期刊文献+

等保2.0时代电力监控系统安全防护体系建设研究 被引量:1

Research on the construction of security protection system of power monitoring system in the era of classified security protection standard 2.0
在线阅读 下载PDF
导出
摘要 通过分析电力监控系统现有的典型结构与安全建设需求,针对电力监控系统网络安全的脆弱性和薄弱点,结合等级保护2.0体系,提出了一种电力监控系统网络安全防护建设方案。该方案以“一个中心,三重防护”为核心思想,突出安全管理中心建设,明确通信网络、区域边界、计算环境的安全防护建设方法。以某发电企业电力监控系统生产控制区为试点,以等保2.0基本要求为衡量标准进行方案应用效果评估,结果表明,通过安全防护体系建设,可有效提升系统安全性。 This paper analyzes the existing typical structure and security construction requirements of power monitoring system. In view of the vulnerability and weakness of the network security of the power monitoring system, combined with the classified security protection standard 2.0 system, a network security protection construction scheme of power monitoring system is proposed. This scheme takes "one center triple protection" as the core idea, highlights the construction of security management center, and defines the construction method of security protection for communication network, regional boundary and computing environment. Taking the production control area of the power monitoring system of a power generation enterprise as a pilot, and taking the basic requirements of classified security protection standard 2.0 as the measurement standard, the application effect of the scheme is evaluated. The results show that through the construction of the security protection system, the system security can be effectively improved.
作者 李政达 杨继 姜添元 Li Zhengda;Yang Ji;Jiang Tianyuan(The 6th Research Institute of China Electronics Corporation,Beijing 100083,China)
出处 《网络安全与数据治理》 2022年第9期48-53,59,共7页 CYBER SECURITY AND DATA GOVERNANCE
关键词 电力监控系统 网络安全 一个中心三重防护 等保2.0 power monitoring system network security one center triple protection classified security protection standard 2.0
  • 相关文献

参考文献12

二级参考文献50

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:255
  • 2张焕国,严飞,傅建明,徐明迪,杨飏,何凡,詹静.可信计算平台测评理论与关键技术研究[J].中国科学:信息科学,2010,40(2):167-188. 被引量:13
  • 3蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 4谢钧,许峰,黄皓.基于可信级别的多级安全策略及其状态机模型[J].软件学报,2004,15(11):1700-1708. 被引量:19
  • 5BELL D E,LAPADULA L J.Secure computer system:mathematical foundation and model[R].Mitre Corp,Bedford Massachussetts:Technical Report,1973:74~244
  • 6K J Biba.Integrity Considerations for Secure Computer Systems[R].Technical Report ESD-TR-76-372,USAF Electronic Systems Division,Hanscom Air Force Base,Bedford,Massachusetts,1977
  • 7Karger P A,V R Austel,D C Toll.Using Mandatory Secrecy and Integrity for Business to Business Applications on Mobile Devices[J].IBM Research,2000
  • 8T Fraser.LOMAC:Low Water-Mark Integrity Protection for COTS Environments[C].In:Proceedings of the 2000 IEEE Symposium on Security and Privacy,Oakland,California,USA,2000
  • 9David Safford,Mimi Zohar.A Trusted Linux Client(TLC).http://www.research.ibm.com/gsal/tcpa/tlc.pdf
  • 10J Marchesini,S Smith,O Wild.Experimenting with TCPA/TCG Hardware,Or:How I Learned to Stop Worrying and Love The Bear[R].Computer Science Technical Report TR2003-476,Dartmouth College,2003

共引文献171

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部