• Home
  • Journals
  • Focus
  • Conferences
  • Researchers
  • Sign in

Outline

  • Abstract
  • Keywords

Figures(5)

标签(1)

Table 1

其他(2)

PDF
Document

Strategic Study of Chinese Academy of Engineering

    • PDF
    • collect

    Development of Industrial Internet Security Technology in China

    1. Institute of Security Research, China Academy of Information and Communications Technology, Beijing 100191, China;

    2. China Academy of Information and Communications Technology, Beijing 100191, China; 

    3. College of Information Science and Engineering, Xinjiang University, Urumqi 830046, China

    Received:2021-01-22 Revised:2021-03-17 Available online:2021-03-24
    Show More
    10.15302/J-SSCAE-2021.02.009
    Cite this article
    董悦,王志勤,田慧蓉,李姗,秦国英,吾守尔·斯拉木.工业互联网安全技术发展研究[J].中国工程科学:1-9.

    Abstract

    As the new-generation information technology, such as cloud computing and big data, integrates in depth with traditionalindustrial operation technologies, the industrial Internet becomes a new driving force for the digital transformation of industrialenterprises. Meanwhile, industrial Internet security problems have increased; therefore, improving the technological capabilities forguaranteeing industrial Internet security becomes the prerequisite for the high-quality development of the industrial Internet. In thisstudy, we first analyze the demand for industrial Internet development and summarize the development status of industrial Internetsecurity protection, evaluation, and monitoring technologies. Subsequently, we investigate the development trend, technologicaldifficulties, and challenges for the industrial Internet security technology, and propose the key technologies and their developmentapproaches. To promote the safe and healthy development of industrial Internet in China, the industrial Internet security technologiesneed to be customized in accordance with industrial characteristics and scenarios, and closely integrate with new technologies such asbig data and AI, to achieve active defense and create endogenous security capabilities.

    Keywords

    industrial Internet security ; security protection technology ; security evaluation technology ; security monitoring technology
    SupplementaryMaterials
    Previous article in issue
    article in issue Next
    登录后,您可以进行评论。请先登录

    评论

    评论

    • 所有评论
     咋就跳到顶部了
    2019-04-23 11:24:14
    回复 (0)
    inspur  手机账号
    2019-05-10 11:30:17
    回复 (0)

    Read

    48

    Download

    18

    Related Research

    Current Issue
      Current Issue
        Follow us
        Copyright © 2015 China Engineering Science Press.
        京ICP备11030251号
        Follow us
        Copyright © 2015 China Engineering Science Press.
        京ICP备11030251号