说明:收录25万 73个行业的国家标准 支持批量下载
物联网安全白皮书 绿盟科技创新中心 © 2016 绿盟科技版权声明特别声明 本文中出现的任何文字叙述、 文档格式、 插图、 照片、 方法、 过程等内容, 除另有特别注明, 版权均属绿盟科技所有,受到有关产权及版权法保护。任何个人、机构未经绿盟科技的书面授 权许可,不得以任何方式复制或引用本文的任何片断。为避免客户数据泄露,所有数据在进行分析前都已经匿名化处理,不会在中间环节出现 泄露,任何与客户有关的具体信息,均不会出现在本报告中。《物联网安全白皮书》 由绿盟科技创新中心撰写 绿盟科技持续关注物联网安全的相关信息 ,如需了解更多,请联系:一. 物联网安全概述 ·················································································· 1 1.1 引言 ··········································································································· 1 1.2 物联网安全的体系结构 ······························································································································ 3 1.3 研究项目和标准化组织 ······························································································································ 4 1.3.1 物联网安全项目 ·················································································································· 4 1.3.2 TRUST ·································································································································· 6 1.3.3 OWASP Internet of Things Project ··················································································· 6 1.3.4 CSA ······································································································································· 6 1.3.5 NIST ······································································································································ 7 1.3.6 IoT Security Foundation ···································································································· 7 二. 物联网安全需求及对策 ······································································ 9 2.1 引言 ···································································································································································· 9 2.2 隐私保护 ·························································································································································· 9 2.3 认证 ································································································································································· 10 2.4 访问控制管理 ·············································································································································· 10 2.5 数据保护 ······················································································································································· 11 2.6 物理安全 ······················································································································································· 11 2.7 设备保护和资产管理 ································································································································ 11 2.8 攻击检测和防御 ········································································································································· 12 2.8.1 拒绝服务攻击 ···················································································································· 12 2.8.2 病毒攻击 ···························································································································· 12 2.8.3 APT 攻击 ···························································································································· 12 2.8.4 蜜罐 ···································································································································· 13 2.9 态势感知 ······················································································································································· 13 2.9.1 异常行为检测 ···················································································································· 13 2.9.2 脆弱性评估 ························································································································ 13 2.9.3 威胁情报交换 ······

pdf文档 物联网安全白皮书-1215

文档预览
中文文档 45 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共45页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
物联网安全白皮书-1215 第 1 页 物联网安全白皮书-1215 第 2 页 物联网安全白皮书-1215 第 3 页
下载文档到电脑,方便使用
本文档由 SC 于 2023-05-03 01:08:38上传分享
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。