期刊文献+

乏燃料后处理厂数字化仪控系统病毒防护研究

Discussion on the Computer Virus Defense of Digital I&C System in Spent Fuel Reprocessing Plant
在线阅读 下载PDF
导出
摘要 随着数字化控制系统在后处理厂中的大规模应用,计算机病毒的威胁也随之出现。首先总结影响数字化控制系统的病毒的一般特点,阐明计算机病毒对于后处理厂控制系统的危害;进而结合核安全文化,阐述一种典型后处理厂纵深防御型网络安全架构,最后基于此架构从信息技术和行政管理两个方面探讨适用于乏燃料后处理厂仪表和控制系统的病毒防护方法、措施和应注意的几点事项,强调计算机病毒的防护策略应贯穿于信息安全载体的制造、配置、应用、检测、评估、维护、改造等一系列活动中,推荐使用可信保障的安全管理机制。同时,本文也提出安全级控制系统和非安全级控制系统应有所区别。 The digital control system has already adopted in nuclear spent fuel reprocessing plant currently. The threatens from the computer virus are accompanying. This paper firstly summarizes the characteristics of the computer virus impacting the I&C control system in the spent fuel reprocessing plant, and illuminates the harms as well. Then Combined with nuclear security culture a typical cyber security architecture with defense-in-depth feature is raised by this paper. Finally based on this cyber security architecture, discussions on how to defense from the virus provided via information technology and administrative management perspective. the virus defense should be included in the progress of manufacturing, configuration, application,testing, assessing, maintenance, updating etc. A credible security management is recommended. And separations for the digital safety system and the non-safety system are provided.
作者 刘建伟 杨庆彧 刘泽辰 Liu Jianwei;Yang Qingyu;Liu Zechen(CNPE,Beijing,100840,China)
出处 《仪器仪表用户》 2022年第6期83-86,共4页 Instrumentation
关键词 网络安全 纵深防御 乏燃料后处理厂 病毒防护 cyber security defense in-depth spent fuel reprocessing plant virus defense
  • 相关文献

参考文献3

二级参考文献34

  • 1Peter Welander,陈廷炯.控制系统安全性的10大威胁[J].软件,2007,28(8):16-20. 被引量:2
  • 22011年中国互联网网络安全态势报告[EB/OL].http://www.cerl:.orgcn/pubhsh/mn/12/2012/20120330183919343905632/20120330183919343905632-.html,2012-08-29.
  • 3超级工厂病毒[EB/OL].2012-09-26[2012-10-22].ht-tp://baike.baidu.corn/view/4410371.htm.
  • 4Global energy cyberattacks : "Night Dragon" [ EB/OL ]. [ S. 1. ] : McAfee Foundstone Professional Services, McAfee Labs, 2011-02-10 [ 2012-10-22]. http://www, mcafee. com/us/resources/white-papers/wp-global-energy-cyber- attacks-night-dragon, pdf.
  • 5Duqu: 盗空一切 [ EB/OL]. 2012-10-18 E 2012-10-223. ht- tp ://www. kaspersky, com. cn/KL-AboutUs/duqu, htm.
  • 6Eric Chien,Gavin O' Gorman. The Nitro attacks: stealing secrets from the chemical industry[ EB/OL]. 2011 [ 2012- 10-22 ]. http://www, symantec, com/content/en/us/en- terprise/media/security_response/whitepapers/the_nitro_ attacks, pdf.
  • 7Flame病毒[ EB/OL]. 2012-08-10 [ 2012-10-22 ]. http-// baike, baidu, eom/view/8686787, htm.
  • 8Waltboyes. The RISI cyber incident report for the 2011calendar year is out! [ EB/OL]. 2012-04-12 [ 2012-10- 22]. http://eommunity, eontrolglobal, com/eontent/risi- eyber-ineident-report-2011 -calendar-year-out-risi-cyberse- curity-pauto-automation-mfg-ma.
  • 9TC/SC 65. IEC/TS 62443-1-1 Edition 1. 0: Industrial eommunieation networks-Network and system seeurity-Part 1-1: Terminology, eoneepts and models [ S]. Geneva: IEC, 2009.
  • 10Andrew Ginter. An IT perspective of control systems secur- ity[ EB/OL]. 2009-10 [ 2012-10-22 ]. http ://www. indus- trialdefender, com/general_downloads/whitepapers/ginter_ it-perspective, pdf.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部