当前位置:主页 > 管理论文 > 移动网络论文 >

二次安全防护系统在滇东电厂的应用研究

发布时间:2018-12-09 15:55
【摘要】:电网中的二次安全防护系统是一个庞大的复杂系统,它的组成包括电力监控系统、电力通信以及相应的数据网络等。随着时代的发展,网络安全问题已经融入各行各业,电力二次系统的安全防护问题就显得尤为重要,电力监控系统以及电力调度数据网络不受侵害是电网安全运行的前提,为了保证电力二次系统的安全运行,在以往的安全防护技术研究中已经形成了四项基本原则——“安全分区、网络专用、横向隔离、纵向认证”,并在此基础上建立二次安全防护系统。 二次系统安全防护工作最重要的一点是通过有效的技术手段或者管理措施全力保护电力实时监控系统以及调度数据网络的安全运行,其终极目标就是建立起一个相对完善并且有成效的二次系统安全防护系统,即在所建立的安全策略下保护电力系统控制环节免受病毒、恶意代码等的网络侵害,尤其是要能够抵御来自外部世界的有组织团体包括拥有丰富资源的威胁源所发起的恶意攻击,,同时要求能减轻严重自然灾害所造成的损失,使电力系统在遭到损害后能够迅速恢复一定比例的功能,以防止二次系统安全事件引起进而导致电力一次系统事故甚至是大面积的停电事故,从而保证电力系统能安全稳定地运行。 本文结合滇东电厂实施电力二次系统安全防护工作的经验,在现有条件下对滇东电厂二次安全防护系统的体系结构以及相关技术进行了深入研究,并在此基础上建立了滇东电厂二次安全防护方案。通过对滇东电厂的电力监控系统和电力调度数据网络的现状分析,找出目前滇东电厂在电力信息安全方面存在的问题,并提出相应的安全改造方案包括:网络结构调整、安全设备选型、安全技术措施、边界清理和技术措施等。同时对本次安全改造中所用到的物理隔离、传输软件等非通用技术装置进行研究,分析其功能规范以及具体实现原理,并将其应用在滇东电厂电力二次系统安全建设中。 本文所研究的内容已经在滇东电厂二次系统安全防护系统工作中得到了实际的应用,效果已达到预期。
[Abstract]:The secondary security protection system in power network is a huge complex system. Its composition includes power monitoring system, electric power communication and corresponding data network. With the development of the times, network security has been integrated into various industries, the security protection of the secondary power system is particularly important, the power monitoring system and power dispatching data network is the premise of the safe operation of power grid. In order to ensure the safe operation of the secondary power system, four basic principles have been formed in the previous research on safety protection technology-"security zoning, network specialization, horizontal isolation, vertical certification". On this basis, the secondary safety protection system is established. The most important point of the security protection work of the secondary system is to protect the power real-time monitoring system and the safe operation of the dispatching data network through effective technical means or management measures. The ultimate goal is to set up a relatively perfect and effective secondary system security protection system, that is, to protect the power system control links from the virus, malicious code and other network violations under the established security policy. In particular, to be able to withstand malicious attacks by organized groups from the outside world, including resource-rich sources of threat, and to mitigate the damage caused by severe natural disasters, The power system can recover a certain proportion of function quickly after being damaged, so as to prevent the secondary system safety incident from causing the power system accident and even the large area power outage accident. Thus, the power system can operate safely and stably. Based on the experience of implementing the safety protection of power secondary system in East Yunnan Power Plant, this paper makes a deep research on the system structure and related technology of the secondary security protection system in East Yunnan Power Plant under the existing conditions. Based on this, the second safety protection scheme of East Yunnan Power Plant is established. Based on the analysis of the current situation of electric power monitoring system and power dispatching data network in East Yunnan Power Plant, this paper finds out the existing problems in electric power information security of East Yunnan Power Plant, and puts forward the corresponding safety reform scheme, which includes: network structure adjustment. Safety equipment selection, safety technical measures, border cleaning and technical measures. At the same time, the physical isolation, transmission software and other non-general technical devices used in this safety reform are studied, and its function specification and concrete realization principle are analyzed, and applied in the security construction of the secondary power system of the East Yunnan Power Plant. The content of this paper has been applied in the work of the secondary system safety protection system of the East Yunnan Power Plant, and the effect has reached the expectation.
【学位授予单位】:华北电力大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08;TM621

【相似文献】

相关期刊论文 前10条

1 杨志红;;移动互联网发展技术与安全研究[J];无线互联科技;2013年07期

2 程静;;计算机桌面安全防护系统设计和管理[J];西安文理学院学报(自然科学版);2013年04期

3 陈刚;;安全交换一肩挑[J];每周电脑报;2005年40期

4 王会波;;内网应用安全几点考虑[J];信息安全与通信保密;2012年01期

5 王红梅;;浅析计算机桌面的安全防护系统[J];太原城市职业技术学院学报;2013年09期

6 张琰s

本文编号:2369648


资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2369648.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户29dce***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com