Research on Key Technologis of Power SystemInformation Security Model

被引:0
|
作者
Zhao, Liang [1 ]
Mu, Dayong [2 ]
Zhong, Chongquan [1 ]
Li, Chunping [2 ]
Zhang, Baogang [2 ]
Zhao, Yun [2 ]
机构
[1] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian 116024, Peoples R China
[2] State Grid Dalian Elect Power Supply Co, Dalian 116024, Peoples R China
关键词
information security power information system;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of information technology and network technology in power system, the business system of power industry is developing in the direction of openness, interconnection and standardization, and the safe operation of power system have gradually formed the dependence on the security of information system The security threats to the power system, and the potential for insecurity. Based on the analysis of the current classic model of the existing information security, security system model should aim for the security requirements of power information system, regard protecting entity security as the core, take the legal and human factors as the guarantee, take the system safety engineering process as a support, and strengthen the safety awareness of all personnel through safety education and training. The model is a dynamic, circulation, and constantly perfected process. The reliability of the current power grid and the future energy system architecture design has an important guiding significance.
引用
收藏
页码:480 / 483
页数:4
相关论文
共 50 条
  • [41] Research on the Application Security Isolation Model
    Gong Lei
    Zhao Yong
    Liao Jianhua
    CHINA COMMUNICATIONS, 2010, 7 (06) : 153 - 156
  • [42] The Research on the Model of Urban Ecological Security
    Dou, Guangxing
    Wang, Yaowu
    Wu, Yudi
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON CONSTRUCTION AND REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2011, : 849 - 853
  • [43] Research on security policies integration model
    Liu Xin
    Li Hongwei
    Han Zhen
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2579 - +
  • [44] An active information security model research
    Zhuang, Y
    Liu, J
    Gu, JJ
    Wei, Q
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 282 - 286
  • [45] Research on Quantum Key Network Model
    Shi, Lei
    Guo, Yi-xi
    Ma, Chen-Hui
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 342 - 348
  • [46] Security key
    James, J
    LIBRARY JOURNAL, 2000, : 10 - 10
  • [47] Security is the key
    New Electronics, 1997, 30 (15):
  • [48] Identification of Key Performance Indicators of Security Management for Thermal Power Plants
    Choudhury, Raj Sekhar
    Das, Sutapa
    JOURNAL OF APPLIED SECURITY RESEARCH, 2014, 9 (02) : 150 - 171
  • [49] Security considerations and key negotiation techniques for power constrained sensor networks
    Doyle, Barry
    Bell, Stuart
    Smeaton, Alan F.
    McCusker, Kealan
    O'Connor, Noel E.
    COMPUTER JOURNAL, 2006, 49 (04): : 443 - 453
  • [50] Security considerations and key negotiation techniques for power constrained sensor networks
    Doyle, Barry
    Bell, Stuart
    Smeaton, Alan F.
    McCusker, Kealan
    O'Connor, Noel E.
    Computer Journal, 2006, 49 (04): : 443 - 453