• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Management of Schemes and Threat Prevention in ICS Partner Companies Security

    2021-12-15 07:09:24SangdoLeeandJunHoHuh
    Computers Materials&Continua 2021年12期

    Sangdo Lee and Jun-Ho Huh

    1Cyber Security Center,Korea Midland Power Co.,Ltd.,Boryeong,Korea

    2Department of Data Informatics,(National)Korea Maritime and Ocean University,Busan,Korea

    Abstract:An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore, enterprise security management systems have been developed to focus on companies’personnel.Nonetheless, several hacking incidents,involving major companies and public/financial institutions, were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work.Specifically, institutions that operate industrial control systems (ICSs) associated with critical national infrastructures, such as traffic or energy, have contracted several cooperative firms.Nonetheless, ICT’s importance is gradually increasing,due to outsourcing,and is the most vulnerable factor in security.This paper proposes a virtualized security management scheme for the resident cooperative firms in the industrial control infrastructure.Since such companies often cannot afford adequate investment in security,the scheme is to let an ICS company provide the virtualized system.One of its merits is the convenience of controlling a VDI server at the center.The cooperative firms were classified,based on their respective security levels,and statistics were collected throughout a four-year period for the results.This paper analyzes the policies and virtualization systems that have been applied to the security of the partner companies, which engaged in ICS security.A suitable model for ICS security was then proposed by analyzing their effects on the system efficiencies, based on the comparisons of the security inspection results obtained before and after virtualization.The proposed system is expected to contribute to industrial safety.

    Keywords: Nuclear power plant; nuclear power plant security; virtual machine; SCADA; ICS; ISO27001;VDI based security; software engineering

    1 Introduction

    We are now witnessing the emergence of the fourth Industrial Revolution, by building on the third one [1], the digital revolution that has been taking place since the middle of the last century.This revolution is characterized by a fusion of technologies, which blur the lines between the physical, digital, and biological spheres [2].

    An analysis of the causes of the security incidents that involve a control system, showed that most had been caused by employees of partner companies who provide maintenance services for the relevant facilities, and not by those operating the system itself.One of the reasons is that the institutions or organizations managing the industrial control systems (ICSs) of major national infrastructures associated with traffic, water resources, or energy systems, have been outsourcing such tasks to partner companies, whose roles are becoming increasingly important.Even though the importance of security has increased, following the expansion of those institutions’workload,their security and management systems are still insufficient, due to a lack of budget and adequate security awareness, leading to security incidents caused by hackers.This study was presented as part of the continuous research on security management schemes for such problems [3–7].

    It was reported in the 2017 ICS-CERT that the number of cases involving infringement on national infrastructure ICSs is rapidly increasing, due to active cyber-attacks that could cause not only simple financial loss, but also devastating social damage or chaos, often caused by their malfunction or unexpected interruption.Some of the typical examples include the blackout incident in Ukraine (Dec.2015) [8–10], the power facility shutdown, caused by the USB-embedded malignant code at a German nuclear power plant (Bavarian State, Apr.2016), and the cyber-threat against Korea Hydro and Nuclear Power (Dec.2014) [11–15].

    Radiation leaks or interruption of power supply could occur with control malfunctions or sudden disruption of a control system of a nuclear plant, caused by a cyber-attack.In such cases,the nation’s sovereign rating could sharply be dropped, leading to massive socio-economic loss and confusion.The existing cyber-security systems have been focusing on shutting off external attack routes.However, the current measures are more concerned with sabotage, deliberate attack, or information leaks by insiders or related workers.Moreover, as the number of cases involving accidents in critical infrastructure, due to such personnel, is steadily increasing, so the establishment of an efficient response system between cooperative firms is urgently required.

    In this paper, a security index was developed in terms of administrative and physical aspects for the security management of the partner companies to induce voluntary efforts and investment in an attempt to strengthen their competency in information protection in the special area of“Industrial Control.”The partner companies were classified into a “Class”,which is based on their respective competency levels and is subject to periodic security inspections.Nonetheless, as the vulnerabilities of the resident partner companies persist every year, we attempted to propose an innovative improvement plan that deals with cyber-threats by constructing a virtual environment as a technological measure.

    2 Related Work

    2.1 International Information Security Management System(ISO 27001)

    Both domestic and foreign information protection/management systems were studied to check for most of the control regulations for the management of partner companies.Their contents were investigated once they had been identified.For example, information security certification ISO27001 evaluates the security regulations for certification by each relevant area, whereas ISO/IEC27001 originates from Britain’s BS7799.As a typical standard for implementing an Information Security Management System (ISMS), this is being widely adopted by global companies as a procedure for assessing their adequacy/capability in security policy and its execution, as well as the ability to deal with security threats.This certification standard also assists an organization or a firm in constructing a framework for adopting and implementing a Plan–Do–Check–Action(PDCA) model when establishing and executing an ISMS to perform security monitoring, review,maintenance, and improvement measures [16,17].

    Information protection management is divided into 14 areas, with 114 subcategories under each area, in compliance with the information security policy.This management system is one that guarantees the confidentiality, integrity, and availability of information and contributes to the improvement, monitoring, examination, and maintenance of the entire management system(Tab.1).

    Table 1:ISO27001 security categories

    2.2 Korea’s Information Security Management System(ISMS)

    The ISMS certification system of the Republic of Korea (ROK) is being managed by the Korea Internet and Security Agency (KISA), whose operations include a series of information security protection activities, based on the establishment of information protection policies and their management protection ranges, risk management, implementation, and follow-up controls(5-steps), all of which are aimed at maintaining the confidentiality, integrity, and availability of the information assets that need to be preserved.All the information protection and management systems are subject to such processes and will be certified by the relevant certificate authorities or review services [18].The ISMS consists of 12 certification criteria for the 5-step information protection and the other 92 criteria for 13 areas, or a total of 104 items, on which a policy should be established and operated.In the process, all the activities should be documented, and information protection measures should be implemented by conducting risk analysis.Recently,ISMS certification has changed to ISMS-P, after additionally including a personal information certification.

    Following the introduction of such a certification system, the institutions or organizations that have been successfully certified, are using their security capability as an important tool for marketing by giving an impression to consumers that they are a safe company.Nevertheless,the question about the insufficiency of quality, concerning the effectiveness of the certification,remains [18–20].

    2.3 Current State of Industrial Technology Leaks

    A leak of industrial technologies results in enormous economic losses or paralysis of business.A company’s competitiveness or the national image will be seriously damaged if a technology that is developed through years of hard work has been leaked to a competitor, then reported by the media.A negative influence on various areas, including sales volume, stock price, etc., can be expected as well [21].

    The subject of technology leaks is usually either an insider or an outsider, and it has been found that the former has often attempted to leak the critical information or electronic documents stored in a personal computer or a work system through web, electronic mails, or Internet messengers as an attachment or, in the case of offline documents, leak copies through fax or other available means.On the other hand, outsiders leak electronic information by hacking the system through the network or breaking into the company illegally to leak the information system assets or the offline documents that are generated by printers or copiers.There have been many cases of large-scale electronic information leaks attempted by outsiders who had stolen critical assets or offline documents.The media outlets that have been used to leak the industrial information,can be largely divided into online and offline media.Moreover, the former employs a variety of methods following the rapid development of IT technology, including transmission through electronic mail, and illegal sharing, through peer to peer (P2P) sites, such as Webhard or Internet messengers.Most of the offline information leaks have been attempted by stealing a laptop or illegally carrying out a portable storage when surveillance was weak.The number of attempts made when the management of offline documents or copies was not properly performed, or access privileges were loosely provided, is increasing [21–25].

    3 Establishment of Security Management System of Partner Companies

    3.1 Increasing Security of Industrial Control System(ICS)

    In this paper, businesses that are equipped with a SCADA system were selected as research objects.Regarded as a system of high importance in the industrial control area, SCADA or ICS facilities are a representative business in various industries, including construction, power generation, and environmental companies.Moreover, such a facility contributes to all kinds of infrastructure, such as energy production or other types of businesses, teams up with several partners in order to mainly perform operations and management tasks, and consigns additional tasks, such as maintenance, repairmen work, etc., to special partner companies when necessary.Many companies have already outsourced/transferred these tasks to them.

    Such movement is expected to increase further in the future.Therefore, managing partner companies will become one of the most important indices that require the establishment of a special security management system to handle security risk efficiently.

    In the ICS industry, SCADA facilities have been facing challenges from security threats, such as the power generation interruption incident, due to Stuxnet (Iranian nuclear facility, 2004),or the cyber-attack against a Korean nuclear power plant (2014), and they are endeavoring to establish higher security measures.It will be appropriate to refer to such security models when establishing a security policy for the other ICS areas [26–31].

    The partner companies were classified, based on their evaluated management and technological levels.An example of a security system construction, based on the evaluation result, was then used to construct a virtual system that prevented information leaks through hacking attempts or internal conspiracy.

    3.2 Establishment of Partner Company Security Management System Model

    The security management system of a partner company should have expertise and objective reliability.Since those become important indices when establishing a security control process or conducting a security inspection.In this paper, the security standards of a design model were established to present a security management system model for a partner company, through an actual application case example to improve the effectiveness of its existing system.

    Roughly 1,000 companies, within a certain contract period (2014~2018), were selected among the ICS industry members to come up with a partner company security management model.The number of employees of a partner company and PCs were collected, directly based on their.They were then sorted primarily, according to each company’s nature, such as service/construction,manufacturing/wholesale/retail, equipment repairs, or auxiliary equipment (Tab.2).They were also analyzed in terms of their respective task performance environment, in addition to the possibility and impact of information leaks, based on the value of the information provided to them (Tab.3).

    Table 2:Classification of partner companies

    Table 3:Risk analysis criteria

    The impact, in the case of an information leak, depends on the significance of the information provided to the company.As such, not only the contract type, but also the risk of an information leak was considered when grading the partners (Tab.3).

    The analysis criteria for the partner companies’ operation environments are presented in Tab.4, with their specific conditions.They are as follows:whether the partner company is permanently staying in the company with whom they contracted; operating while accessing the internal network; sharing and handling important information; and accessing with a separate Internet network.The partner companies were graded after analyzing their internal/external environments.

    Table 4:Criteria for analyzing partner companies’environments

    The level of documents handled by the company should be considered when establishing the criteria for classifying partners.First, the security levels should be set for each drawing,document to apply higher security for those requiring confidentiality or allow sharing of lowerlevel documents to benefit both parties.Tab.5 shows the reference standard for determining which document or drawing corresponds to a particular grade/level.A-level includes the key company information that requires special attention/management since the company’s fate depends on it,whereas D-level is the lowest security grade and can be disclosed to the public or published,without being harmful to the company.

    Table 5:Security levels

    Tab.6 presents the terms or conditions when rating the partner companies.If the technical/technological information is rated as either A or B, the partner company will be rated as first-class, regardless of its current status involving the use of internal/external Internet networks,or whether or not it resides within the company.In other words, a company with the highest technical/technological information level should be treated as a priority company.Companies with C-level technical/technological rating can be divided into three categories.Those that correspond to all of these three conditions are rated as a first-level company, whereas those without access to the external (internal) Internet network, are rated as a second- or third-level company.Fourth-level companies do not correspond to all of those conditions.The information that they are handling can be disclosed to the public, without causing any damage to the company.

    Table 6:Criteria for rating partner companies

    In addition, the partners were divided into either a high-standard or low-standard company,depending on their status in each environment.This enables improving business efficiency and preventing resistance from the partners.

    A high-standard company refers to a first or a second-class partner company that maintains the standards in Tab.6, whereas a low-standard company pertains to a partner company, which keeps the standards for applying for the third- or fourth-class companies.In other words, the former is one that handles technological information, such as drawings or blueprints, at the same level as an ICS company (high security), and the latter is one that supports simple tasks,like supplying equipment and conducting repairs, as well as cleaning, driving, or deliveries.The categorization from classes 1 to 4 depends on the four conditions, including residency, internal network access, Internet access, and acquisition of security certification.

    The partner companies were guided for their voluntarily improvement of security levels, by adding a new item, such as the acquisition of security certification for the assessment.Such an effort includes voluntary preparation for acquiring the ISO27001 information security certification.Those that are required to have a C-level security class or above will be exempted from the information security assessment as one of the benefits (Tab.6).

    Tab.7 describes the partner companies for each class in detail, based on the rating results in Tab.6.For example, first-class companies decided to depend on their state of residency and network access, as well as the importance of the information/documents they access.On the other hand, third- and fourth-class companies, base their access to the documents, even though their geographical locations and allowable network access are the same.

    Table 7:Categorization of partner companies by class

    The test data was collected from 1,042 construction or service companies out of 3,100 partner companies over the period of January 2014–May 2018.As a result, 73 companies were classified as a first-class partner company, whereas 38 (303) (628) companies were categorized as a secondclass, a third-class, and a fourth-class partner company (Tab.8).Based on the standards in Tab.7,1st class is the highest-ranking security class, and 73 companies belong to this class.Fourth-class companies with the lowest security level, accounted for about 60% of all partner companies.

    Table 8:Partner company classification by class

    Each company’s security level was reviewed using three areas, including administrative, physical, and technological protection measures, with a maximum of 40, 10, or 50 points.A point was then given to each evaluation index, for instance, Information Security Policy had four criteria per item, and it must be applied for both first- and second-class partner companies.There are 12 evaluation indices along with 24 evaluation items and 96 evaluation criteria.

    According to ISO27001 and K-ISMS, the evaluation items were categorized in terms of administrative, physical, and technological aspects, and classified into four classes, based on the possibility of information leaks and expected damages.After analyzing previous security incidents,the weights of 50%, 40%, and 10% were applied to technological, administrative, and physical items, respectively, according to ISO27001 (Tab.9).

    Policy, organization, leadership, security activities, and manpower/asset/essential information management are included in the administrative protection measures (Tab.10).Although ISO 27001 includes budgets, the partner companies may have a lot of pressure and negative perception.

    Physical protection measures are divided into the control of assets, which are being carried in or out, and office security.The latter includes protection measures for office equipment, such as document shredders, document cabinets, access control equipment, and PCs.They are the lowest evaluation index (Tab.11).

    Technological protection measures are mainly associated with the security of information communications, including network separation, data protection measures, and system development security (Tab.12).It is the highest index among the three indices:Administrative, Physical,and Technological Protection Measures.Most of the major incidents occur because of poor technological protection measures.Therefore, they must be regarded as highly important factors.The infection as a malicious code is the main cause of hacking incidents, so inspection and precautionary measures must be taken seriously.These all must be observed in the evaluation process.

    The security level of each partner can be determined by the classification procedure, wherein each company is graded by the index of administrative, physical, or technological protection measures, which are identified as Excellent, Satisfactory, Average, Unsatisfactory, and Vulnerable(Fig.1).The 1stClass companies will be inspected regularly to maintain their current excellent security level, whereas those that fall short of the standard will be penalized.

    After classifying the partners, based on the reference standard, security inspection should be performed next.Fig.2 shows the sample inspection procedure flowchart of the company’s supervising department with a 2ndClass partner or above; a self-inspection is performed by the first partner, and the documented result is then reviewed by the company.In this case, the information security department’s role is to support inspection or to provide technical/technological support.

    The company’s security department conducts inspections by dividing them into spot or regular inspections.For new contracts, an initial inspection will be conducted.For the existing ones,regular inspections will be implemented.In such cases, the partner submits the security report after conducting and diagnosing its security activities.The company’s security department reviews the written report and carries out an on-site inspection when such is deemed insufficient (Fig.3).

    If the partner has acquired information security certification (e.g., ISO27001, CoBit, etc.) or complied with the required security process, the on-site inspection can be replaced with other means.Fig.3 is a detailed security inspection flowchart, starting from the security process as the evaluation result, wherein the partner’s security level is determined by the on-site evaluation result.

    Table 9:Maximum scores, class coverages, and assigned scores

    A total of 1,042 partner companies, which were engaged in industrial control, were classified for empirical analysis.Among them, Company S, which belongs to the 111 first- or second-class companies, was randomly selected along with Company L and Company K, from 303 thirdclass companies and 628 fourth-class companies, respectively.A security inspection was carried out twice during the period from January to December 2015, by their document management condition and/or on-site inspection to evaluate their performances.Company S was a control facility maintenance and was allowed to access C-class documents, whereas Companies L and K were in charge of water-quality management and construction work, respectively.Since Company K belonged to the fourth class, it was exempted from both technological and physical inspections.All of these three companies had been selected from the same branch to give them a fair chance for evaluation.

    Table 10:Evaluation index:administrative protection measures

    Table 11:Evaluation index:physical protection measures

    Table 11:Continued

    Table 12:Evaluation index:technological protection measures

    Table 12:Continued

    First, all the partner companies were graded by their evaluation results, such as administrative,physical, and technological, as well as their initial scores.Next, the level of security management of each company was determined by its level of technological information and class.

    Figure 1:Evaluation standard according to the partners’classes

    In Tab.13, a single typical company was selected separately from groups 2, 3, and 4.For the three evaluation indices, a 50% weight was given to the technological items, whereas 40% and 10%weights were given to administrative and physical indices, respectively.Meanwhile, “Performance Rate by Area” refers to a percentage rate against an evaluation score, whereas “Target Scores”means the individual target values set for administrative, physical, and technological scores.A percent rate of 90% means that the relevant score is an initial target score, which shows the improved security condition.Thus, in Fig.1, the final scores were put into items, which divided by individual corresponding scores to define each security level as “Satisfactory,” “Average,” or“Unsatisfactory.” Although all of the target scores for the administrative, physical, and technological indices were supposed to be a perfect score, achieving 90%, which can be regarded as an improved security condition, was set as the primary aim (Tab.13).

    Figure 2:Evaluation standard according to the partners’classes

    Fig.4 depicts the scores in Tab.13 with a graph.The outer red line indicates the target scores,whereas the blue line represents the current scores.

    As a result of analyzing the scores of these three randomly selected partner companies, it was possible to intuitively grasp that both technological and physical security managements for them were inadequate.As such, a security management system was applied to them for the first time.

    The partner companies that have completed the evaluation, have to manage their respective scores, through feedback and reflection, in order to maintain their evaluation classes.There are two different types of management methods for the companies, including an excellent evaluation or vice versa.For the former, the number of inspections will be reduced from 2 to 1, whereas the latter (i.e., 3rdand 4thclasses) will be subject to occasional inspections or document-based inspections.Moreover, some penalties will be imposed on the latter, including fines, to let them realize that security can be a hefty company expense.These companies will then have no choice,but to find a way to improve their security level by making more investments or reinforcing their manpower.

    Figure 3:Actual inspection procedure for the partner company’s information security

    Fig.5 presents the procedure for imposing penalties on the partner company with an unsatisfactory evaluation result.

    The evaluation method was standardized by reflecting the international security standards.The details of security requirements and inspection methods were specified by class, in order to create an effective security inspection procedure.

    Table 13:Security evaluation result of a 3rd-class partner company

    Figure 4:Distribution graph based on the scores

    Figure 5:Procedure for imposing penalties on the partner company with an unsatisfactory evaluation result

    As a result of initially applying the security management model, it was difficult to manage each company’s security management conditions, prior to applying the model, as there were no administrative standards.With the proposed model, every new partner company was classified by the standard after receiving security inspections, based on the evaluation indices, to determine their current security conditions and to perform comprehensive management.Second, about 1,000 partner companies were graded on their security levels, based on the evaluation and inspection results.As a result, (73) (38) (303) (628) companies were rated (A) (B) (C) (D), respectively, with a detailed inspection method applied to each level.A-Level security measures were taken for companies rated as “risky.” In the end, the overall security level was improved.

    For example, third-class companies, which fall short of this year’s standard, were guided in improving their respective status, by strengthening the penalties or increasing the number of inspections.In additional, by presenting them with a security guideline, the risk in business activities was minimized.

    As the ICS system is essential, the ICS operating company should invest in constructing a development or a security system, such as the VDI system, by taking the initiative.The ICS operating company should give the terms in the contract that require their partner companies to install a security system properly and by making an agreement for them to be educated about the security system, through consultation and training.Moreover, the ICS operating company needs to organize a periodic meeting for exchanging opinions in order to resolve the operational difficulties in system operation.

    3.3 Security Inspection Result

    Tab.14 presents the results obtained from the on-site inspections that are held twice a year,during the period from 2015 to 2018, with the physical location of the partner company subject to the inspections from the selected four Korean branch offices.The branch had a total of 60 partner companies, where 1,800 employees were working.

    Table 14:Results of the security inspections conducted from 2015 to 2018

    After applying the virtual system, the total number of security issues decreased by 21%, from 146, to 90 in 2015 and 2016, respectively.In fact, the actual application of the system, which was started in 2017 as system construction, was completed in September 2016, and more time was required for the training.The number of security violations dropped from 146 to 12, showing a 50% decrease after the system had been stabilized.Such a decrease was achieved by reinstalling all the security programs and making it impossible to connect to the network without systematizing the network access controls, in addition to checking whether the vaccines had been installed along with security patches or if unauthorized programs or USB devices were used.

    Specifically, Active Xs were the main cause of the malicious code, which were able to penetrate the security system.After applying the virtual system, they did not pose any problems.Nevertheless, such a virtual system’s uselessness increased, and one of the typical examples was the security violation involving a multi-OS operation.Cases of which have been increasing since 2016.It seems to have been an attempt to bypass the virtual system by installing another OS,which was a weakness of the VDI-based system.

    The security inspection result is shown in Fig.6, with the largest number of violations (62)associated with the use of a wireless LAN in 2015.This was the result of each partner company using its own separate Internet network for its business.However, the effect of the VDI system was immediate, as the number of unauthorized owned documents decreased dramatically.As a whole, the number of security violations dropped, from 146 in 2015, to 21 in 2017, when the system had been stabilized.Then, the major violations involved cases of not setting screen savers or not encrypting the document files properly.

    Figure 6:Graph of the security inspection result

    The next thing to consider was how to transmit data/materials between networks after physically separating them into a business network and an Internet network.This problem was resolved by constructing a data transmission system that enables data exchange between the VDI network and work PCs.An authorization procedure, that allows the transmission of important drawings or documents after being approved by the supervisor, was prepared, along with the system first filtering a malicious code through security software.Since the ICS industry is based on various types of control systems, it is very sensitive to infections or leaks through the Internet.Thus, investment in VDI systems may produce a positive, immediate effect on their Return of Investment.

    The VDI system plays the role of protecting partner companies from external cyber-attacks and keeping the internal technical/technological documents safe from malicious code.There is a system that distributes these documents between the ICS operating company and their partner companies, in order to conduct business smoothly.Between them, general documents are delivered offline, whereas technical documents, such as blueprints, are distributed through a data transmission system or a mail system, which is connected to the partner companies.One of the important aspects in such cases is guaranteeing the process of a prior approval and allowing it to be tracked afterward, when necessary.

    4 Construction of a Partner Company Virtual System

    4.1 Status of System and Network

    Similar security incidents continuously occurred in the following year.Even though the partner companies had been classified by developing an evaluation index and performing security inspections, the number of malicious code-based infections through the Internet never decreased,despite the constant education or guidance.At the same time, new contracts were awarded to other companies, and regulation violations by their employees did not stop, hence the need for a more systematic approach.A fundamental system, that could minimize such problems, was designed by constructing a virtualization system to minimize Internet access and strengthen data access control.

    Preliminary work has to be performed to apply the virtual system to all the partner companies that stay within the company after evaluation and inspection.In other words, it has to be proven that there are no malicious codes within the PCs, which means that their integrity has to be guaranteed at that point.So, the origins of any future virus infections can be traced, thereby ensuring the reliability of the system.

    Therefore, all the information systems, including PCs, must be checked, along with the other equipment, for individual integrity.Such tested PCs are called Clean-Zone PCs.

    After evaluating and inspecting partner companies, there is an indispensable preliminary process to be performed when applying the virtualization system for all the resident partners in the company:“integrity check.” It has to be proven that there are no malicious codes (e.g.,worms, viruses, etc.) in the internal PCs as of that moment.Besides, the integrity level should be maintained at a 100% level, so the origins of future infections can be tracked while securing reliability.In this case, all the information systems, including the partners’PCs, are checked with a vaccine program for their integrity, as well as all other equipment/devices, which enter the control system, even if they are to be used for test bed experiments or inspections.Those cleared PCs are called Clean-Zone PCs, which are independent PCs.They are also subject to a vaccine test, before accessing the control network, and are allowed to be brought in after they have been cleared of any abnormalities.

    In designing the partner security management system model, controlling outside access was focused on by the company, and requested that users pass the approval process at the point of Internet access.Moreover, a separate exclusive network for the partner company was constructed in a way that it has the same security level as the company (Fig.7).

    Figure 7:Security management system diagram of partner companies

    This is the network configuration, wherein all the partners that are stationed at individual branches, are connected.

    Before arranging a partner company system, the partner companies operating in each region were using their own private Internet.As this was not being monitored, the number of security accidents was never reduced, and problems, such as document leaks, had become unmanageable.Thus, it became necessary to establish a centralized security system network.In an attempt to reduce the number of malicious code-based accidents recurring after the centralization, a plan of introducing virtualization was designed.

    The networks that were connected from each area, only allowed outside access after passing through the central security system, where all the data that is exchanged by the partners will be checked by the spam mail server and advanced persistent threat (APT) detection system.Meanwhile, each user is able to protect himself/herself from malicious code or information leaks,by establishing access through an Internet browser with his/her own designated account.For network security, the security system for network control consists of a firewall, an intrusion prevention system (IPS), and network access control (NAC) security equipment.A new mail server is provided to the partners.It is possible to use their own mail server, but those, which are stationed within the company, must be provided by the company only, as it is essential for the important materials leaving the company to be monitored and approved.Such a system is quite important during designing.It also is necessary for inspecting the high-level security documents to correspond for A, B, or C level.

    Moreover, a data transfer system can control malicious codes in a VDI environment, and the data/materials downloaded from the Internet will be tested for viruses or released outside, through the Internet, only after obtaining approval from the supervising department [32–40].

    The partner companies configure their security equipment into networks, PCs, and mail server sections.The work PCs aim to block the data/material being carried out without authorization by installing media controls, an antivirus, and output security software, along with an unauthorized data transfer-blocking system.The security level can be enhanced by installing security products identical to those used by the mother company, if the budget allows.Network security systems,such as firewalls, anti-APTs, and NACs are installed first, followed by spam mail blocking and DLP for mail server security (Tab.15).

    Table 15:Security system of partner companies

    4.2 VDI System Configuration

    Tab.16 compares the merits and demerits of the virtualization method of a VDI system.Due to the decisive problem of the PC-based network separation being vulnerable to malicious code and difficulty of being controlled by the partner company, VDI-based network separation was applied.Since the PC-based method shares a single hard disk, it is not suitable for industrial control systems, due to its vulnerabilities to malicious code, such as advanced persistent threat(APT).Meanwhile, the VDI-based method has its own vulnerabilities to some of the bypassing malicious code.However, it is known to be safer than the PC-based method.

    Table 16:Comparison between VDI-based and PC-based network separations

    A VMware product was used in this study as a server virtualization tool for the configuration of the VDI system.The number of viewers and performance of the server affect the system load, as virtualization that is performed on the server side for all the clients.The VDI server was designed to include all the partner company’s viewers.The server, VDI, network, and mail server were all configured, based on 900 simultaneous user connections.Tab.17 shows the server specifications for constructing a test environment.

    The network configuration is located within the DMZ (De-Militarized Zone) section so that external hacking attempts are dealt with by the firewall, the IPS, spam filter, and the anti-APT that are installed in the upper network.As a secondary future task, network forensics will be introduced to trace the path of malicious code generation and use it as material in the inspection process when data has been leaked.There are two areas in a user PC, including the local areas,where paperwork can be performed, and the VDI area for Internet.People can use e-mail or perform a web search through the Internet by accessing VDI and logging in with the assigned account.

    Table 17:Server specifications for constructing a test environment

    The existing partner companies are vulnerable to hacking attempts, as they often use external Internet.For most cases, their systems are not connected to a safe security system, which is linked to the head office or is installed with a limited security program.Specifically, several small companies are operating their PCs without any security software, due to lack of security awareness or budget.It is only a matter of time before important company files leak outside if they have been stored in them.The partner company, that is working in the ICS space, must at least have a security system the same as the ICS company’s system, in order to share important documents together.In that sense, the VDI system can be regarded as a system that minimizes the possibility of the partner company leaking the information, which are shared within the same space.

    5 Conclusions

    In this paper, a security management system for the partner companies, which are working together at industrial sites operating an ICS facility, was designed to propose an appropriate model, along with an adequate technical/technological plan.The model worked flexibly during its full implementation.The necessity of strengthening the security management capability is often emphasized when developing an industrial control system in addition to constructing a technologically error-free security system.Thus, this study presented a method of classifying the partner companies that often remain in a blind spot of security management, based on the major security elements, along with the management system appropriate for individual security levels.Moreover, the virtualization solution, VDI, was applied to allow the partners to securely use the Internet, by preventing information leaks or protecting their system from any infections or attacks originating from the hackers by malicious code.The results are shown as follows:

    First, the partner companies should be graded by classifying the value of individual information and must be managed by the respective classes.In other words, they need to be classified by considering the information provided to them in their internal/external environment in a special area, for example, industrial control systems.The evaluation model considering the individual partner company classes and contract forms can only be effective when their various securitylevel elements are reflected in the model.The security level can be evaluated by conducting both document-based and actual inspections by class.This paper presented a management plan for each partner company, based on the evaluation results.It is also important that the items in the evaluation indices be adjusted by varying security policy standards and their limits.

    Second, security infrastructure for the prevention of damages, which are caused by information leaks or malicious code, should be constructed as cases of data/material leaks, through the partner companies, are still increasing.There have been many hacking incidents perpetrated through them as well.Nonetheless, providing security training or simply performing security inspections will not totally block the persistent threats.The significance of control systems is too high for almost every industry that the security management problem should not be left to the partner companies only.In that sense, it is necessary to provide proper security infrastructure to each of them for adequate management.VDI can be an excellent option, since it was designed to circulate important materials only after preventing any possibility of infection and approval has been given.It is essential to have a paradigm shift for the partner companies.For example,making an investment in security infrastructure is not “fruitless”, but rather a “future-oriented investment” that enhances the value of the companies engaged in control systems.

    Third, a means of providing work convenience is required.Although security is considered to be one of the priorities in the industrial control, simply emphasizing it in an environment where a lot of value is being placed on the convenience of work would produce a contrary result.Thus, a business program, that not only emphasizes security, but is also suitable for the existing work process, should be provided in the security infrastructure.The security competency of the partner companies has been improved.Moreover, it also reduces the negative effects by providing them with a data transmission system that offers virtualization capabilities and transferring data between businesses by e-mail and messenger systems, which are used for communication between employees.Fourth, the partner companies should be motivated to voluntarily comply with the security policy to continuously improve their security levels.It is necessary for a company to develop some external factors that would encourage the partner companies’security activities by establishing a penalty and incentive system.

    An improved control system security management scheme, was proposed in this study, based on the verified results and by supplementing the limitations of the existing security management systems.The object of this scheme is not only to punish the partner companies that do not comply, but also to promote mutual growth between them, through the improved levels of security.Although there have been quite a large amount of research carried out for the subjects associated with control security, research on the security of the partner companies dealing with ICS security has yet to be conducted.This paper can be meaningful to the ICS security sector, as it provides an applicable solution, based on the results that were obtained through the empirical planning,designing, implementation, and validation processes.

    Funding Statement:This research was supported by the Energy Cloud R&D Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT (NRF-2019M3F2A1073385).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    a级毛色黄片| 午夜福利网站1000一区二区三区| 国产精品国产av在线观看| 免费黄网站久久成人精品| 午夜91福利影院| 欧美成人精品欧美一级黄| 国产日韩一区二区三区精品不卡| www.色视频.com| 日本与韩国留学比较| 亚洲av日韩在线播放| 久久女婷五月综合色啪小说| 一级爰片在线观看| 啦啦啦啦在线视频资源| 观看美女的网站| 中文字幕人妻熟女乱码| 成年美女黄网站色视频大全免费| 精品视频人人做人人爽| 高清毛片免费看| 一边摸一边做爽爽视频免费| av卡一久久| 国产片内射在线| 制服诱惑二区| 午夜福利在线观看免费完整高清在| 久久av网站| 国产日韩欧美亚洲二区| 51国产日韩欧美| 91精品伊人久久大香线蕉| 中文字幕最新亚洲高清| 99热国产这里只有精品6| 男女边摸边吃奶| 精品熟女少妇av免费看| 精品酒店卫生间| 18+在线观看网站| 精品国产一区二区三区四区第35| 亚洲欧美中文字幕日韩二区| 日本爱情动作片www.在线观看| 在线观看三级黄色| 最新中文字幕久久久久| 亚洲综合色惰| 制服诱惑二区| 最近最新中文字幕大全免费视频 | 国产亚洲av片在线观看秒播厂| 天堂俺去俺来也www色官网| 韩国av在线不卡| 男人爽女人下面视频在线观看| 欧美国产精品va在线观看不卡| 9191精品国产免费久久| 亚洲高清免费不卡视频| 精品卡一卡二卡四卡免费| 久久精品国产综合久久久 | 美女中出高潮动态图| 在线观看人妻少妇| 亚洲美女搞黄在线观看| 久久久久久人人人人人| 久热久热在线精品观看| 超碰97精品在线观看| 99热这里只有是精品在线观看| a级毛片黄视频| 久久久久网色| 午夜激情av网站| 亚洲欧美中文字幕日韩二区| 美女国产高潮福利片在线看| 久久午夜福利片| 最后的刺客免费高清国语| av国产久精品久网站免费入址| 国产1区2区3区精品| 美女内射精品一级片tv| 校园人妻丝袜中文字幕| 国产成人av激情在线播放| 最近中文字幕高清免费大全6| 天堂8中文在线网| xxxhd国产人妻xxx| 狂野欧美激情性xxxx在线观看| 午夜久久久在线观看| 国产精品欧美亚洲77777| 亚洲内射少妇av| 中文精品一卡2卡3卡4更新| 亚洲av福利一区| 久久久久视频综合| 少妇人妻 视频| 久久99精品国语久久久| 亚洲av中文av极速乱| 纵有疾风起免费观看全集完整版| 九草在线视频观看| 97超碰精品成人国产| 国产不卡av网站在线观看| 日本91视频免费播放| 伊人久久国产一区二区| 如何舔出高潮| 国产成人欧美| 丰满饥渴人妻一区二区三| 久久久精品区二区三区| 欧美日韩亚洲高清精品| 三级国产精品片| 五月天丁香电影| 成人无遮挡网站| 精品一区在线观看国产| 欧美精品一区二区免费开放| 久久99精品国语久久久| 如日韩欧美国产精品一区二区三区| 大香蕉久久成人网| 丝袜人妻中文字幕| 日产精品乱码卡一卡2卡三| 成人毛片a级毛片在线播放| 亚洲欧美一区二区三区黑人 | 久久久久久久久久成人| 久久久欧美国产精品| 少妇被粗大的猛进出69影院 | 人人妻人人澡人人爽人人夜夜| 亚洲国产精品999| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 人人澡人人妻人| 国产综合精华液| 91精品伊人久久大香线蕉| 99久久综合免费| 欧美日韩国产mv在线观看视频| 91在线精品国自产拍蜜月| 毛片一级片免费看久久久久| 亚洲高清免费不卡视频| 婷婷色综合www| 美国免费a级毛片| 欧美国产精品va在线观看不卡| 午夜激情av网站| 国产日韩欧美视频二区| 性色av一级| 女的被弄到高潮叫床怎么办| 蜜桃国产av成人99| 飞空精品影院首页| 国产精品久久久久久久久免| 黄色 视频免费看| 亚洲第一av免费看| 色5月婷婷丁香| 国产探花极品一区二区| 不卡视频在线观看欧美| 精品人妻熟女毛片av久久网站| 国产精品国产av在线观看| 高清视频免费观看一区二区| 亚洲国产日韩一区二区| 国产一区二区三区综合在线观看 | 午夜久久久在线观看| 国产精品三级大全| 青青草视频在线视频观看| 咕卡用的链子| www日本在线高清视频| 一二三四在线观看免费中文在 | 久久国产精品男人的天堂亚洲 | 婷婷成人精品国产| 熟女人妻精品中文字幕| 建设人人有责人人尽责人人享有的| 欧美日韩亚洲高清精品| av在线老鸭窝| 午夜福利乱码中文字幕| 99国产精品免费福利视频| 看十八女毛片水多多多| 免费女性裸体啪啪无遮挡网站| 最近最新中文字幕大全免费视频 | 成人亚洲精品一区在线观看| 人人妻人人澡人人爽人人夜夜| 亚洲一码二码三码区别大吗| a级毛片在线看网站| 日韩一本色道免费dvd| 免费在线观看黄色视频的| 99热网站在线观看| 少妇的逼好多水| 91久久精品国产一区二区三区| av在线播放精品| 美女国产高潮福利片在线看| 一二三四在线观看免费中文在 | 亚洲伊人色综图| 精品一区二区三卡| 欧美+日韩+精品| 欧美日韩一区二区视频在线观看视频在线| 交换朋友夫妻互换小说| 国产熟女午夜一区二区三区| 亚洲av.av天堂| 中文字幕最新亚洲高清| 亚洲色图综合在线观看| 我要看黄色一级片免费的| 青春草国产在线视频| 亚洲伊人色综图| 亚洲精华国产精华液的使用体验| 成人免费观看视频高清| 狠狠婷婷综合久久久久久88av| 欧美精品一区二区大全| 大香蕉久久成人网| 精品久久久久久电影网| 大片电影免费在线观看免费| 免费大片18禁| 亚洲综合精品二区| 女性被躁到高潮视频| 一二三四在线观看免费中文在 | 啦啦啦在线观看免费高清www| 99久国产av精品国产电影| 国产亚洲精品第一综合不卡 | 国产欧美另类精品又又久久亚洲欧美| av一本久久久久| 丝袜美足系列| 国产片特级美女逼逼视频| 热re99久久精品国产66热6| 亚洲精品一区蜜桃| 日韩电影二区| 少妇高潮的动态图| 久久99一区二区三区| 日产精品乱码卡一卡2卡三| 极品人妻少妇av视频| 中文字幕最新亚洲高清| 2021少妇久久久久久久久久久| 建设人人有责人人尽责人人享有的| 涩涩av久久男人的天堂| 欧美激情 高清一区二区三区| 久久人妻熟女aⅴ| 91午夜精品亚洲一区二区三区| 久久精品国产自在天天线| 成人国语在线视频| 日本av手机在线免费观看| 欧美性感艳星| 国产一区二区三区av在线| 久久久a久久爽久久v久久| www.色视频.com| 成年人午夜在线观看视频| 久久久久久伊人网av| 一区二区av电影网| 亚洲av福利一区| 啦啦啦视频在线资源免费观看| 亚洲欧美日韩另类电影网站| 日日啪夜夜爽| 日本黄色日本黄色录像| 欧美精品人与动牲交sv欧美| √禁漫天堂资源中文www| 在线观看美女被高潮喷水网站| 午夜福利影视在线免费观看| 免费看av在线观看网站| 久久精品熟女亚洲av麻豆精品| 黄色配什么色好看| 纵有疾风起免费观看全集完整版| 最新中文字幕久久久久| www.熟女人妻精品国产 | 欧美激情国产日韩精品一区| 免费观看av网站的网址| 蜜臀久久99精品久久宅男| 日韩av免费高清视频| 亚洲欧美日韩卡通动漫| 亚洲欧美一区二区三区国产| 99久久人妻综合| 亚洲国产日韩一区二区| 这个男人来自地球电影免费观看 | 999精品在线视频| 国产一区有黄有色的免费视频| 少妇高潮的动态图| 免费人妻精品一区二区三区视频| 爱豆传媒免费全集在线观看| 日日爽夜夜爽网站| 建设人人有责人人尽责人人享有的| 国产高清三级在线| 国产欧美亚洲国产| 亚洲av国产av综合av卡| 国产精品国产三级国产av玫瑰| 国产av国产精品国产| 韩国av在线不卡| 青春草视频在线免费观看| 大陆偷拍与自拍| 国产精品一国产av| av又黄又爽大尺度在线免费看| 大片免费播放器 马上看| 国产69精品久久久久777片| 中文字幕制服av| a级片在线免费高清观看视频| 亚洲第一区二区三区不卡| 久久久久久伊人网av| 日本爱情动作片www.在线观看| 51国产日韩欧美| 久久久久久久亚洲中文字幕| 人体艺术视频欧美日本| 日韩精品有码人妻一区| 精品少妇久久久久久888优播| 黄网站色视频无遮挡免费观看| 日韩精品免费视频一区二区三区 | 街头女战士在线观看网站| 色哟哟·www| 男人爽女人下面视频在线观看| 国产乱人偷精品视频| 久久久久久久久久久免费av| 亚洲色图 男人天堂 中文字幕 | 一本久久精品| 中文字幕制服av| 国产一区二区激情短视频 | 天堂俺去俺来也www色官网| 免费人成在线观看视频色| 大陆偷拍与自拍| 亚洲欧洲国产日韩| 一区二区三区四区激情视频| a级毛色黄片| 国产成人午夜福利电影在线观看| 亚洲一码二码三码区别大吗| 18禁裸乳无遮挡动漫免费视频| 午夜福利影视在线免费观看| 欧美成人午夜免费资源| 国精品久久久久久国模美| 中文乱码字字幕精品一区二区三区| 亚洲美女搞黄在线观看| 成年人免费黄色播放视频| 两性夫妻黄色片 | 中文字幕精品免费在线观看视频 | 男女啪啪激烈高潮av片| 精品一区二区免费观看| 91精品国产国语对白视频| 飞空精品影院首页| 亚洲在久久综合| 婷婷色麻豆天堂久久| 丰满乱子伦码专区| 国产精品嫩草影院av在线观看| 免费黄频网站在线观看国产| videosex国产| 少妇被粗大猛烈的视频| 国产高清国产精品国产三级| 最近的中文字幕免费完整| 国产色婷婷99| 欧美xxⅹ黑人| 日韩三级伦理在线观看| 中文字幕精品免费在线观看视频 | 欧美bdsm另类| 在线观看免费高清a一片| 久久久久久久国产电影| www.av在线官网国产| 26uuu在线亚洲综合色| 欧美日韩视频高清一区二区三区二| 三级国产精品片| 赤兔流量卡办理| 亚洲精品日韩在线中文字幕| 有码 亚洲区| 少妇人妻精品综合一区二区| h视频一区二区三区| 男女下面插进去视频免费观看 | 丝瓜视频免费看黄片| 亚洲,欧美,日韩| 国产精品无大码| 两个人看的免费小视频| 国产无遮挡羞羞视频在线观看| 人人妻人人爽人人添夜夜欢视频| 午夜av观看不卡| 久久久久久久精品精品| 国产欧美日韩一区二区三区在线| 免费大片黄手机在线观看| 18禁裸乳无遮挡动漫免费视频| 国产片特级美女逼逼视频| 国产精品人妻久久久久久| 亚洲精品,欧美精品| 美女xxoo啪啪120秒动态图| 女人被躁到高潮嗷嗷叫费观| 国产在线免费精品| 女人精品久久久久毛片| 人妻人人澡人人爽人人| 国产免费又黄又爽又色| 天天躁夜夜躁狠狠久久av| 国产高清国产精品国产三级| 国产乱来视频区| 亚洲精品美女久久av网站| 国产一区二区在线观看av| 日韩欧美精品免费久久| 精品国产一区二区三区四区第35| 中文天堂在线官网| 欧美精品av麻豆av| 丰满饥渴人妻一区二区三| 精品酒店卫生间| 亚洲伊人久久精品综合| 国产精品久久久久成人av| 国产成人精品一,二区| 永久免费av网站大全| 两个人看的免费小视频| 飞空精品影院首页| 成人亚洲欧美一区二区av| 少妇的逼好多水| 99热全是精品| 久久鲁丝午夜福利片| 精品久久久久久电影网| 咕卡用的链子| 免费少妇av软件| 久久久久久久久久久久大奶| 亚洲av电影在线观看一区二区三区| 欧美亚洲日本最大视频资源| 亚洲中文av在线| av免费在线看不卡| 曰老女人黄片| 日韩成人伦理影院| 国产一区二区在线观看日韩| 午夜老司机福利剧场| 亚洲国产看品久久| 精品福利永久在线观看| 久久青草综合色| 国产色婷婷99| 国产黄频视频在线观看| 啦啦啦中文免费视频观看日本| 男人舔女人的私密视频| 成人亚洲精品一区在线观看| 桃花免费在线播放| 日韩 亚洲 欧美在线| 91精品三级在线观看| 观看av在线不卡| 国产精品久久久久久av不卡| 久久国产精品男人的天堂亚洲 | 性色avwww在线观看| 午夜影院在线不卡| 午夜福利网站1000一区二区三区| 美女xxoo啪啪120秒动态图| 国产成人欧美| 国产有黄有色有爽视频| 午夜久久久在线观看| 国产日韩欧美视频二区| 日韩成人伦理影院| 国产极品粉嫩免费观看在线| 精品少妇内射三级| 午夜影院在线不卡| 最新的欧美精品一区二区| 少妇猛男粗大的猛烈进出视频| 亚洲国产毛片av蜜桃av| 2022亚洲国产成人精品| 久久 成人 亚洲| 久久久久久久亚洲中文字幕| 最新的欧美精品一区二区| 亚洲欧美日韩卡通动漫| 国产一区有黄有色的免费视频| 久久久久久久久久久久大奶| 人人澡人人妻人| 亚洲伊人色综图| 伊人亚洲综合成人网| 精品少妇久久久久久888优播| 韩国精品一区二区三区 | 少妇猛男粗大的猛烈进出视频| av在线老鸭窝| 国产黄频视频在线观看| 午夜91福利影院| 在线观看免费视频网站a站| 波多野结衣一区麻豆| 天天躁夜夜躁狠狠躁躁| 国产一区二区三区综合在线观看 | 妹子高潮喷水视频| 免费av不卡在线播放| 色哟哟·www| 久久精品国产鲁丝片午夜精品| 精品人妻偷拍中文字幕| 久久久久久久精品精品| 亚洲国产看品久久| 最黄视频免费看| av电影中文网址| 久久av网站| 亚洲成国产人片在线观看| 欧美亚洲日本最大视频资源| 久久人妻熟女aⅴ| 亚洲精品中文字幕在线视频| 成年女人在线观看亚洲视频| 国产国语露脸激情在线看| 老司机影院成人| 99re6热这里在线精品视频| 亚洲精品色激情综合| 久热久热在线精品观看| 国产精品 国内视频| 国产免费视频播放在线视频| 赤兔流量卡办理| 日韩制服骚丝袜av| 最近的中文字幕免费完整| 国产精品一区二区在线观看99| 亚洲精品国产色婷婷电影| 亚洲少妇的诱惑av| 丝袜人妻中文字幕| 春色校园在线视频观看| 久久av网站| 亚洲综合色网址| 精品亚洲乱码少妇综合久久| 18在线观看网站| 亚洲综合精品二区| 精品少妇黑人巨大在线播放| 日韩中文字幕视频在线看片| 纯流量卡能插随身wifi吗| 丝袜人妻中文字幕| 高清欧美精品videossex| 波野结衣二区三区在线| 色哟哟·www| 成年av动漫网址| 在线观看免费日韩欧美大片| 婷婷色综合www| 亚洲在久久综合| 国产精品免费大片| 精品人妻一区二区三区麻豆| 欧美日韩成人在线一区二区| 人妻人人澡人人爽人人| 久久鲁丝午夜福利片| 一级毛片电影观看| 极品少妇高潮喷水抽搐| 日本与韩国留学比较| 中文乱码字字幕精品一区二区三区| 久久女婷五月综合色啪小说| 黑人欧美特级aaaaaa片| 在线观看一区二区三区激情| 日韩精品有码人妻一区| 啦啦啦啦在线视频资源| 一级片免费观看大全| videossex国产| 久久久久久久久久成人| 欧美少妇被猛烈插入视频| 涩涩av久久男人的天堂| 久久99精品国语久久久| 99久国产av精品国产电影| 亚洲av电影在线进入| 黑人欧美特级aaaaaa片| 久久狼人影院| 亚洲国产av新网站| 久久久久久人人人人人| 最新的欧美精品一区二区| 国产精品熟女久久久久浪| 90打野战视频偷拍视频| 久久热在线av| 欧美变态另类bdsm刘玥| 五月玫瑰六月丁香| 亚洲精品一区蜜桃| 男人操女人黄网站| 99热6这里只有精品| 国产女主播在线喷水免费视频网站| 美女内射精品一级片tv| 欧美人与善性xxx| 激情五月婷婷亚洲| 成人综合一区亚洲| 爱豆传媒免费全集在线观看| 国产深夜福利视频在线观看| 亚洲熟女精品中文字幕| a级毛色黄片| 视频在线观看一区二区三区| 女性被躁到高潮视频| 精品熟女少妇av免费看| 好男人视频免费观看在线| 亚洲精品美女久久av网站| 久久热在线av| kizo精华| 国产亚洲最大av| 精品国产一区二区三区四区第35| 国产麻豆69| 18禁观看日本| 婷婷色综合大香蕉| 亚洲精品中文字幕在线视频| 蜜臀久久99精品久久宅男| 最近2019中文字幕mv第一页| 精品福利永久在线观看| 日本欧美国产在线视频| 在线天堂最新版资源| 最后的刺客免费高清国语| 看十八女毛片水多多多| 亚洲色图综合在线观看| 99re6热这里在线精品视频| 久久影院123| 欧美激情 高清一区二区三区| 国产精品免费大片| tube8黄色片| 日本wwww免费看| 熟妇人妻不卡中文字幕| 国产极品粉嫩免费观看在线| 飞空精品影院首页| 国产熟女午夜一区二区三区| 欧美3d第一页| 亚洲色图 男人天堂 中文字幕 | 男人添女人高潮全过程视频| 日韩中文字幕视频在线看片| 午夜福利视频在线观看免费| 一本—道久久a久久精品蜜桃钙片| 国产亚洲精品第一综合不卡 | 男人舔女人的私密视频| 少妇被粗大猛烈的视频| 亚洲精品中文字幕在线视频| 日本与韩国留学比较| 久久精品久久久久久久性| 大香蕉久久成人网| 国产精品一二三区在线看| 18在线观看网站| 97精品久久久久久久久久精品| 亚洲精品日韩在线中文字幕| 亚洲精品成人av观看孕妇| 日产精品乱码卡一卡2卡三| 一边摸一边做爽爽视频免费| 亚洲精品日韩在线中文字幕| 亚洲国产最新在线播放| 国产熟女欧美一区二区| 春色校园在线视频观看| 国产免费福利视频在线观看| 久久久久网色| 亚洲av欧美aⅴ国产| 9热在线视频观看99| 亚洲精品自拍成人| 三级国产精品片| 欧美精品一区二区免费开放| 欧美 日韩 精品 国产| 成人黄色视频免费在线看| 欧美成人精品欧美一级黄| 日韩欧美一区视频在线观看| 九色成人免费人妻av| 国产成人午夜福利电影在线观看| 搡女人真爽免费视频火全软件| 亚洲精品一区蜜桃| 日本wwww免费看| 亚洲少妇的诱惑av| 爱豆传媒免费全集在线观看| 日韩电影二区| 久久久精品94久久精品| 伦精品一区二区三区| 91精品伊人久久大香线蕉| 最近中文字幕2019免费版| 亚洲欧美清纯卡通| 在线看a的网站| 亚洲精品成人av观看孕妇| 国产极品天堂在线| 久久精品久久久久久久性| 婷婷色麻豆天堂久久| 久久国内精品自在自线图片| 国产成人精品福利久久| 国产精品欧美亚洲77777| 国产日韩欧美亚洲二区| 日本色播在线视频| 日韩一区二区三区影片|