z-logo
open-access-imgOpen Access
Security Analysis of Public Security Terminal Network and Its Peripheral Equipment
Author(s) -
Yuqiang Wu,
Yubao Wu,
Wengan Yang
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1607/1/012057
Subject(s) - computer security , security service , terminal (telecommunication) , security information and event management , cloud computing security , network access control , network security policy , security association , network security , computer science , computer security model , internet security , hacker , security through obscurity , software security assurance , computer network , information security , cloud computing , operating system
As a major focus of global Internet security, peripheral equipment security is getting more and more attention. Due to the serious asymmetry between the high access level and the low protection level of the public security network and its peripheral equipment, it is very easy to be attacked by hackers. This paper briefly describes the Internet of things access technology, introduces the public security terminal network interconnection access mode and part of the network topology. Based on the preliminary analysis of the security of the software and hardware of the public security terminal network and its edge equipment, this paper analyzes the security of the public security terminal network and its peripheral equipment for the subsequent security design, to ensure the reliability of the public security terminal network and its peripheral equipment, and to strengthen the network security of the public security terminal network.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here