2021
DOI: 10.1016/j.procs.2021.02.034
|View full text |Cite
|
Sign up to set email alerts
|

Compliance analysis of business information system under classified protection 2.0 of cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Chaudhuri et al proposed the concept of the first intelligent world, assuming that the new generation of IT technologies can be used in all spheres of life and will be globally connected and create the Internet of Things [6]. Jiang et al has always attached great importance to system security, and the R&D team puts more energy on the home security system [7]. On this basis, the application of ×10 communication technology has greatly developed the smart home industry.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Chaudhuri et al proposed the concept of the first intelligent world, assuming that the new generation of IT technologies can be used in all spheres of life and will be globally connected and create the Internet of Things [6]. Jiang et al has always attached great importance to system security, and the R&D team puts more energy on the home security system [7]. On this basis, the application of ×10 communication technology has greatly developed the smart home industry.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Relying on its advantages in the field of automation, a company has launched a variety of smart home appliances, contributing to the realization of the overall control scheme of smart homes. At the same time, Jiang et al also made great efforts on the smart home control system, based on the control technology of H + APP, and integrated advanced automatic control technology into the smart home control system [7]. In a company that focuses on chip advantages, it is committed to developing core processors that can meet the requirements of smart homes and has launched Computer Card, which can help users upgrade and convert traditional smart home devices to smart home devices and transitional tasks for the smart home.…”
Section: Literature Reviewmentioning
confidence: 99%
“…When a level 2 system is evaluated by classified protection 2.0, for example, it is assigned a score according to the implementation of security countermeasures. Reference [7] and [8] detail how to obtain this score. The score is a feasible indicator of return on cybersecurity investment, which can be used as Net Profit in formula 1.…”
Section: Analysis Of Countermeasuresmentioning
confidence: 99%