Skip to main content
Industrial Router Information Security Risk Analysis
- Five attributes of industrial 4G router information security and their meanings.
(1) Confidentiality: means ensuring that only those who are granted
specific privileges have access to the information. (2) Integrity:
Refers to the correctness and completeness of the information and
processing methods. (3) Usability: means ensuring that those users who
have been authorized determine that they have access to the information
they need when they need it. (4) Non-repudiation: The non-repudiation of
industrial router information is also called non-repudiation,
non-repudiation, and is an extension of the traditional undeniable
demand in the information society. (5) Controllability: refers to the
way in which people or topics that use information resources can be
controlled.
- The difference between information security and network security. [4g wireless router]
Information security covers network security. The information network
system includes two types of entities, line and point, namely network
resources and information resources. The line represents the network
itself, including industrial 4G wireless router network lines and
network equipment, industrial-grade 4G wireless router information is
transmitted through the line (network); and the point refers to various
types of application devices connected by wires. Information is stored
and processed in points. The main consideration of network security is
the line problem, that is, how to solve the security problem of
information transmission in the transmission process through reasonable
4G industrial router network architecture, configuration and management,
and improve the security level to ensure the overall security operation
of the application service; The scope of industrial 3G router
information security is not only the security issue of the line, that
is, the security problem of communication in network transmission, but
also the inherent security problems of the computer itself, such as
system hardware, operating system, application software, and operation
flow.
- Threats and classifications faced by industrial-grade 3G routers
Security threats can sometimes be divided into intentional and
accidental. Intentional threats such as counterfeiting, tampering, etc.,
occasional threats such as information being sent to the wrong address,
misuse, etc. Intentional threats can be further divided into active
attacks and passive attacks. Example—Active attack: Interruption
(meaning that the source of the threat is a damaged or unusable resource
of the system, thereby suspending the dual-card router flow or service
of the data), and tampering [refers to an FDD-LTE router) The threat
source successfully accessed and changed a resource without permission,
thus falsifying the information service provided -], “fabrication” means
that a threat source of the entire Netcom industrial grade router is in
the system without permission. Created false news, false information or
services];
Passive attack: Interception [refers to a threat source that gains
access to a resource without permission and steals useful information or
services from it].
- The three stages of information security development, and their
respective stages, have realized the attributes of information security.
1). Communication confidentiality phase (before the 1980s): confidentiality;
2). Information security phase (90s): confidentiality, integrity, availability;
3). Network-wide industrial router communication support phase (from the
late 1990s to the present): confidentiality Sex, integrity, usability,
non-repudiation, control-ability.
- The principle of the P2DR model.
The P2DR model is a time-based security model, including policy
(security policy), protection (protection), detection (detection),
response (response) four major parts, protection, detection and 3G
wireless router response constitute a complete, dynamic The security
cycle ensures the security of the information system under the guidance
of the security policy. P2DR is a conceptual model derived from the PDR
model, which adds the functionality of the policy and highlights the
dominant position of the management strategy in information security
engineering. The network-wide industrial-grade router security
technology measures are organized in an orderly manner around the
specific requirements of the security policy, and a dynamic security
defense system is constructed.
Comments
Post a Comment