Font Size: a A A

The Design And Implementation Of Secure Internal Control Operation Audit System Based On Protocol Proxy

Posted on:2019-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:X LiuFull Text:PDF
GTID:2382330590475233Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The security of power grid information system is an important foundation for the stable operation of power grid.In the process of deep integration of information and power industry,the security threat from the enterprise is becoming an urgent problem to be solved urgently.At present,after the level of protection and rectification construction and power monitoring system security protection construction,the information security of the power industry in the network boundary protection,communication channel encryption,malicious code protection,intrusion detection protection and other external security protection and control capabilities,based on the need to focus resources and strength to carry out internal operation and maintenance safety and audit system construction.By combing the current situation and problems of the security internal control and audit of the operation and maintenance of the power industry information system,this thesis leads to the requirement analysis of the security internal control operation and maintenance audit system based on the protocol agent,and focuses on the design of the remote operation and maintenance management and the audit process of the information system,and the overall architecture,main functional modules and database of the operation and maintenance audit system.Finally,the implementation of the important functional modules is described,and the prototype of the system is tested to meet the functional and performance requirements.Security internal control operation and maintenance audit system based on the protocol proxy can provide support for authentication,authorization and audit in operation and maintenance process through centralizing management of equipment,personnel(roles)and account numbers.At the same time,all personnel are controlled,and the security operation management system is the only login entry to ensure that all operations are recorded and audited and traceable.This system can prevent the internal users from the irregular operation of the security zone to make up for the traditional IT operation and maintenance short board,and it can effectively reduce the power industry internal information security risks,greatly improve the power system compliance operation and maintenance level and information security capabilities.
Keywords/Search Tags:Electric Power Information Security, Operation Audit, Protocol Proxy, Security Internal Control
PDF Full Text Request
Related items