基于PDCA的电力系统端站设备网络安全配置脆弱性核查方法  

Network Security Configuration Vulnerability Verification Method of Power System Terminal Equipment Based on PDCA

在线阅读下载全文

作  者:周海全 王显盖 张艳艳 刘方方 郭锐 ZHOU Haiquan;WANG Xiangai;ZHANG Yanyan;LIU Fangfang;GUO Rui(State Grid Shandong Electric Power Company Liaocheng Power Supply Company,Liaocheng Shandong,252000,China)

机构地区:[1]国网山东省电力公司聊城供电公司,山东聊城252000

出  处:《长江信息通信》2025年第2期83-85,共3页Changjiang Information & Communications

摘  要:电力系统端站设备网络安全配置不当,导致平均脆弱度评分误差较大,因此设计基于PDCA的电力系统端站设备网络安全配置脆弱性核查方法。采用PDCA循环模式确定网络攻击的可能路径,以预防为主。通过深入辨识网络安全配置的脆弱节点,精准定位风险源头。设置网络安全配置脆弱性指标,量化评估标准,实现了对电力系统端站设备网络安全配置的全面脆弱性核查。结果表明,该文方法在多数脆弱性节点上的评分表现稳定且误差控制良好,证明了在电力系统端站设备网络安全配置脆弱性核查中的有效性。The improper network security configuration of power system terminal equipment leads to a large error in average vulnerability score,so the vulnerability verification method of power system terminal equipment based on PDCA is designed.The PDCA cycle mode was used to determine the possible path of cyber attack,mainly for prevention.By deeply identifying the vulnerable nodes of network security configuration,accurately locate the source of risk.The vulnerability index of network security configuration is set up,and the quantitative evaluation standard is set up to realize the comprehensive vulnerability verification of network security configuration of end-station equipment in power system.The results show that the scoring performance of the proposed method on most vulnerable nodes is stable and the error control is good,which proves the effectiveness of the vulnerability verification in the network security configuration of end-station equipment in power system.

关 键 词:PDCA 电力系统 端站设备 网络安全配置 脆弱性核查 

分 类 号:TM744[电气工程—电力系统及自动化]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象