| By the development of China's economy, there are great advance of our power corporation, the relationship between power system and national economy and our life are more and more closer, the power system's problem have directly influence on our economy and our life. To run a secure and reliable power corporation more and more depend on the data and information network of power corporation as the robotization of power system. Any secure problem of the data and information network will directly influence the power supply and people's living, so the research on the key technique is having meaning. This article is mainly discussion the tactic of information security on power system and the technique's system on information security, of course we still have put forward a project on power system's information security.The first chapter mainly discussed the survey of power system and status quo of power system's information network, and have introduced the current and status quo of information security with the need of electric power's information security. In the last part of chapter, there are epitome and explain for this paper.The second chapter have a research on the basal truss of power system's information network, include fore levels which are main county. big area ., province and city. We have discussed the truss of information network and the technique of network, and we also have discussed the basic operation and it's category and characteristic. In the last part of chapter, we have an analyse on the security of power system's information network on the basis of net work's characteristic, and we also have bring forward the main problem of the information security.The third chapter mainly research the cryptology, The field that encompasses both cryptography and cryptanalysis. We have a deeply research on the DES. RSA and HASH, there are discuss on the arithmetic. security. amelioration and transfiguration of the DES. RSA and HASH and have a compare on those cryptography, of course we have find a perfect cryptography for network in the last part of chapter.The four chapter mainly on network security tactic and key technique for the power system's information network, and have a particular analyse on the menace of network security form both physical and logistic ways. We can see the familiar hidden trouble of network security and familiar ways to attack the power system's information network, and we also have a research on the safeguard of network, for example the firewal. ID affirmance. prevention and cure for the computer virus and the IDS. In the last part we have draw a conclude for the practice of power system on the basis of network secure theory.The fifth chapter have introduce the national regulation on power system's information network and tell us the main request and principle for the security of network. We have draw a good project for the security of power system's information network on the practice and other plans. The emphases of this chapter are the insulation between surveillant network and information network. the dispose of firewall and IDS and the prevention and cure for the network virus etc, and we have made a programme for theneed of data transmission, and there are flow chart in the last part of chapter for it.The sixth chapter have a summarization on all the paper, and show us the foreground of network secure technique for the power system's information network. |