New Active Defense Technology under the Background of Power Information Network Security
نویسندگان
چکیده
Abstract With the rapid development of national power industry, security information network has been widely concerned by society, and related impact also prominent. At this stage, technology is more inseparable from network, so become important, if a serious threat in practical application, loss caused will be unbearable. In process controlling one most important effective methods active defense. Based on this, paper puts forward research defense under background security, expounds defects firewall intrusion trap passive technology, introduces pitfalls new addition, discusses its application reasonable suggestions. Therefore, use to solve hidden danger important.
منابع مشابه
analysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولDetermining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملBackground Information: Grid security for intelligent power supply networks
The highest priority for operators of critical infrastructure, including electrical power supply grids, is to ensure a reliable, secure, and cost-efficient energy supply. New challenges have fundamentally changed the nature of how power grids are operated today. These challenges include the integration of renewable and decentralized energy sources, the need for continuous network optimization, ...
متن کاملNew thinking about information technology security
This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the “divide and conquer” approach to achieving protection, understand...
متن کاملSecurity implications of implementing active network infrastructures using agent technology
Active networks (AN) are a rapid evolving area of research and in parallel an area of great industry interest. However, for this technology to make the step out of the labs and penetrate the market, the security problems have to be tackled eectively. This paper demonstrates why and how agent technology research, can and should be applied to active networks, in order to ful®ll the new security ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of physics
سال: 2021
ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']
DOI: https://doi.org/10.1088/1742-6596/1852/2/022071