Research on information security system of waste terminal disposal process

被引:1
作者
Zhou, Chao [1 ]
Wang, Ziying [1 ]
Guo, Jing [1 ]
Guo, Yajuan [1 ]
Huang, Wei [1 ]
机构
[1] State Grid Jiangsu Elect Power Res Inst, Nanjing 211100, Jiangsu, Peoples R China
来源
2017 INTERNATIONAL SYMPOSIUM ON RESOURCE EXPLORATION AND ENVIRONMENTAL SCIENCE (REES 2017) | 2017年 / 64卷
关键词
D O I
10.1088/1755-1315/64/1/012074
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
引用
收藏
页数:6
相关论文
共 8 条
[1]   Information security strategies: towards an organizational multi-strategy perspective [J].
Ahmad, Atif ;
Maynard, Sean B. ;
Park, Sangseo .
JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) :357-370
[2]   A survey of cyber security management in industrial control systems [J].
Knowles, William ;
Prince, Daniel ;
Hutchison, David ;
Disso, Jules Ferdinand Pagna ;
Jones, Kevin .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 9 :52-80
[3]  
Legros Benjamin, 2016, PERFORM EVALUATION, V99, P37
[4]  
LU YR, 2015, J MED SYSTEMS, V39
[5]   Technical challenges for electric power industries With implementation of distribution system automation in smart grids [J].
Muttaqi, Kashem M. ;
Aghaei, Jamshid ;
Ganapathy, Velappa ;
Nezhad, Ali Esmaeel .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2015, 46 :129-142
[6]   Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges [J].
Sajid, Anam ;
Abbas, Haider ;
Saleem, Kashif .
IEEE ACCESS, 2016, 4 :1375-1384
[7]   A multidimensional approach to information security risk management using FMEA and fuzzy theory [J].
Silva, Maisa Mendonca ;
Henriques de Gusmao, Ana Paula ;
Poleto, Thiago ;
Camara e Silva, Lucio ;
Cabral Seixas Costa, Ana Paula .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2014, 34 (06) :733-740
[8]   Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks [J].
Vollmer, Todd ;
Manic, Milos .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) :1337-1347