I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
3
6
,
No
.
1
,
Octo
b
er
20
24
,
p
p
.
23
1
~
2
4
1
I
SS
N:
2
502
-
4
7
52
,
DOI
: 1
0
.
1
1
5
9
1
/ijee
cs
.v
3
6
.
i
1
.
pp
23
1
-
24
1
231
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs
.
ia
esco
r
e.
co
m
A mo
del propo
sa
l
f
o
r enhanci
ng
cy
ber secur
ity in
in
dustria
l Io
T
env
iro
nments
At
dh
e
B
uja
,
M
a
rik
a
Apo
s
t
o
lo
v
a
,
Art
a
n L
um
a
F
a
c
u
l
t
y
o
f
C
o
n
t
e
m
p
o
r
a
r
y
S
c
i
e
n
c
e
s
a
n
d
T
e
c
h
n
o
l
o
g
i
e
s
,
U
n
i
v
e
r
si
t
y
o
f
S
o
u
t
h
Ea
st
Eu
r
o
p
e
a
n
(
S
E
EU
)
,
T
e
t
o
v
o
,
M
a
c
e
d
o
n
i
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Feb
28
,
2
0
2
4
R
ev
is
ed
Ap
r
24
,
202
4
Acc
ep
ted
May
12
,
2
0
2
4
Th
e
re
v
o
lu
ti
o
n
o
f
th
e
i
n
d
u
strial
se
c
to
r
in
t
h
e
a
u
t
o
m
a
ted
o
n
e
h
a
s
h
a
p
p
e
n
e
d
with
t
h
e
u
se
o
f
t
h
e
I
n
d
u
strial
I
n
t
e
rn
e
t
o
f
th
i
n
g
s
(IIo
T)
.
T
h
e
y
a
re
p
ro
v
id
i
n
g
u
n
p
re
c
e
d
e
n
ted
p
o
ss
ib
il
it
ies
f
o
r
c
o
n
n
e
c
ti
o
n
,
a
n
d
a
u
to
m
a
ti
o
n
.
Also
,
t
h
e
u
b
i
q
u
it
o
u
s
o
f
I
Io
T
h
a
s
b
r
o
u
g
h
t
n
e
w
c
y
b
e
r
se
c
u
ri
ty
c
h
a
ll
e
n
g
e
s
,
p
u
tt
i
n
g
se
n
siti
v
e
d
a
ta
a
t
risk
.
Th
is
re
se
a
rc
h
p
a
p
e
r
p
ro
p
o
se
s
a
c
o
m
p
re
h
e
n
si
v
e
m
o
d
e
l
fo
r
e
n
h
a
n
c
in
g
t
h
e
c
y
b
e
r
se
c
u
ri
t
y
o
f
IIo
T
sy
ste
m
s.
Ou
r
m
o
d
e
l
in
teg
ra
tes
v
a
rio
u
s
c
o
u
n
term
e
a
su
re
s,
in
c
lu
d
in
g
a
p
ro
a
c
ti
v
e
a
ss
e
ss
m
e
n
t
o
f
se
c
u
rit
y
v
u
l
n
e
ra
b
il
it
ies
,
e
x
a
m
in
a
ti
o
n
o
f
i
d
e
n
ti
fied
v
u
ln
e
ra
b
i
li
ti
e
s,
c
a
teg
o
ri
z
in
g
d
a
ta,
d
e
li
v
e
ry
o
f
c
o
m
p
re
h
e
n
siv
e
re
p
o
rts,
a
n
d
a
ss
u
ra
n
c
e
o
f
e
ffe
c
ti
v
e
c
o
u
n
term
e
a
su
re
s
b
a
se
d
o
n
a
c
o
st
-
b
e
n
e
fit
a
p
p
ro
a
c
h
,
a
li
g
n
e
d
wit
h
i
n
d
u
stry
sta
n
d
a
rd
s
a
n
d
fra
m
e
wo
rk
s.
Th
e
p
ro
p
o
se
d
m
o
d
e
l
a
im
s
to
a
d
d
re
ss
th
e
n
e
e
d
fo
r
th
e
d
e
v
e
lo
p
m
e
n
t
o
f
r
o
b
u
st
a
n
d
re
sili
e
n
t
c
y
b
e
r
se
c
u
rit
y
so
lu
ti
o
n
s
fo
r
IIo
T
e
n
v
iro
n
m
e
n
ts.
Th
is
re
se
a
rc
h
wo
rk
i
n
tro
d
u
c
e
s
t
h
e
p
r
o
p
o
se
d
m
o
d
e
l'
s
m
a
in
fu
n
c
ti
o
n
s,
in
teg
ra
ti
o
n
,
wo
r
k
flo
w
,
a
n
d
re
fe
re
n
c
e
s.
Wi
th
t
h
is
re
s
e
a
rc
h
,
we
c
o
n
tri
b
u
te
t
o
t
h
e
e
n
h
a
n
c
e
m
e
n
t
o
f
c
y
b
e
r
se
c
u
rit
y
in
th
e
IIo
T
e
n
v
iro
n
m
e
n
t
b
y
p
ro
p
o
sin
g
a
m
o
d
e
l
t
h
a
t
a
ss
ists
wit
h
p
ro
a
c
ti
v
e
a
ss
e
ss
m
e
n
t,
e
ffe
c
ti
v
e
re
sp
o
n
se
,
a
n
d
in
f
o
rm
e
d
d
e
c
isio
n
-
m
a
k
i
n
g
.
We
e
n
v
isio
n
t
h
a
t
th
e
p
r
o
p
o
se
d
m
o
d
e
l
wil
l
su
p
p
o
rt
in
d
u
strial
o
rg
a
n
iza
ti
o
n
s
i
n
se
c
u
rin
g
t
h
e
ir
II
o
T
s
y
ste
m
s
a
g
a
in
st
c
y
b
e
r
th
re
a
ts,
u
lt
ima
tely
h
a
v
e
sta
b
il
it
y
a
n
d
se
c
u
re
i
n
d
u
strial
o
p
e
ra
ti
o
n
s
.
K
ey
w
o
r
d
s
:
C
o
u
n
ter
m
ea
s
u
r
e
C
y
b
er
s
ec
u
r
ity
I
n
d
u
s
tr
ial
I
o
T
Mo
d
el
T
h
r
ea
ts
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Atd
h
e
B
u
ja
Facu
lty
o
f
C
o
n
tem
p
o
r
ar
y
Scien
ce
s
an
d
T
ec
h
n
o
lo
g
ies
,
Un
iv
e
r
s
ity
o
f
So
u
th
E
ast E
u
r
o
p
ea
n
(
SEE
U)
T
eto
v
o
,
Ma
ce
d
o
n
ia
E
m
ail:
ab
2
9
7
6
2
@
s
ee
u
.
ed
u
.
m
k
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
em
er
g
e
o
f
th
e
I
n
d
u
s
tr
ial
I
n
ter
n
et
o
f
T
h
in
g
s
(
I
I
o
T
)
h
as
ch
an
g
ed
th
e
way
i
n
d
u
s
tr
y
o
p
er
ates,
im
p
r
o
v
e
d
p
r
o
ce
s
s
es,
an
d
im
p
r
o
v
ed
th
e
tim
e
an
d
q
u
ality
o
f
p
r
o
d
u
cts.
T
h
e
f
o
u
r
th
in
d
u
s
tr
ia
l
r
ev
o
l
u
tio
n
as
we
k
n
o
w
it
with
I
n
d
u
s
tr
y
4
.
0
h
a
s
b
r
o
u
g
h
t
g
r
ea
t
ch
an
g
es,
f
r
o
m
th
e
tr
ad
itio
n
al
way
o
f
C
y
b
er
-
P
h
y
s
ical
S
y
s
tem
s
(
C
PS
)
[
1
]
.
Alo
n
g
th
is
ev
o
lu
tio
n
ar
y
p
at
h
,
ar
is
e
th
r
ea
ts
an
d
cy
b
er
-
attac
k
ch
allen
g
es
th
at
r
eq
u
ir
e
ad
d
r
ess
in
g
f
o
r
th
e
o
p
er
atio
n
al
s
ec
u
r
ity
o
f
th
e
in
d
u
s
tr
y
.
Ho
wev
e
r
,
th
is
tech
n
o
lo
g
ical
d
ev
elo
p
m
e
n
t
h
a
s
b
r
o
u
g
h
t
a
r
elate
d
in
cr
ea
s
e
in
cy
b
er
-
attac
k
s
tar
g
etin
g
I
I
o
T
s
y
s
tem
s
,
ca
u
s
in
g
th
r
ea
ts
to
in
d
u
s
tr
ial
o
p
er
atio
n
s
.
T
h
e
r
esear
ch
co
n
tr
ib
u
tio
n
h
as
a
p
ar
ticu
la
r
f
o
cu
s
o
n
e
n
h
an
cin
g
th
e
l
ev
el
o
f
cy
b
e
r
s
ec
u
r
ity
in
I
I
o
T
an
d
in
d
u
s
tr
ial
in
f
r
astru
ctu
r
es,
b
y
p
r
o
p
o
s
in
g
t
h
e
cy
b
e
r
s
ec
u
r
ity
m
o
d
el
f
o
r
I
I
o
T
.
T
h
is
r
esear
c
h
f
o
cu
s
es
o
n
p
r
o
d
u
cin
g
a
cy
b
er
s
ec
u
r
ity
m
o
d
el
f
o
r
I
I
o
T
th
at
c
an
b
e
u
s
ed
to
an
aly
ze
an
d
test
th
e
ef
f
ec
t
o
f
cy
b
er
-
attac
k
s
o
n
th
e
b
eh
av
io
r
o
f
th
e
m
o
d
el.
T
h
is
will
allo
w
u
s
in
t
h
e
f
u
tu
r
e
to
d
etec
t
an
d
p
r
ev
en
t
cy
b
er
-
attac
k
s
.
No
w
th
e
in
d
u
s
tr
ial
in
f
r
astru
ctu
r
e
wo
r
k
s
u
s
in
g
I
I
o
T
c
h
ar
ac
ter
is
tics
s
u
ch
as
ef
f
ec
ti
v
en
ess
,
wh
ich
is
k
n
o
wn
u
n
d
er
th
e
ca
te
g
o
r
y
o
f
I
o
T
a
n
d
wh
ich
en
ab
les
th
e
co
n
n
ec
tio
n
o
f
th
e
in
d
u
s
tr
ial
co
n
tr
o
l
s
y
s
tem
(
I
C
S)
with
th
e
i
n
ter
n
et
[
2
]
.
Mo
r
eo
v
e
r
,
I
I
o
T
with
in
d
u
s
tr
ial
in
f
r
astru
ctu
r
es
ar
e
ex
p
o
s
ed
to
c
y
b
er
-
attac
k
s
,
th
u
s
b
ec
o
m
in
g
attr
ac
tiv
e
tar
g
ets
f
o
r
attac
k
e
r
s
.
Ou
r
p
r
ev
io
u
s
r
esear
ch
[
3
]
,
h
as
s
o
r
ted
o
u
t
th
e
v
u
ln
er
ab
ilit
ies
an
d
ch
allen
g
es
ess
en
tial
to
s
ec
u
r
in
g
th
e
I
I
o
T
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
6
,
No
.
1
,
Octo
b
er
20
24
:
23
1
-
24
1
232
en
v
ir
o
n
m
en
t.
Fro
m
th
e
f
i
n
d
in
g
s
,
I
I
o
T
is
u
n
d
er
g
o
in
g
a
lack
o
f
p
r
iv
ac
y
a
n
d
v
u
ln
er
ab
ilit
ie
s
m
o
s
tly
co
m
m
o
n
cy
b
er
-
attac
k
s
f
o
llo
wed
b
y
m
a
lici
o
u
s
co
d
e
an
d
D
en
ial
o
f
S
e
r
v
ice
(
Do
S).
Ho
wev
er
,
u
n
co
m
m
o
n
cy
b
er
-
attac
k
s
ar
e
co
n
s
tan
tly
o
n
th
e
r
is
e,
tar
g
etin
g
I
I
o
T
in
d
u
s
tr
ial
s
y
s
tem
s
in
p
ar
ts
wh
er
e
s
ec
u
r
ity
p
r
o
tectio
n
is
wea
k
o
r
n
o
t
as
r
eq
u
ir
ed
[
3
]
.
T
o
ac
h
iev
e
s
u
s
tain
ab
le
I
I
o
T
s
y
s
tem
s
in
th
e
f
ac
e
o
f
c
y
b
er
-
attac
k
s
,
th
eir
c
y
b
er
s
ec
u
r
ity
m
u
s
t
b
e
co
n
s
id
er
ed
[
4
]
,
b
u
t
t
h
e
d
em
an
d
is
to
g
o
f
u
r
th
er
f
r
o
m
tr
ad
itio
n
al
cy
b
er
s
ec
u
r
ity
[
5
]
.
T
r
a
d
itio
n
al
cy
b
er
s
ec
u
r
ity
in
clu
d
es
th
e
tr
ian
g
le
o
f
co
n
f
id
en
tiality
,
in
teg
r
ity
,
a
n
d
a
v
ailab
ilit
y
(
C
I
A)
;
au
th
e
n
ticatio
n
,
au
th
o
r
izatio
n
,
an
d
ac
co
u
n
tin
g
(
AAA)
m
ec
h
a
n
is
m
s
;
an
tiv
ir
u
s
s
o
lu
tio
n
s
,
an
d
f
ir
ewa
lls
.
H
av
e
s
h
o
wn
a
lack
o
f
p
r
o
tectio
n
ag
ai
n
s
t
ad
v
an
ce
d
c
y
b
er
t
h
r
ea
ts
tar
g
etin
g
I
I
o
T
i
n
f
r
astru
ctu
r
es.
E
x
is
tin
g
ap
p
r
o
ac
h
es
to
cy
b
e
r
s
ec
u
r
ity
in
I
I
o
T
last
a
ch
allen
g
e
ag
ain
s
t
th
r
ea
ts
an
d
attac
k
s
in
clu
d
in
g
ad
v
a
n
ce
d
p
e
r
s
is
ten
t
th
r
ea
ts
(
APT)
[
3
]
.
W
h
ile
cy
b
er
s
ec
u
r
ity
is
m
o
r
e
r
e
q
u
ir
ed
f
o
r
I
I
o
T
d
ef
en
s
e,
cy
b
er
-
attac
k
s
ca
n
m
an
if
est
v
ar
io
u
s
f
o
r
m
s
,
attac
k
s
u
r
f
ac
es,
an
d
v
ec
t
o
r
s
.
T
h
e
m
ain
co
n
t
r
ib
u
to
r
s
in
tr
o
d
u
ce
th
at
wh
ile
I
I
o
T
tec
h
n
o
lo
g
ies
p
r
o
v
id
e
m
ea
n
in
g
f
u
l
b
en
ef
its
in
in
d
u
s
tr
ial
co
n
tex
ts
,
th
ey
also
p
r
esen
t
u
n
i
q
u
e
s
ec
u
r
ity
ex
ce
p
t
io
n
s
.
T
r
ad
itio
n
al
s
ec
u
r
ity
m
ea
s
u
r
es
ar
e
lack
in
g
to
ad
d
r
ess
th
ese
ex
ce
p
tio
n
s
.
T
h
e
p
r
ev
io
u
s
wo
r
k
o
n
liter
atu
r
e
r
ev
iew
[
3
]
r
ec
o
g
n
izes
v
ar
io
u
s
p
r
o
p
o
s
ed
s
o
lu
tio
n
s
,
s
u
ch
as
m
ac
h
in
e
l
ea
r
n
i
ng
(
M
L
)
alg
o
r
ith
m
s
,
5
G
wir
eless
co
m
m
u
n
icatio
n
n
etwo
r
k
s
,
b
lo
c
k
ch
ain
in
te
g
r
atio
n
,
an
d
in
tellig
en
t
d
en
ial
-
of
-
s
er
v
ice
d
etec
tio
n
f
r
am
ewo
r
k
s
.
Yet,
ch
allen
g
es
r
em
ain
in
th
e
ef
f
ec
tiv
e
im
p
lem
en
tatio
n
o
f
th
ese
s
o
lu
tio
n
s
,
an
d
th
er
e
is
a
n
ee
d
b
ey
o
n
d
r
esear
ch
to
d
esig
n
a
p
r
o
ac
tiv
e
ap
p
r
o
ac
h
t
o
cy
b
er
s
ec
u
r
ity
s
p
ec
if
ic
to
I
I
o
T
ap
p
licatio
n
s
.
T
h
er
e
a
r
e
id
en
tifie
d
ar
ea
s
f
o
r
im
p
r
o
v
e
m
en
t,
as
f
o
llo
ws:
i)
a
d
v
an
ce
d
c
y
b
er
s
ec
u
r
ity
c
o
u
n
ter
m
ea
s
u
r
es,
ii)
i
n
teg
r
atio
n
o
f
em
er
g
in
g
tech
n
o
lo
g
ies,
iii)
m
itig
atin
g
s
ec
u
r
ity
ch
allen
g
es in
I
I
o
T
,
an
d
iv
)
p
r
o
ac
tiv
e
co
u
n
ter
m
ea
s
u
r
es.
Fu
r
th
er
m
o
r
e
,
th
e
co
m
m
o
n
ar
ch
itectu
r
e
o
f
I
I
o
T
a
n
d
it
s
co
n
n
ec
tio
n
with
o
th
e
r
I
n
f
o
r
m
atio
n
T
ec
h
n
o
lo
g
y
(
I
T
)
co
m
p
o
n
en
ts
with
in
th
e
in
d
u
s
tr
ial
en
v
ir
o
n
m
en
t
ar
e
p
r
esen
ted
in
Fig
u
r
e
1
.
T
h
is
f
ig
u
r
e
s
h
o
ws
th
e
ess
en
tial
p
ar
ts
o
f
an
I
I
o
T
ar
ch
itectu
r
e
in
a
n
in
d
u
s
tr
ial
en
v
ir
o
n
m
en
t,
in
cl
u
d
in
g
s
en
s
o
r
s
,
r
em
o
te
ter
m
in
a
l
u
n
its
,
h
u
m
an
-
m
ac
h
in
e
i
n
ter
f
a
ce
s
,
n
etwo
r
k
co
m
m
u
n
icat
io
n
s
,
an
d
in
d
u
s
tr
ial
m
an
a
g
em
en
t
s
y
s
tem
s
.
I
n
r
ec
e
n
t
y
ea
r
s
,
we
h
a
v
e
e
x
p
er
ien
ce
d
c
r
itical
cy
b
er
-
attac
k
s
t
h
at
m
an
ag
ed
to
f
in
d
v
u
ln
er
ab
ilit
ies
in
th
e
d
e
v
ices
o
f
th
e
I
I
o
T
n
etwo
r
k
.
Fu
r
th
er
m
o
r
e,
a
ttack
er
s
u
s
e
th
ese
f
o
u
n
d
v
u
ln
er
ab
ilit
ies
to
ex
p
lo
it
an
d
co
n
tin
u
o
u
s
ly
f
i
n
d
n
ew
o
n
es
th
at
ar
e
u
s
ed
to
p
en
etr
ate
as
f
ar
as
p
o
s
s
ib
le
in
to
n
etw
o
r
k
s
an
d
in
f
r
astru
ctu
r
e
b
y
g
et
tin
g
u
n
au
th
o
r
ized
ac
ce
s
s
.
I
I
o
T
s
tan
d
ar
d
ar
ch
itec
tu
r
e
-
as
m
en
tio
n
ed
in
th
e
in
tr
o
d
u
ctio
n
o
f
t
h
is
p
ap
er
,
th
r
ea
ts
,
an
d
cy
b
er
-
attac
k
s
th
at
tar
g
et
I
I
o
T
in
in
d
u
s
tr
i
al
en
v
ir
o
n
m
en
ts
ar
e
o
n
e
af
ter
th
e
o
th
er
with
a
lo
s
s
o
f
im
p
ac
t.
Pre
cisely
f
o
r
th
is
,
cy
b
er
s
ec
u
r
ity
ass
ess
m
en
ts
n
ee
d
to
o
b
s
er
v
e
a
n
d
r
ec
o
g
n
ize
t
h
e
s
tate
o
f
in
f
r
astru
ctu
r
e
s
ec
u
r
ity
.
I
n
elec
tr
o
n
ic
co
m
m
u
n
icatio
n
s
,
n
etwo
r
k
s
,
i
n
d
u
s
tr
ial
s
en
s
o
r
s
,
a
n
d
th
e
e
n
tire
in
f
r
astru
ctu
r
e,
s
ec
u
r
ity
is
im
p
o
r
tan
t,
wh
ic
h
m
ak
es th
e
o
p
e
r
atio
n
o
f
th
e
s
y
s
tem
s
u
s
tain
ab
le
.
Fig
u
r
e
1
.
I
n
d
u
s
tr
ial
I
o
T
s
tan
d
a
r
d
ar
ch
itectu
r
e
T
h
e
p
r
o
p
o
s
ed
m
o
d
el
o
f
th
is
p
ap
er
h
as
t
h
e
p
r
o
ac
tiv
e
r
o
le
o
f
cy
b
er
s
ec
u
r
ity
f
o
r
ass
ess
in
g
r
i
s
k
,
th
r
ea
ts
,
an
d
v
u
ln
er
a
b
ilit
ies
in
I
I
o
T
d
ev
ices a
n
d
s
y
s
tem
s
.
Du
r
in
g
th
e
u
n
d
er
tak
in
g
o
f
th
e
r
esear
ch
an
d
th
e
p
r
ep
ar
atio
n
o
f
th
e
ar
ch
itectu
r
e
,
th
r
ea
ts
,
a
n
d
p
o
ten
tial
cy
b
er
-
attac
k
v
ec
to
r
s
o
n
I
I
o
T
h
a
v
e
b
ee
n
i
d
en
tifie
d
a
n
d
p
r
esen
ted
b
ased
o
n
ex
p
e
r
ien
ce
in
Fig
u
r
e
2
.
I
I
o
T
attac
k
s
u
r
f
a
ce
a
n
d
p
o
ten
tial
en
tr
y
p
o
in
ts
-
f
r
o
m
f
u
r
th
er
in
v
esti
g
atio
n
an
d
lo
o
k
in
g
d
ee
p
er
in
t
o
th
e
d
etails
o
f
co
m
m
o
n
c
y
b
er
-
attac
k
v
ec
t
o
r
s
at
th
e
I
I
o
T
,
we
will
h
av
e
a
m
o
r
e
en
lig
h
te
n
in
g
v
iew.
Fig
u
r
e
2
p
r
o
v
i
d
es a
r
ep
r
esen
tatio
n
o
f
th
e
I
I
o
T
attac
k
s
u
r
f
ac
e,
in
clu
d
in
g
ass
o
cia
tio
n
with
co
m
m
u
n
icatio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
mo
d
el
p
r
o
p
o
s
a
l fo
r
en
h
a
n
ci
n
g
cy
b
er secu
r
ity
in
in
d
u
s
tr
ia
l I
o
T e
n
viro
n
men
ts
(
A
td
h
e
B
u
j
a
)
233
p
r
o
to
co
l,
p
o
r
t
,
in
d
u
s
tr
y
s
ec
to
r
in
v
o
lv
e
d
,
an
d
attac
k
s
u
r
f
ac
e
in
ten
tio
n
s
.
T
h
e
attac
k
s
u
r
f
ac
e
in
I
I
o
T
r
ef
er
s
to
s
ev
er
al
o
p
p
o
r
tu
n
ities
f
o
r
p
o
t
en
tial
wea
k
n
ess
es
an
d
en
t
r
y
p
o
in
ts
,
wh
ic
h
ca
n
b
e
tar
g
et
ed
b
y
attac
k
er
s
to
co
m
p
r
o
m
is
e
th
e
s
ec
u
r
ity
an
d
in
teg
r
ity
o
f
I
I
o
T
s
y
s
tem
s
.
Fro
m
th
ese
attac
k
s
u
r
f
ac
es id
en
tifie
d
as th
e
p
o
s
s
ib
ilit
y
o
f
m
alicio
u
s
ac
to
r
s
’
en
tr
y
in
to
th
e
i
n
f
r
astru
ctu
r
e
o
f
t
h
e
I
I
o
T
,
th
e
im
p
ac
t
will
b
e
lo
s
s
y
a
n
d
h
ig
h
b
ec
au
s
e
ea
c
h
o
n
e
p
r
esen
ts
a
r
is
k
f
o
r
s
er
io
u
s
cy
b
er
-
attac
k
s
.
L
et’
s
s
ee
th
e
ca
s
e
o
f
I
I
o
T
attac
k
s
u
r
f
ac
e
f
r
o
m
Fig
u
r
e
2
:
"Op
en
an
d
Un
n
ec
ess
ar
y
Po
r
ts
"
m
en
tio
n
s
th
e
r
is
k
o
f
o
p
en
an
d
ac
ce
s
s
ib
le
p
o
r
ts
in
I
I
o
T
d
e
v
ices,
wh
ich
will
p
o
ten
tially
lead
to
attac
k
s
an
d
u
n
au
th
o
r
iz
ed
ac
ce
s
s
to
d
ev
ices a
n
d
m
o
r
e
wid
ely
.
Fig
u
r
e
2
.
I
n
d
u
s
tr
ial
I
o
T
attac
k
s
u
r
f
ac
e
A
s
u
m
m
ar
y
o
f
th
e
p
o
ten
tial
a
ttack
s
u
r
f
ac
e
at
th
e
I
I
o
T
d
ev
i
ce
lev
el
is
p
r
esen
ted
in
Fig
u
r
e
2
wh
er
e
d
if
f
er
en
t
attac
k
s
u
r
f
ac
es
ar
e
r
elate
d
to
co
m
m
u
n
icatio
n
p
r
o
to
co
ls
(
e.
g
.
p
o
r
ts
)
,
in
d
u
s
tr
y
s
ec
to
r
,
an
d
attac
k
s
u
r
f
ac
e
im
p
ac
t.
T
h
e
s
e
ar
e
im
p
o
r
tan
t
b
ec
au
s
e
b
y
id
e
n
tify
in
g
wh
ich
ar
e
th
e
m
o
s
t
co
m
m
o
n
a
ttack
s
u
r
f
ac
es,
y
o
u
ca
n
d
etec
t
v
u
ln
er
a
b
ilit
ies
th
at
th
e
attac
k
ca
n
ex
p
lo
it
an
d
f
i
n
d
way
s
to
d
ef
en
d
ag
ai
n
s
t
th
em
.
C
o
m
m
o
n
cy
b
er
-
attac
k
v
ec
to
r
s
th
at
p
r
esen
t
p
o
s
s
ib
le
en
tr
y
p
o
in
ts
in
clu
d
e
u
n
au
t
h
o
r
ized
ac
ce
s
s
,
f
ir
m
war
e
e
x
p
lo
itatio
n
,
d
ev
ice
th
ef
t,
m
alicio
u
s
co
d
e
in
jectio
n
,
r
an
s
o
m
war
e,
s
n
if
f
er
,
an
d
Do
S
f
lo
o
d
in
g
t
h
e
n
etwo
r
k
.
Ho
wev
er
,
th
e
cy
b
er
s
ec
u
r
ity
ch
allen
g
e
r
em
ain
s
,
wh
ile
co
m
m
o
n
c
y
b
er
-
attac
k
v
ec
to
r
s
ca
n
e
x
p
lo
it
v
u
ln
er
a
b
ilit
ies
with
in
th
e
s
y
s
tem
an
d
g
et
u
n
a
u
th
o
r
ized
ac
ce
s
s
.
B
y
ad
d
r
ess
in
g
th
ese
cy
b
er
-
attac
k
v
ec
to
r
s
th
r
o
u
g
h
th
e
p
r
o
p
o
s
ed
m
o
d
el,
th
e
in
d
u
s
tr
y
ca
n
a
d
v
an
ce
t
h
e
lev
el
o
f
cy
b
e
r
s
ec
u
r
ity
f
o
r
th
eir
I
I
o
T
s
y
s
tem
s
.
T
h
is
p
r
o
p
o
s
ed
m
o
d
el
c
o
m
b
in
es
f
u
n
ctio
n
s
an
d
p
r
o
v
id
es
r
ec
o
m
m
en
d
atio
n
s
in
th
e
f
o
r
m
o
f
c
o
u
n
ter
m
ea
s
u
r
es,
o
f
f
e
r
in
g
c
o
m
p
r
eh
en
s
iv
e
p
r
o
tectio
n
ag
ain
s
t
cy
b
er
th
r
ea
ts
.
T
h
e
co
u
n
ter
m
ea
s
u
r
es
r
ec
o
m
m
e
n
d
ed
b
y
th
e
p
r
o
p
o
s
ed
m
o
d
el
in
clu
d
e
lev
el,
tech
n
ical,
o
p
er
atio
n
al,
a
n
d
p
o
licy
s
ec
u
r
i
ty
co
n
tr
o
ls
.
T
h
e
p
er
ce
p
tio
n
a
n
d
ad
d
r
ess
in
g
o
f
s
u
ch
id
en
tif
ied
r
is
k
s
o
r
th
r
ea
ts
h
ig
h
lig
h
t
th
e
n
ee
d
to
d
ev
elo
p
r
o
b
u
s
t
s
ec
u
r
ity
co
u
n
te
r
m
ea
s
u
r
es
an
d
u
s
e
ef
f
ec
tiv
e
r
is
k
m
an
ag
em
en
t
s
tr
ateg
ies
in
in
d
u
s
tr
ial
en
v
ir
o
n
m
e
n
ts
.
So
,
p
r
ac
tically
,
in
itiatin
g
cy
b
e
r
-
attac
k
s
b
y
th
e
attac
k
er
f
o
llo
ws
a
m
eth
o
d
an
d
p
ath
to
s
u
cc
ess
.
T
h
ese
m
eth
o
d
s
an
d
p
ath
s
ar
e
in
ter
r
elate
d
an
d
in
cy
b
e
r
s
ec
u
r
ity
,
th
ey
ar
e
k
n
o
wn
as
h
ac
k
i
n
g
m
eth
o
d
o
lo
g
y
o
r
p
en
etr
atio
n
test
in
g
p
r
o
ce
s
s
.
First,
th
e
attac
k
er
id
en
tifie
s
th
e
attac
k
s
u
r
f
ac
e
o
f
th
e
ta
r
g
et,
an
d
th
e
n
th
e
attac
k
v
ec
to
r
th
at
co
r
r
esp
o
n
d
s
to
th
at
attac
k
s
u
r
f
ac
e
is
u
s
ed
to
ex
p
lo
it
a
v
u
ln
er
ab
ilit
y
with
in
th
at
s
u
r
f
ac
e
[
1
]
,
[
6
]
.
Fu
r
th
er
,
af
ter
ex
p
l
o
itin
g
th
e
v
u
ln
er
ab
ilit
y
o
n
th
at
s
u
r
f
ac
e
,
s
p
ec
if
ic
cy
b
er
-
attac
k
s
r
elate
d
t
o
th
at
attac
k
v
ec
to
r
ar
e
lau
n
c
h
ed
.
T
h
e
attac
k
v
ec
t
o
r
s
ar
e
m
eth
o
d
s
a
n
d
tech
n
iq
u
es
u
s
ed
b
y
th
e
attac
k
er
to
ex
p
lo
it
v
u
ln
er
a
b
ilit
ies,
th
at
is
,
v
er
if
icatio
n
o
f
wh
et
h
er
th
at
v
u
ln
er
a
b
ilit
y
ex
is
ts
o
r
n
o
t.
Me
an
wh
ile,
cy
b
er
-
attac
k
s
ar
e
s
p
ec
if
ied
as
ac
tio
n
s
tak
en
b
y
th
e
attac
k
er
t
o
ex
p
lo
it th
e
v
u
ln
e
r
ab
ilit
ies an
d
ac
h
iev
e
th
e
m
alicio
u
s
o
b
ject
iv
e
o
f
th
e
attac
k
.
Kn
o
wn
I
I
o
T
s
ec
u
r
ity
th
r
ea
ts
to
th
e
co
u
n
ter
m
ea
s
u
r
es
in
th
is
p
ar
t
o
f
th
e
s
ec
tio
n
,
we
h
av
e
id
en
tifie
d
s
ev
er
al
k
n
o
wn
s
ec
u
r
ity
th
r
ea
ts
,
b
ec
au
s
e
o
f
th
e
ex
is
ten
ce
o
f
v
u
l
n
er
ab
ilit
ies
in
I
I
o
T
d
e
v
ices,
as
p
r
esen
ted
p
r
ev
io
u
s
ly
.
W
e
also
p
r
esen
t
c
o
u
n
ter
m
ea
s
u
r
es
r
eg
ar
d
i
n
g
th
r
e
ats
an
d
p
o
te
n
tial
v
u
ln
e
r
ab
ilit
ies
o
f
an
I
I
o
T
d
ev
ice
th
at
ca
n
b
e
ex
p
lo
ited
,
a
s
ch
em
e
is
also
p
r
esen
ted
i
n
Fig
u
r
e
3
.
C
o
m
m
u
n
icatio
n
s
o
f
I
I
o
T
p
r
ac
tically
th
e
p
r
o
to
co
ls
u
s
ed
ar
e
im
p
o
r
tan
t,
i
n
th
e
f
ac
e
o
f
c
y
b
er
-
attac
k
s
[
7
]
,
[
8
]
.
T
h
r
ea
ts
to
I
I
o
T
p
r
o
t
o
co
ls
ca
n
v
ar
y
b
ased
o
n
th
e
s
p
ec
if
ic
p
r
o
to
c
o
l u
s
ed
,
a
n
d
th
eir
im
p
lem
en
tatio
n
(
s
ec
u
r
it
y
co
n
tr
o
ls
)
[
9
]
,
[
1
0
]
.
Do
S
o
n
e
o
f
th
e
m
o
s
t
well
-
k
n
o
wn
ty
p
es
o
f
t
h
r
ea
ts
an
d
at
tack
s
is
th
e
Do
S
attac
k
.
Su
c
h
an
attac
k
o
cc
u
r
s
wh
e
n
ev
er
th
e
attac
k
er
tr
ies
to
f
lo
o
d
t
h
e
s
er
v
e
r
o
r
t
h
e
I
I
o
T
d
ev
ice
with
tr
a
f
f
ic
p
ac
k
ets,
in
t
h
is
way
d
is
r
u
p
tin
g
o
r
c
r
ash
in
g
it,
an
d
p
u
ttin
g
it
o
u
t
o
f
s
er
v
ice
[
1
1
]
.
Do
S
attac
k
s
h
av
e
a
g
r
ea
t
im
p
ac
t
o
n
th
e
tech
n
ical
asp
ec
ts
o
f
I
I
o
T
s
y
s
tem
s
.
T
h
e
n
,
th
e
s
en
s
itiv
ity
an
d
t
h
e
p
o
in
ts
wh
er
e
it
ca
n
h
av
e
an
im
p
a
ct
d
ep
en
d
in
g
o
n
th
e
n
atu
r
e
an
d
s
ca
le
o
f
th
e
attac
k
,
b
u
t
also
o
n
th
e
I
I
o
T
in
f
r
astru
ctu
r
e
tar
g
eted
.
T
h
e
tech
n
ical
i
m
p
ac
ts
o
f
th
e
Do
S
attac
k
o
n
I
I
o
T
s
y
s
tem
s
in
clu
d
e
s
y
s
tem
av
ailab
ilit
y
,
n
etwo
r
k
co
n
g
esti
o
n
,
d
e
v
ice
o
v
e
r
lo
ad
,
ex
h
au
s
tio
n
o
f
r
eso
u
r
ce
s
,
an
d
d
ata
in
teg
r
ity
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
6
,
No
.
1
,
Octo
b
er
20
24
:
23
1
-
24
1
234
Man
-
in
-
th
e
-
M
id
d
le
(
MitM
)
-
a
n
o
th
er
I
I
o
T
s
ec
u
r
ity
th
r
ea
t
an
d
attac
k
is
MitM
attac
k
s
.
MitM
attac
k
s
o
n
I
I
o
T
s
y
s
tem
s
ca
n
co
m
p
r
o
m
i
s
e
co
m
m
u
n
icatio
n
a
n
d
d
ata
s
h
ar
in
g
s
ec
u
r
ity
an
d
in
teg
r
ity
with
in
th
e
I
I
o
T
in
f
r
astru
ctu
r
e
[
1
2
]
,
[
1
3
]
.
T
h
e
m
o
s
t
co
m
m
o
n
way
s
o
f
u
n
d
e
r
tak
in
g
th
is
attac
k
an
d
f
allin
g
p
r
ey
ar
e
two
,
o
n
e
is
th
r
o
u
g
h
p
h
is
h
in
g
.
Fo
r
ex
am
p
le,
th
e
attac
k
er
s
en
d
s
p
h
is
h
in
g
em
ails
an
d
ask
s
y
o
u
to
p
r
o
v
i
d
e
cr
ed
en
tials
in
a
ce
r
tain
f
o
r
m
b
ec
au
s
e
as
th
is
em
ail
s
ay
s
th
ey
ar
e
n
ec
ess
ar
y
f
o
r
y
o
u
r
o
r
g
a
n
izatio
n
an
d
w
o
r
k
.
I
f
y
o
u
p
r
o
v
id
e
th
o
s
e
cr
ed
e
n
tials
,
th
en
t
h
e
a
ttack
er
ca
n
ac
ce
s
s
y
o
u
r
ac
c
o
u
n
t
a
n
d
in
ter
ce
p
t
y
o
u
r
c
o
m
m
u
n
icatio
n
s
with
ev
er
y
o
n
e.
A
s
ec
o
n
d
way
o
f
MitM
attac
k
is
th
r
o
u
g
h
ac
ce
s
s
to
p
u
b
lic
wir
eless
n
etwo
r
k
s
,
wh
er
e
th
e
lev
el
o
f
s
ec
u
r
ity
d
o
es
n
o
t
ex
is
t
at
all.
T
h
e
m
o
m
en
t
th
e
attac
k
er
g
ets
ac
ce
s
s
to
th
e
r
o
u
ter
o
f
t
h
at
n
etwo
r
k
,
an
attac
k
er
ca
n
in
ter
ce
p
t a
n
d
r
ec
eiv
e
all
th
e
d
ata
th
at
is
tr
an
s
m
itted
[
1
4
]
.
Un
au
th
o
r
ized
ac
ce
s
s
-
a
n
u
n
a
u
th
o
r
ized
ac
ce
s
s
attac
k
o
n
I
I
o
T
h
as
an
im
p
ac
t
a
n
d
r
ea
c
h
es
d
ata
b
r
ea
ch
,
u
n
au
th
o
r
ized
co
n
tr
o
l,
an
d
c
o
m
p
r
o
m
is
es
th
e
au
th
en
ticatio
n
m
ec
h
an
is
m
.
T
h
e
b
est
d
ef
en
s
e
ag
ain
s
t
th
ese
t
y
p
es
o
f
attac
k
s
is
th
r
o
u
g
h
r
esp
o
n
d
i
n
g
at
a
n
y
tim
e,
m
ain
tain
in
g
t
h
e
s
ec
u
r
ity
s
y
s
tem
,
a
n
d
s
ec
u
r
i
n
g
th
e
d
ata
s
to
r
ag
e
wh
er
e
it is
s
to
r
ed
[
1
5
]
.
Ma
licio
u
s
p
ay
lo
ad
o
r
co
d
e
in
jectio
n
-
d
if
f
er
en
t ty
p
es o
f
attac
k
s
ca
n
b
e
ca
r
r
ied
o
u
t su
c
h
as
m
alicio
u
s
p
ay
l
o
ad
co
d
e
in
jectio
n
,
in
clu
d
in
g
SQL
i
n
ject
io
n
(
SQLi)
,
C
r
o
s
s
-
S
ite
S
cr
ip
tin
g
(
XSS),
r
em
o
te
co
d
e
ex
ec
u
tio
n
(
R
C
E
)
,
an
d
c
o
d
e
in
jectio
n
in
I
o
T
Firm
war
e.
Fo
r
ex
am
p
le,
a
m
alicio
u
s
p
ay
lo
ad
o
cc
u
r
s
wh
en
th
e
attac
k
er
s
en
d
s
an
i
n
f
ec
ted
p
ay
lo
ad
to
th
e
d
ev
ice
o
r
s
er
v
e
r
th
at
I
I
o
T
c
o
m
m
u
n
icate
s
,
wh
i
ch
ca
n
lead
to
d
ata
co
r
r
u
p
ti
o
n
an
d
th
e
f
t.
B
y
s
en
d
in
g
th
is
m
alicio
u
s
p
ay
lo
ad
,
an
d
b
y
tr
ig
g
er
in
g
it in
s
id
e
th
e
tar
g
eted
in
f
r
astru
ctu
r
e,
it
en
ab
les
th
e
attac
k
er
t
o
r
ec
ei
v
e
t
h
e
d
ata,
in
a
way
o
p
en
i
n
g
t
h
e
co
n
n
ec
tio
n
with
th
e
tar
g
et
i
n
th
is
ca
s
e
th
r
o
u
g
h
th
e
co
d
e
in
jectio
n
attac
k
[
1
6
]
.
Ho
wev
e
r
,
th
is
attac
k
ca
n
o
n
l
y
b
e
ca
r
r
ied
o
u
t
wh
en
th
er
e
ar
e
s
ec
u
r
ity
wea
k
n
ess
es in
th
e
s
o
f
twar
e,
an
d
m
alicio
u
s
co
d
e
ca
n
b
e
ex
ec
u
ted
.
Dev
ice
s
p
o
o
f
i
n
g
an
d
im
p
er
s
o
n
atio
n
-
f
o
r
ex
am
p
le,
d
ev
ice
s
p
o
o
f
in
g
a
n
d
im
p
er
s
o
n
atio
n
o
cc
u
r
wh
en
an
attac
k
er
im
p
er
s
o
n
ates
a
le
g
itima
te
I
I
o
T
d
ev
ice
o
r
th
eir
n
o
d
es
to
g
ain
u
n
au
th
o
r
ized
a
cc
ess
to
n
etwo
r
k
s
,
m
an
ip
u
late
d
ata,
o
r
lau
n
ch
o
t
h
er
attac
k
s
.
No
w
th
at
we
co
v
er
ed
I
I
o
T
th
r
ea
ts
an
d
p
o
ten
tia
l
v
u
ln
er
a
b
ilit
ies
th
at
ca
n
b
e
ex
p
l
o
ited
ab
o
v
e,
we
ca
n
m
en
tio
n
c
o
u
n
ter
m
ea
s
u
r
es
an
d
p
r
ev
e
n
tio
n
o
f
attac
k
s
.
W
e
s
h
o
w
v
ar
io
u
s
k
n
o
wn
I
I
o
T
th
r
ea
t
attac
k
s
,
as
well
as
th
e
m
eth
o
d
s
th
at
th
e
attac
k
s
u
s
e.
Fig
u
r
e
3
is
b
r
o
k
en
d
o
wn
,
an
d
s
p
ec
if
ic
ex
am
p
le
s
o
f
attac
k
s
ar
e
p
r
o
v
id
ed
alo
n
g
with
co
u
n
ter
m
ea
s
u
r
e
s
th
at
ca
n
b
e
u
s
ed
f
u
r
th
e
r
to
s
e
cu
r
e
I
I
o
T
d
e
v
ices.
Fig
u
r
e
3
.
Kn
o
wn
i
n
d
u
s
tr
ial
I
o
T
s
ec
u
r
ity
th
r
ea
ts
to
th
e
c
o
u
n
t
er
m
ea
s
u
r
es
T
h
is
p
ap
er
is
o
r
g
an
ized
i
n
to
s
ec
tio
n
s
,
th
e
f
ir
s
t
s
ec
tio
n
p
r
o
v
id
es
in
d
u
s
tr
y
r
esear
ch
in
f
o
r
m
atio
n
,
p
r
ev
io
u
s
r
esear
ch
w
o
r
k
o
n
I
I
o
T
ar
ch
itectu
r
e
,
attac
k
s
u
r
f
ac
e,
an
d
p
o
ten
tial
en
t
r
y
p
o
in
ts
,
a
n
d
ty
p
es
o
f
th
r
ea
ts
to
I
I
o
T
co
u
n
ter
m
ea
s
u
r
es.
T
h
e
s
ec
o
n
d
s
ec
tio
n
u
s
ed
m
eth
o
d
o
l
o
g
y
d
escr
ib
es
th
e
m
eth
o
d
s
u
tili
ze
d
to
s
h
o
w
th
e
p
r
o
d
u
ctio
n
an
d
in
teg
r
atio
n
o
f
s
u
ch
an
ap
p
r
o
ac
h
m
o
d
el
p
r
o
p
o
s
al.
Sectio
n
th
r
ee
is
a
d
etaile
d
d
is
cu
s
s
io
n
o
f
th
e
p
r
o
p
o
s
ed
m
o
d
el,
its
m
ain
f
u
n
ctio
n
s
,
m
o
d
el
in
teg
r
atio
n
,
an
d
wo
r
k
f
l
o
w
o
v
er
v
iew.
Sectio
n
f
o
u
r
r
esu
lts
an
d
d
is
cu
s
s
io
n
s
p
r
o
v
id
e
a
n
ar
r
ativ
e
th
at
r
ea
d
er
s
u
n
d
e
r
s
tan
d
th
e
m
ea
n
i
n
g
o
f
th
e
f
in
d
i
n
g
s
an
d
p
r
o
p
o
s
al.
L
astl
y
,
th
e
s
ec
tio
n
co
n
clu
s
io
n
p
r
o
v
id
es
a
co
m
p
r
eh
e
n
s
iv
e
m
o
d
el
p
r
o
p
o
s
a
l,
ad
d
r
ess
es
th
e
co
n
tr
ib
u
tio
n
o
f
th
e
r
esear
ch
,
an
d
d
is
cu
s
s
es p
o
ten
tial a
p
p
licatio
n
s
o
f
th
e
p
r
o
p
o
s
ed
m
o
d
el,
a
n
d
f
u
tu
r
e
r
esear
ch
d
ir
ec
tio
n
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
mo
d
el
p
r
o
p
o
s
a
l fo
r
en
h
a
n
ci
n
g
cy
b
er secu
r
ity
in
in
d
u
s
tr
ia
l I
o
T e
n
viro
n
men
ts
(
A
td
h
e
B
u
j
a
)
235
2.
M
E
T
H
O
D
T
h
is
s
ec
tio
n
in
tr
o
d
u
ce
s
th
e
m
eth
o
d
o
l
o
g
y
em
p
lo
y
e
d
in
a
p
p
lied
r
esear
ch
f
o
cu
s
in
d
es
ig
n
in
g
o
u
r
p
r
o
p
o
s
ed
cy
b
e
r
s
ec
u
r
ity
m
o
d
e
l
f
o
r
I
I
o
T
s
y
s
tem
s
.
T
h
e
m
eth
o
d
o
lo
g
y
lay
s
o
u
t
th
e
s
tr
u
ct
u
r
ed
ap
p
r
o
ac
h
tak
en
t
o
ad
d
r
ess
th
e
r
esear
ch
o
b
jectiv
e
s
.
T
h
e
m
ain
o
b
jectiv
e
o
f
o
u
r
r
esear
ch
is
to
d
esig
n
a
cy
b
er
s
ec
u
r
ity
m
o
d
el
th
at
en
h
an
ce
s
th
e
s
ec
u
r
ity
,
s
tab
ilit
y
,
an
d
p
r
o
tectio
n
o
f
I
I
o
T
s
y
s
te
m
s
.
T
h
is
p
r
o
p
o
s
ed
m
o
d
el
aim
s
to
a
d
d
r
ess
ex
is
tin
g
cy
b
er
s
ec
u
r
ity
c
h
allen
g
es
an
d
v
u
ln
er
a
b
ilit
ies
in
I
I
o
T
en
v
i
r
o
n
m
en
ts
.
T
h
is
in
clu
d
es
id
en
tify
in
g
th
e
s
ec
u
r
ity
p
o
s
tu
r
e
a
n
d
t
h
r
ea
ts
,
ca
teg
o
r
iz
in
g
th
r
ea
ts
an
d
v
u
l
n
er
ab
ilit
ies
in
to
im
p
ac
t
lev
els,
p
r
o
v
id
in
g
co
u
n
ter
m
ea
s
u
r
es,
an
d
ev
alu
atin
g
co
u
n
te
r
m
ea
s
u
r
es
f
r
o
m
a
co
s
t
-
b
en
ef
it
p
e
r
s
p
ec
tiv
e.
I
n
o
u
r
p
r
ev
i
o
u
s
r
esear
ch
wo
r
k
[
3
]
,
[
17
]
,
we
co
n
d
u
cte
d
a
co
m
p
r
e
h
en
s
iv
e
liter
atu
r
e
r
ev
iew
to
co
llect
ex
is
tin
g
r
esear
ch
wo
r
k
,
s
o
lu
tio
n
s
,
an
d
in
s
ig
h
ts
r
elate
d
to
cy
b
er
s
ec
u
r
ity
i
n
I
I
o
T
.
T
h
e
p
r
ev
io
u
s
w
o
r
k
a
n
aly
s
is
o
n
t
h
e
cu
r
r
e
n
t
s
o
lu
tio
n
s
h
as
in
d
icate
d
th
e
o
p
p
o
r
tu
n
ities
to
wo
r
k
o
n
th
e
d
esig
n
o
f
th
e
m
o
d
el
wh
ic
h
a
d
v
an
ce
s
th
e
le
v
el
o
f
s
ec
u
r
ity
in
I
I
o
T
.
T
h
e
lite
r
atu
r
e
r
ev
iew
h
elp
ed
id
en
tify
th
e
cu
r
r
en
t
g
a
p
s
an
d
l
im
itatio
n
s
o
f
th
e
f
ield
,
p
r
o
v
id
i
n
g
a
b
asis
f
o
r
o
u
r
r
esear
ch
.
T
h
e
f
in
d
in
g
s
[
3
]
,
[
17
]
s
h
o
w
u
s
th
at
I
I
o
T
is
cr
itical
with
th
e
cu
r
r
en
t
lev
el
o
f
cy
b
e
r
s
ec
u
r
ity
d
u
r
in
g
its
o
p
er
atio
n
p
r
o
ce
s
s
in
g
,
s
to
r
in
g
,
an
d
tr
an
s
m
itti
n
g
d
ata.
B
ased
o
n
o
u
r
m
et
h
o
d
o
lo
g
y
in
a
p
p
lied
r
esear
ch
,
we
d
ev
elo
p
th
e
p
r
o
p
o
s
ed
cy
b
er
s
ec
u
r
ity
m
o
d
el
f
o
r
I
I
o
T
.
T
h
e
m
eth
o
d
o
l
o
g
y
s
u
r
r
o
u
n
d
s
a
s
tr
u
ctu
r
ed
ap
p
r
o
ac
h
,
in
clu
d
in
g
a
liter
atu
r
e
r
ev
iew,
ex
p
er
ien
ce
d
ex
p
er
tis
e,
an
d
m
o
d
el
e
n
h
an
ce
m
en
t.
L
iter
atu
r
e
r
ev
iew
-
a
th
o
r
o
u
g
h
liter
atu
r
e
r
ev
iew
[
3
]
,
[
17
]
w
as
h
an
d
led
to
id
e
n
tify
ex
is
tin
g
r
esear
ch
,
g
ap
s
,
an
d
i
n
s
ig
h
ts
ass
o
ciate
d
with
cy
b
er
s
ec
u
r
ity
in
I
I
o
T
.
R
elev
an
t
ac
ad
e
m
ic
jo
u
r
n
als,
co
n
f
er
en
ce
p
r
o
ce
ed
in
g
s
,
in
d
u
s
tr
y
r
ep
o
r
t
s
,
an
d
o
u
r
f
ield
ex
p
er
tis
e
wer
e
an
aly
ze
d
to
u
n
d
e
r
s
tan
d
cu
r
r
e
n
t
p
r
ac
tices,
ch
allen
g
es,
an
d
e
m
er
g
in
g
tr
en
d
s
in
I
I
o
T
s
ec
u
r
ity
.
E
x
p
er
ien
c
ed
ex
p
er
tis
e
–
o
u
r
team
’s
f
ield
ex
p
er
tis
e
in
c
y
b
e
r
se
cu
r
ity
,
I
I
o
T
s
y
s
tem
s
,
c
r
y
p
t
o
g
r
ap
h
y
,
an
d
in
d
u
s
tr
ial
au
to
m
atio
n
was
ad
v
is
ed
to
co
lle
ct
d
o
m
ain
-
d
is
tin
ct
k
n
o
wled
g
e
an
d
in
s
ig
h
ts
.
Am
o
n
g
u
s
as
ex
p
er
ts
,
m
ee
tin
g
s
an
d
in
ten
s
iv
e
wo
r
k
wer
e
h
an
d
led
to
c
o
n
f
ir
m
th
e
f
in
d
in
g
s
f
r
o
m
t
h
e
liter
atu
r
e
r
ev
iew,
id
en
tify
g
ap
s
in
ac
t
u
al
p
ath
s
,
an
d
co
llect
in
p
u
t
o
n
th
e
d
esig
n
an
d
d
ev
elo
p
m
e
n
t o
f
t
h
e
p
r
o
p
o
s
ed
m
o
d
e
l.
Mo
d
el
d
ev
elo
p
m
en
t
-
g
r
o
u
n
d
ed
o
n
th
e
f
i
n
d
in
g
s
f
r
o
m
th
e
liter
atu
r
e
r
ev
iew
an
d
ex
p
er
t
ad
v
ice,
an
in
tr
o
d
u
cto
r
y
a
b
s
tr
ac
t
s
tr
u
ctu
r
e
f
o
r
t
h
e
cy
b
er
s
ec
u
r
ity
m
o
d
el
ca
m
e
in
to
ex
is
ten
ce
.
T
h
is
s
tr
u
ctu
r
e
d
e
f
in
ed
th
e
m
ain
f
u
n
ctio
n
s
o
f
th
e
p
r
o
p
o
s
ed
m
o
d
el,
in
cl
u
d
in
g
p
en
etr
atio
n
test
in
g
,
th
r
ea
t
ass
ess
m
en
t,
s
ec
u
r
ity
C
o
s
t
-
B
en
ef
it
An
aly
s
is
ap
p
r
o
ac
h
(
CBA
)
,
an
d
co
u
n
ter
m
ea
s
u
r
e
r
ec
o
m
m
en
d
atio
n
.
Mo
d
el
r
e
f
in
em
en
t
–
th
e
in
tr
o
d
u
ct
o
r
y
m
o
d
el
g
o
es
th
r
o
u
g
h
r
ep
etitiv
e
r
ef
i
n
e
m
en
t
v
ia
f
ee
d
b
ac
k
r
o
u
n
d
s
with
ex
p
er
ts
an
d
u
n
d
er
s
tan
d
in
g
r
ea
l
-
wo
r
ld
ex
am
p
les
s
itu
atio
n
s
.
Feed
b
ac
k
s
wer
e
in
t
eg
r
ated
to
a
d
v
an
ce
t
h
e
m
o
d
el’
s
f
ea
s
ib
ilit
y
.
I
n
teg
r
atio
n
o
f
s
tan
d
ar
d
s
a
n
d
f
r
am
ewo
r
k
s
–
o
v
e
r
th
e
m
o
d
el
d
ev
elo
p
m
e
n
t
o
p
er
atio
n
,
s
ettled
s
tan
d
ar
d
s
an
d
f
r
am
ewo
r
k
s
wer
e
co
n
s
id
er
ed
r
ef
er
e
n
ce
s
to
ass
u
r
e
alig
n
m
en
t
with
in
d
u
s
tr
y
b
est
p
r
ac
tices
an
d
r
eq
u
ir
em
e
n
ts
.
T
h
e
s
tan
d
ar
d
s
s
u
p
p
lied
g
u
id
an
ce
o
n
s
ec
u
r
ity
co
n
tr
o
ls
,
r
is
k
m
an
ag
e
m
e
n
t,
an
d
c
o
m
p
lian
ce
r
elate
d
to
th
e
I
I
o
T
in
d
u
s
tr
y
i
n
clu
d
in
g
I
SO/IE
C
2
7
0
0
1
,
2
7
0
0
2
,
NI
ST
cy
b
er
s
ec
u
r
ity
f
r
a
m
ewo
r
k
,
an
d
I
E
C
6
2
4
4
3
.
Ou
r
r
esear
c
h
is
b
ased
o
n
an
in
n
o
v
ativ
e
m
o
d
el
an
d
in
co
r
p
o
r
ates
as
we
ex
p
lain
ed
s
ettled
p
r
in
cip
les
an
d
m
o
d
els
o
f
th
e
f
ield
o
f
C
y
b
er
Secu
r
ity
an
d
I
I
o
T
.
I
t
also
in
te
g
r
ates
f
u
n
ctio
n
s
in
clu
d
in
g
p
en
etr
atio
n
test
in
g
,
r
is
k
ass
es
s
m
en
t,
an
d
ass
u
r
an
ce
o
f
ef
f
ec
tiv
e
co
u
n
ter
m
ea
s
u
r
es b
as
ed
o
n
a
C
B
A
.
2
.
1
.
E
x
perim
ent
a
l set
up
A
th
o
r
o
u
g
h
liter
atu
r
e
r
ev
iew
was
h
an
d
led
to
i
d
en
tify
,
ex
is
tin
g
r
esear
c
h
,
g
ap
s
,
a
n
d
d
ir
ec
tio
n
s
in
c
y
b
er
s
ec
u
r
ity
f
o
r
I
I
o
T
s
y
s
tem
s
[
3
]
.
R
elativ
e
ac
ad
em
ic
jo
u
r
n
als,
c
o
n
f
er
e
n
ce
p
r
o
ce
ed
i
n
g
s
,
in
d
u
s
tr
y
r
e
p
o
r
ts
,
a
n
d
o
u
r
f
ield
ex
p
e
r
tis
e
wer
e
an
aly
ze
d
as
in
p
u
t
f
o
r
th
e
d
esig
n
o
f
th
e
m
o
d
el.
Pen
etr
atio
n
tes
tin
g
p
r
o
ce
s
s
–
th
e
p
en
etr
atio
n
test
in
g
p
r
o
ce
s
s
was
u
tili
ze
d
to
ev
alu
ate
th
e
s
ec
u
r
ity
p
o
s
tu
r
e
o
f
I
I
o
T
s
y
s
tem
s
[
17
]
.
T
h
is
in
clu
d
ed
s
im
u
lated
cy
b
er
attac
k
s
to
id
en
tify
v
u
ln
e
r
ab
ilit
ies
an
d
attac
k
s
u
r
f
ac
es
in
th
e
s
y
s
tem
'
s
d
ef
en
s
es,
p
r
o
p
er
to
OW
AS
P
m
eth
o
d
o
lo
g
y
.
T
h
r
e
at
ass
ess
m
en
t
m
eth
o
d
s
–
to
ev
alu
ate
th
e
im
p
ac
t
o
f
id
en
t
if
ied
th
r
ea
ts
th
r
ea
t
ass
e
s
s
m
en
t m
eth
o
d
s
wer
e
u
tili
ze
d
b
ased
o
n
th
e
OW
ASP r
i
s
k
ass
es
s
m
en
t [
17
]
.
T
h
r
ea
ts
wer
e
g
r
o
u
p
e
d
b
ased
o
n
th
e
r
is
k
to
I
I
o
T
s
y
s
tem
s
,
co
ac
h
in
g
th
e
p
r
io
r
itizatio
n
o
f
th
e
attac
k
s
,
an
d
co
u
n
ter
m
ea
s
u
r
es.
Secu
r
ity
C
B
A
–
a
co
s
t
-
b
en
ef
it
an
aly
s
is
was
m
a
n
ag
ed
to
p
r
o
v
id
e
o
r
g
a
n
izatio
n
s
with
th
e
to
o
p
r
ec
io
u
s
s
o
lu
tio
n
to
p
r
o
tect
an
d
en
h
an
ce
th
e
s
ec
u
r
ity
p
o
s
tu
r
e
o
f
I
I
o
T
s
y
s
tem
s
.
T
h
is
in
clu
d
ed
ass
es
s
in
g
f
r
o
m
th
e
p
er
s
p
ec
tiv
e
o
f
th
e
co
s
t
r
elate
d
to
co
u
n
ter
m
ea
s
u
r
es
u
p
o
n
b
en
ef
its
o
f
m
itig
atin
g
id
en
tif
ied
th
r
ea
ts
an
d
cy
b
er
-
attac
k
s
.
C
o
u
n
ter
m
ea
s
u
r
e
g
en
er
atio
n
p
r
o
ce
s
s
–
wen
t
th
r
o
u
g
h
p
r
o
v
id
i
n
g
ef
f
ec
tiv
e
r
ec
o
m
m
en
d
atio
n
co
u
n
ter
m
ea
s
u
r
es
b
ased
o
n
r
ef
e
r
en
ce
m
eth
o
d
c
o
m
m
o
n
v
u
ln
er
a
b
ilit
ies
an
d
ex
p
o
s
u
r
es
(
C
VE
)
a
n
d
m
o
d
el
r
ef
e
r
en
ce
s
.
T
h
e
p
r
o
ce
s
s
u
tili
ze
d
in
p
u
t
in
s
ig
h
ts
f
r
o
m
p
en
etr
atio
n
test
in
g
,
th
r
ea
t
ass
ess
m
en
t,
an
d
C
B
A
to
p
r
o
v
id
e
p
r
o
p
e
r
co
u
n
ter
m
ea
s
u
r
es.
Her
e
to
o
ls
lik
e
Py
th
o
n
s
cr
ip
ts
wer
e
em
p
lo
y
ed
to
au
t
o
m
ate
th
e
p
r
o
ce
s
s
o
f
g
ettin
g
f
ee
d
s
to
p
ar
ticu
lar
t
h
r
ea
ts
an
d
g
en
er
ate
co
u
n
ter
m
ea
s
u
r
es [
17
]
.
2
.
2
.
Da
t
a
a
na
ly
s
is
F
in
d
in
g
s
f
r
o
m
th
e
p
e
n
etr
atio
n
test
in
g
p
r
o
ce
s
s
wer
e
ex
am
in
ed
to
f
in
d
v
u
ln
er
ab
ilit
ies
an
d
attac
k
v
ec
to
r
s
in
I
I
o
T
s
y
s
tem
s
.
T
h
ese
f
in
d
in
g
s
e
n
lig
h
ten
ed
th
e
g
e
n
er
atio
n
o
f
co
u
n
ter
m
ea
s
u
r
es
to
m
itig
ate
id
en
tifie
d
v
u
ln
er
ab
ilit
ies.
T
h
r
ea
t
ass
ess
m
en
t
r
esu
lts
wer
e
a
n
aly
ze
d
to
g
r
o
u
p
th
r
e
ats
b
ased
o
n
th
eir
im
p
ac
t
lev
el
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
6
,
No
.
1
,
Octo
b
er
20
24
:
23
1
-
24
1
236
ac
co
r
d
in
g
t
o
OW
ASP
r
i
s
k
ass
es
s
m
en
t
m
eth
o
d
o
lo
g
y
.
T
h
is
an
aly
s
is
s
u
p
p
o
r
ted
p
r
i
o
r
itizin
g
th
e
th
r
ea
ts
an
d
v
u
ln
er
ab
ilit
ies
m
itig
atio
n
in
t
o
lev
els
o
f
r
is
k
.
T
h
e
co
s
t
-
b
en
ef
it
an
aly
s
is
in
v
o
lv
ed
ev
al
u
atio
n
b
y
f
in
an
cial
in
d
icatio
n
s
o
f
i
m
p
lem
en
tin
g
co
u
n
ter
m
ea
s
u
r
es.
T
h
is
an
aly
s
is
aid
ed
s
tak
eh
o
ld
er
s
m
ak
e
i
n
f
o
r
m
e
d
d
ec
is
io
n
s
r
elatin
g
to
r
eso
u
r
ce
allo
ca
tio
n
f
o
r
cy
b
er
s
ec
u
r
ity
ac
tio
n
s
.
J
u
d
g
m
en
ts
r
elate
d
to
th
e
in
clu
s
io
n
an
d
ex
clu
s
io
n
o
f
d
ata
wer
e
m
ad
e
b
ased
o
n
th
e
s
ev
er
ity
an
d
im
p
ac
t
o
f
th
r
ea
ts
,
an
d
r
elev
an
ce
to
th
e
r
e
s
ea
r
ch
o
b
jectiv
es.
T
h
r
o
u
g
h
cy
b
er
s
ec
u
r
ity
p
r
ac
ti
ce
ex
is
ts
a
p
r
o
ce
s
s
o
f
ex
p
lo
itatio
n
o
f
id
en
tifie
d
v
u
ln
er
a
b
ilit
ies
b
y
b
r
in
g
in
g
o
u
t
th
e
r
ea
l p
o
ten
tial c
y
b
er
-
attac
k
s
.
3.
P
RO
P
O
SE
D
M
O
D
E
L
I
n
th
is
s
ec
tio
n
,
we
p
r
esen
t
in
d
etail
th
e
p
r
o
p
o
s
ed
m
o
d
el
f
o
r
en
h
an
cin
g
cy
b
er
s
ec
u
r
ity
f
o
r
I
I
o
T
.
W
h
en
we
ev
alu
ate
th
e
s
ec
u
r
ity
p
o
s
tu
r
e
o
f
I
I
o
T
s
y
s
tem
s
,
it
is
n
ec
ess
ar
y
to
u
s
e
an
y
p
en
et
r
atio
n
t
esti
n
g
m
eth
o
d
o
l
o
g
y
an
d
to
o
ls
,
as
well
as
th
e
d
ef
i
n
itio
n
o
f
attac
k
s
,
an
d
th
e
p
r
o
ce
d
u
r
e
o
f
p
en
etr
atio
n
test
in
g
.
A
s
tr
u
ctu
r
ed
an
d
p
r
o
ac
tiv
e
ap
p
r
o
ac
h
to
d
e
v
elo
p
in
g
s
u
ch
s
ec
u
r
ity
test
s
is
to
f
o
l
lo
w
th
e
d
ev
elo
p
m
en
t o
f
th
e
f
o
u
r
-
s
tep
p
r
o
ce
s
s
an
d
d
ef
in
e
t
h
e
s
ec
u
r
ity
test
in
g
s
t
ep
s
f
o
r
ea
ch
.
T
h
e
f
o
llo
win
g
p
ar
t
o
f
th
e
s
ec
tio
n
s
h
o
ws
th
e
p
r
o
p
o
s
ed
m
o
d
el
f
u
n
ctio
n
s
an
d
s
ec
u
r
ity
test
in
g
ac
tio
n
s
u
p
to
th
e
d
ev
elo
p
m
e
n
t
o
f
th
e
p
r
o
ce
s
s
in
g
en
er
al
as
s
u
p
p
o
r
ted
b
y
th
e
r
ef
er
en
ce
s
o
f
estab
lis
h
ed
s
tan
d
ar
d
s
an
d
f
r
am
ewo
r
k
s
.
T
h
e
in
itial
p
h
ase
co
n
s
is
ts
o
f
p
lan
n
in
g
th
e
ass
ess
m
en
t
o
f
s
ec
u
r
ity
p
o
s
tu
r
e
(
p
en
etr
atio
n
test
in
g
)
,
wh
ile
th
e
n
ex
t
p
h
ase
co
llects
th
e
f
i
n
d
in
g
s
an
d
o
r
g
an
izes
(
f
in
d
in
g
s
,
d
ata
s
o
r
tin
g
,
an
d
ca
teg
o
r
izat
io
n
o
p
er
atio
n
)
,
th
e
co
n
tin
u
atio
n
with
th
e
s
ec
u
r
ity
an
aly
s
is
also
f
r
o
m
th
e
asp
ec
t
o
f
c
o
s
t
-
b
en
ef
it
(
s
ec
u
r
ity
an
aly
s
is
)
,
f
in
is
h
in
g
(
r
ep
o
r
t
d
eliv
er
y
)
an
d
d
o
cu
m
e
n
tatio
n
o
f
r
ec
o
m
m
e
n
d
ed
co
u
n
ter
m
e
asu
r
es.
W
h
ile
th
is
p
r
o
ac
t
iv
e
ap
p
r
o
ac
h
f
o
r
its
p
u
r
p
o
s
e
n
ee
d
s
to
u
s
e
s
o
f
twar
e
an
d
to
o
ls
,
th
e
p
r
o
ce
s
s
is
s
im
il
ar
f
o
r
all
s
ec
to
r
s
o
f
th
e
i
n
d
u
s
tr
y
(
f
o
r
e
x
am
p
le,
t
h
e
p
r
o
ce
s
s
o
f
s
ettin
g
u
p
cy
b
er
s
e
cu
r
ity
f
o
r
th
e
in
d
u
s
tr
ial
s
y
s
te
m
s
[
18
]
,
[
1
9
]
)
.
Fo
r
th
e
m
o
d
el
to
p
r
o
v
id
e
r
esu
lts
in
th
e
p
r
o
v
is
io
n
o
f
cy
b
e
r
s
ec
u
r
ity
f
o
r
I
I
o
T
,
we
f
o
c
u
s
o
n
th
e
d
esig
n
,
im
p
lem
en
tatio
n
,
an
d
r
ec
o
m
m
en
d
atio
n
o
f
co
u
n
ter
m
ea
s
u
r
es
p
h
ase
o
f
th
e
m
o
d
el
an
d
s
p
ec
if
y
th
e
f
o
u
r
m
ain
f
u
n
cti
o
n
s
in
m
o
r
e
d
etail:
i)
p
en
etr
atio
n
test
in
g
(
attac
k
test
in
g
)
;
ii)
th
r
ea
t
ass
es
s
m
en
t,
an
d
d
ata
ca
teg
o
r
izatio
n
;
iii)
s
ec
u
r
ity
co
s
t
-
b
en
ef
it
an
aly
s
is
,
an
d
co
u
n
ter
m
ea
s
u
r
e
g
en
er
atio
n
;
an
d
iv
)
cy
b
er
s
ec
u
r
ity
co
u
n
ter
m
ea
s
u
r
e
r
ep
o
r
t.
B
y
in
teg
r
atin
g
th
ese
f
u
n
ctio
n
alities
,
th
e
m
o
d
el
en
a
b
les
s
tak
eh
o
ld
er
s
to
ef
f
e
ctiv
el
y
id
en
tify
an
d
ad
d
r
ess
v
u
ln
er
a
b
ilit
ies,
en
h
an
ce
th
e
s
ec
u
r
ity
p
o
s
tu
r
e
o
f
s
y
s
tem
s
an
d
n
etwo
r
k
s
,
an
d
allo
ca
t
e
r
eso
u
r
ce
s
ef
f
icien
tly
f
o
r
r
is
k
m
itig
atio
n
an
d
co
u
n
ter
m
ea
s
u
r
es im
p
lem
en
tatio
n
.
3
.
1
.
P
enet
r
a
t
io
n t
esting
Pen
etr
atio
n
test
in
g
,
as
we
k
n
o
w
eth
ica
l
h
ac
k
in
g
,
is
a
s
y
s
tem
atic
s
tr
u
ctu
r
ed
p
r
o
ce
s
s
f
o
r
test
in
g
co
m
p
u
ter
s
y
s
tem
s
to
id
en
tif
y
th
r
ea
ts
an
d
p
o
te
n
tial
v
u
ln
er
ab
ilit
ies.
T
h
ese
s
ec
u
r
ity
test
s
ca
n
b
e
co
n
d
u
cted
eith
er
way
f
r
o
m
o
u
ts
id
e
an
d
f
r
o
m
in
s
id
e
th
e
in
f
r
astru
ctu
r
e
t
o
en
s
u
r
e
th
at
all
attac
k
p
o
s
s
ib
i
liti
es
ar
e
co
v
er
ed
.
T
h
e
o
b
jectiv
e
o
f
ea
c
h
p
en
etr
at
io
n
test
is
to
estab
lis
h
g
u
id
eli
n
es
an
d
r
ec
o
m
m
en
d
atio
n
s
f
o
r
f
ix
es
in
a
d
d
r
ess
in
g
th
e
f
in
d
in
g
s
.
Ap
p
r
o
p
r
iate
p
la
n
n
in
g
is
v
er
y
im
p
o
r
tan
t
in
d
e
f
in
in
g
th
e
p
u
r
p
o
s
e,
an
d
o
b
jec
tiv
es
o
f
test
in
g
th
e
tar
g
et
s
y
s
tem
,
n
et
wo
r
k
,
d
ev
i
ce
,
o
r
ap
p
licatio
n
.
T
h
e
p
lan
n
in
g
in
clu
d
es
co
n
tr
ac
tu
al
m
e
asu
r
es
th
at
u
s
u
ally
co
n
s
is
t
o
f
au
th
o
r
izatio
n
o
r
c
o
n
tr
ac
ts
th
at
d
ef
in
e
th
e
s
co
p
e
o
f
th
e
p
e
n
etr
atio
n
test
,
th
e
s
ch
e
d
u
le
o
f
co
n
d
u
ctin
g
th
e
test
,
th
e
h
u
m
an
r
eso
u
r
ce
s
in
v
o
lv
ed
,
an
d
th
e
r
e
p
o
r
tin
g
.
F
o
r
th
e
p
en
etr
atio
n
test
in
g
p
r
o
c
ess
,
d
if
f
er
en
t
way
s
ca
n
b
e
u
s
ed
,
b
u
t two
a
r
e
th
e
m
ain
o
n
es a
ls
o
b
ased
o
n
th
e
in
f
o
r
m
atio
n
th
at
th
e
attac
k
er
m
ay
h
av
e.
B
lack
b
o
x
test
in
g
:
o
n
ly
h
a
v
e
th
e
in
itial
in
f
o
r
m
atio
n
o
f
th
e
t
ar
g
et,
o
r
we
h
a
v
e
n
o
in
f
o
r
m
at
io
n
at
all.
W
h
i
te
b
o
x
test
in
g
:
mo
s
t
o
f
th
e
in
f
o
r
m
atio
n
is
k
n
o
wn
to
t
h
e
attac
k
er
.
Mo
r
e,
in
f
o
r
m
atio
n
ab
o
u
t
th
e
s
y
s
tem
is
av
ailab
le.
Pen
etr
atio
n
T
esti
n
g
p
h
ases
ar
e
th
e
s
tep
s
th
at
th
e
test
m
u
s
t
g
o
th
r
o
u
g
h
an
d
ca
n
b
e
p
r
esen
te
d
as
f
o
llo
ws [
2
0
]
,
[
2
1
]
:
−
R
ec
o
n
n
aiss
an
ce
an
d
in
f
o
r
m
a
t
io
n
g
ath
er
in
g
:
t
h
e
in
itial
p
h
ase,
co
llectin
g
in
f
o
r
m
atio
n
a
b
o
u
t
th
e
tar
g
et
s
y
s
tem
,
n
etwo
r
k
s
,
d
ev
ice,
o
r
a
p
p
licatio
n
.
All th
e
in
f
o
r
m
atio
n
f
o
u
n
d
is
u
s
ed
in
th
e
n
ex
t
p
h
ase
o
f
test
in
g
.
−
Scan
n
in
g
:
a
t th
is
s
tag
e,
to
o
ls
a
r
e
u
s
ed
to
f
u
r
th
er
test
in
d
ep
th
to
p
o
ten
tially
id
e
n
tify
tar
g
et
v
u
ln
er
ab
ilit
ies.
−
E
x
p
lo
itatio
n
an
d
g
ain
in
g
ac
ce
s
s
:
i
n
th
i
s
p
h
ase,
th
e
ex
p
lo
itatio
n
m
eth
o
d
s
an
d
tech
n
iq
u
es
o
f
th
e
tar
g
et
ar
e
u
tili
ze
d
,
b
y
u
s
in
g
all
th
e
in
f
o
r
m
atio
n
g
ath
er
e
d
f
r
o
m
th
e
o
th
e
r
p
h
ases
.
−
Ma
in
tain
in
g
ac
ce
s
s
:
f
o
r
an
attac
k
er
,
it
is
im
p
o
r
tan
t
to
s
ta
y
in
co
n
tin
u
o
u
s
co
n
n
ec
tio
n
with
th
e
tar
g
et,
b
ec
au
s
e
in
th
at
way
attac
k
e
r
c
o
llects m
o
r
e
d
ata
ab
o
u
t h
im
.
−
C
o
v
er
in
g
tr
ac
k
s
:
t
h
is
p
h
ase
is
k
n
o
wn
f
o
r
clea
r
in
g
an
y
tr
ac
es
in
th
e
lo
g
s
s
o
th
at
th
e
u
n
au
th
o
r
ized
ac
ce
s
s
o
f
th
e
attac
k
er
r
em
ain
s
a
n
o
n
y
m
o
u
s
.
R
eq
u
ir
ed
in
p
u
t
f
o
r
p
en
etr
ati
o
n
test
in
g
p
r
o
ce
s
s
.
T
o
b
eg
i
n
th
is
test
in
g
p
r
o
ce
s
s
,
we
n
ee
d
in
itial
in
f
o
r
m
atio
n
th
at
d
eter
m
in
es
t
h
e
s
tar
t
o
f
th
e
p
r
o
ce
s
s
.
I
t
also
d
e
p
en
d
s
o
n
t
h
e
way
o
f
test
i
n
g
(
b
lac
k
-
b
o
x
o
r
wh
ite
-
b
o
x
test
in
g
)
,
b
u
t
th
e
in
p
u
t
is
n
ec
ess
ar
y
f
o
r
th
e
in
itiatio
n
p
h
ases
o
f
p
en
etr
atio
n
test
in
g
.
R
eq
u
ir
ed
in
p
u
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
mo
d
el
p
r
o
p
o
s
a
l fo
r
en
h
a
n
ci
n
g
cy
b
er secu
r
ity
in
in
d
u
s
tr
ia
l I
o
T e
n
viro
n
men
ts
(
A
td
h
e
B
u
j
a
)
237
in
clu
d
es
th
ese
an
d
n
o
t
o
n
ly
d
ep
en
d
i
n
g
o
n
t
h
e
p
e
n
etr
atio
n
test
in
g
s
co
p
e,
ta
r
g
ets:
I
P
ad
d
r
ess
es,
h
o
s
tn
am
e,
n
etwo
r
k
d
ata,
web
lin
k
s
,
a
n
d
s
o
f
twar
e
v
er
s
io
n
s
o
r
o
p
e
r
atin
g
s
y
s
tem
s
.
3
.
2
.
T
hrea
t
a
s
s
ess
m
ent
a
nd
da
t
a
ca
t
e
g
o
riza
t
i
o
n
I
n
th
is
f
u
n
ctio
n
o
p
er
atio
n
,
af
t
er
th
e
ex
ec
u
tio
n
o
f
th
e
p
e
n
etr
atio
n
test
in
g
p
r
o
ce
s
s
,
th
e
f
u
n
c
tio
n
o
f
th
e
m
o
d
el
tak
es
o
v
e
r
th
e
task
o
f
a
n
aly
zin
g
an
d
o
r
g
an
izin
g
th
e
f
i
n
d
in
g
s
.
T
h
e
f
in
d
in
g
s
in
tr
o
d
u
c
e
th
e
v
u
ln
er
a
b
ilit
ies
an
d
p
o
ten
tial
en
tr
y
p
o
in
ts
o
f
c
y
b
er
-
attac
k
s
.
I
t
m
ea
n
s
t
h
at
th
e
attac
k
s
u
r
f
ac
e
f
o
r
th
e
tar
g
et
h
as
b
ee
n
r
ec
o
g
n
ize
d
,
an
d
p
o
ten
tially
th
e
attac
k
v
ec
to
r
s
h
av
e
b
ee
n
v
e
r
if
ied
in
th
e
ex
p
lo
itatio
n
p
h
ase
o
f
p
en
etr
a
tio
n
test
in
g
.
Attack
v
ec
to
r
s
r
ep
r
esen
t
v
u
ln
er
a
b
ilit
ies
in
th
e
test
ed
s
y
s
tem
,
n
etwo
r
k
,
d
ev
ice,
o
r
ap
p
licatio
n
.
E
ac
h
attac
k
v
ec
to
r
is
r
elate
d
to
a
c
y
b
er
-
attac
k
in
th
e
b
ac
k
g
r
o
u
n
d
th
at
ca
n
o
cc
u
r
if
co
u
n
ter
m
ea
s
u
r
es
ar
e
n
o
t
d
eter
m
in
ed
.
I
n
ad
d
itio
n
,
r
ec
o
g
n
ized
r
ef
e
r
en
ce
s
tan
d
a
r
d
s
,
f
r
am
ewo
r
k
s
,
cy
b
er
s
ec
u
r
ity
co
n
tr
o
ls
,
m
eth
o
d
o
lo
g
ies,
an
d
g
u
id
elin
es
o
f
th
e
m
o
d
el
wer
e
also
c
o
n
s
u
lted
.
T
h
e
an
aly
s
is
an
d
ev
al
u
atio
n
o
f
th
e
f
in
d
i
n
g
s
d
ete
r
m
in
e
th
eir
ca
teg
o
r
y
,
ac
co
r
d
in
g
t
o
th
eir
im
p
ac
t o
n
s
u
ch
cy
b
er
-
att
ac
k
s
.
3.
3
.
Securit
y
c
o
s
t
-
benef
it
a
na
ly
s
is
a
nd
co
un
t
er
m
ea
s
ure
g
ener
a
t
io
n
I
n
s
ec
u
r
ity
an
aly
s
is
b
ased
o
n
th
e
f
in
d
in
g
s
an
d
m
o
d
el
r
ef
er
en
ce
s
s
tan
d
ar
d
s
an
d
f
r
am
ewo
r
k
s
,
co
u
n
ter
m
ea
s
u
r
es
ar
e
g
en
e
r
ate
d
.
I
n
f
o
r
m
atio
n
is
s
tu
d
ied
to
p
r
o
v
id
e
r
ec
o
m
m
en
d
atio
n
s
f
o
r
co
u
n
ter
m
ea
s
u
r
es
th
at
wo
u
ld
m
i
n
im
ize
o
r
elim
in
ate
v
u
ln
er
ab
ilit
ies.
At
th
is
p
o
in
t,
to
o
ls
an
d
s
cr
ip
ts
ca
n
b
e
u
s
ed
t
o
au
to
m
ate
ac
tio
n
s
,
esp
ec
ially
ab
o
u
t
o
b
tai
n
in
g
ad
d
itio
n
al
in
f
o
r
m
atio
n
ab
o
u
t
f
i
x
es
o
f
v
u
l
n
er
ab
ilit
ies.
I
n
th
is
r
ese
ar
ch
p
ap
er
,
Py
th
o
n
s
cr
ip
ts
ar
e
u
s
ed
to
au
to
m
ate
th
e
k
n
o
wled
g
e
ac
q
u
is
itio
n
o
f
th
i
s
ad
d
itio
n
al
in
f
o
r
m
atio
n
f
o
r
ea
ch
v
u
ln
er
a
b
ilit
y
at
th
e
m
o
d
el
r
ef
er
e
n
ce
s
.
W
h
ile
th
e
s
ec
u
r
ity
an
al
y
s
is
is
b
ein
g
d
o
n
e
,
th
e
m
o
d
el
tak
es
a
g
e
n
er
al
ap
p
r
o
ac
h
a
n
d
p
r
o
d
u
ce
s
a
c
o
s
t
-
b
en
ef
it
esti
m
a
tio
n
f
o
r
ec
ast,
f
o
r
r
ec
o
m
m
e
n
d
e
d
co
u
n
ter
m
ea
s
u
r
es.
Mo
r
eo
v
er
,
ass
ess
m
en
t
o
f
th
e
r
is
k
,
an
d
co
s
t
-
b
en
e
f
it
f
o
r
th
e
r
ec
o
m
m
en
d
e
d
cy
b
er
s
ec
u
r
ity
c
o
u
n
ter
m
ea
s
u
r
es
t
o
b
e
im
p
lem
en
ted
,
b
e
o
f
u
s
e
to
o
r
g
an
izatio
n
s
t
o
h
a
v
e
a
f
f
o
r
d
a
b
le
s
o
lu
tio
n
s
[
2
2
]
.
T
h
e
p
r
o
p
o
s
ed
cy
b
er
s
e
cu
r
ity
m
o
d
el
f
o
r
I
I
o
T
is
b
u
ilt
o
n
th
e
f
o
u
n
d
atio
n
s
o
f
r
ec
o
g
n
ized
s
ta
n
d
ar
d
s
a
n
d
f
r
am
ew
o
r
k
s
a
n
d
a
d
ap
ted
f
o
r
t
h
e
in
d
u
s
tr
y
.
T
h
e
m
o
d
el
r
ef
er
en
ce
s
in
o
u
r
r
esear
ch
in
cl
u
d
e
a
wid
e
r
an
g
e
o
f
r
ec
o
g
n
ized
s
tan
d
a
r
d
s
s
u
ch
as
th
e
[
23
]
c
y
b
er
s
ec
u
r
ity
f
r
am
ewo
r
k
,
I
SO/IE
C
2
7
0
0
1
,
2
7
0
0
2
,
an
d
I
E
C
6
2
4
4
3
,
C
y
b
e
r
s
ec
u
r
ity
an
d
I
n
f
r
astru
ctu
r
e
Secu
r
ity
Ag
e
n
cy
(
C
I
SA)
,
o
p
en
I
I
o
T
,
Fo
r
u
m
o
f
I
n
cid
en
t
R
esp
o
n
s
e
an
d
Secu
r
ity
T
ea
m
s
(
FI
R
ST)
,
E
NI
SA
Go
o
d
Pra
ctice
s
f
o
r
I
o
T
a
n
d
s
m
ar
t
in
f
r
astru
ctu
r
es
to
o
l,
t
h
e
o
p
e
n
web
a
p
p
licatio
n
s
ec
u
r
ity
p
r
o
ject
(
OW
ASP),
o
p
e
n
-
s
o
u
r
ce
s
ec
u
r
ity
test
in
g
m
eth
o
d
o
l
o
g
y
m
an
u
al
(
OSSTM
M)
,
p
en
etr
atio
n
test
in
g
ex
ec
u
tio
n
s
tan
d
ar
d
(
PTE
S)
,
an
d
o
p
e
n
-
s
o
u
r
ce
in
tellig
en
ce
(
OSI
NT
)
.
B
ased
o
n
th
e
d
ata
o
f
th
e
m
o
d
el
f
u
n
ctio
n
s
s
p
ec
if
ic
p
en
etr
atio
n
t
esti
n
g
p
r
o
ce
s
s
,
th
e
s
elec
tio
n
o
f
th
ese
r
ef
er
en
ce
s
is
also
m
ad
e
as
an
im
p
o
r
tan
t
a
ttrib
u
te
o
f
th
e
v
u
ln
er
ab
ilit
ies
id
en
tifie
d
.
Af
ter
th
e
an
aly
s
is
o
f
th
e
d
at
a,
th
e
v
u
ln
er
ab
ilit
ies
o
f
th
e
m
o
d
el
f
u
n
cti
o
n
p
e
n
etr
atio
n
test
in
g
p
r
o
ce
s
s
[
24
]
,
[
2
5
]
a
n
d
t
h
e
ass
es
s
m
en
t
f
r
o
m
th
e
s
ec
u
r
ity
asp
ec
t,
an
d
th
en
s
o
r
tin
g
a
n
d
g
r
o
u
p
in
g
th
em
i
n
to
im
p
ac
t
c
ateg
o
r
ies
u
s
in
g
th
e
OW
AS
P
m
eth
o
d
o
lo
g
y
[
2
4
]
,
wh
er
e
th
e
ca
teg
o
r
ies
lev
el
ar
e
esta
b
lis
h
ed
o
f
cr
itical,
h
ig
h
,
m
ed
iu
m
,
an
d
lo
w.
I
n
th
e
n
ex
t
p
h
ase,
k
n
o
wled
g
e
ac
q
u
is
itio
n
[
2
6
]
-
[
3
5
]
is
co
n
d
u
cted
,
tak
in
g
th
e
b
asic
a
n
d
co
m
p
lem
en
tar
y
in
f
o
r
m
atio
n
o
f
th
e
v
u
ln
er
ab
ilit
ies
[
3
6
]
,
[
3
7
]
,
b
y
g
en
er
a
tin
g
th
e
r
ec
o
m
m
e
n
d
atio
n
s
f
o
r
cy
b
er
s
ec
u
r
ity
co
u
n
ter
m
ea
s
u
r
es
o
n
e
b
y
o
n
e
.
Af
ter
th
e
d
is
co
v
er
y
o
f
th
e
c
o
u
n
ter
m
ea
s
u
r
es,
d
ata
wer
e
r
eg
r
o
u
p
ed
b
y
r
e
p
ea
tin
g
s
u
cc
ess
iv
e
iter
atio
n
s
u
n
til
th
e
o
p
tim
al
r
ec
o
m
m
en
d
atio
n
s
wer
e
f
o
u
n
d
f
o
r
ass
o
ciate
d
v
u
ln
er
ab
ilit
ies.
B
y
co
n
tin
u
o
u
s
ly
ev
alu
atin
g
th
e
co
s
t
-
b
en
ef
it
an
aly
s
is
f
o
r
r
ec
o
m
m
en
d
atio
n
s
co
u
n
ter
m
ea
s
u
r
es
[
3
8
]
,
th
e
f
in
al
ch
ec
k
lis
t
is
r
ea
ch
ed
th
at
s
u
p
p
o
r
ts
th
e
d
ec
is
io
n
-
m
ak
er
s
at
th
e
o
r
g
an
izatio
n
s
f
o
r
th
e
m
o
s
t
p
o
s
s
ib
le
an
d
co
s
t
-
ef
f
ec
tiv
e
s
o
lu
tio
n
s
.
3.
4
.
Cy
ber
s
ec
urit
y
co
un
t
er
m
ea
s
ure
re
po
rt
On
ce
th
e
c
o
m
p
r
e
h
en
s
iv
e
a
n
a
ly
s
is
cy
b
er
s
ec
u
r
ity
s
tate
o
f
th
e
I
I
o
T
s
y
s
tem
h
as
b
ee
n
co
n
d
u
cte
d
,
in
clu
d
in
g
t
h
e
id
en
tific
atio
n
o
f
v
u
l
n
er
ab
ilit
ies
ass
o
ciate
d
with
r
is
k
th
r
ea
ts
,
g
r
o
u
p
in
g
an
d
ca
teg
o
r
izatio
n
,
g
en
er
atio
n
o
f
co
u
n
ter
m
ea
s
u
r
e
s
b
ased
o
n
m
o
d
el
r
ef
er
e
n
ce
s
,
as
well
a
s
th
eir
co
s
t
-
b
en
ef
it
e
v
alu
atio
n
.
At
th
is
tim
e,
th
e
n
ex
t
f
u
n
ctio
n
d
eliv
e
r
s
th
e
f
in
al
r
ep
o
r
t
d
o
cu
m
en
tin
g
th
e
f
in
d
in
g
s
.
T
h
is
r
ep
o
r
t
s
er
v
es
as
a
m
ea
n
s
o
f
co
m
m
u
n
icatio
n
,
o
f
f
er
in
g
t
h
e
o
r
g
an
izatio
n
a
n
d
p
a
r
ties
v
alu
a
b
le
in
s
ig
h
ts
in
to
th
e
s
ec
u
r
ity
p
o
s
tu
r
e
o
f
th
e
I
I
o
T
s
y
s
tem
an
d
r
ec
o
m
m
e
n
d
in
g
ac
tio
n
s
f
o
r
m
itig
atin
g
id
en
ti
f
ied
v
u
ln
e
r
ab
ilit
ies.
C
o
m
p
lem
en
tar
y
,
th
e
r
ep
o
r
t
in
clu
d
es
th
e
ev
alu
atio
n
o
f
t
h
e
co
s
t
-
b
en
ef
it
an
aly
s
is
to
s
ee
th
e
f
in
an
cial
im
p
ac
ts
o
f
im
p
lem
en
tin
g
th
e
r
ec
o
m
m
en
d
ed
cy
b
er
s
ec
u
r
ity
c
o
u
n
ter
m
ea
s
u
r
es
.
3.
5
.
M
o
del int
eg
ra
t
i
o
n a
nd
wo
rk
f
lo
w
I
n
th
e
s
ec
tio
n
ab
o
v
e
we
ex
p
lain
ed
in
d
etail
th
e
p
r
o
p
o
s
ed
m
o
d
el
f
u
n
ctio
n
s
,
h
ig
h
lig
h
tin
g
its
k
ey
co
m
p
o
n
en
ts
an
d
th
eir
in
ter
co
n
n
ec
tio
n
s
.
W
e
elab
o
r
ated
o
n
s
p
ec
if
ic
s
tep
s
in
v
o
lv
ed
in
in
teg
r
atin
g
th
e
d
if
f
er
en
t
s
ec
u
r
ity
m
ea
s
u
r
es
with
in
t
h
e
p
r
o
p
o
s
ed
m
o
d
e
l.
T
h
e
s
u
cc
ess
f
u
l
im
p
lem
e
n
tatio
n
o
f
s
u
s
tain
ab
le
cy
b
e
r
s
ec
u
r
ity
m
ea
s
u
r
es
ag
ain
s
t
th
r
ea
ts
an
d
attac
k
s
in
I
I
o
T
e
n
v
ir
o
n
m
en
ts
n
ec
ess
ar
ily
r
eq
u
ir
es
th
e
in
te
g
r
atio
n
o
f
m
u
ltip
le
f
u
n
ctio
n
s
to
h
av
e
a
n
ef
f
ec
tiv
e
d
ef
en
s
e
s
tr
ateg
y
.
I
n
th
is
s
ec
tio
n
,
we
p
r
esen
t
th
e
m
o
d
el
th
at
p
er
f
ec
tly
in
teg
r
ates
th
e
f
u
n
cti
o
n
s
o
f
p
en
et
r
atio
n
te
s
tin
g
,
th
r
ea
t
ass
ess
m
en
t,
d
ata
ca
teg
o
r
izatio
n
,
s
ec
u
r
ity
co
s
t
-
b
en
ef
it
an
aly
s
is
,
an
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
6
,
No
.
1
,
Octo
b
er
20
24
:
23
1
-
24
1
238
co
u
n
ter
m
ea
s
u
r
e
g
en
er
atio
n
.
T
h
e
p
u
r
p
o
s
e
an
d
o
b
jectiv
e
o
f
th
e
r
esear
ch
,
th
e
in
teg
r
atio
n
o
f
th
ese
im
p
o
r
tan
t
f
u
n
ctio
n
s
is
to
p
r
o
v
id
e
a
p
r
o
ac
tiv
e
ap
p
r
o
ac
h
to
en
h
an
ce
a
n
d
r
ei
n
f
o
r
ce
th
e
le
v
el
o
f
cy
b
er
s
ec
u
r
ity
in
I
I
o
T
s
y
s
tem
s
.
T
h
is
co
m
p
r
e
h
en
s
iv
e
ap
p
r
o
ac
h
en
titl
es
in
d
u
s
tr
ial
o
r
g
an
izatio
n
s
t
o
d
etec
t
an
d
m
itig
ate
p
o
ten
tial
v
u
ln
er
ab
ilit
ies
ef
f
ec
tiv
ely
,
s
tr
en
g
th
en
s
ec
u
r
ity
p
o
s
tu
r
e
,
an
d
d
ef
en
d
th
eir
c
r
itical
in
f
r
as
tr
u
ctu
r
e.
Fig
u
r
e
4
p
r
esen
ts
th
e
wo
r
k
f
l
o
w
o
v
er
v
i
ew
o
f
a
p
r
o
p
o
s
ed
m
o
d
el
o
f
c
y
b
er
s
ec
u
r
ity
f
o
r
I
I
o
T
i
n
clu
d
i
n
g
th
e
s
eq
u
e
n
ce
o
f
o
p
er
atio
n
s
,
i
n
f
o
r
m
atio
n
f
lo
w
s
,
an
d
d
ec
is
io
n
p
o
in
ts
th
at
o
cc
u
r
r
e
d
.
T
h
e
v
is
u
al
p
r
esen
t
atio
n
o
f
th
e
m
o
d
el
d
iag
r
am
,
wo
r
k
f
lo
w
s
tep
s
,
an
d
in
ter
co
n
n
ec
tio
n
s
is
m
ad
e
u
s
in
g
th
e
b
u
s
in
ess
p
r
o
ce
s
s
m
o
d
el
an
d
n
o
tatio
n
(
B
PMN)
.
Fig
u
r
e
4
.
W
o
r
k
f
lo
w
s
tep
s
o
v
er
v
iew
o
f
th
e
p
r
o
p
o
s
ed
m
o
d
el
4.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
T
h
e
ad
v
e
n
t
o
f
I
I
o
T
h
as
ch
an
g
ed
in
d
u
s
tr
ial
o
p
er
atio
n
s
,
a
d
v
an
cin
g
ef
f
icie
n
cy
an
d
q
u
ality
.
Ho
wev
er
,
th
is
tech
n
o
lo
g
ical
en
h
a
n
ce
m
e
n
t
h
as
also
ac
c
o
m
p
an
ie
d
an
i
n
cr
ea
s
e
in
c
y
b
er
-
attac
k
s
tar
g
e
tin
g
I
I
o
T
s
y
s
tem
s
.
T
h
e
r
esear
ch
ad
d
r
ess
es
th
ese
ch
allen
g
es
b
y
p
r
o
p
o
s
in
g
a
cy
b
er
s
ec
u
r
ity
m
o
d
el
f
o
r
I
I
o
T
.
Pr
ev
io
u
s
s
tu
d
ies
h
av
e
ex
p
lo
r
ed
th
e
im
p
ac
t
o
f
co
m
m
o
n
c
y
b
er
th
r
ea
ts
tar
g
etin
g
I
I
o
T
s
y
s
tem
s
,
s
u
ch
as
m
alicio
u
s
co
d
e
i
n
jectio
n
,
Do
S
attac
k
s
,
an
d
u
n
au
th
o
r
ized
ac
ce
s
s
.
Ou
r
s
tu
d
y
f
o
u
n
d
th
at
t
r
ad
it
io
n
al
cy
b
e
r
s
ec
u
r
ity
m
ea
s
u
r
es
h
av
e
s
h
o
wn
a
lack
in
m
itig
atin
g
th
ese
th
r
ea
ts
to
I
I
o
T
s
y
s
tem
s
.
T
r
ad
itio
n
al
s
e
cu
r
ity
m
ea
s
u
r
es
lik
e
th
e
C
I
A
tr
iad
an
d
an
tiv
ir
u
s
s
o
lu
tio
n
s
d
em
o
n
s
tr
ate
lack
in
g
ad
d
r
ess
in
g
th
e
a
d
v
an
ce
d
m
o
d
er
n
cy
b
er
-
attac
k
s
.
T
h
e
p
r
o
p
o
s
ed
s
o
lu
tio
n
s
en
tail
ML
alg
o
r
ith
m
s
,
b
lo
ck
ch
ain
in
teg
r
atio
n
,
an
d
in
tellig
en
t
Do
S
d
etec
tio
n
f
r
a
m
ewo
r
k
s
.
Nev
e
r
th
eless
,
ch
allen
g
es
ex
is
t
in
im
p
lem
en
tin
g
th
ese
s
o
lu
tio
n
s
ef
f
ec
tiv
ely
,
a
n
d
a
n
ee
d
b
ey
o
n
d
r
esear
ch
to
d
esig
n
p
r
o
ac
tiv
e
c
y
b
er
s
ec
u
r
ity
ap
p
r
o
ac
h
es
s
p
ec
if
ic
to
I
I
o
T
.
E
v
i
d
en
ce
f
r
o
m
th
e
r
esear
ch
s
tu
d
y
is
o
u
tlin
ed
in
T
ab
le
1
p
r
o
v
id
es
in
s
ig
h
ts
in
to
th
e
m
ajo
r
f
in
d
in
g
s
d
is
cu
s
s
ed
ea
r
lier
.
Ou
r
f
in
d
in
g
s
u
n
d
e
r
lin
e
th
e
cr
i
ticality
o
f
cy
b
er
s
ec
u
r
ity
i
n
p
r
o
tectin
g
I
I
o
T
s
y
s
tem
s
ag
ain
s
t
g
r
o
win
g
cy
b
er
th
r
ea
ts
.
Ho
wev
er
,
th
e
p
r
o
p
o
s
ed
cy
b
er
s
ec
u
r
ity
m
o
d
el
p
r
o
v
id
es
a
p
r
o
ac
tiv
e
ap
p
r
o
ac
h
b
y
in
teg
r
atin
g
f
u
n
ctio
n
s
s
u
ch
as
p
e
n
etr
atio
n
test
in
g
,
th
r
ea
t
ass
ess
m
en
t,
s
ec
u
r
ity
co
s
t
-
b
e
n
ef
it
an
al
y
s
is
,
an
d
c
o
u
n
ter
m
ea
s
u
r
e
r
ec
o
m
m
en
d
atio
n
s
.
B
en
ef
itin
g
s
tan
d
ar
d
s
an
d
f
r
am
ewo
r
k
s
lik
e
I
SO/IE
C
2
7
0
0
1
,
NI
ST
cy
b
er
s
ec
u
r
ity
f
r
am
ewo
r
k
,
an
d
I
E
C
6
2
4
4
3
,
th
e
m
o
d
el
d
eliv
er
s
o
r
g
an
izati
o
n
s
with
a
s
tr
u
ctu
r
e
d
m
o
d
el
f
o
r
ad
v
an
cin
g
th
e
s
ec
u
r
ity
p
o
s
tu
r
e
o
f
I
I
o
T
s
y
s
te
m
s
.
T
h
is
p
r
o
ac
tiv
e
ap
p
r
o
ac
h
e
m
p
o
wer
s
s
tak
eh
o
l
d
er
s
to
id
en
tify
v
u
l
n
er
ab
ilit
ies,
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2
5
0
2
-
4
7
52
A
mo
d
el
p
r
o
p
o
s
a
l fo
r
en
h
a
n
ci
n
g
cy
b
er secu
r
ity
in
in
d
u
s
tr
ia
l I
o
T e
n
viro
n
men
ts
(
A
td
h
e
B
u
j
a
)
239
p
r
io
r
itize
th
r
ea
ts
,
an
d
ass
ig
n
r
eso
u
r
ce
s
ef
f
icien
tly
f
o
r
r
is
k
m
itig
atio
n
.
Ou
r
s
tu
d
y
f
in
d
i
n
g
s
h
av
e
in
d
icatio
n
s
f
o
r
p
o
licy
d
r
af
tin
g
in
th
e
f
ield
o
f
cy
b
er
s
ec
u
r
ity
f
o
r
I
I
o
T
.
B
y
e
m
p
h
asizin
g
t
h
e
n
ee
d
f
o
r
en
h
a
n
ce
d
c
y
b
er
s
ec
u
r
ity
co
u
n
ter
m
ea
s
u
r
es
an
d
p
r
o
ac
tiv
e
th
r
ea
t
m
itig
atio
n
,
th
e
s
tu
d
y
ad
v
is
es
p
o
licy
m
ak
er
s
o
n
th
e
u
r
g
en
t
n
ee
d
to
s
o
r
t
cy
b
er
s
ec
u
r
ity
in
v
estme
n
ts
a
n
d
r
e
g
u
latio
n
s
in
in
d
u
s
tr
ial
s
ec
to
r
s
.
T
h
e
p
r
o
p
o
s
ed
c
y
b
er
s
ec
u
r
ity
m
o
d
el
h
as
ap
p
licab
le
in
d
icat
io
n
s
f
o
r
ad
v
an
cin
g
th
e
r
esil
ien
ce
o
f
I
I
o
T
s
y
s
tem
s
ag
ain
s
t
cy
b
er
th
r
ea
ts
.
B
y
in
co
r
p
o
r
atin
g
ad
v
an
ce
d
s
ec
u
r
ity
m
ea
s
u
r
es
an
d
b
en
e
f
itin
g
f
r
o
m
em
e
r
g
in
g
tech
n
o
lo
g
ies
lik
e
M
L
an
d
b
lo
c
k
ch
ain
,
o
r
g
an
izatio
n
s
ca
n
m
ain
tain
th
eir
d
ef
en
s
es
an
d
m
itig
ate
p
o
ten
tial
r
is
k
s
.
H
o
wev
er
,
th
e
m
o
d
el’
s
lim
itatio
n
s
an
d
p
o
s
s
ib
le
ch
allen
g
es
in
im
p
lem
en
tatio
n
n
ee
d
f
u
r
th
er
ex
p
l
o
r
atio
n
.
Fu
tu
r
e
r
esear
ch
in
cl
u
d
es
ad
v
an
ce
an
d
v
alid
atio
n
o
f
t
h
e
p
r
o
p
o
s
ed
m
o
d
el
th
r
o
u
g
h
p
r
ac
tical
im
p
lem
en
tatio
n
s
an
d
ca
s
e
s
tu
d
ie
s
.
Nev
er
th
eless
,
th
e
s
u
cc
ess
o
f
th
e
m
o
d
el
m
a
y
d
if
f
er
b
ased
o
n
th
e
s
p
ec
if
ic
c
h
ar
ac
ter
is
tics
an
d
co
n
f
ig
u
r
atio
n
s
o
f
d
if
f
er
en
t
in
d
u
s
tr
ial
s
y
s
tem
s
.
Fu
r
th
er
m
o
r
e,
co
n
tin
u
in
g
r
esear
ch
is
n
ee
d
e
d
to
h
an
d
le
em
er
g
in
g
cy
b
e
r
th
r
ea
ts
an
d
v
u
ln
e
r
ab
ilit
ies
s
p
ec
if
ic
to
I
I
o
T
ap
p
licatio
n
s
,
an
d
s
ec
u
r
e
co
n
tin
u
o
u
s
ad
v
an
ce
s
in
cy
b
er
s
ec
u
r
ity
p
r
ac
tices.
Ou
r
s
tu
d
y
h
ig
h
lig
h
ts
th
e
cr
iticality
o
f
cy
b
er
s
ec
u
r
ity
in
s
af
eg
u
ar
d
in
g
I
I
o
T
s
y
s
tem
s
ag
ain
s
t
ev
o
lv
in
g
cy
b
er
th
r
ea
ts
.
T
h
e
p
r
o
p
o
s
ed
cy
b
e
r
s
ec
u
r
ity
m
o
d
el
o
f
f
er
s
p
r
ac
tical
in
s
ig
h
ts
f
o
r
p
o
licy
m
ak
e
r
s
an
d
in
d
u
s
tr
y
s
tak
eh
o
ld
er
s
,
em
p
h
asizin
g
th
e
n
ee
d
f
o
r
ad
v
a
n
ce
d
cy
b
e
r
s
ec
u
r
ity
co
u
n
ter
m
ea
s
u
r
es
an
d
p
r
o
ac
tiv
e
th
r
ea
t
m
itig
atio
n
s
tr
ateg
ies.
C
o
llab
o
r
atio
n
,
p
ar
tn
er
s
h
ip
s
,
an
d
k
n
o
wled
g
e
s
h
ar
in
g
b
et
wee
n
in
d
u
s
tr
y
s
tak
eh
o
ld
er
s
,
r
esear
ch
er
s
,
an
d
p
o
licy
m
ak
er
s
ar
e
v
ital
to
d
e
s
ig
n
in
g
th
o
r
o
u
g
h
s
tr
ateg
ies
f
o
r
th
e
p
r
o
tectio
n
o
f
I
I
o
T
s
y
s
tem
s
an
d
cr
itical
in
f
r
astru
ctu
r
e
a
g
ain
s
t c
y
b
er
t
h
r
ea
ts
.
T
ab
le
1
.
T
h
e
in
s
ig
h
ts
in
to
th
e
m
ajo
r
f
in
d
in
g
s
F
i
n
d
i
n
g
s
D
e
scri
p
t
i
o
n
C
o
mm
o
n
c
y
b
e
r
s
e
c
u
r
i
t
y
t
h
r
e
a
t
s
i
n
I
I
o
T
I
d
e
n
t
i
f
i
e
d
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
i
n
c
l
u
d
e
l
a
c
k
o
f
p
r
i
v
a
c
y
,
c
o
mm
o
n
c
y
b
e
r
-
a
t
t
a
c
k
s (m
a
l
i
c
i
o
u
s c
o
d
e
,
D
o
S
)
,
a
n
d
e
merg
i
n
g
t
h
r
e
a
t
s
t
a
r
g
e
t
i
n
g
w
e
a
k
se
c
u
r
i
t
y
a
r
e
a
s
.
I
I
o
T
a
t
t
a
c
k
su
r
f
a
c
e
s a
n
d
e
n
t
r
y
p
o
i
n
t
s
A
t
t
a
c
k
su
r
f
a
c
e
s
i
n
c
l
u
d
e
o
p
e
n
p
o
r
t
s,
c
o
mm
u
n
i
c
a
t
i
o
n
p
r
o
t
o
c
o
l
s
,
a
n
d
i
n
d
u
st
r
y
-
sp
e
c
i
f
i
c
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s.
K
n
o
w
n
I
I
o
T
sec
u
r
i
t
y
t
h
r
e
a
t
s
a
n
d
c
o
u
n
t
e
r
m
e
a
s
u
r
e
s
Th
r
e
a
t
s
i
n
c
l
u
d
e
D
o
S
,
M
i
T
M
a
t
t
a
c
k
s,
u
n
a
u
t
h
o
r
i
z
e
d
a
c
c
e
ss,
a
n
d
mal
i
c
i
o
u
s
c
o
d
e
i
n
j
e
c
t
i
o
n
.
C
o
u
n
t
e
r
m
e
a
su
r
e
s
i
n
v
o
l
v
e
a
c
c
e
ss
c
o
n
t
r
o
l
,
e
n
c
r
y
p
t
i
o
n
,
a
n
d
n
e
t
w
o
r
k
m
o
n
i
t
o
r
i
n
g
.
5.
CO
NCLU
SI
O
N
I
n
th
is
p
ap
e
r
,
we
p
r
esen
ted
a
co
m
p
r
eh
en
s
iv
e
m
o
d
el
p
r
o
p
o
s
al
o
f
c
y
b
er
s
ec
u
r
ity
f
o
r
th
e
I
I
o
T
.
T
h
er
ef
o
r
e,
o
u
r
m
o
d
el
p
r
o
v
i
d
es
a
p
r
o
ac
tiv
e
a
p
p
r
o
ac
h
to
a
d
v
an
ce
c
y
b
er
s
ec
u
r
ity
r
esil
ien
ce
b
y
in
teg
r
atin
g
f
u
n
ctio
n
s
s
u
ch
as
p
en
etr
atio
n
test
in
g
,
th
r
ea
t
ass
es
s
m
en
t,
d
ata
ca
teg
o
r
izatio
n
,
s
ec
u
r
ity
c
o
s
t
-
b
en
ef
it
an
aly
s
is
,
an
d
cy
b
er
s
ec
u
r
ity
co
u
n
ter
m
e
asu
r
e
r
ec
o
m
m
e
n
d
atio
n
s
.
T
o
a
d
d
r
ess
s
ec
u
r
ity
ch
allen
g
es,
o
u
r
p
r
o
p
o
s
ed
m
o
d
el
p
r
o
v
id
es
a
p
r
o
ac
tiv
e
ap
p
r
o
ac
h
in
teg
r
ated
with
jo
in
t
f
u
n
cti
o
n
s
to
en
h
a
n
ce
cy
b
er
s
ec
u
r
it
y
r
esil
ien
ce
in
I
I
o
T
s
y
s
tem
s
.
T
h
r
o
u
g
h
th
ese
f
u
n
ctio
n
s
,
s
tak
eh
o
ld
er
s
ca
n
a
s
s
es
s
th
e
s
ec
u
r
ity
p
o
s
tu
r
e
o
f
I
I
o
T
,
id
en
tif
y
v
u
ln
er
ab
ilit
ies
,
p
r
io
r
itize
r
is
k
s
,
an
d
r
ec
o
m
m
e
n
d
c
o
u
n
ter
m
ea
s
u
r
es
g
u
id
ed
b
y
co
s
t
-
b
e
n
ef
it
an
aly
s
is
.
B
y
r
ec
eiv
in
g
in
f
o
r
m
atio
n
f
r
o
m
p
e
n
etr
atio
n
test
in
g
an
d
th
r
ea
t
as
s
ess
m
en
t,
we
ca
n
q
u
ick
ly
f
in
d
v
u
ln
e
r
ab
ilit
ies
an
d
p
o
ten
tial
attac
k
v
ec
t
o
r
s
,
an
d
s
u
p
p
o
r
t
s
tak
eh
o
ld
e
r
s
f
o
r
th
e
im
p
lem
en
tatio
n
o
f
p
r
o
tectiv
e
c
o
u
n
ter
m
ea
s
u
r
es.
Data
ca
teg
o
r
izatio
n
en
s
u
r
es
th
e
ef
f
ec
tiv
e
o
r
g
an
izatio
n
o
f
d
ata
r
elate
d
to
s
ec
u
r
ity
an
d
s
u
p
p
o
r
t
f
o
r
p
r
io
r
itizin
g
ap
p
r
o
p
r
iate
ac
tio
n
s
b
ased
o
n
th
e
im
p
ac
t
o
f
r
is
k
.
T
h
e
s
ec
u
r
ity
co
s
t
-
b
en
e
f
it
an
aly
s
is
f
u
n
ctio
n
s
p
ec
if
ies
th
e
f
in
an
cial
co
s
t
im
p
licatio
n
s
o
f
im
p
lem
en
tin
g
c
o
u
n
ter
m
ea
s
u
r
e
s
,
h
elp
in
g
s
tak
eh
o
ld
er
s
m
ak
e
i
n
f
o
r
m
e
d
d
ec
is
io
n
s
ab
o
u
t
th
e
n
ec
ess
ar
y
r
eso
u
r
ce
s
.
T
h
e
last
is
th
e
g
en
er
atio
n
o
f
co
u
n
ter
m
ea
s
u
r
es
th
at
p
r
ep
ar
e
ac
tio
n
s
f
o
r
s
ec
u
r
ity
m
ea
s
u
r
es to
ad
d
r
ess
th
e
wea
k
n
ess
es f
o
u
n
d
,
ac
co
r
d
in
g
to
th
e
o
r
g
an
izatio
n
'
s
s
tr
ateg
ic
g
o
als
an
d
r
i
s
k
to
ler
a
n
ce
.
L
o
o
k
in
g
f
o
r
war
d
,
we
u
n
d
e
r
s
tan
d
th
e
s
ig
n
if
ican
ce
o
f
b
e
y
o
n
d
r
esear
ch
an
d
r
ef
i
n
em
en
t
o
f
o
u
r
m
o
d
el.
Fu
tu
r
e
wo
r
k
s
will
f
o
cu
s
o
n
b
u
ild
in
g
th
e
m
o
d
el
u
tili
zin
g
ML
alg
o
r
ith
m
s
to
ad
v
a
n
ce
th
e
m
o
d
el’
s
ca
p
ab
ilit
ies,
test
in
g
th
e
m
o
d
el
in
s
im
u
lated
I
I
o
T
in
f
r
astru
ctu
r
e,
o
r
at
an
y
Un
iv
er
s
ity
L
a
b
o
r
ato
r
y
;
an
d
ev
alu
atin
g
its
p
er
f
o
r
m
an
ce
th
r
o
u
g
h
ML
m
et
r
ics.
Fu
r
th
er
m
o
r
e,
we
aim
t
o
p
r
o
to
ty
p
e
a
n
en
h
a
n
ce
d
m
o
d
el
o
f
cy
b
er
s
ec
u
r
ity
f
o
r
I
I
o
T
th
at
co
r
r
esp
o
n
d
s
with
o
r
g
an
izatio
n
al
g
o
als
an
d
r
is
k
to
ler
an
ce
.
B
y
h
an
d
lin
g
th
ese
p
lan
s
,
we
aim
to
co
n
tr
ib
u
te
to
th
e
o
n
g
o
in
g
ef
f
o
r
ts
to
p
r
o
tect
I
I
o
T
s
y
s
tem
s
an
d
f
o
r
tify
cy
b
er
s
ec
u
r
ity
r
esil
ien
ce
in
in
d
u
s
tr
ial
s
ettin
g
s
.
RE
F
E
R
E
NC
E
S
[
1
]
X
.
Ji
a
n
g
,
M
.
Lo
r
a
,
a
n
d
S
.
C
h
a
t
t
o
p
a
d
h
y
a
y
,
“
A
n
e
x
p
e
r
i
m
e
n
t
a
l
a
n
a
l
y
si
s
o
f
s
e
c
u
r
i
t
y
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
i
n
i
n
d
u
st
r
i
a
l
I
o
T
d
e
v
i
c
e
s,
”
A
C
M
T
ra
n
s
a
c
t
i
o
n
s
o
n
I
n
t
e
r
n
e
t
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
2
0
,
n
o
.
2
,
p
p
.
1
–
2
4
,
M
a
y
2
0
2
0
,
d
o
i
:
1
0
.
1
1
4
5
/
3
3
7
9
5
4
2
.
[
2
]
J.
W
.
Ja
n
g
,
S
.
K
w
o
n
,
S
.
J
.
K
i
m,
J.
S
e
o
,
J.
O
h
,
a
n
d
K
.
H
.
Le
e
,
“
C
y
b
e
r
s
e
c
u
r
i
t
y
f
r
a
mew
o
r
k
f
o
r
I
I
o
T
-
b
a
se
d
p
o
w
e
r
s
y
st
e
m
c
o
n
n
e
c
t
e
d
t
o
mi
c
r
o
g
r
i
d
,
”
K
S
I
I
T
ra
n
s
a
c
t
i
o
n
s
o
n
I
n
t
e
rn
e
t
a
n
d
I
n
f
o
rm
a
t
i
o
n
S
y
st
e
m
s
,
v
o
l
.
1
4
,
n
o
.
5
,
p
p
.
2
2
2
1
–
2
2
3
5
,
M
a
y
2
0
2
0
,
d
o
i
:
1
0
.
3
8
3
7
/
t
i
i
s
.
2
0
2
0
.
0
5
.
0
2
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
52
In
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
3
6
,
No
.
1
,
Octo
b
er
20
24
:
23
1
-
24
1
240
[
3
]
A
.
B
u
j
a
,
M
.
A
p
o
s
t
o
l
o
v
a
,
A
.
Lu
ma,
a
n
d
Y
.
J
a
n
u
z
a
j
,
“
C
y
b
e
r
sec
u
r
i
t
y
st
a
n
d
a
r
d
s
f
o
r
t
h
e
i
n
d
u
s
t
r
i
a
l
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
(
I
I
o
T)
–
a
sy
st
e
ma
t
i
c
r
e
v
i
e
w
,
”
i
n
2
0
2
2
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
g
r
e
ss
o
n
H
u
m
a
n
-
C
o
m
p
u
t
e
r
I
n
t
e
r
a
c
t
i
o
n
,
O
p
t
i
m
i
z
a
t
i
o
n
a
n
d
R
o
b
o
t
i
c
A
p
p
l
i
c
a
t
i
o
n
s
(
H
O
RA)
,
Ju
n
.
2
0
2
2
,
p
p
.
1
–
6
,
d
o
i
:
1
0
.
1
1
0
9
/
H
O
R
A
5
5
2
7
8
.
2
0
2
2
.
9
7
9
9
8
7
0
.
[
4
]
F
.
M
e
n
e
g
h
e
l
l
o
,
M
.
C
a
l
o
r
e
,
D
.
Zu
c
c
h
e
t
t
o
,
M
.
P
o
l
e
se
,
a
n
d
A
.
Za
n
e
l
l
a
,
“
I
o
T:
i
n
t
e
r
n
e
t
o
f
t
h
r
e
a
t
s?
a
s
u
r
v
e
y
o
f
p
r
a
c
t
i
c
a
l
s
e
c
u
r
i
t
y
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
i
n
r
e
a
l
I
o
T
d
e
v
i
c
e
s
,
”
I
EE
E
I
n
t
e
rn
e
t
o
f
T
h
i
n
g
s
J
o
u
rn
a
l
,
v
o
l
.
6
,
n
o
.
5
,
p
p
.
8
1
8
2
–
8
2
0
1
,
O
c
t
.
2
0
1
9
,
d
o
i
:
1
0
.
1
1
0
9
/
JI
O
T.
2
0
1
9
.
2
9
3
5
1
8
9
.
[
5
]
C
.
P
e
t
t
e
y
,
“
N
a
v
i
g
a
t
i
n
g
t
h
e
s
e
c
u
r
i
t
y
l
a
n
d
s
c
a
p
e
i
n
t
h
e
I
o
T
e
r
a
,
”
G
a
rt
n
e
r
,
2
0
1
6
.
h
t
t
p
s
:
/
/
w
w
w
.
g
a
r
t
n
e
r
.
c
o
m
/
smar
t
e
r
w
i
t
h
g
a
r
t
n
e
r
/
n
a
v
i
g
a
t
i
n
g
-
t
h
e
-
sec
u
r
i
t
y
-
l
a
n
d
s
c
a
p
e
-
in
-
t
h
e
-
i
o
t
-
e
r
a
.
[
6
]
S
.
R
i
z
v
i
,
R
.
O
r
r
,
A
.
C
o
x
,
P
.
A
s
h
o
k
k
u
mar,
a
n
d
M
.
R
.
R
i
z
v
i
,
“
I
d
e
n
t
i
f
y
i
n
g
t
h
e
a
t
t
a
c
k
su
r
f
a
c
e
f
o
r
I
o
T
n
e
t
w
o
r
k
,
”
I
n
t
e
rn
e
t
o
f
T
h
i
n
g
s
,
v
o
l
.
9
,
p
.
1
0
0
1
6
2
,
M
a
r
.
2
0
2
0
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
i
o
t
.
2
0
2
0
.
1
0
0
1
6
2
.
[
7
]
A
.
R
i
a
h
i
,
E.
N
a
t
a
l
i
z
i
o
,
Y
.
C
h
a
l
l
a
l
,
N
.
M
i
t
t
o
n
,
a
n
d
A
.
I
e
r
a
,
“
A
s
y
s
t
e
m
i
c
a
n
d
c
o
g
n
i
t
i
v
e
a
p
p
r
o
a
c
h
f
o
r
I
o
T
s
e
c
u
r
i
t
y
,
”
i
n
2
0
1
4
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
C
o
m
p
u
t
i
n
g
,
N
e
t
w
o
r
k
i
n
g
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
s
(
I
C
N
C
)
,
F
e
b
.
2
0
1
4
,
p
p
.
1
8
3
–
1
8
8
,
d
o
i
:
1
0
.
1
1
0
9
/
I
C
C
N
C
.
2
0
1
4
.
6
7
8
5
3
2
8
.
[
8
]
S
.
H
.
M
e
k
a
l
a
,
Z.
B
a
i
g
,
A
.
A
n
w
a
r
,
a
n
d
S
.
Ze
a
d
a
l
l
y
,
“
C
y
b
e
r
sec
u
r
i
t
y
f
o
r
i
n
d
u
st
r
i
a
l
I
o
T
(
I
I
o
T)
:
t
h
r
e
a
t
s,
c
o
u
n
t
e
r
me
a
su
r
e
s
,
c
h
a
l
l
e
n
g
e
s
a
n
d
f
u
t
u
r
e
d
i
r
e
c
t
i
o
n
s
,
”
C
o
m
p
u
t
e
r
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
2
0
8
,
p
p
.
2
9
4
–
3
2
0
,
A
u
g
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
mc
o
m.
2
0
2
3
.
0
6
.
0
2
0
.
[
9
]
K
.
Ts
i
k
n
a
s
,
D
.
T
a
k
e
t
z
i
s
,
K
.
D
e
m
e
r
t
z
i
s,
a
n
d
C
.
S
k
i
a
n
i
s,
“
C
y
b
e
r
t
h
r
e
a
t
s
t
o
i
n
d
u
s
t
r
i
a
l
I
o
T
:
A
su
r
v
e
y
o
n
a
t
t
a
c
k
s
a
n
d
c
o
u
n
t
e
r
m
e
a
s
u
r
e
s,
”
I
o
T
,
v
o
l
.
2
,
n
o
.
1
,
p
p
.
1
6
3
–
1
8
6
,
M
a
r
.
2
0
2
1
,
d
o
i
:
1
0
.
3
3
9
0
/
i
o
t
2
0
1
0
0
0
9
.
[
1
0
]
R
.
A
n
k
e
l
e
,
S
.
M
a
r
k
s
t
e
i
n
e
r
,
K
.
N
a
h
r
g
a
n
g
,
a
n
d
H
.
V
a
l
l
a
n
t
,
“
R
e
q
u
i
r
e
m
e
n
t
s
a
n
d
r
e
c
o
mm
e
n
d
a
t
i
o
n
s
f
o
r
I
o
T/
I
I
o
T
mo
d
e
l
s
t
o
a
u
t
o
m
a
t
e
sec
u
r
i
t
y
a
ss
u
r
a
n
c
e
t
h
r
o
u
g
h
t
h
r
e
a
t
m
o
d
e
l
l
i
n
g
,
se
c
u
r
i
t
y
a
n
a
l
y
s
i
s
a
n
d
p
e
n
e
t
r
a
t
i
o
n
t
e
st
i
n
g
,
”
i
n
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
1
4
t
h
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
Av
a
i
l
a
b
i
l
i
t
y
,
Re
l
i
a
b
i
l
i
t
y
a
n
d
S
e
c
u
r
i
t
y
,
A
u
g
.
2
0
1
9
,
p
p
.
1
–
8
,
d
o
i
:
1
0
.
1
1
4
5
/
3
3
3
9
2
5
2
.
3
3
4
1
4
8
2
.
[
1
1
]
V
.
B
o
r
g
i
a
n
i
,
P
.
M
o
r
a
t
o
r
i
,
J.
F
.
K
a
z
i
e
n
k
o
,
E.
R
.
R
.
T
u
b
i
n
o
,
a
n
d
S
.
E.
Q
u
i
n
c
o
z
e
s,
“
To
w
a
r
d
a
d
i
st
r
i
b
u
t
e
d
a
p
p
r
o
a
c
h
f
o
r
d
e
t
e
c
t
i
o
n
a
n
d
mi
t
i
g
a
t
i
o
n
o
f
d
e
n
i
a
l
-
of
-
ser
v
i
c
e
a
t
t
a
c
k
s
w
i
t
h
i
n
i
n
d
u
st
r
i
a
l
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s,
”
I
EEE
I
n
t
e
r
n
e
t
o
f
T
h
i
n
g
s
J
o
u
r
n
a
l
,
v
o
l
.
8
,
n
o
.
6
,
p
p
.
4
5
6
9
–
4
5
7
8
,
M
a
r
.
2
0
2
1
,
d
o
i
:
1
0
.
1
1
0
9
/
JI
O
T.
2
0
2
0
.
3
0
2
8
6
5
2
.
[
1
2
]
J.
J
.
K
a
n
g
,
K
.
F
a
h
d
,
S
.
V
e
n
k
a
t
r
a
ma
n
,
R
.
Tr
u
j
i
l
l
o
-
R
a
su
a
,
a
n
d
P
.
H
a
sk
e
l
l
-
D
o
w
l
a
n
d
,
“
H
y
b
r
i
d
r
o
u
t
i
n
g
f
o
r
ma
n
-
in
-
t
h
e
-
mi
d
d
l
e
(
M
I
TM
)
a
t
t
a
c
k
d
e
t
e
c
t
i
o
n
i
n
I
o
T
n
e
t
w
o
r
k
s,
”
i
n
2
0
1
9
2
9
t
h
I
n
t
e
r
n
a
t
i
o
n
a
l
T
e
l
e
c
o
m
m
u
n
i
c
a
t
i
o
n
N
e
t
w
o
rks
a
n
d
A
p
p
l
i
c
a
t
i
o
n
s
C
o
n
f
e
r
e
n
c
e
(
I
T
N
AC
)
,
N
o
v
.
2
0
1
9
,
p
p
.
1
–
6
,
d
o
i
:
1
0
.
1
1
0
9
/
I
TN
A
C
4
6
9
3
5
.
2
0
1
9
.
9
0
7
7
9
7
7
.
[
1
3
]
S
.
P
a
l
l
a
v
i
a
n
d
V
.
A
.
N
a
r
a
y
a
n
a
n
,
“
A
n
o
v
e
r
v
i
e
w
o
f
p
r
a
c
t
i
c
a
l
a
t
t
a
c
k
s
o
n
B
L
E
b
a
s
e
d
I
O
T
d
e
v
i
c
e
s
a
n
d
t
h
e
i
r
se
c
u
r
i
t
y
,
”
i
n
2
0
1
9
5
t
h
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
A
d
v
a
n
c
e
d
C
o
m
p
u
t
i
n
g
&
C
o
m
m
u
n
i
c
a
t
i
o
n
S
y
s
t
e
m
s
(
I
C
A
C
C
S
)
,
M
a
r
.
2
0
1
9
,
p
p
.
6
9
4
–
6
9
8
,
d
o
i
:
1
0
.
1
1
0
9
/
I
C
A
C
C
S
.
2
0
1
9
.
8
7
2
8
4
4
8
.
[
1
4
]
R
.
E.
N
a
v
a
s,
H
.
Le
B
o
u
d
e
r
,
N
.
C
u
p
p
e
n
s,
F
.
C
u
p
p
e
n
s
,
a
n
d
G
.
Z
.
P
a
p
a
d
o
p
o
u
l
o
s,
“
D
e
m
o
:
d
o
n
o
t
t
r
u
s
t
y
o
u
r
n
e
i
g
h
b
o
r
s!
a
s
mal
l
i
o
t
p
l
a
t
f
o
r
m
i
l
l
u
st
r
a
t
i
n
g
a
ma
n
-
in
-
t
h
e
-
mi
d
d
l
e
a
t
t
a
c
k
,
”
i
n
L
e
c
t
u
r
e
N
o
t
e
s
i
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
i
n
c
l
u
d
i
n
g
s
u
b
seri
e
s
L
e
c
t
u
re
N
o
t
e
s
i
n
Art
i
f
i
c
i
a
l
I
n
t
e
l
l
i
g
e
n
c
e
a
n
d
L
e
c
t
u
re
N
o
t
e
s i
n
Bi
o
i
n
f
o
rm
a
t
i
c
s)
,
v
o
l
.
1
1
1
0
4
LN
C
S
,
2
0
1
8
,
p
p
.
1
20
–
1
2
5
.
[
1
5
]
M
.
Jo
v
i
c
,
E
.
Ti
j
a
n
,
S
.
A
k
se
n
t
i
j
e
v
i
c
,
a
n
d
D
.
C
i
s
i
c
,
“
A
n
o
v
e
r
v
i
e
w
o
f
sec
u
r
i
t
y
c
h
a
l
l
e
n
g
e
s
o
f
se
a
p
o
r
t
I
o
T
s
y
st
e
m
s,”
i
n
2
0
1
9
4
2
n
d
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
v
e
n
t
i
o
n
o
n
I
n
f
o
rm
a
t
i
o
n
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
T
e
c
h
n
o
l
o
g
y
,
E
l
e
c
t
r
o
n
i
c
s
a
n
d
M
i
c
r
o
e
l
e
c
t
r
o
n
i
c
s
(
MIPRO
)
,
M
a
y
20
1
9
,
p
p
.
1
3
4
9
–
1
3
5
4
,
d
o
i
:
1
0
.
2
3
9
1
9
/
M
I
P
R
O
.
2
0
1
9
.
8
7
5
7
2
0
6
.
[
1
6
]
H
.
A
.
N
o
ma
n
a
n
d
O
.
M
.
F
.
A
b
u
-
S
h
a
r
k
h
,
“
C
o
d
e
i
n
j
e
c
t
i
o
n
a
t
t
a
c
k
s
i
n
w
i
r
e
l
e
ss
-
b
a
s
e
d
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
(
I
o
T)
:
a
c
o
m
p
r
e
h
e
n
si
v
e
r
e
v
i
e
w
a
n
d
p
r
a
c
t
i
c
a
l
i
m
p
l
e
m
e
n
t
a
t
i
o
n
s
,
”
S
e
n
so
rs
,
v
o
l
.
2
3
,
n
o
.
1
3
,
p
.
6
0
6
7
,
J
u
n
.
2
0
2
3
,
d
o
i
:
1
0
.
3
3
9
0
/
s
2
3
1
3
6
0
6
7
.
[
1
7
]
A
.
B
u
j
a
,
M
.
A
p
o
s
t
o
l
o
v
a
,
a
n
d
A
.
L
u
ma,
“
E
n
h
a
n
c
i
n
g
c
y
b
e
r
s
e
c
u
r
i
t
y
i
n
i
n
d
u
s
t
r
i
a
l
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
s
y
st
e
ms:
a
n
e
x
p
e
r
i
m
e
n
t
a
l
a
ssessm
e
n
t
,
”
i
n
2
0
2
3
1
2
t
h
Me
d
i
t
e
rra
n
e
a
n
C
o
n
f
e
r
e
n
c
e
o
n
Em
b
e
d
d
e
d
C
o
m
p
u
t
i
n
g
(
M
EC
O
)
,
J
u
n
.
2
0
2
3
,
p
p
.
1
–
5
,
d
o
i
:
1
0
.
1
1
0
9
/
M
EC
O
5
8
5
8
4
.
2
0
2
3
.
1
0
1
5
5
1
0
0
.
[
1
8
]
P
.
Zh
u
a
n
d
J.
P
.
Li
y
a
n
a
g
e
,
“
C
y
b
e
r
sec
u
r
i
t
y
o
f
o
f
f
s
h
o
r
e
o
i
l
a
n
d
g
a
s
p
r
o
d
u
c
t
i
o
n
a
sse
t
s
u
n
d
e
r
t
r
e
n
d
i
n
g
a
sse
t
d
i
g
i
t
a
l
i
z
a
t
i
o
n
c
o
n
t
e
x
t
s:
a
sp
e
c
i
f
i
c
r
e
v
i
e
w
o
f
i
ssu
e
s
a
n
d
c
h
a
l
l
e
n
g
e
s
i
n
s
a
f
e
t
y
i
n
st
r
u
me
n
t
e
d
sy
s
t
e
ms,”
Eu
r
o
p
e
a
n
J
o
u
r
n
a
l
f
o
r
S
e
c
u
r
i
t
y
R
e
se
a
rch
,
v
o
l
.
6
,
n
o
.
2
,
p
p
.
1
2
5
–
1
4
9
,
D
e
c
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
0
7
/
s4
1
1
2
5
-
021
-
0
0
0
7
6
-
2
.
[
1
9
]
J.
P
a
r
k
,
Y
.
S
u
h
,
a
n
d
C
.
P
a
r
k
,
“
I
mp
l
e
men
t
a
t
i
o
n
o
f
c
y
b
e
r
s
e
c
u
r
i
t
y
f
o
r
safe
t
y
s
y
st
e
ms
o
f
n
u
c
l
e
a
r
f
a
c
i
l
i
t
i
e
s,
”
Pr
o
g
ress
i
n
N
u
c
l
e
a
r
En
e
r
g
y
,
v
o
l
.
8
8
,
p
p
.
8
8
–
9
4
,
A
p
r
.
2
0
1
6
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
p
n
u
c
e
n
e
.
2
0
1
5
.
1
2
.
0
0
9
.
[
2
0
]
S
.
S
h
a
h
a
n
d
B
.
M
.
M
e
h
t
r
e
,
“
A
n
o
v
e
r
v
i
e
w
o
f
v
u
l
n
e
r
a
b
i
l
i
t
y
a
sse
ssm
e
n
t
a
n
d
p
e
n
e
t
r
a
t
i
o
n
t
e
s
t
i
n
g
t
e
c
h
n
i
q
u
e
s,”
J
o
u
r
n
a
l
o
f
C
o
m
p
u
t
e
r
Vi
ro
l
o
g
y
a
n
d
H
a
c
k
i
n
g
T
e
c
h
n
i
q
u
e
s
,
v
o
l
.
1
1
,
n
o
.
1
,
p
p
.
2
7
–
4
9
,
F
e
b
.
2
0
1
5
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
4
1
6
-
0
1
4
-
0
2
3
1
-
x.
[
2
1
]
H
.
M
.
Z.
A
l
S
h
e
b
l
i
a
n
d
B
.
D
.
B
e
h
e
s
h
t
i
,
“
A
st
u
d
y
o
n
p
e
n
e
t
r
a
t
i
o
n
t
e
st
i
n
g
p
r
o
c
e
ss
a
n
d
t
o
o
l
s,
”
i
n
2
0
1
8
I
EEE
L
o
n
g
I
sl
a
n
d
S
y
st
e
m
s,
Ap
p
l
i
c
a
t
i
o
n
s
a
n
d
T
e
c
h
n
o
l
o
g
y
C
o
n
f
e
re
n
c
e
(
L
I
S
AT)
,
M
a
y
2
0
1
8
,
p
p
.
1
–
7
,
d
o
i
:
1
0
.
1
1
0
9
/
LI
S
A
T.
2
0
1
8
.
8
3
7
8
0
3
5
.
[
2
2
]
S
.
K
i
m
a
n
d
H
.
J.
L
e
e
,
“
C
o
st
-
b
e
n
e
f
i
t
a
n
a
l
y
s
i
s
o
f
se
c
u
r
i
t
y
i
n
v
e
st
m
e
n
t
s:
M
e
t
h
o
d
o
l
o
g
y
a
n
d
c
a
se
st
u
d
y
,
”
i
n
L
e
c
t
u
re
N
o
t
e
s
i
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
3
4
8
2
,
n
o
.
I
I
I
,
2
0
0
5
,
p
p
.
1
2
3
9
–
1
2
4
8
.
[
2
3
]
“
C
y
b
e
r
sec
u
r
i
t
y
f
r
a
mew
o
r
k
,
”
N
I
S
T
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
n
i
st
.
g
o
v
/
c
y
b
e
r
f
r
a
m
e
w
o
r
k
.
[
2
4
]
“
A
t
t
a
c
k
s
u
r
f
a
c
e
a
n
a
l
y
si
s
c
h
e
a
t
s
h
e
e
t
,
”
O
WA
S
P
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
c
h
e
a
t
s
h
e
e
t
s
e
r
i
e
s
.
o
w
a
sp
.
o
r
g
/
c
h
e
a
t
s
h
e
e
t
s/
A
t
t
a
c
k
_
S
u
r
f
a
c
e
_
A
n
a
l
y
si
s
_
C
h
e
a
t
_
S
h
e
e
t
.
h
t
m
l
.
[
2
5
]
J.
N
o
r
d
i
n
e
,
“
O
S
I
N
T
f
r
a
mew
o
r
k
,
”
o
si
n
t
f
r
a
m
e
w
o
r
k
.
c
o
m
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
o
s
i
n
t
f
r
a
m
e
w
o
r
k
.
c
o
m
/
.
[
2
6
]
“
C
y
b
e
r
se
c
u
r
i
t
y
f
r
a
mew
o
r
k
,
”
C
y
b
e
rse
c
u
r
i
t
y
a
n
d
I
n
f
r
a
st
r
u
c
t
u
re
S
e
c
u
ri
t
y
A
g
e
n
c
y
(
C
I
S
A)
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
c
i
sa.
g
o
v
/
u
sce
r
t
/
r
e
s
o
u
r
c
e
s
/
c
y
b
e
r
sec
u
r
i
t
y
-
f
r
a
m
e
w
o
r
k
.
[
2
7
]
“
U
s
i
n
g
t
h
e
c
y
b
e
r
se
c
u
r
i
t
y
f
r
a
mew
o
r
k
,
”
C
y
b
e
r
sec
u
r
i
t
y
a
n
d
I
n
f
ra
st
ru
c
t
u
re
S
e
c
u
ri
t
y
A
g
e
n
c
y
(
C
I
S
A)
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
c
i
sa.
g
o
v
/
u
si
ng
-
c
y
b
e
r
s
e
c
u
r
i
t
y
-
f
r
a
m
e
w
o
r
k
.
[
2
8
]
“
F
I
R
S
T
st
a
n
d
a
r
d
s,
”
F
o
ru
m
o
f
I
n
c
i
d
e
n
t
Re
s
p
o
n
s
e
a
n
d
S
e
c
u
r
i
t
y
T
e
a
m
s
(
FI
R
S
T
)
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
f
i
r
st
.
o
r
g
/
s
t
a
n
d
a
r
d
s
/
.
[
2
9
]
“
I
n
d
u
s
t
r
i
a
l
c
o
m
mu
n
i
c
a
t
i
o
n
n
e
t
w
o
r
k
s
-
n
e
t
w
o
r
k
a
n
d
s
y
st
e
m
se
c
u
r
i
t
y
-
p
a
r
t
1
-
1
:
t
e
r
mi
n
o
l
o
g
y
,
c
o
n
c
e
p
t
s
a
n
d
mo
d
e
l
s,”
I
n
t
e
r
n
a
t
i
o
n
a
l
El
e
c
t
r
o
t
e
c
h
n
i
c
a
l
C
o
m
m
i
ss
i
o
n
(
I
E
C
)
,
2
0
0
9
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
e
b
s
t
o
r
e
.
i
e
c
.
c
h
/
p
u
b
l
i
c
a
t
i
o
n
/
7
0
2
9
.
[
3
0
]
“
I
n
d
u
s
t
r
i
a
l
c
o
mm
u
n
i
c
a
t
i
o
n
n
e
t
w
o
r
k
s
-
n
e
t
w
o
r
k
a
n
d
s
y
s
t
e
m
se
c
u
r
i
t
y
-
p
a
r
t
2
-
1
:
e
st
a
b
l
i
s
h
i
n
g
a
n
i
n
d
u
s
t
r
i
a
l
a
u
t
o
m
a
t
i
o
n
a
n
d
c
o
n
t
r
o
l
sy
st
e
m
se
c
u
r
i
t
y
p
r
o
g
r
a
m,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
El
e
c
t
ro
t
e
c
h
n
i
c
a
l
C
o
m
m
i
ssi
o
n
(
I
EC
)
,
2
0
1
8
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
si
n
g
a
p
o
r
e
st
a
n
d
a
r
d
ses
h
o
p
.
sg
/
P
r
o
d
u
c
t
/
S
S
P
d
t
D
e
t
a
i
l
/
c
8
c
a
a
4
d
0
-
4
a
f
1
-
4
f
d
6
-
a
5
5
2
-
d
1
4
f
f
3
c
a
5
9
a
6
.
[
3
1
]
“
S
e
c
u
r
i
t
y
f
o
r
i
n
d
u
s
t
r
i
a
l
a
u
t
o
m
a
t
i
o
n
a
n
d
c
o
n
t
r
o
l
s
y
st
e
ms
-
p
a
r
t
2
-
4
:
sec
u
r
i
t
y
p
r
o
g
r
a
m
r
e
q
u
i
r
e
me
n
t
s
f
o
r
I
A
C
S
se
r
v
i
c
e
p
r
o
v
i
d
e
r
s,”
I
n
t
e
r
n
a
t
i
o
n
a
l
El
e
c
t
ro
t
e
c
h
n
i
c
a
l
C
o
m
m
i
ssi
o
n
(
I
E
C
)
,
2
0
1
7
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s:
/
/
w
e
b
st
o
r
e
.
i
e
c
.
c
h
/
p
u
b
l
i
c
a
t
i
o
n
/
6
1
3
3
5
.
[
3
2
]
“
U
n
d
e
r
st
a
n
d
i
n
g
I
EC
6
2
4
4
3
,
”
I
n
t
e
rn
a
t
i
o
n
a
l
El
e
c
t
ro
t
e
c
h
n
i
c
a
l
C
o
m
m
i
ssi
o
n
(
I
EC
)
,
2
0
2
1
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
i
e
c
.
c
h
/
b
l
o
g
/
u
n
d
e
r
st
a
n
d
i
n
g
-
i
e
c
-
6
2
4
4
3
.
[
3
3
]
“
I
S
O
/
I
EC
2
7
0
0
5
:
2
0
1
8
,
”
w
w
w
.
i
s
o
2
7
0
0
1
sec
u
r
i
t
y
.
c
o
m
,
2
0
1
8
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
i
s
o
2
7
0
0
1
s
e
c
u
r
i
t
y
.
c
o
m/
h
t
ml
/
2
7
0
0
5
.
h
t
m
l
.
[
3
4
]
“
I
S
O
/
I
EC
2
7
0
0
1
i
n
f
o
r
mat
i
o
n
sec
u
r
i
t
y
ma
n
a
g
e
m
e
n
t
s
y
s
t
e
ms,
”
I
S
O
,
2
0
2
2
.
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s
:
/
/
w
w
w
.
i
s
o
.
o
r
g
/
st
a
n
d
a
r
d
/
2
7
0
0
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.