Quantitative Assessment of Industrial Control System Security

Quantitative Assessment of Industrial Control System Security

In recent years, security incidents involving industrial control systems have been frequent, and there is a lack of effective quantitative risk assessment methods domestically. To address this issue, a quantitative assessment method for industrial control system security based on the combination of fuzzy analytic hierarchy process and attack tree models is proposed. This method establishes … Read more

How to Ensure OTA Security for Intelligent Connected Vehicles

How to Ensure OTA Security for Intelligent Connected Vehicles

With the development of intelligent connected vehicles, OTA (Over-The-Air) updates have become a basic function essential for smart cars. It is an important technological means for vehicles to perform software and hardware upgrades, introduce new features, update applications, and fix vulnerabilities, enabling continuous evolution of vehicles, ongoing optimization of user experience, and sustained value creation.However, … Read more

Security Operations Center (SOC) Overview

Security Operations Center (SOC) Overview

Cybersecurity is a dynamic process, mainly reflected in the following two aspects: The methods of attackers are constantly changing, and attack methods and tools are continuously updated. With the increasing number of devices on the network, various vulnerabilities continue to emerge, providing new breeding grounds for attackers. Network business is constantly changing; software systems are … Read more