期刊文献+

智能充电桩信息安全风险评估流程研究 被引量:3

Research on Information Security Risk Assessment Process of Intelligent Charging Pile
下载PDF
导出
摘要 随着新能源汽车的普及,智能充电桩也越来越多地出现在人们的日常生活中。它们不仅具有充电功能,还可以与管理平台进行交互,从而实现用户的认证、充电计费、用户信息收集等功能。在这些信息交互的过程中,信息安全的问题也随之而来。如果不加以重视,会造成巨大的财产损失。信息安全问题的发现依靠周期性的风险评估。它是系统信息安全评估的重要环节之一,包括以下四个方面:资产评估、威胁评估、脆弱性评估和保障能力评估。在研究智能充电桩具体应用场景,并且参考大量风险评估相关的文献内容后,基于前述的四个方面,可以归纳出一种针对智能充电桩信息安全风险评估的实施方法。该研究旨在对智能充电桩信息安全风险评估流程提供一套切合实际应用场景、规范化的方法,对于推动智能充电桩应用场景下信息安全技术要求的落地具有重要意义。 Along with the popularity of new energy vehicles, intelligent charging piles are increasingly appearing in people’s daily life. They not only have charging functions, but also can interact with the management platform, to realize user authentication, charging billing, user information collection and other functions. In the process of these information interactions, the problem of information security comes along, which can cause huge property losses if not taken seriously. The discovery of information security issues relies on periodic risk assessment, which is one of the important aspects of system information security assessment, including the following four aspects: asset assessment, threat assessment, vulnerability assessment and assurance capability assessment. After studying the specific application scenarios of intelligent charging piles and referring to a large amount of literature content related to risk assessment, an implementation method for information security risk assessment of intelligent charging piles can be summarized based on the four aspects. This research aims to provide a set of standardized methods for the information security risk assessment process of intelligent charging piles to meet the actual application scenarios, which is of great significance to promote the implementation of information security technical requirements in the application scenarios of intelligent charging piles.
作者 忻奕敏 叶琼瑜 任悦 张倩 XIN Yimin;YE Qiongyu;REN Yue;ZHANG Qian(Shanghai Testing&Inspection Institute for Electrical Equipment Co.,Ltd.,Shanghai 200063,China)
出处 《自动化仪表》 CAS 2022年第7期91-95,共5页 Process Automation Instrumentation
关键词 信息安全 风险评估 智能充电桩 资产评估 威胁评估 脆弱性评估 保障能力 数据交互 Information security Risk assessment Intelligent charging piles Asset assessment Threat assessment Vulnerability assessment Assurance capability Data interaction
  • 相关文献

参考文献5

二级参考文献25

  • 1付钰,吴晓平,严承华.基于贝叶斯网络的信息安全风险评估方法[J].武汉大学学报(理学版),2006,52(5):631-634. 被引量:39
  • 2江常青,彭勇,林家骏,王贵驷.基于CMM的信息系统安全保障模型[J].计算机工程与应用,2006,42(34):112-115. 被引量:6
  • 3米歇尔·沃尔德罗普 陈玲译.复杂-诞生于秩序与混沌边缘的科学[M].北京:三联书店,1997..
  • 4Bihanic D, Polacsek T. Models for visualisation of Complex Information Systems[ C]//Infnrmation Visualisation (Ⅳ) ,2012 16th International Conference on. IEEE ,2012 : 130 - 135.
  • 5Razavi M, Aliee F S, Badie K. An AHP-based approach toward enter-prise architecture analysis based on enterprise architecture quality at- tributes [ J ]. Knowledge and information systems, 2011,28 ( 2 ) : 449 - 472.
  • 6Zhang C, Wang F. Construction of forestry e-government system based on Zachman frame theory [ C ]//E-Business and E-Government ( ICEE ), 2011 International Conference on. IEEE,2011 : 1 - 4.
  • 7Zachman J A. Enterprise Architecture : The Issue of the Century [ J ]. Database Programming & Design ,2007,10 (3) :44 - 57.
  • 8Santos F J N,Santoro F M, Cappelli C. Crosscutting concerns at enter- prise architecture level [ C ]//Systems, Man, and Cybernetics ( SMC ), 2011 IEEE International Conference on. IEEE ,2011:345 - 350.
  • 9GB/T20274-2008.信息安全技术信息系统安全保障评估框架[S].北京:国家质检总局,2008.
  • 10刘念,张建华,张昊.网络环境下变电站自动化系统的信息资产识别[J].电力系统自动化,2009,33(13):53-57. 被引量:6

共引文献43

同被引文献21

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部