Font Size: a A A

Design And Implementation Of Grid Scheduling Information Security Audit System

Posted on:2016-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y XuFull Text:PDF
GTID:2298330467997491Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As a particular organization of electricity industrial production, grid scheduling plays avital role in the security and stability of the power system. With the rapid development of gridDispatching informatization, the security, stability and canonical of grid scheduling get greatpromotion and enhancement. But at the same time, certain information security risks arebrought to grid scheduling, and a higher requirement is put forward to information securitymanagement of the existing power grid.Based on the analysis of the grid information security development and the status quo ofexisting grid scheduling audits, Grid scheduling information security audit system is designedto effectively defend against the destruction and attacks of hackers, viruses, and otherinformation which launched through the grid scheduling system management or technicalflaws on the grid.This paper clarifies the status quo of grid scheduling information development, carriesout the the functional requirements analysis of grid security audit management system;integrates the security audit-related information resources, including condition monitoring,audit logs, database auditing, network audit, security and other resources. A system design isput forward to meet the requirements of the system, including architecture design, functionaldesign, network deployment design, database design, and the detailed design of informationsecurity audit is carried out. The entire system includes the Web management subsystem andcollection-service management subsystem. The Web management subsystem realizes thefunction of management modules, real-time monitoring module, audit analysis module and soon, configures and monitors the security audit system permissions, equipment accounting,collection and other contents, and displays the data analysis. Collection-service managementsubsystem mainly collects the data of security acquisition equipment based on managementconfiguration, analyses the collected data and put out alarm processing. This article focus onthe detailed design of the content and effects of the section of the real-time monitoringmodule and management modules in Web management subsystem. The design of the system based on the existing information security Technology (likenetwork defense, intrusion detection, host protection, State monitoring, etc.), is fully integratethe various of information security technology,eliminate the isolated island of securityinformation, also can to locate the fault.At the same time can monitor the informationsecurity realtimely, meet the different needs of information system security to Customizedpersonalized alarm rules, ensure to rapidly find safe hidden trouble, and to take measures.The paper will focus on the overall system requirements and design, and theimplementation the Web subsystem. Through the Web subsystem not only provides moreconvenient way to configure and manage the system, but also more various way to display themonitoring information and security audit data.Implementation of information security audit system, deployment according to thecharacteristics and risk control requirements of grid scheduling information system, andintegration of existing security technology resources, strengthen the monitoring of gridscheduling information system operating environment, users, system operation, effectivelyimprove the power grid scheduling information security, and reduce the security risks.
Keywords/Search Tags:Power Grid Dispatching, Information Security, Security Audit, Information Security Monitoring
PDF Full Text Request
Related items