Design and Application of the Information Security Framework for Electric System Lifecycle

Article Preview

Abstract:

With the further promotion of electric enterprise information construction, industrialization and informationization have been deeply integrated. Power system safety and stability is highly dependent upon electric information system. However, as the electric business higher integrated, data more interactive, and structures more complex, electric information system would face serious security risks. Any simple system may become the "short board" of enterprise information security protection architecture, and any vulnerability may bring serious consequences. In this paper, we propose an information security framework for electric system lifecycle based on typical information security model. As the framework widely applied, the overall safety capacity of electric enterprise has increased substantially.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2704-2708

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] G. McGraw, Software Security: Building Security, Addison Wesley, (2006).

Google Scholar

[2] M. Howard, S. Lipner, The Security Development Lifecycle (SDL): A Process for Developing Demonstrably More Secure Software, Microsoft Press, (2006).

Google Scholar

[3] Information technology-Security techniques-Application security-Part 1: Overview and concepts, standard ISO/IEC 27034-1 (2011).

Google Scholar

[4] MSDN: Security development lifecycle phases, http: /msdn2. microsoft. com/en-us/library/ms995349. aspx, (2005).

Google Scholar

[5] Security Considerations in the System Development Life Cycle, NIST Special Publication 800-64 Revision 2.

Google Scholar

[6] Bart De Win *, Riccardo Scandariato, Koen Buyens. On the secure software development process: CLASP, SDL and Touchpoints compared. Information and Software Technology, 2009(51)1152–1171.

DOI: 10.1016/j.infsof.2008.01.010

Google Scholar

[7] OWASP CLASP Project.Comprehensive,lightweight application security process[R]. http:/www.owasp.org/index.php/Category:OWASP— CLASP Project.Last Ac—cessed M arch 2012.

Google Scholar

[8] OWASP. Software Assurance Maturity Model. http: /www. opensamm. org.

Google Scholar

[9] Information security technology- Classification guide for classified protection of information system. GB/T 22240—(2008).

Google Scholar

[10] Information security technology— Baseline for classified protection of information system. GB/T 22239—(2008).

Google Scholar