State of information (or resources of an information system) whereby persons with the appropriate access rights have unobstructed access to the specific information or resource.
Data structure with a digital signature containing a public encryption key and the ID of the client or server.
Combination of any number of intermediate certificates between the end-entity certificate and the root certificate.
Participant of client-server interaction that sends requests to the server and receives responses to those requests.
Property of information meaning that it cannot be accessed by unauthorized users and/or processes.
A system that guarantees the fulfillment of specific security objectives in all possible scenarios of system usage as stipulated by the developers.
Structural element of an OPC UA information model containing data and metadata.
Standalone data source for exchanging messages between devices on the internet of things. For example, a data source could be an OPC UA server at the management controller of an industrial machine.
A value calculated with an encryption algorithm and added to data in such a way that any data recipient can use the signature to verify the origin and integrity of the data.
Conversion of data from readable format to encoded format. Encrypted data can be read or processed only after decryption.
Component of a pair of encryption keys used for asymmetric encryption. Keys can be public or private.
Certificate containing a public encryption key that can be used to verify or validate an end-entity, such as an MQTT client.
State of information (or resources of an information system) whereby changes can be made only by persons who have the permissions to make such a change.
A network of interrelated electronic devices ("things") that are equipped with built-in capabilities for interaction with the external environment or with each other without human involvement.
A system that ensures secure transmission of user traffic between sensors and an IoT platform.
A software/hardware system based on the Siemens SIMATIC IOT2040 device for the industrial internet of things that has the KasperskyOS operating system and application software installed. Kaspersky IoT Secure Gateway 100 is designed to work as a secure gateway for the industrial internet of things.
A microkernel operating system for building secure solutions.
A network protocol that works on top of the TCP/IP protocol stack to exchange messages between devices on the internet of things.
A server that receives, filters, and forwards messages over the MQTT protocol.
A hierarchical path to the data source used for sending messages over the MQTT protocol.
All security-related settings of Kaspersky IoT Secure Gateway 100. You can make changes to these settings by editing the configuration files on the microSD card.
Set of mechanisms and characteristics, including signature and encryption algorithms and encryption key algorithm that can ensure the security of the connection between the OPC UA server and client.
Specification defining the protocols and mechanism for data transfer in industrial networks as well as interaction between devices in these networks.
Certificate of the root Certification Authority.
Top Certification Authority that is not subordinate to any higher Certification Authority.
Additional restrictions imposed on the system operating conditions that either simplify or complicate the fulfillment of security objectives.
Mode in which the client and server agree on whether or not to use encryption and a digital signature for data transmission.
Requirements imposed on a cyberimmune information system that must be fulfilled to ensure that the system operates securely in any possible usage scenario with consideration of the necessary security constraints.
Participant of client-server interaction that processes requests from the client.
Secure protocol that uses encryption to transfer data in local networks and on the internet. TLS is used in web applications to create secure connections between a client and a server.
Page top