期刊文献+

安全管理平台在电力系统的应用研究 被引量:1

Research on the application of security management platform in power system
下载PDF
导出
摘要 根据贵州电网安全审计试点项目,分析安全管理平台在建设和运营中可能会遇到的困难,分别应用"基于PKI的关键评价指标体系"以保证平台依据业务需求建设,"基于IS027001管理体系标准"以保证平台在运营中的落地,充分发挥了平台对贵州电网二次系统和业务系统的安全保障能力。 Based on the pilot project of Guizhou Power Grid security audit,difficulties in the construction and operation that may be encountered in security management platform were analyzed. It is applied based on PK1 key evaluation index system to ensure the construction,and based on ISO27001 management system standard to ensure the ground in the operating platform,respectively. It gives full play to the platform in Guizhou Power Grid secondary system and business system security capabilities.
作者 魏力鹏
出处 《贵州电力技术》 2015年第1期72-74,共3页 Guizhou Electric Power Technology
关键词 安全管理平台 安全审计 电力系统 security management platform security audit power system
  • 相关文献

参考文献7

  • 1史简,郭山清,谢立.统一网络安全管理平台的研究与实现[J].计算机应用研究,2006,23(9):92-94. 被引量:23
  • 2赵彬,王亚弟,徐宁,李立新.网络安全运营中心关键技术研究[J].计算机工程与设计,2009,30(9):2117-2120. 被引量:8
  • 3韦潜,夏清国.基于安全管理中心的关联引擎技术的研究[J].计算机工程与设计,2007,28(13):3085-3087. 被引量:5
  • 4JonathanTregear. RiskAssessment[ J]. information SecurityTechn - icalReport,2001,6(3) : 19 -21.
  • 5CuppensF, MiegeA. AlertCorrelation inaCooperativelntrusionDe - tectionFramework [ C ]. Proceedingsof the2002 IEEESymposiumonSecurity andPrivacy,2002. 202 - 215.
  • 6DebarH,WespiA. Aggregation and Correlation of Intrusion Detec - tionAlerts [ C ]. Proceedings of the 4th InternationalSymposium onRecentAdvances in lntrusionDetection,2001. 85 - 103.
  • 7Pe N,Yun C,Dougtas SR Anal 'zi Intensive l msion Alertsvia(bnvlation [C ]. Pmc 'edings ff the 5th lntemationalSyn d tAdvar, c in lntrusionDete ion,z3XE 74 -95.

二级参考文献23

  • 1Morin B,Me L,Debar H,et al.M2D2: A formal data model for IDS alert correlation[C].Proc of Recent Advances in Intrusion Detection.Berlin:Springer-Verlag,2002:115-127.
  • 2Renaud Bidou. Security operation center concepts and implementation[R].France: Iv2 Technologies,2003.
  • 3IETF Intrusion Detection Exchange Format Working Group. The intrusion detection message exchange format [EB/OL]. http://xml.coverpages.org/draft-ietf-idwg-idmef-xml- 12.txt, 2004-07-08.
  • 4Anderson H.Introduction to nessus[EB/OL], http://www. securityfocus.com/infocus/1741,2003.
  • 5Ning P, CUI Y, Reeves D S,et al.Techniques and tools for analyzing intrusion alerts[C]. ACM Trans on Information and System Security,2004,7(2):274-318.
  • 6Zimmermann J,Me L,Bidan C.An improved reference flow control model for policy-based intrusion detection[C].Proc of the 8th European Symposium on Research in Computer Security. Gj-vik: Springer-Verlag,2003:291-308.
  • 7Ning ECui Y.Analyzing intensive intrusion alerts via correlation[C].Zurich, Switzerland: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, 2002.
  • 8Michael E Whitman,Herbert J Mattord.Principles of Information Security[M].北京:清华大学出版社,2003..
  • 9International Organization for Standardization.Code of Practice for Information Security Management[S].ISO/IEC 17799,2000.
  • 10Jonathan Tregear.Risk Assessment[J].Information Security Technical Report,2001,6(3):19-21.

共引文献29

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部