浏览全部资源
扫码关注微信
1. 淮浙煤电有限责任公司,安徽 淮南 232000
2. 浙江省能源集团有限公司,浙江 杭州 317000
3. 浙江浙能技术研究院有限公司,浙江 杭州 317000
4. 浙江浙能工业信息工程重点企业研究院,浙江 杭州 317000
[ "刘道远(1972- ),男,淮浙煤电有限责任公司高级工程师,主要研究方向为能源工程及自动化" ]
[ "孙科达(1980- ),男,浙江省能源集团有限公司高级工程师,主要研究方向为能源信息技术" ]
[ "周君良(1973- ),男,浙江浙能技术研究院有限公司高级工程师,主要研究方向为能源信息技术" ]
[ "范海东(1979- ),男,浙江浙能技术研究院有限公司、浙江浙能工业信息工程重点企业研究院教授级高级工程师,主要研究方向为能源工程及自动化" ]
网络出版日期:2020-03,
纸质出版日期:2020-03-20
移动端阅览
刘道远, 孙科达, 周君良, 等. 模糊综合评判法在电力企业网络信息安全评估中的应用[J]. 电信科学, 2020,36(3):34-41.
Daoyuan LIU, Keda SUN, Junliang ZHOU, et al. Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises[J]. Telecommunications science, 2020, 36(3): 34-41.
刘道远, 孙科达, 周君良, 等. 模糊综合评判法在电力企业网络信息安全评估中的应用[J]. 电信科学, 2020,36(3):34-41. DOI: 10.11959/j.issn.1000-0801.2020065.
Daoyuan LIU, Keda SUN, Junliang ZHOU, et al. Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises[J]. Telecommunications science, 2020, 36(3): 34-41. DOI: 10.11959/j.issn.1000-0801.2020065.
现今电力企业已经实现了信息化的经营生产,网络信息安全评估工作的重要性日益显著。采用二级模糊综合评判法对一种基于PDRR模型的电力企业网络信息安全系统进行安全等级评估,并采用Delphi法对评估过程中电力影响企业网络安全的各项因素的权重系数进行确定,通过对评估结果的客观分析,找出电力企业网络信息安全系统中存在的突出问题,做出相应的安全加固。验证结果表明,优化后的网络信息安全模型更为坚固,实用性和可操作性都显著提升,有效提高了电力企业的网络信息安全等级,可以作为其他电力企业网络信息安全建设的有利参照。
Nowadays
electric power enterprises have realized the operation and production of information technology
and the importance of network information security evaluation is more and more obvious.Two-level fuzzy comprehensive evaluation method was used to evaluate the security level of network information security system of power enterprises based on PRDD model
and Delphi method was used to determine the weight coefficients of various factors of network security of power enterprises in the evaluation process.Through objective analysis of the evaluation results
the network credit of power enterprises was found out.The prominent problems existing in the informa tion security system should be solved and the corresponding security reinforcement scheme should be formulated.The validation results show that the optimized network information security model is more robust
practicability and operability are significantly improved
which effectively improve the network information security level of power enterprises
and can be used as a favorable reference for the construction of network information security of other power enterprises.
周慎学 , 范渊 , 夏克晁 , 等 . 台二电厂工控系统信息安全防护体系的建设 [J ] . 中国电力 , 2017 , 50 ( 8 ): 53 - 57 .
ZHOU S X , FAN Y , XIA K C , et al . Construction of information security protection system for industrial control system in Taizhou 2nd power plant [J ] . Electric Power , 2017 , 50 ( 8 ): 53 - 57 .
王波 , 王威 , 李丰伟 . 电网集中监控下海量信息导致的安全风险及应对策略 [J ] . 中国电力 , 2015 , 48 ( 12 ): 27 - 32 .
WANG B , WANG W , LI F W . Research on grid security risk and response strategies on centralized monitoring of massive information [J ] . Electric Power , 2015 , 48 ( 12 ): 27 - 32 .
张瑞敏 , 冯建民 . 信息安全及其在电力系统中的应用 [J ] . 中国电力教育 , 2012 ( z2 ): 458 - 459 .
ZHANG R M , FENG J M . Research on grid security risk and response strategies on centralized monitoring of massive information [J ] . China Electric Power Education , 2012 ( z2 ): 458 - 459 .
朱晓燕 , 方泉 . 美国电力行业信息安全运作机制和策略分析 [J ] . 中国电力 , 2015 , 48 ( 5 ): 81 - 88 .
ZHU X Y , FANG Q.Study on mechanism and strategy of cyber security in U.S . electric power industry [J ] . Electric Power , 2015 , 48 ( 5 ): 81 - 88 .
赵婷 , 高昆仑 , 郑晓崑 , 等 . 智能电网物联网技术架构及信息安全防护体系研究 [J ] . 中国电力 , 2012 , 45 ( 5 ): 87 - 90 .
ZHAO T , GAO K L , ZHENG X K , et al . Research on technical framework and cyber security protection system of IoT in smart grid [J ] . Electric Power , 2012 , 45 ( 5 ): 87 - 90 .
何蕾 . 基于改进 PDRR 模型的电力企业网络安全模型研究 [D ] . 北京:华北电力大学 , 2015 .
HE L . Research on power enterprise network security model based on improved PDRR model [D ] . Beijing:North China Electric Power University , 2015 .
付沙 , 宋丹 . 基于AHP和模糊综合评判的信息安全风险评估方法 [J ] . 实验室研究与探索 , 2012 , 31 ( 6 ): 207 - 210 .
FU S , SONG D . An information security risk assessment method based on AHP and fuzzy comprehensive evaluation [J ] . Research and Exploration in Laboratory , 2012 , 31 ( 6 ): 207 - 210 .
吴文刚 , 张志文 , 王庆生 . 基于模糊综合评判和AHP信息安全风险评估模型 [J ] . 重庆理工大学学报(自然科学版) , 2017 , 31 ( 7 ): 156 - 161 .
WU W G , ZHANG Z W , WANG Q S . A information security risk assessment model based on AHP and fuzzy comprehensive evaluation [J ] . Journal of Chongqing Institute of Technology (Natural Science) , 2017 , 31 ( 7 ): 156 - 161 .
杨肖 , 杨力 , 杨子纯 . 基于模糊层次分析的工业 SCADA 安全风险评估方法研究与应用 [J ] . 计算机应用与软件 , 2017 , 34 ( 5 ): 54 - 60 .
YANG X , YANG L , YANG Z C . Research and application of industrial SCADA security risk assessment method based on fuzzy AHP [J ] . Computer Applications and Software , 2017 , 34 ( 5 ): 54 - 60 .
姚晓勇 , 徐略红 , 黄华平 , 等 . 电力企业信息安全防护体系的构建与实现 [J ] . 自动化技术与应用 , 2018 , 37 ( 9 ): 150 - 155 .
YAO X Y , XU L H , HUANG H P , et al . Establishment and implementation of information security protection system in power enterprises [J ] . Techniques of Automation and Applications , 2018 , 37 ( 9 ): 150 - 155 .
李冰霞 . 电力信息网络安全态势评估与预测方法研究 [D ] . 保定:华北电力大学 , 2014 .
LI B X . Research on security situation assessment and prediction method of electric power information network [D ] . Baoding:North China Electric Power University , 2014 .
HERVE C , FREDERIC G . Maturity assessment and process improvement for information security management in small and medium enterprises [J ] . Journal of Software:Evolution and Process , 2014 , 26 ( 5 ): 496 - 503 .
石江红 . 基于模糊测度理论的电力通信网风险评估 [D ] . 保定:华北电力大学 , 2017 .
SHI J H . Risk assessment of electric power communication network based on fuzzy measure theory [D ] . Baoding:North China Electric Power University , 2017 .
崇小蕾 , 庄子旻 , 路超 , 等 . 基于层次模糊综合评价法的信息安全评价 [J ] . 信息安全与通信保密 , 2014 ( 11 ): 137 - 139 ,143.
CHONG X L , ZHUANG Z M , LU C , et al . Information security analysis based on AHP and fuzzy comprehensive evaluation [J ] . Information Security and Communications Privacy , 2014 ( 11 ): 137 - 139 ,143.
王姣 , 范科峰 , 莫玮 . 基于模糊集和DS证据理论的信息安全风险评估方法 [J ] . 计算机应用研究 , 2017 , 34 ( 11 ): 3432 - 3436 .
WANG J , FAN K F , MO W . Method for information security risk assessment based on fuzzy set theory and DS evidence theory [J ] . Application Research of Computers , 2017 , 34 ( 11 ): 3432 - 3436 .
苏琦 , 王玮 , 刘荫 , 等 . 电力行业的信息安全防护方案研究 [J ] . 信息网络安全 , 2017 ( 11 ): 84 - 88 .
SU Q , WANG W , LIU Y , et al . Research on the scheme of information security protection in electric power industry [J ] . Netinfo Security , 2017 ( 11 ): 84 - 88 .
王静 , 高昆仑 , 张波 . 基于网络隔离与安全数据交换的发电集团双网体系研究与设计 [J ] . 电信科学 , 2017 , 33 ( 2 ): 163 - 172 .
WANG J , GAO K L , ZHANG B . Research and design in dual network scheme of power corporation based on network isolation and secure data exchange [J ] . Telecommunications Science , 2017 , 33 ( 2 ): 163 - 172 .
梁智强 , 林丹生 . 基于电力系统的信息安全风险评估机制研究 [J ] . 信息网络安全 , 2017 ( 4 ): 86 - 90 .
LIANG Z Q , LIN D S . Information security risk assessment mechanism research based on power system [J ] . Netinfo Security , 2017 ( 4 ): 86 - 90 .
姜红红 , 张涛 , 赵新建 , 等 . 基于大数据的电力信息网络流量异常检测机制 [J ] . 电信科学 , 2017 , 33 ( 3 ): 134 - 141 .
JIANG H H , ZHANG T , ZHAO X J , et al . A big data based flow anomaly detection mechanism of electric power information network [J ] . Telecommunications Science , 2017 , 33 ( 3 ): 134 - 141 .
王凯 , 李婉卿 , 白雨欣 . 基于模糊综合评判法的电力系统安全评估 [J ] . 数字技术与应用 , 2019 , 37 ( 1 ): 65 - 67 .
WANG K , LI W Q , BAI Y X . Power system security assessment based on fuzzy comprehensive evaluation method [J ] . Digital Technology and Application , 2019 , 37 ( 1 ): 65 - 67 .
0
浏览量
257
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构