期刊文献+

核电厂信息安全风险评估方法 被引量:1

Application of information security risk assessment in nuclear power plants
下载PDF
导出
摘要 随着信息化与工业化深度融合,核电厂信息安全变得日益重要。网络系统因为其固有的脆弱性,带来了一定的潜在的危险,因此评估网络系统的脆弱性具有重要意义。本文通过分析面临的威胁和详细的网络系统的脆弱性,主要包括SCADA(监控和数据的脆弱性采集)系统、EMS(能源管理系统)和MIS(管理信息系统),确定电力行业的风险,找出薄弱部位,提高网络系统的安全性。论文从核电业进行信息安全的角度出发,描述病毒入侵控制系统的手段及防护方式。根据IEC 62443标准,确定进行信息系统风险评估的方式、步骤和措施,并与广泛使用的核电站概率安全评价(PSA)的安全评价方法进行比较。通过论述说明风险评估是保障核电信息安全的一个重要条件。 With the integration of information technology and industrialization development,the nuclear power plant’s information security has become increasingly important.The cyber system brings some hidden danger because of its inherent vulnerability.So it is significant to assess the vulnerability of cyber system,to determine the risk and the weak parts of power industry,and to set appropriate response for the potential accidents of the cyber system.Starting from the point of view of the nuclear power industry information security,this paper describes the virus invasion means and protection methods, information system risk assessment steps and measures in the industry control systems in accordance with IEC 62443 standard,with the widespread use of nuclear power plant probabilistic safety assessment method.Finally,it describes the risk assessment as an important condition for the protection of the cyber security of nuclear power.
作者 王英 李佳嘉
出处 《仪器仪表用户》 2013年第4期22-24,21,共4页 Instrumentation
关键词 风险评估 信息安全 安全级别生命周期 概率安全评价 risk assessment cyber security levels of security lifecycle probabilistic safety assessment
  • 相关文献

参考文献2

二级参考文献14

  • 1Piggin R.Stuxnet:best practice to secure industrial control systems[J].Industrial Ethernet Book,2010(61).
  • 2Welander P.Cyber security hits home[J].Control Engineering,2009,56(1):40 -43.
  • 3Siemens O.Hardware route to the virus protection for the automation nets[J].Industrial Ethernet Book,2005(29).
  • 4Ogden F.Security hardware for industrial networking[J].Industrial Ethernet Book,2008 (46).
  • 5IEC/TS 62443-1-1 Industrial communication networks-network and system security-part 1-1:terminology,concepters and models[S].2009.
  • 6Byres E,Verhappen L.Defence-in-depth now takes in the fieldbus levels[J].Industrial Ethernet Book,2007 (38).
  • 7Innominate Security Technology AG.IT security in production,security for industrial ethernet networks based on accepted standards[EB/OL].http:// www.innominate,com/images/stories/documents/publikationen/2008/pub_git_security_it_in_production,pdf.
  • 8Innominate Security Technology AG.Hacking the industrial network[EB/OL].http://www.innominate,com/en/forms/white-paperregistration.2009.
  • 9Bell D E, Lapadula L J. Secure Compter System[R].MTR-2527, 1973.
  • 10Biba K. Integrity Considerations for Secure Computing Systems[R]. Mitre Report MTR-3153, 1975.

共引文献14

同被引文献14

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部