GB/T 33009.1-2016: Translated English of Chinese Standard. GB/T33009.1-2016, GB33460: Industrial automation and control system security - Distributed control system (DCS) - Part 1: Protection requirements
https://www.chinesestandard.net, 11. feb. 2018 - 36 sider
This part of GB/T 33009 specifies the security capabilities, protection technical requirements, and division of security protection zones of the distributed control system in the operation and maintenance process, AND proposes specific requirements for the key protection items, protection equipment, and protection techniques of the process monitoring layer, field control layer and field equipment layer.
Hva folk mener - Skriv en omtale
Vi har ikke funnet noen omtaler på noen av de vanlige stedene.
Physical access control requirements
Field control layer network security
Andre utgaver - Vis alle
access control application software attacks audit records backup Basic requirements Beijing buffer overflow chart production software Common enhanced requirements control layer network control program control system security data communication software data transmission software DCS system applications DCS system network Deepening enhanced requirements deployed deployment of protective Distributed control system engineer station ensure enterprise user equipment layer network field control layer field equipment layer flow chart production GB/T graphical editing software historical data transmission human machine interface identity authentication Industrial automation industrial control system integrity Intrusion prevention IP fragmentation language programming software limited login Manufacturing Execution System mobile code modification events monitoring layer network network security network traffic OPC server software operator station process monitoring layer protective equipment protective software protocol real-time data real-time database server reliability and security requirement includes requirements DCS requirements This requirement resource control security policy security requirements security zone system configuration software user configuration software