Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 482-484.

Previous Articles    

Comprehensive Evaluation Research of Information Security Based on Power System

XU Hui,LIANG Cheng-dong and CHENG Jun-chun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to effectively solve the suboptimal problems of comprehensive information security based on power system,this paper combined with the specific environmental of power system,and designed a comprehensive evaluation architecture of information security.This architecture links these variable factors that contain technology,management,strategy,system,monitor,and evaluates the develope synergistic degree of these variable factors.Analysis shows that only ensuring synergetic development of these variable factors can optimize the information security level of power system efficiently.

Key words: Information security,Synergetics,Evaluation architecture,Power system

[1] 李丈武,游文霞,王先培.电力系统信息安全研究综述[J].电力系统保护与控制,2011,39(10):140-147
[2] Andersonl E E,Choobineh J.Enterprise information securitystrategies [J].Computers & Security,2008,27:22-29
[3] 罗嘉,李连友.基于协同学的金融监管协同度研究 [J].财贸经济,2009,(3):15-19
[4] Colwill C.Human factors in information security:The insiderthreate Who can you trust these days ?[J].Information Securi-ty Technical Report,2009,4:186-196
[5] 陶长琪,陈文华,林龙辉.我国产业组织演变协同度的实证分析-以企业融合背景下的我国IT产业为例[J].管理世界,2007(12):67-72
[6] 彭端旭.浅谈电力应急管理及建设重点[J].东北电力大学学报,2007(5):11-12
[7] 张鑫,陈雪华,刘新.电力系统信息安全基线标准体系的构建[J].电力信息与通信技术,2013,11(11):110-114
[8] Ashenden D.Information Security management:A human challenge [J].Information Security Technical Report,2008,13:195-201

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!