首页> 外文期刊>InTech >Industrial automation cybersecurity conformity assessments
【24h】

Industrial automation cybersecurity conformity assessments

机译:工业自动化网络安全符合性评估

获取原文
获取原文并翻译 | 示例
           

摘要

Having attended numerous conferences hosted by different industry groups over the past few years, I have found that the conversations are frequently muddled, lacking structure, and without a generally accepted paradigm for establishing context--with the exception of interchanges with a few subject-matter experts (SMEs) at the top of their game. The most frustrating dynamic is the lack of context. For example, I reviewed a recent industry group study about industrial automation and control system (IACS) cybersecurity that surveyed its constituency about spending plans for "cybersecurity solutions" in the context of purchasing cybersecurity "products" to solve the problem. That was it. The study did not separate the issues into people, process, and technology categories and did not separate the cybersecurity topics into IACS life-cycle phases.
机译:在过去的几年中,我参加了由不同行业团体主办的众多会议,发现对话常常是混乱的,缺乏结构的,并且没有建立上下文的普遍接受的范式-除了与一些主题的交流之外专家(SME)放在他们游戏的顶端。最令人沮丧的动态是缺少上下文。例如,我回顾了最近有关工业自动化和控制系统(IACS)网络安全的行业小组研究,该研究调查了其在购买网络安全“产品”以解决问题的情况下有关“网络安全解决方案”支出计划的支持者。就是这样该研究没有将问题分为人员,流程和技术类别,也没有将网络安全主题分为IACS生命周期阶段。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号