Power system mobile terminal security threat assessment method
A mobile terminal and power system technology, applied in the field of power system, can solve the problems of waste of input cost, lack of unified R&D safety quality control and operation safety protection considerations, threats to the information network and business operation of power companies, etc., to ensure safety. effect used
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0022] The security threat assessment method of a mobile terminal of a power system in this embodiment specifically includes the following steps:
[0023] S1: Analyze the security threats faced by the power terminal, and generate a threat list T:{t i |i=1,2,3...,n}, where t i Is the i-th threat, n is the total number of threats faced by the system;
[0024] S2: According to the generated threat list, establish a power terminal threat set:
[0025] First determine the attributes of the threat consequences, including such as "cannot perform critical operations", "loss of productivity", "loss of income", "damage to public reputation", "endanger public safety", etc. Then the threat consequence attribute type is expressed as X: (x j |j=1,2,3...,m}, where x j Is the j-th consequence attribute, m is the number of kinds of consequence attributes;
[0026] S3: Determine the threat consequence attribute, and determine the weight W: {W j |j=1,2,3...,m} where W j Is the weight of the j-th consequ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap