GB/T 33009.4-2016: Translated English of Chinese Standard. GB/T33009.4-2016, GB33460: Industrial automation and control system security - Distributed control system (DCS) - Part 4: Risk and vulnerability detection requirements
https://www.chinesestandard.net, 11 feb. 2018 - 33 páginas
This part of GB/T 33009 specifies the risk and vulnerability detection of the distributed control system (DCS) before and after being put into operation, proposes specific requirements for the risk and vulnerability detection of the DCS software, Ethernet network communication protocol and industrial control network protocol.
Comentarios de usuarios - Escribir una reseña
No hemos encontrado ninguna reseña en los sitios habituales.
Otras ediciones - Ver todo
GB/T 33009.1-2016: Translated English of Chinese Standard. GB/T33009.1-2016 ...
Vista previa restringida - 2018
accordance with DCS automation and control Beijing Commercial Ethernet protocol communication protocol data control system DCS control system security data integrity database management system DCS engineer station DCS equipment DCS risk DCS system meets detecting the vulnerability detection indicator requirements Detection items Detection Detection items include detection staff Distributed control system enterprise or organization Enterprise Resource Planning field control layer field equipment layer fuzz testing implementation Detection methods implementation include Industrial automation industrial network protocol information system security items Detection items listed in GB Manufacturing Execution System meet or partially meet the detection meet the requirements meets the security methods and implementation monitoring software network structure OPC server OPC software operating system operator station partially meet process monitoring layer protocol communication mechanism protocol to resist real-time and security requirements DCS Result judgment risk and vulnerability security functional elements security requirements software administrator software version testing meets vulnerability detection