期刊文献+

PLC设备的CC保护轮廓研究

Research on Protection Profile of Common Criteria for PLC
下载PDF
导出
摘要 针对可编程逻辑控制器(PLC)设备安全性评估的需求,在通用标准(CC)的基础上,对PLC保护轮廓(PP)进行研究,重点分析梳理PLC安全环境中存在的假设、威胁和组织安全策略,进而推导出其安全目的,最后提出对应的安全要求,用于PLC设备的安全性评估和开发。利用此PP,针对PLC的组态下装中仿冒身份的安全威胁,提出基于SM3算法的挑战-响应动态口令机制实现PLC与上位机的身份的验证。 As the security evaluation for Programmable Logic Controller is required, based on Common Criteria, Protection Profile is dasigned for PLC. Analysis on security environment (include threats, assumptions, organizational security policies) is mainly performed, following corresponding security objectives is deduced, so that security requirements are proposed. The PLC protection profile can be widely applied to security evaluation and development of PLC. Using this PLC PP, a dynamic password system is praided based on challenge/response mechanism and SM3 to solve the threaten of insecure authentication between PLC and upper computer.
作者 张钟 傅一帆 王皓 张晓莉 王毅璇 ZHANG Zhong;FU Yi-fan;WANG Hao;ZHANG Xiao-li;WANG Yi-xuan(National Computer System Engineering Research Institute of China, Beijing 102209 China)
出处 《自动化技术与应用》 2019年第5期87-91,共5页 Techniques of Automation and Applications
关键词 PLC 通用准则 保护轮廓 PLC common criteria protection profile
  • 相关文献

参考文献3

二级参考文献24

  • 1陈轶佳,周安民,方勇,王炜,曹军.信息安全产品测评系统研究与实现[J].计算机应用研究,2005,22(2):100-101. 被引量:2
  • 2GB/T18336-2001信息技术安全性评估准则[s].中华人民共和国国家标准局,2001.
  • 3ISO/IEC TR 15446 Information Technology-Security Techniques-Guide for the Production of Protection Profiles and Security Targets. http:// www. iso. org/iso/catalogue_detail. htm.
  • 4Jeffrey R Williams, Karen M Ferraiolo. Protection Profile Process Improvement [ R ]. Arca Systems, Inc, 1999.
  • 5John P Hopkinson. System Security Engineering Capability Maturity Model[ R./OL]. http://www. sse-cmm.org/docs/sse-cmm. pdf.
  • 6National Security Agency and the National Institutes of Standards and Technology. Consistency Instruction Manual for Development of US Government Protection Profiles for Use in Basic Robustness Environments [ RJOL ]. http ://www. niap-ccevs.org/pp/bas_rob_manual-3. 0. pdf.
  • 7National Security Agency and the National Institutes of Standards and Technology. Consistency Instruction Manual for Development of US Government Protection Profiles for Use in Medium Robustness Environments [ R/OL]. http ://www. niap-ccevs. org/pp/med_rob_manual-3.0. pdf.
  • 8ISO/IEC 15408- 1, The International Oranization for Standardization Common Criteria for Information Technology Security Evaluation: Part 1 Introduction and General Model.
  • 9Development Process for US Government Protection Profiles. Information Assurance Directorate, NIST, NIAP,2004.
  • 10GB/T18336.中华人民共和国国家标准—信息技术安全技术信息技术安全性评估准则第1部分:简介和一般模型.[S].,..

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部