Font Size: a A A

Study On Security Analysis And Management For Chongqing Power Data Network

Posted on:2006-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:H PengFull Text:PDF
GTID:2132360182977204Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
In this thesis, 21th century oriented China state power data network (SPD net or CED net) and power system dispatching automation technique are summarized. With the development of the computer technology, Information processing technology and communication technology, the production and management of electric power industry have entered into information era. The information security of electric power, in particular security of electric power dispatching automation network has important action for the security, steady and economy operation of electric power system. The information security of electric power system has arranged into demonstrate engineering by the national science and technology department. So, the thesis theme selected is of great signification theory sense and practical value.The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.On the based, a novel PPDR security expression model (policy, protection, detection, response) is adopted, which nucleus is security policy, which characteristic is dynamic and time-based. According to PPDR model, the risk is reduced to least.According to the current case of Chongqing power data network(CQPDnet), the security threats for every layers of the physics, network, management and electric power dispatching system are analyzed, and then the CQPDnet security requirements are analyzed, including the policy and Management system, professional system, security service and advisory, layer security and internal entirety security . The CQPDnet security system frame is designed.The CQPDnet security management is studied. The policy, object, task, principle, program and method of the security management are plotted.The resolve schemes of the information security regulation, security product and technology are presented. The partial schemes are implemented. And effect is very satisfactory.
Keywords/Search Tags:information, security, data network, security management
PDF Full Text Request
Related items