Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security risk assessment method and device, storage medium and electronic equipment

A security risk and security technology, applied in the fields of storage media and electronic equipment, devices, and security risk assessment methods, can solve the problems of high difficulty, difficult realization, and many attack paths.

Pending Publication Date: 2021-07-30
GUANGDONG POWER GRID CO LTD +1
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A large number of terminals and network interfaces will be deployed on the user side and system nodes at all levels. There are many physical points that malicious attackers can touch, and it is difficult to monitor these points in a comprehensive and timely manner.
[0004] 2) There are many paths to attack
Network communication technologies such as wireless private network, satellite network, 5G, NB-IoT, and near-field communication will be widely used. Although it is beneficial to reduce terminal access costs and improve convenience, it will also increase the number of network paths for malicious attackers to attack.
[0005] 3) There are many network security loopholes in power distribution IoT terminals, and the cutting system is generally used, which basically does not have security protection capabilities
Commonly used IoT security risk assessment models include the artificial immune detection model and the cloud transformation model. Although the artificial immune detection model can refresh the threat range in real time and dynamically, it is efficient and accurate. However, since the risk assessment is based on the detection results, the assessment results have no Risk safety detection results have a strong dependence on
Although the cloud transformation model can handle a large amount of data and support qualitative and quantitative transformation, it is difficult to establish and difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security risk assessment method and device, storage medium and electronic equipment
  • Security risk assessment method and device, storage medium and electronic equipment
  • Security risk assessment method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although certain embodiments of the present invention are shown, it is to be understood that the invention can be implemented in various forms, and should not be construed as being limited to the embodiments set forth herein, and instead provide these examples for It is more thoroughly understood and integrated. It should be understood that the accompanying drawings and examples of the present invention are for exemplary action, not intended to limit the scope of the invention.

[0024] It should be understood that the various steps described in the method embodiment of the present invention can be performed in different order, and / or in parallel. Further, the method embodiment can include additional steps and / or omitted the steps shown. The scope of the invention is not limited thereto.

[0025] The term "comprising" as used herein and its deformatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a security risk assessment method and device, a storage medium and electronic equipment. The method comprises the steps of obtaining a security hierarchical structure model corresponding to a power distribution Internet-of-Things system, wherein the security hierarchical structure model comprises security elements of at least two hierarchies; for each hierarchy of the security hierarchy structure model, determining importance weight of each security element in the current hierarchy according to a sequence from low hierarchy to high hierarchy, and after a judgment matrix corresponding to the current hierarchy is constructed, performing consistency check on the judgment matrix; and when determining that each judgment matrix passes the consistency check, performing security risk assessment on the power distribution Internet of Things system based on the importance weight of each security element in each hierarchy. Through the technical scheme provided by the embodiment of the invention, risk assessment can be carried out on security threats existing in the power distribution Internet of Things system more comprehensively and reasonably, and the accuracy of security risk assessment on the power distribution Internet of Things system is improved.

Description

Technical field [0001] Embodiments of the present invention relate to electric power network safety technology, and more particularly to a safety risk assessment method, device, storage medium, and electronic device. Background technique [0002] Distribution Into the Internet is the implementation of power networks in the field of distribution, and the network architecture of the power distribution network system is complicated, the main station is cloudized, the terminal equipment is associated, and the business is flexible. The security risks faced by the system have changed significantly compared to the traditional power distribution monitoring system. Today, the network security situation is increasingly serious, and the Internet of Things and industrial control system have increased year by year. The current power distribution network system lacks safety protection terminals and technologies, and the following problems are mainly present in terms of terminal safety protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/06G16Y10/35G16Y30/10G16Y40/50
CPCG06Q10/0635G06Q50/06G16Y10/35G16Y40/50G16Y30/10
Inventor 李伟青赵瑞锋周安石扬叶汇镓古钰冰梅咏武
Owner GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products