Abstract
Under the background of the construction of “three types and two networks”, the introduction of a large number of heterogeneous intelligent terminals, ubiquitous open networks, interactive real-time control services and wide area interconnected power systems have transmitted the network security risks to all aspects of the power system. The security defense capability of power system is not only the superposition of security defense equipment, but also the excellent network security team. The continuous improvement of the level of network security is inseparable from the accumulation of network security attack and defense technology and practical experience, as well as practical tools and equipment with the characteristics of the power industry. In order to meet the increasingly severe security protection challenges, actively implement the security protection requirements of the power information system, ensure the safe and stable operation of the power system, build a network shooting range suited to the attributes of the power industry, and continuously improve the ability of network security protection, consolidate the foundation of digital transformation to ensure the safe and stable operation of power system and reliable power supply.The safe and stable operation of the information system needs to carry out comprehensive and in-depth vulnerability troubleshooting. In view of the lack of power business loophole mining and security event verification shooting range environment, this paper studies the power security shooting range construction technology.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.