物联网安全白皮书 绿盟科技创新中心 © 2016 绿盟科技 《物联网安全白皮书》 由绿盟科技创新中心撰写 绿盟科技持续关注物联网安全的相关信息 , 如需了解更多,请联系: 特别声明 为避免客户数据泄露,所有数据在进行分析前都已经匿名化处理,不会在中间环节出现 泄露,任何与客户有关的具体信息,均不会出现在本报告中。 版权声明 本文中出现的任何文字叙述、文档格式、插图、照片、方法、过程等内容,除另有特别注明, 版权均属绿盟科技所有,受到有关产权及版权法保护。任何个人、机构未经绿盟科技的书面授 权许可,不得以任何方式复制或引用本文的任何片断。 目录 一 . 物联网安全概述 ··················································································1 1.1 引言···········································································································1 1.2 物联网安全的体系结构 ······························································································································ 3 1.3 研究项目和标准化组织 ······························································································································ 4 1.3.1 物联网安全项目 ·················································································································· 4 1.3.2 TRUST ·································································································································· 6 1.3.3 OWASP Internet of Things Project··················································································· 6 1.3.4 CSA ······································································································································· 6 1.3.5 NIST······································································································································ 7 1.3.6 IoT Security Foundation ···································································································· 7 二 . 物联网安全需求及对策 ······································································9 2.1 引言···································································································································································· 9 2.2 隐私保护 ·························································································································································· 9 2.3 认证································································································································································· 10 2.4 访问控制管理 ·············································································································································· 10 2.5 数据保护 ······················································································································································· 11 2.6 物理安全 ······················································································································································· 11 2.7 设备保护和资产管理································································································································ 11 2.8 攻击检测和防御 ········································································································································· 12 2.8.1 拒绝服务攻击 ···················································································································· 12 2.8.2 病毒攻击 ···························································································································· 12 2.8.3 APT 攻击 ···························································································································· 12 2.8.4 蜜罐 ···································································································································· 13 2.9 态势感知 ······················································································································································· 13 2.9.1 异常行为检测 ···················································································································· 13 2.9.2 脆弱性评估 ························································································································ 13 2.9.3 威胁情报交换 ···················································································································· 14 2.9.4 可视化展示 ························································································································ 14 2.9.5 物联网事件响应措施 ········································································································ 14 2.10 通信保护 ········································································································

pdf文档 2017-《绿盟科技物联网安全白皮书》

安全研究库 > 安全文章摘录 > 安全文章摘录 > 文档预览
45 页 0 下载 32 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2017-《绿盟科技物联网安全白皮书》 第 1 页 2017-《绿盟科技物联网安全白皮书》 第 2 页 2017-《绿盟科技物联网安全白皮书》 第 3 页 2017-《绿盟科技物联网安全白皮书》 第 4 页 2017-《绿盟科技物联网安全白皮书》 第 5 页
下载文档到电脑,方便使用
还有 40 页可预览,继续阅读
本文档由 张玉竹2022-04-08 09:16:49上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言