Power industry network security management system and method

A network security and power industry technology, applied in the transmission system, electrical digital data processing, computer security devices, etc., can solve the problems of hidden dangers of information security, inconsistent information, and inability to achieve collaborative work, etc., to improve information security, Realize the effect of collaborative work and avoid information leakage

Pending Publication Date: 2021-03-16
ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, this method of completely relying on manual inspection cannot realize the timely sharing of information due to the inconsistency of information held by different personnel, resulting in low efficiency of network security inspection work, unable to realize collaborative work, and unable to realize network security vulnerability discovery, early warning and maintenance. Closed-loop management in other aspects; at the same time, network security information is managed manually, and there are also great security risks in information confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power industry network security management system and method
  • Power industry network security management system and method
  • Power industry network security management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] In one or more implementations, a power industry network security management system is disclosed, referring to figure 1 , including:

[0031] The account management module is configured to assign different data processing permissions to different accounts; at the same time, it can realize the management and maintenance of account basic information and status, manage the work schedule of different account terminals, basic personnel information, and score management statistics.

[0032] In this embodiment, the account terminals include: an administrator account terminal, a task executor account terminal, a task retester account terminal, and a task verifier account terminal.

[0033] The network security vulnerability monitoring module is configured to receive network security vulnerability information, generate a vulnerability review task, and send it to the account terminal with corresponding authority for vulnerability review, and perform a security risk assessment on ...

Embodiment 2

[0055] In one or more implementations, a method for network security management in the electric power industry is disclosed, referring to figure 2 , including the following procedures:

[0056] (1) Receive network security vulnerability information, generate a vulnerability audit task, and send it to the account terminal with corresponding authority for vulnerability audit;

[0057] Regarding the reporting of network security vulnerability information, the account terminal can report the first discovered vulnerabilities, and the administrator account terminal can rate the reported vulnerabilities and initiate a loophole closed-loop management process; the system provides a first-time vulnerability report template, in the template After filling in the vulnerability-related information and submitting it, the vulnerability can be directly pushed to the relevant responsible unit. The vulnerability report template can generate a Word document, so there is no need to repeatedly wr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a power industry network security management system and method, and the system comprises a network security vulnerability supervision module which is configured to receive network security vulnerability information, generate a vulnerability audit task, send the task to an account terminal with a corresponding authority for vulnerability audit, carry out the security risk assessment of a vulnerability based on a feedback audit result, generate a vulnerability rectification notice according to the evaluation result, and issue the vulnerability rectification notice to a corresponding account terminal; a network security vulnerability retesting module which is configured to receive a vulnerability rectification result fed back by the account terminal, generate a vulnerability retesting task, execute vulnerability retesting and send a retesting result to the network security vulnerability filing module; and a network security vulnerability archiving module which is configured to archive and store the network security vulnerability information, the vulnerability rectification result and the vulnerability retest result. Through the network information security management platform, real-time sharing of network security information can be realized, and full-closed-loop management of network security vulnerabilities can be realized.

Description

technical field [0001] The invention relates to the technical field of electric power industry network security, in particular to a system and method for electric power industry network security management. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] With the rapid development and wide application of electric power information technology, while the computer network brings great convenience such as information resource sharing, many network security problems also arise. [0004] The current substation network security inspection and evaluation method is based on manual inspection, screening, and supervision. For example, the network security "red and blue supervisor" teams that are common in power companies are currently in charge. The red team is mainly responsible for the normal discovery of network and information security vulnerabil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q50/06G06F21/57
CPCH04L63/1416H04L63/1433H04L63/20G06F21/577G06Q50/06H04L63/104
Inventor 刘冬兰马雷刘新张昊陈剑飞王睿谭虎王小亮于灏苏冰赵勇吕国栋王晓峰井俊双姚洪磊牛德玲
Owner ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products