期刊文献+

移动终端在电网企业应用中的安全性研究 被引量:3

Research on security of mobile terminal in power grid enterprise application
原文传递
导出
摘要 随着计算机技术日新月异的发展,应用计算机网络进行营销的企业越来越多,特别是移动在电网企业中的应用尤其显著。移动应用在企业的使用过程中首要考虑的因素就是安全问题,众所周知,移动智能的功能效用越来越多样化,随之而来的在运用它的过程中也会面临着更多的安全威胁,例如由于移动智能的使用率较高,任何人或公司都可以使用,因而会导致其被恶意软件或病毒的攻击率增高;随着智能系统存储能力的提高,容易受到网络黑客的攻击,会就导致大量数据资料泄露,从而使公司遭受巨大的损失等。本文从目前移动终端发展的实际情况出发,进一步分析它在我国电网企业中的应用中遇到的安全问题,主要从系统、设备、电源插口等方面进行深入分析,从而制定出相应的解决方案,确保电网企业的评平稳运行。 With the rapid development of computer technology, the use of computer networks for marketing more and more enterprises, especially mobile applications in power grid enterprises is particularly significant. As everyone knows mobile applications in the use of factors in the process of enterprise first consideration is safety, utility function, more and more mobile intelligent diversification, resulting in the use of the process will also face more security threats, such as the use of mobile agents due to the high rate of any person or company can be used, which will cause the it is malware or virus attacks increased;with the storage capacity of intelligent systems to improve, vulnerable to backer attacks, will lead to a large number of data leakage, so that the company suffered huge losses. This article from the current situation of the development of the mobile terminal, further analyzes the security problems and its application in power grid enterprises in our country the main in-depth analysis from the system, equipment, power supply socket etc. , so as to formulate corre- sponding solutions, to ensure smooth operation of the power grid enterprise evaluation.
出处 《自动化与仪器仪表》 2017年第9期197-198,共2页 Automation & Instrumentation
基金 基金项目:基于移动应用平台的设备状态数据流录入技术研究与试点应用
关键词 移动智能终端 恶意软件 安全威胁 安全方案 mobile intelligent terminal malicious software security threats security solutions
  • 相关文献

参考文献14

二级参考文献79

  • 1李俊平,梅洪,单家元.基于Linux的实时平台的研究[J].微计算机信息,2005,21(06Z):21-23. 被引量:15
  • 2张焕周,罗捷,金刚等可信计算研究进展[J].武汉大学学报(理学版).2006(05).
  • 3Gartner, Inc. Gartner Says Worldwide Smartphone Sales Soared inFourth Quarter of 2011 With 47 Percent Growth [EB/OLJ. http://www.gartner.com/it/page.jsp.id=1924314,2012—2—15/2012—4—12 .
  • 4GoogleInc. Android Developers: What is Android.[EB/OL]. http://developer.android.com/guide/basics/what—is~ android.html,2012 —4—7/2012-4-13.
  • 5GoogleInc. Android Developers: Security and Permissions[EB/OL].2012—4 —7[2012—4—13J http://developer.android.com/guide/topics/security/security.htinl.
  • 6AlbertsB, Oldani M. Beating up on Android: Practical AndroidAttacks[R/OL]. 2011—4—16[2012—4—13] http://www.immunitysec.com/infiltrate/2011 / presentations7Android_Actacks.odt.pdf.
  • 7ShabtaiA, Fledel Y, Kanonov U, et al. Google Android: AComprehensive Security Assessment!}]. IEEE Security & Privacy, March,2010,8 (2): 35-44.
  • 8Google Inc. Android Security Overview [EB / OL]. 2012-4_7[2012—4—14] http://source.android.com/tech/security/index.html.
  • 9Enck W, Ongtang M, McDaniel P. Understanding Android Security [J].IEEE Security & Privacy, Jan, 2009, 7 (1): 50—57.
  • 10GoogleInc. Android Developers: What is the NDK.[EB/OL]. 2012—4-7[2012-4-14j http://developer.android.com/sdk/ndk/overview.html.

共引文献50

同被引文献25

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部