浏览全部资源
扫码关注微信
1. 中广核智能科技(深圳)有限责任公司,广东 深圳 518026
2. 上海中广核工程科技有限公司,上海 200241
3. 中国广核集团有限公司,广东 深圳 518026
[ "陈伟雄(1974- ),男,中广核智能科技(深圳)有限责任公司高级工程师,主要从事网络安全情报、网络安全态势感知研究等工作" ]
[ "杨晓晨(1963- ),男,上海中广核工程科技有限公司高级工程师、副总工程师,主要从事网络安全与数字化转型规划、网络安全演习技术研究工作" ]
[ "春增军(1973- ),男,博士,中广核智能科技(深圳)有限责任公司研究员级高级工程师,主要从事网络安全架构与网络安全技术研究工作" ]
[ "李若兰(1982- ),女,中国广核集团有限公司高级工程师,主要从事网络安全等保测评、应急演练等工作" ]
[ "张华(1980- ),女,中广核智能科技(深圳)有限责任公司工程师,主要从事网络安全管理、网络安全管理平台设计开发等工作" ]
网络出版日期:2022-07,
纸质出版日期:2022-07-20
移动端阅览
陈伟雄, 杨晓晨, 春增军, 等. 电力企业网络安全威胁情报管理体系的研究与实践[J]. 电信科学, 2022,38(7):184-189.
Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, et al. Research and practice of network security threat intelligence management system for power enterprise[J]. Telecommunications science, 2022, 38(7): 184-189.
陈伟雄, 杨晓晨, 春增军, 等. 电力企业网络安全威胁情报管理体系的研究与实践[J]. 电信科学, 2022,38(7):184-189. DOI: 10.11959/j.issn.1000-0801.2022133.
Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, et al. Research and practice of network security threat intelligence management system for power enterprise[J]. Telecommunications science, 2022, 38(7): 184-189. DOI: 10.11959/j.issn.1000-0801.2022133.
网络安全是国家安全的重要组成部分,网络安全威胁情报工作成为网络安全防护工作重要内容,针对电力企业开展网络安全威胁情报来源多、种类多、范围广、漏洞风险多、涉及部门和人员多等问题,提出了电力企业网络安全威胁情报工作方案,方案包括情报来源、情报研判、情报处置、情报平台、情报绩效 5 个方面,设计了网络安全漏洞评估方法、情报标准化处理流程、情报绩效评价方法。初步应用结果表明该方案对提升电力企业网络安全情报应急处置能力、网络安全防护能力水平具有重要参考价值。
Network security is an important part of the national security
and network security threat intelligence work has become an important part of the network security protection.Aiming at the problems of power enterprise carrying out network security threat intelligence
such as many sources
many types
wide range
many vulnerability risks
many subordinate departments and personnel
the network security threat intelligence work plan of power enterprise was put forward.The scheme includes five aspects: information source
information research and judgment
information disposal
information platform and information performance.The evaluation method of network security vulnerabilities
information emergency disposal process and information performance evaluation method were puts forward.The preliminary application results show that the proposed scheme has important reference value for power enterprise to improve the emergency response ability of network security information and the level of network security protection ability.
王长杰 , 李志华 , 张叶 . 一种针对恶意软件家族的威胁情报生成方法 [J ] . 信息网络安全 , 2020 , 20 ( 12 ): 83 - 90 .
WANG C J , LI Z H , ZHANG Y . A threat intelligence generation method for malware family [J ] . Netinfo Security , 2020 , 20 ( 12 ): 83 - 90 .
陈剑锋 , 范航博 . 面向网络空间安全的威胁情报本体化共享研究 [J ] . 通信技术 , 2018 , 51 ( 1 ): 171 - 177 .
CHEN J F , FAN H B . Ontological threat intelligence sharing in cyberspace security [J ] . Communications Technology , 2018 , 51 ( 1 ): 171 - 177 .
陈明 , 王乔保 , 汤文峤 . 网络空间安全战略情报保障能力研究 [J ] . 情报杂志 , 2020 , 39 ( 4 ): 127 - 131 .
CHEN M , WANG Q B , TANG W Q . The capability of strategic intelligence supporting for cyberspace security [J ] . Journal of Intelligence , 2020 , 39 ( 4 ): 127 - 131 .
徐锐 , 陈剑锋 , 刘方 . 网络空间安全威胁情报及应用研究 [J ] . 通信技术 , 2016 , 49 ( 6 ): 758 - 763 .
XU R , CHEN J F , LIU F . Research on cyber threat intelligence and applications [J ] . Communications Technology , 2016 , 49 ( 6 ): 758 - 763 .
徐留杰 , 翟江涛 , 杨康 , 等 . 一种多源网络安全威胁情报采集与封装技术 [J ] . 网络安全技术与应用 , 2018 ( 10 ): 23 - 26 .
XU L J , ZHAI J T , YANG K , et al . A multi-source network se-curity threat intelligence collection and packaging technology [J ] . Network Security Technology & Application , 2018 ( 10 ): 23 - 26 .
朱薏 . 计算机网络安全分层评价防护体系的构建与应用研究 [J ] . 大众标准化 , 2020 ( 24 ): 50 - 51 .
ZHU Y . Research on the construction and application of hierar-chical evaluation and protection system for computer network security [J ] . Popular Standardization , 2020 ( 24 ): 50 - 51 .
吴仲 . 计算机网络安全风险评价及防范措施探析 [J ] . 电子技术与软件工程 , 2015 ( 19 ): 216 .
WU Z . Computer network security risk assessment and analysis of preventive measures [J ] . Electronic Technology & Software Engineering , 2015 ( 19 ): 216 .
黄欣 . 计算机网络安全威胁与防范措施 [J ] . 产业与科技论坛 , 2011 , 10 ( 5 ): 95 - 96 .
HUANG X . Computer network security threats and precau-tions [J ] . Industrial & Science Tribune , 2011 , 10 ( 5 ): 95 - 96 .
林晨希 , 薛丽敏 , 韩松 . 浅析网络安全威胁情报的发展与应用 [J ] . 网络安全技术与应用 , 2016 ( 6 ): 12 - 13 , 15 .
LIN C X , XUE L M , HAN S . A brief analysis of the development and application of cybersecurity threat intelligence [J ] . Network Security Technology & Application , 2016 ( 6 ): 12 - 13 , 15 .
王晓周 , 乔喆 , 李雨昂 , 等 . 基础电信企业网络安全威胁情报工作思路探讨 [J ] . 电信工程技术与标准化 , 2018 , 31 ( 12 ): 7 - 12 .
WANG X Z , QIAO Z , LI Y A , et al . Discussion on cyber secu-rity threat intelligence work of telecom operators [J ] . Telecom Engineering Technics and Standardization , 2018 , 31 ( 12 ): 7 - 12 .
刘俊博 , 马博克 . 网络安全模糊风险评价方法与应用 [J ] . 网络安全技术与应用 , 2020 ( 5 ): 3 - 4 .
LIU J B , MA B K . Network security fuzzy risk assessment me-thod and application [J ] . Network Security Technology & Ap-plication , 2020 ( 5 ): 3 - 4 .
董聪 , 姜波 , 卢志刚 , 等 . 面向网络空间安全情报的知识图谱综述 [J ] . 信息安全学报 , 2020 , 5 ( 5 ): 56 - 76 .
DONG C , JIANG B , LU Z G , et al . Knowledge graph for cy-berspace security intelligence:a survey [J ] . Journal of Cyber Security , 2020 , 5 ( 5 ): 56 - 76 .
林玥 , 刘鹏 , 王鹤 , 等 . 网络安全威胁情报共享与交换研究综述 [J ] . 计算机研究与发展 , 2020 , 57 ( 10 ): 2052 - 2065 .
LIN Y , LIU P , WANG H , et al . Overview of threat intelligence sharing and exchange in cybersecurity [J ] . Journal of Computer Research and Development , 2020 , 57 ( 10 ): 2052 - 2065 .
黄克振 , 连一峰 , 冯登国 , 等 . 基于区块链的网络安全威胁情报共享模型 [J ] . 计算机研究与发展 , 2020 , 57 ( 4 ): 836 - 846 .
HUANG K Z , LIAN Y F , FENG D G , et al . Cyber security threat intelligence sharing model based on blockchain [J ] . Jour-nal of Computer Research and Development , 2020 , 57 ( 4 ): 836 - 846 .
尹立君 . 基于大数据下的网络安全威胁感知决策指挥系统设计 [J ] . 邯郸职业技术学院学报 , 2020 , 33 ( 1 ): 63 - 66 , 90 .
YIN L J . Design of network security threat perception decision command system based on big data [J ] . Journal of Handan Poly-technic College , 2020 , 33 ( 1 ): 63 - 66 , 90 .
肖俊芳 . 网络安全威胁情报概述 [J ] . 保密科学技术 , 2016 ( 6 ): 12 - 15 .
XIAO J F . Cybersecurity threat intelligence overview [J ] . Secrecy Science and Technology , 2016 ( 6 ): 12 - 15 .
0
浏览量
288
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构