Power system mobile terminal security threat assessment method

A mobile terminal and power system technology, applied in the field of power system, can solve the problems of waste of input cost, lack of unified R&D safety quality control and operation safety protection considerations, threats to the information network and business operation of power companies, etc., to ensure safety. effect used

Inactive Publication Date: 2018-03-23
国网浙江省电力有限公司电力科学研究 +4
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these applications adopt a decentralized development, independent release development and promotion model, and lack of unified research and development safety quality control and operation safety protection considerations
If a large number of se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power system mobile terminal security threat assessment method
  • Power system mobile terminal security threat assessment method
  • Power system mobile terminal security threat assessment method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] The security threat assessment method of a mobile terminal of a power system in this embodiment specifically includes the following steps:

[0023] S1: Analyze the security threats faced by the power terminal, and generate a threat list T:{t i |i=1,2,3...,n}, where t i Is the i-th threat, n is the total number of threats faced by the system;

[0024] S2: According to the generated threat list, establish a power terminal threat set:

[0025] First determine the attributes of the threat consequences, including such as "cannot perform critical operations", "loss of productivity", "loss of income", "damage to public reputation", "endanger public safety", etc. Then the threat consequence attribute type is expressed as X: (x j |j=1,2,3...,m}, where x j Is the j-th consequence attribute, m is the number of kinds of consequence attributes;

[0026] S3: Determine the threat consequence attribute, and determine the weight W: {W j |j=1,2,3...,m} where W j Is the weight of the j-th consequ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a power system mobile terminal security threat assessment method comprising: (1) analyzing a security threat to a power terminal and generating a threat list; (2) establishinga power terminal threat set according to the generated threat list; (3) determining threat consequence attributes and weights corresponding to the threat consequence attributes; (4) collecting historical information data on threat events and determining the probability of threats; (5) building a threat index model; and (6) according to the threat index model, determining the security threats. Themethod is favorable for improving the overall protection ability of a business system and the guarantee capability of the security protection ability, and meets the protection requirement of the business system.

Description

technical field [0001] The invention relates to the technical field of electric power systems, in particular to a method for evaluating security threats of electric power system mobile terminals. Background technique [0002] The development of mobile applications related to power business has shown a blowout state in recent years. Some provincial companies have released many mobile applications through various methods such as application stores, Weibo, and WeChat, and have attracted a large number of users and obtained good social response. However, these applications adopt a decentralized development and independent release development and promotion model, which lacks the consideration of unified R&D safety quality control and operation safety protection. If a large number of security holes were introduced in the early mobile business, it would threaten the safe operation of the information network and business of the entire power company; later related repair work would c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q50/06
CPCG06Q10/0639G06Q50/06
Inventor 孙歆李沁园程周育顾旻旻
Owner 国网浙江省电力有限公司电力科学研究
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products