development, and their respective stages, have realized the attributes of information security.
    1). Communication confidentiality phase (before the 1980s): confidentiality;
    2). Information security phase (90s): confidentiality, integrity, availability;
    3). Network-wide industrial router communication support phase (from the late 1990s to the present): confidentiality Sex, integrity, usability, non-repudiation, control-ability.
  3. The principle of the P2DR model.
    The P2DR model is a time-based security model, including policy (security policy), protection (protection), detection (detection), response (response) four major parts, protection, detection and 3G wireless router response constitute a complete, dynamic The security cycle ensures the security of the information system under the guidance of the security policy. P2DR is a conceptual model derived from the PDR model, which adds the functionality of the policy and highlights the dominant position of the management strategy in information security engineering. The network-wide industrial-grade router security technology measures are organized in an orderly manner around the specific requirements of the security policy, and a dynamic security defense system is constructed.

Comments

Popular Posts