期刊文献+
共找到118篇文章
< 1 2 6 >
每页显示 20 50 100
Development of an Analytical Model of the Process of Cybersecurity Protection of Distributed Information Systems of Critical Infrastructure
1
作者 Ramaz R. Shamugia 《International Journal of Communications, Network and System Sciences》 2020年第10期161-169,共9页
This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence,... This article is dedicated to the creation of the analytical model of quantitative estimation of cybersecurity of Information Systems of Critical Infrastructure (ISCI). The model takes into consideration the existence, in the discussed ISCI, of both the intelligent tools of detection, analysis and identification of threats and vulnerabilities and means for restauration and elimination of their consequences. The development of the model also takes into consideration probabilistic nature of flow of events happening in ISCI and transferring the system between different states of cybersecurity. Among such probabilistic events we mean any operational perturbations (that can cause extreme situations) happening in ISCI under the influence of cyber-threats, as well as events concerning restoration and elimination of consequences of such cyber-threats. In this work, as methods of modelling, there have been used methods of system-oriented analysis based on theory of probability, theory of reliability and theory of queues. These methods enabled to describe analytically dependence of effectiveness indices of ISCI operation on abovementioned probabilistic processes. 展开更多
关键词 CYBERSPACE Critical Infrastructure Multichannel Queuing System cybersecurity cybersecurity protection System
下载PDF
Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies
2
作者 Maryam Roshanaei 《Journal of Computer and Communications》 2021年第8期80-102,共23页
The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics a... The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks. 展开更多
关键词 Critical Infrastructure protection Critical Information Infrastructure protection cybersecurity Operational Technologies Risk Management
下载PDF
Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia
3
作者 Sami Saad Alsemairi 《Intelligent Information Management》 2023年第4期259-283,共25页
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ... In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors. 展开更多
关键词 cybersecurity Policies COMPLIANCE protection Information and Technology Assets
下载PDF
Cybersecurity and Privacy Protection in Vehicular Networks (VANETs)
4
作者 Bruno Macena Celio Albuquerque Raphael Machado 《Advances in Internet of Things》 2023年第4期109-118,共10页
As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe... As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles. 展开更多
关键词 Vehicular Ad-Hoc Networks (VANETs) Privacy and Data protection cybersecurity Pseudonymization Schemes Internet of Vehicles (IoV)
下载PDF
U.S.and International Legal Perspectives Affecting Cybersecurity Corporate Governance
5
作者 Paul J.Morrow Thomas M.Fitzpatrick 《International Relations and Diplomacy》 2020年第6期231-239,共9页
International and U.S.corporations must be well advised regarding specific regulations and laws that affect cybersecurity decisions because the Board of Directors must perform due diligence to avoid regulatory neglige... International and U.S.corporations must be well advised regarding specific regulations and laws that affect cybersecurity decisions because the Board of Directors must perform due diligence to avoid regulatory negligence and lawsuit liability.Depending on the standards and the regulations that do define reasonable care,the corporate director is faced with the challenge of determining how and what cybersecurity laws apply.Then,directors can institute best cybersecurity management practices.This paper provides guidance regarding the application of the law in the areas of cyber security for the international corporations interacting with the European General Data Protection Regulations(GDPR),the California Consumer Privacy Act(CCPA),and recent Federal Trade Commission(FTC)administrative agency rulings.Reading this paper is worth your time because it will inform you of the legal challenges that international and domestic corporations face in making decisions about spending capital to manage cybersecurity and at the same time perform due diligence.In other words,if there is a cybersecurity breach,this paper will provide insights into what law must be followed by the corporation enabling the best management decisions assuring adequate response,compliance,thereby avoiding unnecessary liability risk.The paper also provides reflections about whether the GDPR serves as a better legal comprehensive regulatory model rather than the recently enacted laws in the U.S. 展开更多
关键词 cybersecurity compliance General Data protection Regulation California Consumer Privacy Act data privacy Federal Trade Commission
下载PDF
International Cybersecurity Breach Detection Risk, Prosecution and Resolution
6
作者 Paul J.Morrow Thomas M.Fitzpatrick 《International Relations and Diplomacy》 2021年第5期173-181,共9页
The U.S.and the international business community is in a crisis regarding ransomware attacks and cybersecurity policing/regulation.Based on recent events,state sponsored cyber hackers have made it their mission to hol... The U.S.and the international business community is in a crisis regarding ransomware attacks and cybersecurity policing/regulation.Based on recent events,state sponsored cyber hackers have made it their mission to hold the information security world hostage extorting money for a returning of data systems to normal functioning.This paper examines the challenges for the global business community regarding the scope of the attacks,the current state of the law in the U.S.intended to provide current information to the international business community,illustrate the challenges for regulators and the courts,illustrate the recent progress of the criminal investigatory aspects of apprehending cybercriminals,report on the non-delegable duties of decision makers in the international community doing business in the U.S.,and demonstrate the potential solutions to this evolving international crisis.It is worth your time to read this paper for the following reasons:1.Understanding the risks and the scope of the problem moving forward with doing business in the U.S.;2.communicating recent developments fostering cooperation and contributing to mediating cybersecurity events for international corporations;and 3.providing information on the current state of the law by the U.S.Supreme Court pointing out the relevant and the consequential outcomes of the legal system leading to potential smart solutions for planning business decisions. 展开更多
关键词 cybersecurity compliance general data protection regulation California Consumer Privacy Act data privacy Federal Trade Commission
下载PDF
网络安全演习防护工作探讨 被引量:1
7
作者 李建国 《青岛远洋船员职业学院学报》 2024年第1期47-50,54,共5页
网络安全演习是针对网络安全问题进行的模拟性实战演练,旨在提高网络安全防护能力、检验网络安全防御措施的有效性和发现网络安全漏洞。本文讨论了网络安全演习的背景与意义、安全演习的类型流程和技术手段,并对网络安全演习防护手段进... 网络安全演习是针对网络安全问题进行的模拟性实战演练,旨在提高网络安全防护能力、检验网络安全防御措施的有效性和发现网络安全漏洞。本文讨论了网络安全演习的背景与意义、安全演习的类型流程和技术手段,并对网络安全演习防护手段进行了深入探讨。 展开更多
关键词 网络安全 演习 防护
下载PDF
基于数据挖掘的等级保护测评数据再利用模型研究 被引量:3
8
作者 赵佳璐 李格菲 +4 位作者 葛晓囡 朱磊 韦宇星 严毅恒 阿依登·塔布斯 《信息安全研究》 CSCD 北大核心 2024年第4期353-359,共7页
针对网络安全等级保护测评数据资源未有效利用的问题,提出一种包括数据分类、数据再利用流程、典型应用场景3个维度的网络安全等级保护测评数据再利用模型.首先,将数据按照应用场景进行分类,统计分析测评基础数据,形成不同角度的分析结... 针对网络安全等级保护测评数据资源未有效利用的问题,提出一种包括数据分类、数据再利用流程、典型应用场景3个维度的网络安全等级保护测评数据再利用模型.首先,将数据按照应用场景进行分类,统计分析测评基础数据,形成不同角度的分析结论;其次,利用测评基础数据以及初步分析结论作为输入,根据各方应用需求构建基于数据挖掘的测评数据再利用模型,提供关联分析、分类分析、聚类分析等功能,深入挖掘数据背后的信息.从而帮助相关各方安全有效利用数据,以数据作为一个强力支撑,为构建网络安全体系发挥更大积极作用. 展开更多
关键词 数据安全 网络安全等级保护 数据挖掘 数据分类 聚类分析
下载PDF
基于贝叶斯网络的等级保护测评辅助方法 被引量:1
9
作者 李志文 梁承东 《电子质量》 2024年第2期12-15,共4页
当前在等级保护测评活动中,测评指标众多,为减少人工审核所耗费的时间和资源,引入了贝叶斯网络作为一种辅助方法。首先,该方法以现有机构的大量测评数据为基础构建贝叶斯网络模型,模型以测评指标为父节点,测评指标中的各检查点为子节点... 当前在等级保护测评活动中,测评指标众多,为减少人工审核所耗费的时间和资源,引入了贝叶斯网络作为一种辅助方法。首先,该方法以现有机构的大量测评数据为基础构建贝叶斯网络模型,模型以测评指标为父节点,测评指标中的各检查点为子节点,通过工具Netica计算得出各测评指标和检查点的概率;然后,通过专家验证调整部分预设关系得出各测评指标和检查点基准概率;最后,以此准概率与测评中新得到的数据进行对比,可为等级保护测评活动提供辅助检验、预测的功能。 展开更多
关键词 贝叶斯网络 贝叶斯定理 等级保护 等级保护测评 网络安全
下载PDF
Competencies in Computer Security and Resolution of Technological Problems in Higher Education Students
10
作者 Esteban Pérez Flores Alejandra Aldrette Malacara +1 位作者 Sandra R. Murillo Cano Vittorio Zanella Palacios 《Journal of Computer and Communications》 2024年第4期171-185,共15页
Starting from the importance of preserving our information and protecting our devices against attacks on their vulnerabilities, this article aims to establish the level of knowledge in computer security and problem-so... Starting from the importance of preserving our information and protecting our devices against attacks on their vulnerabilities, this article aims to establish the level of knowledge in computer security and problem-solving of students at a university in northwest Mexico. This research has a quantitative approach where the European Framework of Digital Competencies for Citizenship was used as a reference to identify and establish the level of the competencies that were evaluated. The IKANOS Test was used as a data collection tool. The results show that students know the importance of keeping their devices safe and how valuable the information found on them is. On the other hand, the results also show a considerable percentage of students who do not have the knowledge and are at a basic level of knowledge to solve technical problems with their devices. 展开更多
关键词 Digital Literacy cybersecurity DigComp Digital Skills Data protection
下载PDF
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
11
作者 Smith Patel Vijay K. Madisetti 《Journal of Information Security》 2024年第4期474-493,共20页
In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac... In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approach to embedding sophisticated phishing detection within a password manager’s framework, called PhishGuard. PhishGuard uses a Large Language Model (LLM), specifically a fine-tuned BERT algorithm that works in real time, where URLs fed by the user in the credentials are analyzed and authenticated. This approach enhances user security with its provision of real-time protection from phishing attempts. Through rigorous testing, this paper illustrates how PhishGuard has scored well in tests that measure accuracy, precision, recall, and false positive rates. 展开更多
关键词 Phishing Attacks Password Management Phishing Detection AI BERT Algorithm Real-Time protection cybersecurity URL Authentication
下载PDF
信息时代消费者权益保护的趋势、挑战和应对措施
12
作者 丁怡旸 《中国商论》 2024年第22期71-74,共4页
信息时代,消费者权益保护正步入复杂多变的新阶段。互联网数据信息技术的飞速发展丰富了消费者的购物渠道,但同时也埋下了算法滥用、隐私侵犯、信息消费等隐患,严重威胁着消费者主权。消费者个人信息保护、网络交易安全风险和消费者维... 信息时代,消费者权益保护正步入复杂多变的新阶段。互联网数据信息技术的飞速发展丰富了消费者的购物渠道,但同时也埋下了算法滥用、隐私侵犯、信息消费等隐患,严重威胁着消费者主权。消费者个人信息保护、网络交易安全风险和消费者维权制度缺陷是当前信息时代消费者权益保护面临的主要挑战。基于此,本文认为需要扩大消费者法定概念范畴,加强算法规制,重新合理分配举证责任,以确保消费者权益在信息洪流中得到有效保护。 展开更多
关键词 信息时代 消费者权益保护 挑战算法 互联网 信息技术 网络安全
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
13
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
网络安全知识图谱构建与应用研究综述
14
作者 张舒越 詹昊谋 +2 位作者 李昕泽 孙雄韬 李晖 《网络空间安全科学学报》 2024年第3期79-106,共28页
随着网络空间的迅速发展,网络安全威胁日益复杂和多样化,知识图谱为解决多源异构网络安全数据的提取、整合和分析提供了新的手段。近年来,知识图谱已逐步应用于威胁情报、漏洞管理、攻击路径分析等众多网络安全细分领域,展现出广阔的应... 随着网络空间的迅速发展,网络安全威胁日益复杂和多样化,知识图谱为解决多源异构网络安全数据的提取、整合和分析提供了新的手段。近年来,知识图谱已逐步应用于威胁情报、漏洞管理、攻击路径分析等众多网络安全细分领域,展现出广阔的应用前景。此外,随着知识图谱应用的不断深入,其自身面临的诸多安全问题同样值得重视。全面概述网络安全知识图谱(Cybersecurity Knowledge Graph,CKG)的构建与应用,以及知识图谱当前面临的安全风险。首先介绍了CKG的构建,包括网络安全本体和网络安全信息提取的相关工作;其次梳理了基于威胁情报的CKG、CKG补全以及CKG具体应用的相关工作;随后探讨了知识图谱当前面临的安全风险,涉及针对知识图谱的攻击与防御、知识图谱中的隐私保护等相关工作;最后讨论了当前面向网络空间安全领域的知识图谱研究中存在的挑战以及未来的工作方向。通过对CKG的构建与应用以及知识图谱风险与防护的全面介绍和深入分析,可以更好地促进知识图谱在网络空间安全领域的应用。 展开更多
关键词 网络安全知识图谱 知识图谱构建与应用 网络威胁情报 知识图谱风险与防护
下载PDF
大数据发展背景下网络安全与隐私保护探讨
15
作者 张晓娟 王子平 周国涛 《信息与电脑》 2024年第4期195-197,共3页
大数据技术的飞速发展,在给人们的生活和工作带来便利、推动社会发展的同时,给计算机网络安全与公民隐私带来了一定的威胁。网络安全与隐私保护成了民众应用大数据技术时所关注的一个焦点问题。文章主要对大数据发展背景下网络安全与隐... 大数据技术的飞速发展,在给人们的生活和工作带来便利、推动社会发展的同时,给计算机网络安全与公民隐私带来了一定的威胁。网络安全与隐私保护成了民众应用大数据技术时所关注的一个焦点问题。文章主要对大数据发展背景下网络安全与隐私保护问题进行分析,并简要总结网络安全与隐私保护技术,以期提高网络安全与隐私保护水平。 展开更多
关键词 大数据 网络安全 隐私保护
下载PDF
某油田轻烃回收厂控制系统项目中的工控安全技术应用
16
作者 李兆崇 郝坚勇 +2 位作者 付海州 杨康 胡永钟 《自动化博览》 2024年第1期62-64,共3页
随着智慧油田的不断发展,需要按照等保要求和现场业务实际需求对生产网的工控系统进行安全防护,并且生产网与办公网之间的交互逐步从单纯的数据交互转变到业务交互,也对跨网交互中的边界安全性提出了更高的防护要求。本文对某油田轻烃... 随着智慧油田的不断发展,需要按照等保要求和现场业务实际需求对生产网的工控系统进行安全防护,并且生产网与办公网之间的交互逐步从单纯的数据交互转变到业务交互,也对跨网交互中的边界安全性提出了更高的防护要求。本文对某油田轻烃回收厂控制系统如何做好安全防护进行分析,并充分考虑了油气单位生产网与办公网的业务安全交互难点,最终实现了“业务+安全”的深度融合。 展开更多
关键词 信息安全 等级保护 私有协议 深度融合
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
17
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
数据中心防静电性能的测试与评估
18
作者 周婧洁 吴先智 +2 位作者 李舒 鲁凯 管美华 《计量与测试技术》 2024年第8期54-57,共4页
本文使用高精度人体动态电位仪,对人员在数据中心环境内的静电情况进行实时测量。结果表明:国标A级数据中心未存在人体静电对IT设备造成损坏的隐患,满足防静电设计规范中三级防静电工作区的技术要求。
关键词 静电 网络安全等级保护 数据中心 人体动态电位仪
下载PDF
智能电网调度控制系统安全防护技术及发展 被引量:89
19
作者 高昆仑 辛耀中 +4 位作者 李钊 孙炜 南贵林 陶洪铸 赵保华 《电力系统自动化》 EI CSCD 北大核心 2015年第1期48-52,共5页
对中国电网调度控制系统信息安全防护体系的发展历程进行梳理,总结为3个阶段,即基于边界安全的纵深防护体系阶段、基于等级保护的业务安全防护体系阶段以及基于可信计算的主动防御体系阶段。结合当前日新月异的新型威胁及国家级网络空... 对中国电网调度控制系统信息安全防护体系的发展历程进行梳理,总结为3个阶段,即基于边界安全的纵深防护体系阶段、基于等级保护的业务安全防护体系阶段以及基于可信计算的主动防御体系阶段。结合当前日新月异的新型威胁及国家级网络空间对抗新形势,提出基于可信计算技术,实现计算环境可信、应用行为可信、网络通信可信,构建以安全免疫为特征、以安全可控为目标的新一代智能电网调度控制系统安全主动防御体系,并介绍了其核心防御技术。 展开更多
关键词 智能电网调度控制系统 网络安全 纵深防护 等级保护 可信计算 主动防御
下载PDF
工业互联网安全产业发展态势及路径研究 被引量:26
20
作者 王秋华 吴国华 +3 位作者 魏东晓 苗功勋 徐艳飞 任一支 《中国工程科学》 CSCD 北大核心 2021年第2期46-55,共10页
工业互联网安全是实现我国工业互联网产业高质量发展的重要前提和保障,也是建设网络强国和制造强国战略的重要支撑。本文针对我国工业互联网安全产业发展面临的问题,分析了工业互联网安全在产业政策、标准体系、产业结构、产业规模等方... 工业互联网安全是实现我国工业互联网产业高质量发展的重要前提和保障,也是建设网络强国和制造强国战略的重要支撑。本文针对我国工业互联网安全产业发展面临的问题,分析了工业互联网安全在产业政策、标准体系、产业结构、产业规模等方面的发展现状,研判了工业互联网安全产业面临的历史机遇和发展趋势,提出了构建新一代工业互联网安全产业的发展路径。研究建议,加强顶层设计和政策引导,强化科技创新与转化,构建良好的产业发展生态,注重供应链安全与稳定,加强人才培养与队伍建设;立足全局、统筹联动,坚持"政产学研用"融合发展,探索出适合我国工业互联网安全产业的可持续发展路径。 展开更多
关键词 工业互联网安全 产业生态体系 网络安全等级保护 自主可控
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部