电力信息系统安全体系设计方法综述A SURVEY TO DESIGN METHOD OF SECURITY ARCHITECTURE FOR POWER INFORMATION SYSTEMS
胡炎,谢小荣,韩英铎,辛耀中
摘要(Abstract):
电力信息系统是由众多复杂异构的子系统组成的超大规模、广域分布和分级递阶的大系统,它的安全是多因素和多维的。为此,需要一种系统化和结构化的设计方法以及相应的辅助工具设计电力信息系统的安全体系。文章阐述了电力信息系统安全体系设计方法的研究现状,并从安全需求的不确定性和系统的动态、分布特征等方面深入分析了信息系统安全体系设计中可能存在的问题,最后明确提出了对电力信息系统安全体系设计方法的要求。
关键词(KeyWords): 电力信息系统;安全体系设计方法;风险管理方法;S2系统
基金项目(Foundation): 国家高技术研究发展计划(863)项目(2002AA145040)。~~
作者(Author): 胡炎,谢小荣,韩英铎,辛耀中
Email:
DOI:
参考文献(References):
- [1]辛耀中.新世纪电网调度自动化技术发展趋势[J].电网技术,2001,25(12):1-10.XinYaozhong.Development trend of power system dispatching automation in21st century[J].PowerSystemTechnology,2001,25(12):1-10.
- [2]胡炎,董名垂,韩英铎.电力工业信息安全的思考[J].电力系统自动化,2002,26(7):1-4.HuYan,DongMingchui,HanYingduo.Consideration of information security for electric power industry[J].Automation ofElectricPowerSystems,2002,26(7):1-4.
- [3]周士跃,王劲松,金小达.地区供电网调度实时数据网络安全分析及对策[J].电网技术,2003,27(10):52-55.ZhouShiyue,WangJinsong,JinXiaoda.Security analysis and countermeasures of real-time dispatching data network for regional power supply network[J].PowerSystemTechnology,2003,27(10):52-55.
- [4]陈思勤.华能上海石洞口第二电厂实时系统安全分析及防护对策[J].电网技术,2004,28(11):72-75.ChenSiqin.Security analysis of real-time systems inHuanengShanghaiShidongkouNo.2 power plant and their protection measures[J].PowerSystemTechnology,2004,28(11):72-75.
- [5]胡炎,辛耀中,韩英铎.二次系统安全体系结构化设计方法[J].电力系统自动化,2003,27(21):63-67.HuYan,XinYaozhong,HanYingduo.A method for the structured security architecture design of secondary systems[J].Automation ofElectricPowerSystems,2003,27(21):63-67.
- [6]ZemelT,RossakW.Mega-Systems——the issue of advanced systems development[A].Proceedings of theSecondInternationalConference onSystemsIntegration[C].Morristown,NJ,USA,1992:548-555.
- [7]韩祯祥,曹一家.电力系统的安全性及防治措施[J].电网技术,2004,28(9):1-6.HanZhenxiang,CaoYijia.Power system security and its prevention[J].PowerSystemTechnology,2004,28(9):1-6.
- [8]BillArbaugh.Security: technical, social, and legal challenges[J].Computer,2002,35(2):109-111.
- [9]NIST SP 800-30,RiskManagementGuide forInformationTechnologySystems[S].
- [10]桂林.大型发电机主保护配置方案优化设计的研究[D].北京:清华大学,2003.
- [11]ISO/IEC TR 13335-3,InformationTechnologyGuidelines for theManagement ofIT SecurityPart3:Techniques for theManagement ofIT Security[S].
- [12]叶吉祥,胡小兵.基于安全策略的企业网络设计探讨[J].长沙电力学院学报(自然科学版),2001,16(1):27-29.YeJixiang,HuXiaobing.Design of enterprise network based on security strategy[J].Journal ofChangshaUniversity ofElectricPower(NaturalScience),2001,16(1):27-29.
- [13]MichaelP Z.Security design in distributed computing applications[D].SaltLakeCity,USA:TheUniversity ofUtah,1993.
- [14]SchweitzerE J.Security news[A].Proceedings of the11thNationalComputerSecurityConference[C].Baltimore,Maryland,USA,1988:17.