Please wait a minute...
Computer & Telecommunication  2021, Vol. 1 Issue (11): 12-15    DOI: 10.15966/j.cnki.dnydx.2021.11.025
Current Issue | Archive | Adv Search |
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
Guangdong Industry Polytechnic
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  
Network security is a major challenge faced by industrial control systems today, and on the basis of good technical protection, network security must rely on the improvement of management. This paper researches on the realization of a dynamic industrial control system network security management cycle based on the PDCA model, and introduces the industrial control system network security management practice implemented in A Company. By constructing a network security management system framework, it establishes a complete management system library for unified management, revises and improves the existing system clauses, formulates the basis for reviewing the implementation of the system in key links, conducts regular network security managementself-examinations, and monitors implementations of the system so as to verify the rationality and applicability of the management system, and finally achieve continuous network security.

Key words     
Published: 01 November 2021

Cite this article:

LAI Jin-zhi.

Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
. Computer & Telecommunication, 2021, 1(11): 12-15.

URL:

https://www.computertelecom.com.cn/EN/10.15966/j.cnki.dnydx.2021.11.025     OR     https://www.computertelecom.com.cn/EN/Y2021/V1/I11/12

[1] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[2] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[3] CAI Hong-fang.
Research on the Quality Assurance Path of Online and Offline Integrated Teaching
Based on PDCA Cycle
——Take Instrumentation Analysis for Example
[J]. 电脑与电信, 2023, 1(3): 55-58.
[4] CHAI Yuan-yuan SUN Na-xin MENG Chen-ran CHENG Hui ZHENG Jing-jing.
Exploration on Computer Practice Teaching Mode Based on Curriculum Ideology and Politics
[J]. 电脑与电信, 2023, 1(1-2): 5-7.
[5] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[6] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[7] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[8] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[9] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[10] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[11] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[12] ZHANG Yu. Application of DES File Encryption in Network Security[J]. 电脑与电信, 2019, 1(7): 49-.
[13] JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks[J]. 电脑与电信, 2019, 1(5): 48-50.
[14] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[15] FAN Miao-miao. Analysis of WSN Network Security Management Mechanism[J]. 电脑与电信, 2018, 1(12): 84-86.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd