Research on Key Technologis of Power SystemInformation Security Model

被引:0
|
作者
Zhao, Liang [1 ]
Mu, Dayong [2 ]
Zhong, Chongquan [1 ]
Li, Chunping [2 ]
Zhang, Baogang [2 ]
Zhao, Yun [2 ]
机构
[1] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[2] State Grid Dalian Elect Power Supply Co, Dalian 116024, Peoples R China
关键词
information security power information system;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of information technology and network technology in power system, the business system of power industry is developing in the direction of openness, interconnection and standardization, and the safe operation of power system have gradually formed the dependence on the security of information system The security threats to the power system, and the potential for insecurity. Based on the analysis of the current classic model of the existing information security, security system model should aim for the security requirements of power information system, regard protecting entity security as the core, take the legal and human factors as the guarantee, take the system safety engineering process as a support, and strengthen the safety awareness of all personnel through safety education and training. The model is a dynamic, circulation, and constantly perfected process. The reliability of the current power grid and the future energy system architecture design has an important guiding significance.
引用
收藏
页码:480 / 483
页数:4
相关论文
共 50 条
  • [1] Research on Collaborative Defense Model of Power Grid Security
    Guan, Xiaojuan
    Ma, Yuanyuan
    Shao, Zhipeng
    Zhang, Bo
    2018 8TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2018, : 270 - 273
  • [2] Research on improving security of protection for power system secondary system by quantum key technology
    Zhou, J. (zhoujingjing@epri.sgcc.com.cn), 1600, Power System Technology Press (38):
  • [3] Research on Key Security Strategies of Cloud Computing
    Zhao, Duanyang
    Xu, Qingxiang
    Hu, Xiaxia
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1577 - 1580
  • [4] The Research on Network Security Visualization Key Technology
    Li, Xiaoyan
    Wang, Qingxian
    Yang, Lin
    Luo, Xiangyang
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 983 - 988
  • [5] Analysis and Research on the Security Key Technology of Grid
    Longjun, Zhang
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 334 - 338
  • [6] The Research of Security Network Group Key Management
    Hu, Ge
    Wang, Wei
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1497 - 1502
  • [7] Research Towards Key Issues of API Security
    Sun, Ronghua
    Wang, Qianxun
    Guo, Liang
    CYBER SECURITY, CNCERT 2021, 2022, 1506 : 179 - 192
  • [8] Research on Network Security Issues and Security Model
    Tang, JianGang
    Zhang, ShiJun
    Jiang, Ji
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 128 - 131
  • [9] Construction and Research on Cloud-edge Collaborative Power Measurement and Security Model
    Huang J.
    Sun Y.
    Jiang X.
    Huang Y.
    Zhou D.
    EAI Endorsed Transactions on Energy Web, 2024, 11 : 1 - 8
  • [10] Research and Design of the Security Area Classification Model of Electric Power Information System
    Zhang, Tong
    Wu, Kehe
    Li, Wei
    MATERIAL AND MANUFACTURING TECHNOLOGY II, PTS 1 AND 2, 2012, 341-342 : 519 - 523