Industrial Internet Security Management System
As shown in the figure, the whole application system level is divided into data acquisition layer, data processing layer, business application layer and visualization layer from bottom to top.
Data collection layer: this layer describes the data acquisition methods of integrated monitoring of information security , situation display and emergency response platform. The data sources of this system mainly include log collector, flow sensor and security intelligence system access. Through the security intelligence system, the threat information provided by cloud can be received, APT attack behavior can be identified, the situation can be displayed. Hardware support of asset management, log retrieval and audit function business modules are also provided.