Information security offense and defense drill competition system for power industry

An information security and power industry technology, applied in transmission systems, electrical components, etc., can solve problems such as weak information security protection, stealing sensitive information, tampering with website content, etc., to improve the company's independent and controllable information security capabilities, and strengthen team building. , Improve the effect of vulnerability mining ability

Inactive Publication Date: 2016-01-27
ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, for the loopholes in the power information system, hackers in the society use various methods, such as: using weak passwords in the server system, implanting virus and Trojan horse files on the server, thereby stealing sensitive information in the power system or tampering with website content, etc.
Many units have not established an information security attack and defense drill platform that simulates hacker attacks, and information security protection is relatively weak. Malicious attackers may use system vulnerabilities to log in to the system to obtain sensitive information, resulting in power supply schemes, security schemes, substation building structure diagrams, Leakage of electrical main wiring diagrams, information room topology diagrams, and related sensitive materials and information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security offense and defense drill competition system for power industry
  • Information security offense and defense drill competition system for power industry
  • Information security offense and defense drill competition system for power industry

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0035] like figure 1 As shown, the power system will organize information security professionals from various units to participate in competitions from time to time, which will be used to select outstanding personnel to set up information security red and blue teams, and to carry out work such as power information system vulnerability mining and hidden danger investigation. The knowledge contest is mainly a stand-alone operation, and the offensive and defensive competition includes two aspects: attack and defense. The attacker mainly targets the company's information security red team, exploits the loopholes on the target target machine, obtains administrator privileges through some privilege escalation methods, and then obtains the information on the target target machine. Sensitive information; the defender is mainly aimed at the company's information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security offense and defense drill competition system for the power industry, comprising an experimental platform, an experimental environment customization module and an application scenario customization module. The experimental platform is used for implementing offense and defense drill competition, being connected with the experimental environment customization module and the application scenario customization module, building attacks and carrying out security test, and includes a knowledge base management module, an online learning module and an offense and defense competition module. The experimental environment customization module is used for customizing a comprehensive drill scenario, analyzing malicious codes, and carrying out Intranet penetration and hole mining. The application scenario customization module is used for power information security training, information security offense and defense scenario drilling, industrialized depth customizing, security product testing, security technology researching and security assessment testing. According to the invention, the information security independent control capability, the safety monitoring capability, the notification and warning capability, the emergency disposal capability and the whole-process management control capability of companies can be improved.

Description

technical field [0001] The invention relates to an information security attack and defense drill competition system adapted to the electric power industry. Background technique [0002] Under the current circumstances, with the popularization of power system work informatization and the deepening application of information systems, information security has become an important part of the informatization work of power grid companies. Information security work is the foundation and guarantee of enterprise informatization construction, which is directly related to the security and development. [0003] With the extensive development and application of information technology, the information security situation is becoming increasingly severe. The "Prism Gate Incident", "Snowden Incident", and "Heartbleed Vulnerability" all reflect the increasing international information security situation. Under the current situation, power grid security protection is facing deeper security th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416H04L63/1433
Inventor 刘冬兰马雷刘新张展于灏井俊双赵勇吕国栋
Owner ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products