GB/T 33008.1-2016: Translated English of Chinese Standard (GBT 33008.1-2016, GB/T33008.1-2016, GBT33008.1-2016): This Standard specifies the terms and definitions, product specifications, requirements, test methods, inspection rules, marking, packaging, transportation and storage, product accompanying documents of plate-type flue gas DeNOx catalysts. This Standard is applicable for vanadium and titanium NH3 selective catalytic reduction plate-type flue gas DeNOx catalyst
https://www.chinesestandard.net, 2016/09/24 - 47 ページ
This part of GB/T 33008 specifies the network security requirements of the programmable logic controller (PLC) system, including the network security requirements that the PLC communicates directly or indirectly with other systems. This part applies to engineering design party, equipment manufacturers, system integrators, users, and evaluation and certification institutes.
レビュー - レビューを書く
access control area boundaries assets audit log audit records Backup Beijing Capability level communication load Confidentiality protection control measures control objectives controller shall provide cryptographic denial of service design and development Emergency power supply Ensure equipment GB/T identification and authentication Implement information processing facilities input integrity The PLC malicious code management requirements supplier mechanisms to protect mobile code mobile devices monitor network and security network security events network security management network security policy network security risk network security technical Non-repudiation operation organization password PLC system network portable and mobile Product integrator System Programmable logic controller provide the ability Public key infrastructure requirements supplier Product risk assessment risk treatment security configuration Security management requirements security technical requirements session ID software processes storage supplier Product integrator system network security system requirements system shall provide Table B.1 continued Technical vulnerability Technology transmission unauthorized access Unique identification untrusted networks user person verify