期刊文献+

电力信息安全防护体系研究分析 被引量:3

下载PDF
导出
摘要 近年来我国信息科技的发展尤为迅速,在全球化网络发展的时代背景下,我国国网信息也有技术上的更新,但是由于黑客的存在,国网信息的安全也受到了威胁。据调查结果显示,国网公司每天要遭受的网络攻击已经达到了数十万次。在这个信息化的时代,网络信息已经深入到人们的工作、生活中,正因为网络的常见性,所以网络安全性则更容易被人们忽略。文章就是从分析电力公司的信息安全隐患出发,建立相对完善的信息安全防护体系的理念。并且将信息安全防护利息进行持续性的更进改良,以确保我国电力公司信息安全实现最大化。 In recent years, the development of information technology in China is particularly rapid. In the context of the development of global network, the national network information of our country has also been updated technically, but due to the existence of hackers, the security of national network information has also been threatened. According to the results of the survey, the number of cyber attacks on national network companies has reached hundreds of thousands every day. In this Information Age, network information has been deeply into people's work, life, it is because of the common nature of the network, so network security is more easily ignored by people. This paper is based on the analysis of the hidden dangers of information security of power companies, and establishes the concept of relatively perfect information security protection system, and continue to improve the information security protection interest, in order to ensure the information security of China's power companies to grow to maximum.
作者 张星
出处 《科技创新与应用》 2018年第14期57-58,60,共3页 Technology Innovation and Application
关键词 科技发展 网络安全 信息防护 science and technology development network security information protection
  • 相关文献

参考文献6

二级参考文献64

  • 1冯小安,祁兵.电力信息系统安全体系的构建[J].电网技术,2008,32(S1):77-80. 被引量:13
  • 2何大愚.柔性交流输电技术的定义、机遇及局限性[J].电网技术,1996,20(6):18-24. 被引量:32
  • 3Merike Kseo.网络安全性设计[M].北京:机械工业出版社,2000..
  • 4Katie Fehrenbacher. Smart meter worm could spread like a virus[EB/OL] . 200912011-04-05] . http://gigaom.com/cleantech/smart- meter-worrn-could-spread-like-a-virus/.
  • 5Office of Energy Assurance, Office of Independent Oversight and PerformanceAssurance, U.S. DepartmentofEnergy. 21 steps to improve cybersecurity of SCADA networks [EB/OL]. 200512011-04-05]. http: //www.oe.netl.doe.gov/docs/prepare/21 stepsbooklet.pdf.
  • 6Energy policy act of 2005 (Pub.L.109-58)[EB/OL]. 200512011-04- 05]. http://doi.net/iepa/EnergyPolicyActof2005.pdf.
  • 7NERC. Critical infrastructure protection (CIP) 002, 003-009[S/OL]. 200912011-04-05]. http://www.nerc.com/page.php?cid=2%7C20.
  • 8Federal Information Security Management Act of 2002("FISMA", 44 U.S.C.~ 3541)[Z/OL]. 200212011-04-05]. http://csrc.nist.gov/drivers/ documents/Fl S MA-final.pdf.
  • 9NIST, U.S. Department of Commerce. NIST SP 80082 Guide to industrial control systems (ICS) security, final public draft[R/OL]. 200812011-04-05] . http://csrc.nist.gov/publications/nistpubs/800-82/ SP800-82-final.pdf.
  • 10NIST, U.S. Department of Commerce. NIST SP 800-53 revision Recommended security controls for federal information systems[R OL]. 200912011-04-05]. http://csrc.nist.gov/publications/nistpubs1 800-53-Rev3/spS00-53-rev3-final.pdf. ' /.

共引文献485

同被引文献11

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部