Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week Wi-Fi Security 01 Phishing Wi-Fi Risk Analysis In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create deceptive Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and … Read more

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week Wi-Fi Security 01 Phishing Wi-Fi Risk Analysis In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create misleading Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and … Read more

Safety Protection Solutions for Steel Industrial Control Systems | Anmeng Information

Safety Protection Solutions for Steel Industrial Control Systems | Anmeng Information

1. Industry Background The steel industry is a fundamental industry in China and a pillar of the national economy. However, there are still many security risks in the industrial control networks of steel enterprises that need to be addressed, despite their seemingly stable operation. In the automation process of the smelting industry, continuous casting mold … Read more

Quantitative Assessment of Industrial Control System Security

Quantitative Assessment of Industrial Control System Security

In recent years, security incidents involving industrial control systems have been frequent, and there is a lack of effective quantitative risk assessment methods domestically. To address this issue, a quantitative assessment method for industrial control system security based on the combination of fuzzy analytic hierarchy process and attack tree models is proposed. This method establishes … Read more

How to Ensure OTA Security for Intelligent Connected Vehicles

How to Ensure OTA Security for Intelligent Connected Vehicles

With the development of intelligent connected vehicles, OTA (Over-The-Air) updates have become a basic function essential for smart cars. It is an important technological means for vehicles to perform software and hardware upgrades, introduce new features, update applications, and fix vulnerabilities, enabling continuous evolution of vehicles, ongoing optimization of user experience, and sustained value creation.However, … Read more