Design and Exploration of an Industrial Enterprise Asset Vulnerability Management System
Abstract
equipment, industrial machinery, production systems, and information systems continue to grow. However, cybersecurity issues accompanying this digital transformation have become increasingly prominent. Failure to effectively address these challenges will inevitably hinder enterprise IT development and disrupt normal industrial production and operations. This paper explores and designs an industrial enterprise asset
vulnerability management system aimed at managing vulnerabilities within industrial enterprise assets.
Keywords
Full Text:
PDFReferences
[1] Ouyang Yongji, Wei Qiang, Wang Qingxian, et al. An Anomaly Distribution-Oriented Intelligent Fuzzing Method [J]. Journal of Electronics & Information Technology, 2015, 37(1):7. DOI:10.11999/JEIT140262.
[2] Hang Feilu, Ou Wei, Li Shenchang, et al. Reflections on CMDB Configuration Management Database Creation and Maintenance [J].
China New Communications, 2017, 19(14):2.
[3] Yan Liping, Guo Chengyuan, Song Kai, et al. Real-Time Path Selection in Urban Road Networks Based on Road Risk Assessment [J].
Journal of Software, 2023, 34(2):16. DOI:10.13328/j.cnki.jos.006424.
DOI: http://dx.doi.org/10.70711/aitr.v3i4.8200
Refbacks
- There are currently no refbacks.