As the development of global economy, electric network has been build large distance, even EHV, UHV direction; the scale becomes larger and more complicated. The power system has made great networking benefits, at the same time, bears potential risks. Especially with the development of the power market reform, the change of management mechanism and new members participate in the market, it is difficult to control the electric network, and the power system is facing great challenge.Security risk assessment management is an important part of modern business management is to ensure that power enterprises an effective means of safety. In recent years, rural power companies are to carry out risk assessment. Include periodic assessment of both the standard and also includes real-time assessment of the content, but how the combination of the daily standardized operations, to achieve real-time assessment, does not give a clear and workable approach. Hazard identification and prevention is the core of real-time assessment, prevention and control of hazard identification and assessment model is to achieve real-time assessment of the key standard operation.The power system has to establish standard scientific safe management system, to meet the needs of production. Power enterprises should according to their own characteristics, to establish risk assessment method, in order to strengthen the safety management.Based on the Monte Carlo method, LEC, risk matrix and a comparative study presents a LEC (or operating conditions of risk assessment method) assessment model, the improved real-time security risk assessment model with those of enterprise security risk assessment and management can be a good combination of practical work. Resulting in a variety of risk factors operating before the likelihood and severity of accidents caused qualitative and quantitative description is given, so a timely reminder and prevention, can effectively prevent accidents.System in the design process of software engineering standards in strict accordance with a detailed needs analysis, the functions of each module is the refinement and analysis. An example was graphically clear and simple description of the relationship between the various entities, such as by using ADO.NET for database access technology to achieve the assessment criteria for allocation and query capabilities, improved system performance and reliability.System user-friendly, simple, functional, after a year of practical application of enterprise security risk assessment and control played a good supporting role. |