期刊文献+

地区调度数据网络安全评估及应急预案体系建设

Region Scheduling Data Network Security Assessment and Emergency System
下载PDF
导出
摘要 按照国家电力二次系统安全防护的有关要求,对福州地区电网的二次系统网络安全进行评估,针对福州地区电网的二次系统网络安全防御问题进行专题研究、实践,找出福州地区电网二次系统的安全薄弱点,并提出科学解决方案。针对安全评估报告,研究制订安全策略、实施方案并试点进行实践、再测试、再评估,建立起并完善地区电网应该系统安全防御体系,并归纳形成标准的防御体系模式。 Secondary power system in accordance with the national security of the relevant requirements of the Fuzhou region of the second grid system to assess network security, in view of the Fuzhou region of the second grid system issues of network security defense research, practice, and to identify areas of Fuzhou, the second grid weak point of the safety of the system, and scientific solutions. For the safety assessment report to study the formulation of security policy, the implementation of pilot programs and practice, and then test it again to build and improve the regional power network security defense system to system, and summed up the defense system the formation of the standard model.
作者 曹建锋
出处 《科技传播》 2010年第24期228-229,共2页 Public Communication of Science & Technology
关键词 二次系统 网络 安全防护 预案 Secondary system networking security
  • 相关文献

参考文献8

二级参考文献36

  • 1葛海慧,卢潇,周振宇.网络安全管理平台中的数据融合技术[J].现代电子技术,2004,27(24):69-70. 被引量:5
  • 2肖康.建立和完善企业IP网络安全体系(之二)[J].计算机网络世界,2000,10(10):52-57. 被引量:8
  • 3周兴建.可替代镀铬的离子束技术[J].国外金属热处理,1996,17(3):52-55. 被引量:5
  • 4沈昌祥.用信息安全工程理论规范信息安全建设[J].计算机世界,2001,(34):01-01.
  • 5马东平.设计企业信息系统的安全体系[J].计算机世界,2001,(34):08-08.
  • 6DoD. Information Assurance Technical Framework V 3. 0.http://www. iatf. net, 1996.
  • 7SSE-CMM Project. Systems Security Engineering Capability Maturity Model Version 2.0. http://www. sse-cmm. org, 1999-04-01.
  • 8Herrmann P, Krumm H. Object-oriented Security Analysis and Modeling. In: Proc 9th International Conference on Telecommunication Systems— Modeling and Analysis. Dallas(US): 2001. 21-32.
  • 9Lowman T, Mosier D. Applying the DoD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architectures. New York: IEEE, 1997.
  • 10ISO/IEC TR 13335-5. Information Technology — Guidelines for the Management of IT Security, Part 5: Management Guidance on Network Security (First Edition). 2001.

共引文献143

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部