Font Size: a A A

Application Research Of Security Protection Of Power Secondary System In Zhongshan

Posted on:2012-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:L XuFull Text:PDF
GTID:2212330371452142Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
Power secondary system is comprised of the power of monitoring system, power communication and data network, which is a complex one. In order to strengthen the power secondary system security protection, guarantee power monitoring system and Electric power dispatching data network security, "security division, network special, horizontal, vertical isolation authentication," the four cardinal principles are proposed for the security protection technology purpose . And the concrete implementation of this principle have been studied to improve the power monitoring system and the data network security, reliability and real-time, guard against all forms of attack and infringement arising from the power system accident.With the help of the experience in implementation of Zhongshan power grid secondary system safety, I made a research on the main method of security engineering, architecture and key technologies under the implementation of the existing conditions. By the contrast analysis, I get the most suitable plan for Zhongshan power secondary system safety protection construction. In this paper, there is a detailed study of its security system architecture, hardware protection device configuration, security policy design and application of risk assessment. And a thorough analysis of the power monitoring system combined with the data network and application network in Zhongshan has been done.Zhongshan power the entire secondary system is divided into four security zones, I zone has the highest level of security, followed by decline, business in a low security level can not be deployed in the high zone, the different security zones with different security measures, the same security zone is not considered protective. Partition makes network structure organized, security boundary clear, and the safety devices deployed conveniently. The same location uses a firewall and isolation devices between the different areas to resist the illegal access, denial of service, and other types of attacks. Meanwhile, the different locations use the Encryption authentication between the same areas to defend against all kinds of attacks such as data eavesdropping, forgery, tampering in process of data transmission.In this paper, the contents of the secondary power system security in Zhongshan protection works in practical application, and the effect is good ,which provides a strong support for Zhongshan network security, stability in the economy.
Keywords/Search Tags:Power Secondary System, Security Protection, Power Data Network, Network -Safety
PDF Full Text Request
Related items