Introduction to Information Security and Cryptography

Introduction to Information Security and Cryptography

This article provides a preliminary understanding of the field of information security. 1. Briefly describe security attacks, security mechanisms, and security services. Security attack: Any act that jeopardizes the security of an information system. Security mechanism: A process used to detect, prevent attacks, or recover from an attack state to a normal state. Security service … Read more

Challenges and Thoughts on Information Security of Intelligent Connected Vehicles

Challenges and Thoughts on Information Security of Intelligent Connected Vehicles

On July 27, the National Standardization Administration of the Ministry of Industry and Information Technology issued the “Guidelines for the Construction of the National Internet of Vehicles Industry Standard System (Intelligent Connected Vehicles) (2023 Edition)” (referred to as the “2023 Standard System Construction Guidelines”). “To adapt to the new trends, new characteristics, and new demands … Read more

Understanding the Vehicle Networking Industry

Understanding the Vehicle Networking Industry

Article Outline Information Security Risks and Challenges of Intelligent Connected Vehicles Current Status of Information Security Policies and Regulations for Intelligent Connected Vehicles in China Analysis and Interpretation of Key Policies and Regulations (Network | Data | Software Security) Assessment of Future Management Directions Intelligent Vehicles Information Securityof Intelligent Connected Vehicles Risks and Challenges Intelligent … Read more

Industrial Control System Information Security Protection Guidelines

Industrial Control System Information Security Protection Guidelines

Notice on Issuing the “Industrial Control System Information Security Protection Guidelines” Ministry of Industry and Information Technology Document No. 338, 2016 In order to implement the “Guiding Opinions of the State Council on Deepening the Integration of Manufacturing and the Internet” (Guofa [2016] No. 28), and to ensure the information security of industrial control systems … Read more

Interpretation of Emergency Management Guidelines for Industrial Control System Information Security Events

Interpretation of Emergency Management Guidelines for Industrial Control System Information Security Events

To further implement the “Guiding Opinions of the State Council on Deepening the Integration of Manufacturing and the Internet”, and in accordance with the “Cybersecurity Law of the People’s Republic of China” and the “Emergency Response Law of the People’s Republic of China”, the Ministry of Industry and Information Technology recently issued the “Emergency Management … Read more

Overview of Information Security Software and Monitoring for Industrial Control Systems

Overview of Information Security Software and Monitoring for Industrial Control Systems

Abstract This article discusses the development of information security software and monitoring for industrial control systems, introduces the architecture of information security software and monitoring for industrial control systems, and provides a detailed analysis of information security software and monitoring across various layers including the field device layer, field control layer, process monitoring layer, manufacturing … Read more

Information Security in Industrial Control Systems

Information Security in Industrial Control Systems

Quoted from: “Intelligent Manufacturing Information Security Technology” (Authors: Qin Zhiguang, Nie Xuyun, Qin Zhen) The book has been published, for details please see the end of this article~ 「 1. Overview of Industrial Control Systems」 Industrial Control Systems (ICS) refer to a collective term for various types of control systems including monitoring and data acquisition … Read more

Introduction to OSI Reference Model and Data Encapsulation Principles

Introduction to OSI Reference Model and Data Encapsulation Principles

Blue Team – Technical Exchange In the field of information security, the characteristics of network security can be classified according to the OSI reference model, facilitating a systematic approach to analyzing and researching information network security risks. What is the OSI Reference Model? The OSI (Open System Interconnect) model, commonly known as the “OSI Reference … Read more

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

1. Overview of Cybersecurity 1.1 Definition Information Security: The technical and managerial security measures established and adopted for data processing systems, protecting computer hardware, software, and data from accidental and malicious destruction, alteration, and disclosure. Cybersecurity: Prevent unauthorized users from accessing information Prevent unauthorized attempts to destroy or modify information 1.2 Characteristics of Information Security … Read more

Functional Safety Left, Information Security Right: How Automotive SoCs Win the Smart Car Safety Upgrade Battle

Functional Safety Left, Information Security Right: How Automotive SoCs Win the Smart Car Safety Upgrade Battle

Thanks to “Gaogong Intelligent Automotive” for their attention to Synopsys. Currently, the global automotive industry is undergoing a major transformation. With the continuous increase in innovative applications in areas such as ADAS/autonomous driving and V2X, intelligent connected vehicles are becoming heavy-duty computers equipped with a central processing engine. Behind this, the connectivity and complexity of … Read more