Analysis and Application of Information Security Evaluation Abilities Based on Power Control Systems

Article Preview

Abstract:

With the widely application of power control systems and acceleration of the information modernization process of the power industry, the connection between power control system products and information security is closer and closer. This paper, through the analysis of the safety standard on power control systems, the combination with the existing power information system evaluation and the integration of the idea of full life cycle, research on the safe evaluation environment and the standards, processes and contents of evaluation technology in power control systems. It shows that to analysis and application of information security testing evaluation which is based on power control systems is meaningful and necessary.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

378-382

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] S. Pu, Z. G. Chen, S. X. Zhu. Analysis and Protection of Stuxnet Virus,. Netinfo Security, no. 2(2012), pp.40-43.

Google Scholar

[2] J. Lin, and S. J. Den, Problems and Countermeasures of Information Security Risk Assessment,. Software Engineer, no. 10(2004), pp.62-63.

Google Scholar

[3] GB/T 20438. 5-2006:Functional safety of electrical/electronic/programmable electronic safety-related systems―Part 5: Examples of methods for the determination of safety integrity levels, (2006).

DOI: 10.3403/30193475

Google Scholar

[4] GB/T 18336. 2-2008: Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements, (2008).

DOI: 10.3403/30108741

Google Scholar

[5] GB/T 25000. 1-2010: Software engineering—Software product Quality Requirements and Evaluation (SQuaRE)—Guide to SQuaRE, (2010).

DOI: 10.3403/30078641

Google Scholar

[6] GB/T 22239—2008: Information security technology baseline for classified protection of information system security. (2008).

Google Scholar

[7] Information on. http: /www. microsoft. com/security/sdl/default. aspx.

Google Scholar

[8] David Litchfield. Oracle PL/SQL injection[C]. BlackHat Europe, (2004).

Google Scholar

[9] N. Zhang, J. H. Zhang, C. C. Fu. Dynamic detection and prevention of buffer overflow attacks, . Journal of Southwest University for Nationalities(Natrual Science Edition), vol. 33, no. 5(2007), pp.1172-1174.

Google Scholar