A New Security Baseline Reinforcement Method for the Power Information System

Article Preview

Abstract:

Power information is a typical distributed interconnect system, faced with a complex network security problems. It still lacks a systematic method for the design and evaluation of system security. The authors comprehensively survey the layout of the power network and also ISO27001 international standards, and proposed a new security baseline reinforcement method for the power information system. By using the multi-class fuzzy comprehensive judgment model and the SSE-CMM method, the authors proved the reinforcement method is reliable in theory. This method combines ISO27001 PDCA model with the security baseline testing process, and applies ITU-T X.805 security architecture to the testing indicators extraction process, which makes the security evaluation process for the power information system quick and practical.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2407-2411

Citation:

Online since:

February 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Feng Xiao, Dailiang Ye. Re-understanding and experience of the standard of ISO/27001: 2005 [J]. Electric Power Information Technology: 2008, 6 (7): 99-101. In Chinese.

Google Scholar

[2] Hu Yan, Xie Xiao-rong . Analysis and comparison of existing security design methods for power information system,. Power System Technology, vol. 30, pp.35-39, 2006. In Chinese.

Google Scholar

[3] Guangyu Ma, Jing Shen. How to better play the role of communication network security baselines [J]. Telecommunications Technology: 2011, 5: 11-14. In Chinese.

Google Scholar

[4] Zhiqiang Wang, Jiangang Li. Construction of Information Security Management System Based on ISO/ IEC 27001 [J]. Zhejiang Electric Power: 2008, 27(4): 47-49. In Chinese.

Google Scholar

[5] Shugang Yu. Extraction method of telecom data network security indicators [J]. China New Telecommunications: 2006, 23: 19-22. In Chinese.

Google Scholar

[6] Wenhua Huang. Research on Abstraction Method for Safety Evaluation Parameters of Telecom Data Networks [J]. Modern Electronic Technique: 2007, 30(20) 143-146, 153. In Chinese.

Google Scholar

[7] Zeng-ke Zhang, The Application of Fuzzy Mathematics in Automation Technology, Tsinghua University Press, 1997. In Chinese.

Google Scholar

[8] Xiao-an Feng, Xie Hong-bin. Security Evaluation of Power Network Information Systems Based on Fuzzy Comprehensive Judgment, Power System Technology, vol. 32, pp.40-43, 2008. In Chinese.

Google Scholar

[9] Systems Security Engineering Capability Maturity Model (SSE-CMM)Project (June, 2003). Systems Security Engineering Capability Maturity Model ○RSSE-CMM○RModel Description Document. Carnegie Mellon University, Pennsylvania, USA. [Online]. Available: http: /www. ssecmm/org/lib/lib. asp.

DOI: 10.3403/30143286

Google Scholar