pisco_log
banner

Design and Exploration of an Industrial Enterprise Asset Vulnerability Management System

Jianchao Guo

Abstract


With the substantial advancement of information technology in industrial enterprises, the variety and complexity of internal IT
equipment, industrial machinery, production systems, and information systems continue to grow. However, cybersecurity issues accompanying this digital transformation have become increasingly prominent. Failure to effectively address these challenges will inevitably hinder enterprise IT development and disrupt normal industrial production and operations. This paper explores and designs an industrial enterprise asset
vulnerability management system aimed at managing vulnerabilities within industrial enterprise assets.

Keywords


Industrial enterprise; Assets; Vulnerability management

Full Text:

PDF

Included Database


References


[1] Ouyang Yongji, Wei Qiang, Wang Qingxian, et al. An Anomaly Distribution-Oriented Intelligent Fuzzing Method [J]. Journal of Electronics & Information Technology, 2015, 37(1):7. DOI:10.11999/JEIT140262.

[2] Hang Feilu, Ou Wei, Li Shenchang, et al. Reflections on CMDB Configuration Management Database Creation and Maintenance [J].

China New Communications, 2017, 19(14):2.

[3] Yan Liping, Guo Chengyuan, Song Kai, et al. Real-Time Path Selection in Urban Road Networks Based on Road Risk Assessment [J].

Journal of Software, 2023, 34(2):16. DOI:10.13328/j.cnki.jos.006424.




DOI: http://dx.doi.org/10.70711/aitr.v3i4.8200

Refbacks

  • There are currently no refbacks.