Construction of Information Security System of Power Generation Enterprise
In order to meet the current demands of building information security, while ensuring existing business systems available, based on information technology to achieve the goal of building security system, the existing network deployment structure system access mode, user habits of Guodian Chengdu Jin...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2014-01-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.01.023/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850097013147828224 |
|---|---|
| author | Ying Yu |
| author_facet | Ying Yu |
| author_sort | Ying Yu |
| collection | DOAJ |
| description | In order to meet the current demands of building information security, while ensuring existing business systems available, based on information technology to achieve the goal of building security system, the existing network deployment structure system access mode, user habits of Guodian Chengdu Jintang Generation Co., Ltd., on behalf of units of power generation enterprises, were analyzed. Based on this analysis, a five-level business system, as the network management, border security protection, mobile access security, host security, application security, was designed for power generation enterprise security reinforcement. By introducing the construction process of advanced security system of Guodian Chengdu Jintang Generation Co., Ltd., the references were provided for other power generation enterprise information safety construction. |
| format | Article |
| id | doaj-art-98c3fb720bf549f6ade9189540f758be |
| institution | DOAJ |
| issn | 1000-0801 |
| language | zho |
| publishDate | 2014-01-01 |
| publisher | Beijing Xintong Media Co., Ltd |
| record_format | Article |
| series | Dianxin kexue |
| spelling | doaj-art-98c3fb720bf549f6ade9189540f758be2025-08-20T02:41:07ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-01-013014815259624469Construction of Information Security System of Power Generation EnterpriseYing YuIn order to meet the current demands of building information security, while ensuring existing business systems available, based on information technology to achieve the goal of building security system, the existing network deployment structure system access mode, user habits of Guodian Chengdu Jintang Generation Co., Ltd., on behalf of units of power generation enterprises, were analyzed. Based on this analysis, a five-level business system, as the network management, border security protection, mobile access security, host security, application security, was designed for power generation enterprise security reinforcement. By introducing the construction process of advanced security system of Guodian Chengdu Jintang Generation Co., Ltd., the references were provided for other power generation enterprise information safety construction.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.01.023/identity authenticationnetwork managementsecurity protectiondata leakterminal check |
| spellingShingle | Ying Yu Construction of Information Security System of Power Generation Enterprise Dianxin kexue identity authentication network management security protection data leak terminal check |
| title | Construction of Information Security System of Power Generation Enterprise |
| title_full | Construction of Information Security System of Power Generation Enterprise |
| title_fullStr | Construction of Information Security System of Power Generation Enterprise |
| title_full_unstemmed | Construction of Information Security System of Power Generation Enterprise |
| title_short | Construction of Information Security System of Power Generation Enterprise |
| title_sort | construction of information security system of power generation enterprise |
| topic | identity authentication network management security protection data leak terminal check |
| url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.01.023/ |
| work_keys_str_mv | AT yingyu constructionofinformationsecuritysystemofpowergenerationenterprise |