Research on Key Technologis of Power SystemInformation Security Model

被引:0
|
作者
Zhao, Liang [1 ]
Mu, Dayong [2 ]
Zhong, Chongquan [1 ]
Li, Chunping [2 ]
Zhang, Baogang [2 ]
Zhao, Yun [2 ]
机构
[1] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[2] State Grid Dalian Elect Power Supply Co, Dalian 116024, Peoples R China
关键词
information security power information system;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of information technology and network technology in power system, the business system of power industry is developing in the direction of openness, interconnection and standardization, and the safe operation of power system have gradually formed the dependence on the security of information system The security threats to the power system, and the potential for insecurity. Based on the analysis of the current classic model of the existing information security, security system model should aim for the security requirements of power information system, regard protecting entity security as the core, take the legal and human factors as the guarantee, take the system safety engineering process as a support, and strengthen the safety awareness of all personnel through safety education and training. The model is a dynamic, circulation, and constantly perfected process. The reliability of the current power grid and the future energy system architecture design has an important guiding significance.
引用
收藏
页码:480 / 483
页数:4
相关论文
共 50 条
  • [21] Research on Key Technologies of Network Security Management Policy
    Tang, Chenghua
    Yu, Shunzheng
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12530 - 12533
  • [22] Research on Security of Key Algorithms in Intelligent Driving System
    Liu Shangdong
    Wu Ye
    Ji Yimu
    Chen Chen
    Bi Qiang
    Jiao Zhipeng
    Gong Jian
    Wang Ruchuan
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 29 - 38
  • [23] Research on key strategies and analytics of big data security
    Zhao, Duanyang
    Xu, Qingxiang
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 1211 - 1217
  • [24] Research on the Internet banking Security based on USB Key
    Xiong, Yazhou
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 2218 - 2222
  • [25] Cloud Computing Security Architecture and Key Technologies Research
    Wu, Xianglong
    Wu, Shaobo
    INFORMATION, COMMUNICATION AND EDUCATION APPLICATION, VOL 11, 2013, 11 : 65 - 69
  • [26] Research on Security of Key Algorithms in Intelligent Driving System
    LIU Shangdong
    WU Ye
    JI Yimu
    CHEN Chen
    BI Qiang
    JIAO Zhipeng
    GONG Jian
    WANG Ruchuan
    Chinese Journal of Electronics, 2019, 28 (01) : 29 - 38
  • [27] THE OBJECT OF ANTICORRUPTION CRIMINOLOGICAL SECURITY: KEY RESEARCH DIRECTIONS
    Damm, Irina A.
    RUSSIAN JOURNAL OF CRIMINOLOGY, 2022, 16 (05): : 555 - 565
  • [28] Research on Key Technology of Computer Security Monitoring System
    Hui, Jin
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 236 - 239
  • [29] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607
  • [30] Research on Distributed Power Market Trading Model Based on Grid Line Transmission Security
    Li, Yuan-Zheng
    Zhang, Hu
    Liu, Jiang-Ping
    Zhao, Yong
    Lian, Yi-Cheng
    Zidonghua Xuebao/Acta Automatica Sinica, 2024, 50 (10): : 1938 - 1952