2019 ◽  
Vol 8 (S1) ◽  
pp. 15-17
Author(s):  
A. Aruljothi ◽  
N. Prabhu ◽  
N. M. Mallika

It is a difficult building to ensure the security of data arrange, so it is important to consider out a new security control design and model in the viewpoint of foundational control. As indicated by the attributes and security requests of data net, another security control viewpoint and its engineering dependent on parts is proposed, the security control framework is made-up, and insights regarding the structure of control system, its different kinds, and capacities and spread methods of security control parts are presented, at that point the highlights of the control framework are outlined at last.


2011 ◽  
Vol 268-270 ◽  
pp. 1012-1016
Author(s):  
Jian Zhou ◽  
Shan Shan Li ◽  
Wei Jie Tan

Aiming at face Tri-networks integration demand bearing network/core backbone, carry out research of security control technical structure , key technologies and standards systematic In Tri-networks integration environment, to Build a safer control system that includes Facing the Tri-networks integration of business, network, content, behavior, etc. Research oriented business level controls and abnormal behavior of preventing high-speed low delay safety control equipment, builds the control center system, realize the legality of different modal information content safety monitoring control, network security situation analysis and display, control strategy of unified management and dynamic maintenance, and other functions. validation the functions and performance of security control network system, argumentation the feasibility and evolution ability of the fusion network security control system structure.


2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.


2021 ◽  
Vol 7 (1) ◽  
pp. 10-18
Author(s):  
Arief Saptono ◽  
Abdul Malik ◽  
Muhamad Satim

Computer and information technology from time to time are always experiencing developments, both in terms of hardware, software and the internet being one of the most important things atthis time. The increasing number of applications of computer technology will make the role of computers increasingly important to be more advanced (modernization). The security system isstill not effective and efficient enough, so that a control using a website is needed to help the security control process at the gate. This system is not only used in offices, but can be used inhome security, etc. So we need a security system, where the security control system uses a tool to monitor realtime security via a web browser, namely a webcam (Web Camera). A web-basedgate control system can be designed using the Raspberry Pi B +. From the explanation mentioned above, the researcher made a gate control device that was given to the Microcontroller using a Web Browser in order to open and close the gate. So it is hoped that this security system application can provide a sense of comfort, in addition, of course, with this system application it can reduce the number of crimes that occur both crimes and other crimes.


Author(s):  
Joshua Lubell

This paper describes a markup-based approach for synthesizing disparate information sources and discusses a software implementation of the approach. The implementation makes it easier for people to use two complementary, but differently structured, guidance specifications together: the (top-down) Cybersecurity Framework and the (bottom-up) National Institute of Standards and Technology Special Publication 800-53 security control catalog. An example scenario demonstrates how the software implementation can help a security professional select the appropriate safeguards for restricting unauthorized access to an Industrial Control System. The implementation and example show the benefits of this approach and suggest its potential application to disciplines other than cybersecurity.


2021 ◽  
Vol 2078 (1) ◽  
pp. 012067
Author(s):  
Jingcheng Zhao ◽  
Xiaomeng Li ◽  
Yaofu Cao ◽  
Junwen Liu ◽  
Junlu Yan ◽  
...  

Abstract In recent years, international industrial control network security incidents have occurred frequently. As a core component of the industrial control field, intelligent power control systems are increasingly threatened by external network attacks. Based on the current research status of power industrial control network security, closely combining the development of active monitoring and defense technology in the public network field and the problems encountered by network security operators in actual work, this paper uses data mining methods to study the power control system network security situation awareness technology. Combing operational data collection and integrated processing, situation index screening and extraction, we use wavelet neural network analysis method to train the sampled data set, and finally calculate the true value of the network security status through deep intelligent learning. Finally, we conclude that the artificial intelligence algorithm based on wavelet neural network can be used for power control system network security situation awareness. In actual work, it can predict the situation value for a period of time in the future and assist network security personnel in judgment and decision-making.


Sign in / Sign up

Export Citation Format

Share Document