Font Size: a A A

Study Of IT Network Security In South Guiyang Power Bureau

Posted on:2005-10-15Degree:MasterType:Thesis
Country:ChinaCandidate:Q L WangFull Text:PDF
GTID:2132360125963789Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
With the development of communication and network technology, more and more control systems are connecting with State Power Data network. Especially the power market is being put into operation, and more data are exchanged. The control system and data network face a big challenge about security, reliability and real time operation. At present, focal point of safe protection in secondary system is to resist evil intention destroying and attack from virus, hacker, etc. through various kinds of form, especially the group type attacks, to lay special stress on protecting the security of real time monitoring system and dispatcher's data network, thus ensure the security of the national important infrastructure power system.The works of this paper are based on the demand of national computer information safety and the actual conditions of information network in Guiyang Power Company and include the following aspects1. Safe assessment is made on computer information network of Guiyang, a whole scheme of safe protection about information network of Guiyang south office is proposed and implemented;2. Confirm the safe protection database platform as the focal point, take effective safety measure to the visiting and controlling of key database (ORACLE), take measures from the hardware and software, control the visit of the database strictly on the premise of guaranteeing to use;3. According to the actual need, special power gap device for power system security are developed.The works above are carried out successfully and the capability for security protection is improved. Thus it can provide timely and correct data to the power system operation. And it benefits the power system operation.The research is leading in China, so it is very useful for reference in power system security protection in the feature.
Keywords/Search Tags:IT Network, Security protection, Power System
PDF Full Text Request
Related items