期刊文献+

油气管道SCADA系统工控安全分析 被引量:2

Industrial control security analysis of SCADA system for oil and gas pipeline
下载PDF
导出
摘要 近年来全球工业信息安全事件频发,为加强油气管道SCADA系统的安全防护能力,提出基于资产、威胁源、脆弱性进行分析的工控安全风险分析方法。通过对系统中存在的资产进行整理归纳,找出系统面临的威胁源及存在的脆弱性利用途径,并结合某油气管道的调控中心及场站进行分析,从而找出系统可能存在的风险,为管理员部署系统安全防护措施提供参考依据。 In recent years,global industrial information security events occur frequently.In order to strengthen the security protection ability of oil and gas pipeline SCADA system,this paper proposes an industrial control security risk analysis method based on the analysis of assets,threat sources and vulnerability.By sorting out and summarizing the existing assets in the system,the threat sources and the existing vulnerability utilization ways of the system are found out.Combined with the analysis of the control center and the station of an oil and gas pipeline,the possible risks of the system are found out,which provides a reference for the administrator to deploy system security protection measures.
作者 刘锐 薛金良 包贤晨 王永军 郑承洧 Liu Rui;Xue Jinliang;Bao Xianchen;Wang Yongjun;Zheng Chengwei(SINO-PIPELINE International Company,Beijing 100029,China;Zhejiang Guoli Security Technology Co.,Ltd.,Ningbo 315000,China)
出处 《信息技术与网络安全》 2021年第11期1-7,共7页 Information Technology and Network Security
关键词 工业控制系统 风险分析 油气管道 industrial control system risk analysis oil and gas pipelines
  • 相关文献

参考文献10

二级参考文献85

  • 1孟邹清.第一讲 新工业形态下功能安全技术发展及安全一体化概述[J].仪器仪表标准化与计量,2020(1):12-16. 被引量:2
  • 2陈星,贾卓生.工业控制网络的信息安全威胁与脆弱性分析与研究[J].计算机科学,2012,39(S2):188-190. 被引量:29
  • 3高国辉.西门子被曝工业系统漏洞或影响多数工业化国家[N].南方日报.2011-6-8.
  • 4ANSI. Std. 99.00.01 Security for industrial automation and control systems part 1 [ S]. ISA,2007.
  • 5Valenzano A, Durante L, Cheminod M. Review of security issues in industrial networks [ J ]. IEEE Transactions on Industrial Infonnatics ,2013,9( 1 ) :277-293.
  • 6Stouffer K,Falco J ,Scarfon K E. Guide to industrial control systems(ICS) security [ S ]. NIST Special Pulication ,2(I)8.
  • 7ISA99. IEC 62443 Industrial control network & system security standardization [ S ]. ISA,2011.
  • 8Kang D J, Lee J J, Kim S J, et al. Analysis on cyber threats to SCADA systems [ C ]//IEEE Transmission & Distribution Conference & Exposition,2009 :1-4.
  • 9Ralston P A S, Graham J H, Hieb J L. Cyber security risk assessment for SCADA and DCS networks [ J ]. ISA Transactions,2007,46 (4) : 583-594.
  • 10Tolga E, Demircan M, Kahraman C. Operating system selection using fuzzy replacement analysis and analytic hierarchy process [ J ]. International Journal of Production Economics ,2005,97 ( 1 ) :89-117.

共引文献109

同被引文献62

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部