检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:周海全 王显盖 张艳艳 刘方方 郭锐 ZHOU Haiquan;WANG Xiangai;ZHANG Yanyan;LIU Fangfang;GUO Rui(State Grid Shandong Electric Power Company Liaocheng Power Supply Company,Liaocheng Shandong,252000,China)
机构地区:[1]国网山东省电力公司聊城供电公司,山东聊城252000
出 处:《长江信息通信》2025年第2期83-85,共3页Changjiang Information & Communications
摘 要:电力系统端站设备网络安全配置不当,导致平均脆弱度评分误差较大,因此设计基于PDCA的电力系统端站设备网络安全配置脆弱性核查方法。采用PDCA循环模式确定网络攻击的可能路径,以预防为主。通过深入辨识网络安全配置的脆弱节点,精准定位风险源头。设置网络安全配置脆弱性指标,量化评估标准,实现了对电力系统端站设备网络安全配置的全面脆弱性核查。结果表明,该文方法在多数脆弱性节点上的评分表现稳定且误差控制良好,证明了在电力系统端站设备网络安全配置脆弱性核查中的有效性。The improper network security configuration of power system terminal equipment leads to a large error in average vulnerability score,so the vulnerability verification method of power system terminal equipment based on PDCA is designed.The PDCA cycle mode was used to determine the possible path of cyber attack,mainly for prevention.By deeply identifying the vulnerable nodes of network security configuration,accurately locate the source of risk.The vulnerability index of network security configuration is set up,and the quantitative evaluation standard is set up to realize the comprehensive vulnerability verification of network security configuration of end-station equipment in power system.The results show that the scoring performance of the proposed method on most vulnerable nodes is stable and the error control is good,which proves the effectiveness of the vulnerability verification in the network security configuration of end-station equipment in power system.
关 键 词:PDCA 电力系统 端站设备 网络安全配置 脆弱性核查
分 类 号:TM744[电气工程—电力系统及自动化]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.63