工業互聯網安全

蔡君 等

  • 出版商: 電子工業
  • 出版日期: 2025-07-01
  • 售價: $480
  • 語言: 簡體中文
  • 頁數: 212
  • ISBN: 7121504383
  • ISBN-13: 9787121504389
  • 相關分類: 資訊安全
  • 下單後立即進貨 (約4週~6週)

相關主題

商品描述

本書共8章,目標是讓讀者了解工業互聯網安全的基本內涵、風險分析、關鍵技術及產品系統。第1章主要講述工業互聯網的基本概念、應用案例、體系架構、產業現狀及發展趨勢;第2章主要介紹工業互聯網安全威脅,包括工業互聯網的安全風險來源、面臨的主要挑戰、攻擊影響、威脅發展趨勢;第3章介紹工業互聯網安全防護與管理,包括安全需求及目標、安全防護技術及產品等;第4 ~ 8章分別從標識解析系統、工業互聯網平臺、工業控制系統、邊緣計算及數據的安全風險分析、防護要求及關鍵技術等方面,為讀者剖析工業互聯網安全風險、應對措施及技術發展趨勢等。本書內容豐富、概念清晰、語言精練、通俗易懂,堅持理論聯系實際,收集了面向產業應用的案例和知識,盡量避免過多的數學公式。本書可作為網絡空間安全、信息安全、物聯網、計算機科學與技術等專業的本科生教材,也可以作為廣大網絡安全工程師、網絡管理員、工業和信息化從業人員的參考書。

目錄大綱

第1章 工業互聯網 ············································································.1
1.1 工業互聯網的基本概念 ··········································································.1
1.2 工業互聯網應用案例 ·············································································.3
1.3 工業互聯網體系架構 ·············································································.4
1.4 工業互聯網產業現狀 ············································································.20
1.5 工業互聯網發展趨勢 ············································································.22
參考文獻 ································································································.25
第2章 工業互聯網安全威脅 ······························································.26
2.1 工業互聯網安全風險來源 ······································································.26
2.2 工業互聯網安全主要挑戰 ······································································.29
2.3 工業互聯網安全攻擊影響 ······································································.39
2.4 工業互聯網安全威脅發展趨勢 ································································.40
參考文獻 ································································································.44
第3章 工業互聯網安全防護與管理 ·····················································.45
3.1 安全需求及目標 ··················································································.45
3.2 安全管理體系 ·····················································································.49
3.3 法律法規與指導辦法 ············································································.52
3.4 安全防護技術及產品 ············································································.55
參考文獻 ································································································.74
第4章 標識解析安全 ·······································································.75
4.1 工業互聯網標識解析發展現狀 ································································.75
4.2 工業互聯網標識解析安全風險分析 ··························································.93
4.3 工業互聯網標識解析安全防護建設 ························································.101
4.4 工業互聯網標識解析安全關鍵技術 ························································.104
4.5 工業互聯網標識解析安全建設的意義及展望 ············································.107
參考文獻 ······························································································.109
第5章 工業互聯網平臺安全 ····························································.110
5.1 工業互聯網平臺安全風險 ····································································.110
5.2 工業互聯網平臺安全防護要求 ······························································.114
5.3 工業互聯網平臺安全措施 ····································································.117
5.4 工業互聯網平臺安全防禦關鍵技術 ························································.121
5.5 工業互聯網平臺安全的發展意義及展望 ··················································.127
參考文獻 ······························································································.129
第6章 工業控制系統安全 ·······························································.130
6.1 工業控制系統安全問題 ·······································································.130
6.2 工業控制系統安全風險 ·······································································.133
6.3 工業控制系統常見的攻擊手段 ······························································.135
6.4 工業控制系統安全防護策略 ·································································.139
參考文獻 ······························································································.150
第7章 工業互聯網邊緣計算安全 ······················································.151
7.1 工業互聯網邊緣計算概述 ····································································.151
7.2 工業互聯網邊緣計算研究現狀 ······························································.152
7.3 工業互聯網邊緣計算面臨的典型安全風險 ···············································.153
7.4 工業互聯網邊緣計算安全防護面臨的挑戰 ···············································.155
7.5 工業互聯網邊緣計算安全措施 ······························································.158
7.6 工業互聯網邊緣計算安全關鍵技術 ························································.160
7.7 工業互聯網邊緣計算安全的發展意義及展望 ············································.176
參考文獻 ······························································································.177
第8章 工業互聯網數據安全 ····························································.178
8.1 工業互聯網數據安全概述 ····································································.178
8.2 工業互聯網數據安全的發展現狀 ···························································.180
8.3 工業互聯網數據安全的風險點與問題分析 ···············································.181
8.4 工業互聯網數據安全關鍵技術 ······························································.182
8.5 工業互聯網數據安全新興技術 ······························································.196
8.6 工業互聯網數據安全的發展意義及展望 ··················································.204
參考文獻 ······························································································.206