【24h】

Mining Network and the Security Question

机译:采矿网络和安全问题

获取原文

摘要

Companies all over the world are very sensitive concerning their IT and network security. In most network connected technical installations and machines however, network security is not taken into account to a significant extent: insecure protocols are run, unencrypted information is exchanged freely and even broadcasted wirelessly and networked machines are accessible via insecure file transfer protocol (FTP). What happens in case of malfunctions of such technical installations? Who is responsible? Who can be held liable in case of accidents? The first computer worm for automation systems ('STUXNET') (Symantec, 2010) was discovered during 2010. The paper is intended to create sensitivity among decision makers for potential security and resulting safety leaks and points out the current status quo in technical network security. It outlines best practices for secure networking and procedures for remote access and remote software updates on stationary equipment and mobile mining machinery. It describes how to ensure authentic and genuine configurations and software targets and howto ensure secure communication for autonomous and remote controlled equipment. For such equipment in particular, the following statement should apply: 'There is no safety without network security'.
机译:世界各地的公司对其IT和网络安全非常敏感。在大多数网络连接的技术安装和机器中,在很大程度上没有考虑网络安全性:运行不安全协议,不完全交换未加密的信息,甚至通过不安全文件传输协议(FTP)访问无线和网络机器。在此类技术安装故障的情况下会发生什么?谁是负责的人?谁可以在事故发生责任?自动化系统(“Stuxnet”)('Stuxnet')(Symantec,2010)的第一台计算机蠕虫是在2010年发现的。本文旨在为决策者创造潜在安全性的敏感性,并导致安全泄漏,并指出技术网络安全中的当前现状。它还概述了固定设备和移动挖掘机械上远程访问和远程软件更新的安全网络和程序的最佳实践。它描述了如何确保真实和真正的配置和软件目标以及如何确保自主和远程控制设备的安全通信。对于此类设备,特别是以下陈述应适用:“没有网络安全的安全性”。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号