Security vulnerability assessment method, system and equipment for cigarette industrial control system

An industrial control system and control system technology, applied in the cigarette industry, can solve the problems of high cost of simulation environment, incomplete and inaccurate security vulnerability assessment, etc., and achieve the effect of reducing the cost of enterprises

Active Publication Date: 2021-01-29
SHANGHAI TOBACCO GRP CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above-mentioned shortcomings of the prior art, the purpose of the present invention is to provide a security vulnerability assessment method, system and server of the cigarette industrial control system, which is used to solve the problem of high cost of establishing a simulation environment for the cigarette industrial control system in the prior art. , there is a big difference between the simulation environment and the real production environment, which leads to the problem of incomplete and inaccurate security vulnerability assessment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security vulnerability assessment method, system and equipment for cigarette industrial control system
  • Security vulnerability assessment method, system and equipment for cigarette industrial control system
  • Security vulnerability assessment method, system and equipment for cigarette industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040]This embodiment provides a security vulnerability assessment method of a cigarette industrial control system, the cigarette industrial control system includes a plurality of sub-control systems, and the security vulnerability assessment method of the cigarette industrial control system includes the following steps:

[0041] identifying each of the plurality of sub-control systems as a data flow on the evaluation object, and marking the data flow path and direction of the data flow;

[0042] classifying said data stream according to its attributes;

[0043] Analyzing the attack surface of each device node on the data flow path to calculate the potential security vulnerabilities existing on each device node;

[0044] Judging whether the data flow has corresponding technical control measures in the cigarette industrial control system; if yes, perform the next step, if not, configure corresponding technical control measures for the data flow;

[0045] Judging whether each d...

Embodiment 2

[0085]This embodiment provides a security vulnerability assessment system of a cigarette industrial control system, the cigarette industrial control system includes multiple sub-control systems, and the security vulnerability assessment system of the cigarette industrial control system includes:

[0086] an identification module, configured to identify each of the plurality of sub-control systems as a data flow on an evaluation object;

[0087] A marking module, connected to the preprocessing module, for marking the data flow path and flow direction of the data flow;

[0088] A classification module, connected to the marking module, for classifying the data stream according to its attributes;

[0089] The first analysis module is connected with the identification module, the marking module, and the classification module, and is used to analyze the attack surface of each device node on the data flow path to count the potential security vulnerabilities existing on each device no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security vulnerability assessment method for a cigarette industry control system. The method comprises the steps of identifying data streams, and tagging data stream paths and stream directions of the data streams; classifying the data streams according to attributes of the data streams; analyzing an attack surface; judging whether the data streams have technical control measures corresponding to the data streams in the cigarette industry control system or not; if yes, judging whether equipment nodes on the data stream paths have security management measures corresponding to the equipment nodes or not; if yes, performing security vulnerability testing and analysis on key nodes on the data stream paths, performing statistics on security vulnerability points on the key nodes on the data stream paths, and compiling the security vulnerability points existent in the cigarette industry control system in a predetermined document format; and if the equipment nodes on the data stream paths do not have the security management measures corresponding to the equipment nodes, configuring the security management measures corresponding to the equipment nodes for the equipment nodes on the data stream paths, and if the data streams do not have the technical control measures corresponding to the data streams in the cigarette industry control system, configuring the technical control measures corresponding to the data streams for the data streams. According to the security vulnerability assessment method, the security vulnerability of the cigarette industry control system can be assessed more comprehensively and more accurately.

Description

technical field [0001] The invention belongs to the technical field of the cigarette industry, and relates to an assessment method and system, in particular to a security vulnerability assessment method, system and equipment of a cigarette industry control system. Background technique [0002] At present, China mainly adopts "GB / T 27921-2011 Risk Management Risk Assessment Technology" and "GB / T 26333-2010 Industrial Control Network Security Risk Assessment Specification" to carry out network security risk assessment and security risk management for industrial control systems. Network security risk assessment mainly involves asset identification and assessment, threat assessment, vulnerability assessment, and risk calculation. Vulnerability assessment requires active attack methods such as vulnerability scanning and penetration testing for detection and identification. There are no serious threats in traditional IT information systems. However, using the above methods for ind...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06
CPCG06Q10/0635
Inventor 戴志渊胡庭川卓蔚周佳杰谭琛王玮
Owner SHANGHAI TOBACCO GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products