Font Size: a A A

Security Design And Application Of Secondary Power System Based On Classified Protection 2.0

Posted on:2022-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2492306539960729Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
Power secondary system refers to the business system,intelligent equipment and supporting communication network used for power monitoring and control.In recent years,the international situation is becoming complicated relationship,to the national power system and other infrastructure operations lifeblood of industrial systems,is becoming important targets of hostile states and terrorists,the security situation is becoming increasingly grim.Events such as "Stuxnet" and "Black Energy" show that the destructiveness of cyber attacks has extended from traditional virtual space to physical infrastructure involving the national economy and people’s livelihood,and has caused huge losses to the target system.The State Electricity Regulatory Commission and the Energy Administration have formulated a series of safety protection regulations and norms in recent years.The country promulgated the "Cybersecurity Law of the People’s Republic of China " in 2016.With the development of information technology,industrial control,cloud computing,and mobile Internet,after years of accumulation,Classified protection of cybersecurity standard has been revised,and classified protection 2.0 system upgrade has been completed.Aiming at the new security situation,this paper focuses on the problems and weaknesses in the secondary power system,and combines the classified protection 2.0 system,from the secure computing environment,secure communication network,secure area boundaries,and combines the classified protection 2.0 design requirements,constructed a security protection design plan in line with the Classified Protection 2.0 standard system architecture,and introduced the design of the security protection system in detail from the hardware products and the system.The main contents of this paper are as follows:(1)Firstly,it analyzes the security threats and problems faced by the secondary power system,and then introduces the changes of the level protection system and the Classified Protection 2.0.Further research has been conducted on information encryption,access control,physical isolation and other security technologies related to Classified Protection,which lays a solid foundation for the subsequent design of secondary power security protection in accordance with Classified Protection..(2)On the basis of strictly following the safety protection requirements of the power secondary system,combined with the Classified Protection 2.0 design principle,a power secondary safety protection system with protection 2.0 standard and a central triple protection system architecture is constructed,with introduced from the security environment and security management in two parts detailed design of the security system,to ensure a full range of implementation,management,scalability,completeness,balance function in terms of security.(3)Design and application of hardware and software based on the design of the security protection system of Classified Protection 2.0.First,it introduces the design and application of hardware products such as encryption authentication devices,network security isolation devices,firewalls,that play an important role in network equipment,security equipment.Then,from the perspective of software security protection of the power secondary system,the security design and application of the operating system and database system are introduced in detail,and the security design and application of the general application system are given.So as to realize the safety guarantee of the safety protection of the power secondary system from the infrastructure to the application program.
Keywords/Search Tags:Classified protection of cybersecurity, Protect cybersecurity, Power secondary system
PDF Full Text Request
Related items