首页> 外文期刊>Electronic Engineering Times >Protocol guards against security breaches
【24h】

Protocol guards against security breaches

机译:协议防范安全漏洞

获取原文
获取原文并翻译 | 示例
           

摘要

The proliferation of connected sys-terns is offering huge advantages to individuals and businesses the world over. Formidable cost savings are possible in terms of time efficiencies and additional features. Consider, for example, a utility company that is now able to connect to electric meters over the Internet. Think how many person-hours will be saved when, instead of sending a reader to check on individual meters, a management center can connect to a large number of meters and collect billing information instantly. Usually, when designing an application such as meter checking, networking code is verified and tested for proper operation within a well-defined test environment. Testing often includes interoperability with numerous other products using well-behaved and friendly software that has been verified to comply with the networking protocol specifications. But many businesses find communicate with the system. There is no guarantee that such software will behave properly. In fact, the system could connect with hostile software written specifically to launch break-in, denial-of-service and buffer-overflow attacks.
机译:互联系统的激增为全世界的个人和企业提供了巨大的优势。就时间效率和其他功能而言,可以节省大量成本。例如,考虑一家公用事业公司,该公司现在可以通过Internet连接到电表。考虑一下何时管理中心可以连接大量仪表并立即收集账单信息,而不是让阅读器检查单个仪表,将节省多少工时。通常,在设计仪表检查等应用程序时,将对网络代码进行验证并对其进行测试,以便在定义明确的测试环境中正常运行。测试通常包括使用行为良好且友好的软件来与众多其他产品进行互操作,这些软件已被验证符合网络协议规范。但是许多企业发现与系统进行通信。不保证此类软件将正常运行。实际上,该系统可以与专门编写的恶意软件连接,以发起入侵,拒绝服务和缓冲区溢出攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号