期刊文献+

核电站非安全级DCS网络和主机信息安全防护 被引量:1

Cyber Security Protection of Non-safety DCS Network and Host of NPP
下载PDF
导出
摘要 随着工业4.0的浪潮滚滚而来,核电站控制系统已经普遍改造为SCADA、DCS等数字化控制系统。工业以太网、工业现场总线,以及大量标准互联网技术已经被应用于核电站控制系统。本文将聚焦于网络安全和主机安全,探讨核电站非安全级DCS的信息安全防护。DCS网络安全防护将主要涉及3个方面,包括区域划分、边界防护和网络入侵防护。DCS主机安全防护将主要涉及集中管理,用于给出一种核电站非安全级DCS的信息安全防护方案,着重通过网络安全防护措施和主机安全防护措施,有效提高核电站非安全级DCS的信息安全防护能力。 With the arrival of industry 4.0,NPP control system has been generally upgraded to digital control system such as SCADA or DCS.Industry Ethernet,industry field bus,and a large number of standard internet technologies have been applied to NPP control system.This article will focus on network security and host security to explore the cyber security protection of Non-safety DCS.DCS network security protection will mainly involve three aspects,including regional division,boundary protection and network intrusion prevention.DCS host security protection will mainly involve centralized management.The article is used to give an cyber security protection plan for nuclear power plant Non-safety DCS,focusing on network security protection measures and host security protection measures to effectively improve the cyber security protection capability of nuclear power plant Non-safety DCS.
作者 薛文俊 韩新宇 徐勇 Xue Wenjun;Han Xinyu;Xu Yong(State Nuclear Power Automation System Engineering Company,Shanghai,200241,China)
出处 《仪器仪表用户》 2021年第1期81-84,共4页 Instrumentation
关键词 核电站非安全级DCS 网络安全 主机安全 non-safety DCS of NPP network security host security
  • 相关文献

参考文献2

二级参考文献24

  • 1BYRES E, LOWE J. The myths and facts be- hind cyber security risks for industrial control systems[C]//Proceedings of the VDE Kongress. Berlin, Germany: [s. n. ], 2004.
  • 2BYRES E, LEVERSAGE D. The industrial se- curity incident database[R]. Wurldtech Analyt- ics Inc. , 2006.
  • 3CNN. Mouse click could plunge city into dark ness, experts say[EB/OL]. (2007-09 27). http ///edition. cnn. eom/2007/US/O9/27/power, at. risk/index, html.
  • 4KREBS B. Cyber incident blamed for nuclear power plant shutdown [N]. The Washington Post, 2008-06-05.
  • 5Government of Canada P S C. AV10-023: Sie- mens SIMATIC WinCC or Siemens Step 7 sot- ware vulnerabilities[EB/OL]. (2011 10-22). ht- tp // www. publicsafety, gc. ca/prg/em/ceirc/ 2010/av10-023-eng. aspx.
  • 6ERDBRINK T, NAKASHIMA E. Iran strugg- ling to contain "foreign-made" "Stuxnet" com- puter virus[N]. The Washington Post, 2010-09- 27.
  • 7ALBRIGHT D, BRANNAN P, WALROND C. Did Stuxnet take out 1,000 centrifuges at the Na- tanz enrichment plant? [R]. USA: Institute for Science and International Security, 2010.
  • 8工业和信息化部.关于加强工业控制系统信息安全管理的通知[EB/OL].(2011-10-27).http:// xxaqs, miit. gov. cn/n11293472/n11295344/ n13012971/14291899, html.
  • 9PERLROTH N. Researchers link {lame virus to Stuxnet and Duqu[N]. The New York Times, 2012-05-30.
  • 10STOUFFER K, FALCO J, SCARFONE K. Guide to industrial control systems (ICS) securi- ty, NIST-SP-800-82-2011 [R]. USA: National Institute of Standards and Technology, 2011.

共引文献17

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部