As information security is promoted to the level of national security, industrial control systems as an important system of the lifeline of the country, its security defense has increasingly become a hot spot in the field of information security.
However, compared with traditional information security, industrial control system security has its own unique features. How is the current situation of industrial control system security in China, and how can we effectively defend the safety of industrial control systems? Recently, the reporter interviewed Meng Qingsen, assistant president of Beijing Wang Yu Xingyun Information Technology Co., Ltd.
Since the attack on the Bushehr nuclear power plant in Iran in 2010, the information security for industrial control systems has been increasingly valued by various countries. "At present, although there are no major industrial control system security incidents in China, once the problems of industrial control system safety occur, the consequences will be very serious." Meng Qingsen said, "In general, the domestic security awareness of industrial control systems is still weak. The investment in the safety of industrial control systems and professional safety personnel is relatively small."
Different from the traditional IT system, the industrial control system is generally a dedicated system, and its operating system and communication protocol are also very different from the general system. Compared with the open Internet environment, the industrial control system is relatively independent.
Meng Qingsen said: "In recent years, with the development trend of the integration of the two industries, the interconnection between the management system and the industrial control system has increased the efficiency of the traditional IT risk to the industrial control system. In addition, with more and more General-purpose systems and general-purpose hardware are gradually being applied to industrial control system facilities. Traditional system vulnerabilities also pose a threat to the security of industrial control systems. However, for the moment, the biggest threat to the security of industrial control systems lies in APT attacks."
APT attackers are often organized, planned, and combined with multiple attack modes, through comprehensive intelligence gathering, and persistent search target vulnerabilities until the system is compromised. Such attacks often have clear goals and huge financial support. Because of its strong planning, organization and concealment, and the duration of the attack is very long, it is difficult to be discovered and defended. In addition, the design of industrial security system in information security defense is inherently insufficient, and APT attack has become the number one killer threatening the security of industrial control systems.
So, how to ensure the safety of industrial control systems? At present, China has issued relevant guidance documents on the safety of industrial control systems, such as the Notice on Strengthening Information Security Management of Industrial Control Systems issued by the Ministry of Industry and Information Technology (Ministry of Industry and Information Technology [2011] No. 451) and the State Council issued "Several Opinions on Promoting Informatization Development and Effectively Protecting Information Security" (Guo Fa [2012] No. 23), etc., all put forward opinions on the management of information security of industrial control systems in key areas, and requested the establishment of a national information security system. It is proposed to "safeen the safety of industrial control systems."
Meng Qingsen believes that the state has expressed great importance to the safety of industrial control systems from the policy level. However, in the implementation process of the industrial security system security defense, there are still certain difficulties: "At present, the domestic industrial control system uses a wide variety of products and brands. Most of them are mainly overseas manufacturers. It is difficult for domestic information security vendors to cooperate with many manufacturers and products. Secondly, because of the special nature of industrial control systems, they have been in the state of operational production, and security vendors cannot test them. Testing, which also makes it difficult to implement security vendor and user level cooperation."
In addition, there are also major differences between industrial control agreements between different industries and manufacturers. There are even as many as fifty or sixty types of communication protocols. This also causes problems for security vendors in the development of security products for industrial control systems. For this, Meng Qingsen suggested: It is best to start from the perspective of industry-oriented development of industrial control system security products and solutions.
Then, in the face of the above problems, how to implement the defense and protection of the industrial control system security? Meng Qingsen said: The security of industrial control systems also needs to have a large security perspective, and deep defense from multiple dimensions, such as: consideration of the entire system, training of security management personnel, and security system level.
In the interview, Meng Qingsen also gave specific relevant suggestions: stratification, sub-domain, and hierarchical division of industrial control systems, and isolation and access control of industrial control systems by means of gatekeeper equipment and VPN access equipment. Vulnerability assessment of industrial control systems and equipment, timely update of the system, or update of virtual patches of protective equipment; through the monitoring platform for industrial control systems, together with other security equipment to protect the industrial control system facilities; in addition, regular security Training, system evaluation, and timely detection of hidden dangers of security threats.
What can the Screen Protector Cutting Machine do?
This is a customized universal cutting machine that can cut Screen Protectors and Back Filmns suitable for mobile phones,
iPads, smart watches, macbook etc.
One Cutting Machine can cut all types of Mobile Phone Screen Protectors. The cutting accuracy is 0.1mm. It can cut more
than 22000+ mobile phone models and styles, and any model can be cut. 0 inventory, no need to worry about large
inventory, to meet the large needs of customers.
In the Mobile Phone Screen Protector industry, in order to meet the requirements of consumers in the traditional mobile phone film business model, many practitioners will prepare a large number of Mobile Phone Screen Protectors for popular mobile phones. However, the alternate iteration of new and old mobile phone models is too fast, and the cycle is greatly shortened, resulting in many screen protectors that have not been able to be sold in time, and can only be disposed of by themselves. and profit margins will suffer as a result. It is against this background that the Screen Protector Cutting Machine was born, and its appearance can improve the operating status of the Screen Protector industry.
Protective Film Cutting Machine,Back Sticker Cutting Machine,Phone Sticker Cutting Machine,Flim Cutting Machine
Shenzhen TUOLI Electronic Technology Co., Ltd. , https://www.hydrogelprotector.com