CN109361650A - A kind of power information system monitoring method - Google Patents
A kind of power information system monitoring method Download PDFInfo
- Publication number
- CN109361650A CN109361650A CN201811036009.2A CN201811036009A CN109361650A CN 109361650 A CN109361650 A CN 109361650A CN 201811036009 A CN201811036009 A CN 201811036009A CN 109361650 A CN109361650 A CN 109361650A
- Authority
- CN
- China
- Prior art keywords
- data
- information
- safety
- safe
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
Abstract
The invention discloses a kind of power information system monitoring methods, comprising the following steps: step 1 obtains the safe cardinal data when overall operation of goal systems;Step 2, safe cardinal data configuration;Step 3, real time data imaging monitoring;Step 4, data transmission;Step 5, data storage and maintenance.The present invention passes through contrasting detection data; mainly each data in power information system are compared with the data in safe radix; to obtain the changing condition of each data; the data more than safe radix can be quickly detected; actually detected and adjusting is carried out to alternatively put to data; then the data for front and back of taking off are compared into preservation, it is convenient that the data of same problem are saved, to reinforce further protecting a certain security breaches emphatically.
Description
Technical field
The present invention relates to software technology field, in particular to a kind of power information system monitoring method.
Background technique
Safety be information system need most be also the smallest safety assurance, be the most basic safety requirements of information system.Letter
Fast-developing modern society of breathization society needs to carry out detection work to information system often, guarantees testing staff and equipment
Also data are avoided to be stolen by ambient systems while safe.
Therefore, it is necessary to solve the above problems to invent a kind of power information system monitoring method.
Summary of the invention
The purpose of the present invention is to provide a kind of power information system monitoring methods, mainly will be each in power information system
A data are compared with the data in safe radix, to obtain the changing condition of each data, can be quickly detected super
Cross the data of safe radix, thus to data alternatively put carry out actually detected and adjusting, then by take off front and back data into
Row comparison saves, convenient to save to the data of same problem, to reinforce carrying out into one a certain security breaches emphatically
Step protection, to solve the problems mentioned in the above background technology.
To achieve the above object, the invention provides the following technical scheme: a kind of power information system monitoring method, including with
Lower step:
Safe cardinal data when obtaining the overall operation of goal systems: step 1 takes the safe radix of goal systems
Data, main includes the first personal secure data, the second equipment safety data, third finance correlation data, the 4th host data
Library data and the 5th line security data, and data comparison table is established according to each data, daily data variation is carried out
Comparison, it is convenient that entire goal systems is monitored;
Step 2, safe cardinal data configuration: in each data in one that take steps, principal security safety device, peace
Total state and security breaches, wherein safety device includes operating system security, equipment management safety, personal safety and route peace
Entirely, safe condition includes that port security, process safety, Host Security and data daily update safety, and security breaches include system
Loophole, database loophole, network hole and property loophole;
Step 3, real time data imaging monitoring: in step 2 obtain data information after, need to carry out information calculate and
Processing, detects the changing condition of each route by way of monitoring and the monitoring video of each equipment safety, needs
It wants personnel that equipment is taken off and observed often, in personal safety, needs for the work clothes of worker's allocation criterion, work
Clothes need the Vital status by Multiple detection, avoided the occurrence of, and the data situation inside network and host then needs to pass through
Visual examination system was checked and is overhauled to the problem of company property;
Step 4, data transmission: when being acquired to data, communicating terminal by monitoring information transmission to information terminal, into
And acquisition information is inputted to host by access interface, the information after host receives is arrived after multi-enciphering using optical cable transmission
Information is transferred to communication by the encrypted form of wireless network after being monitored by monitoring personnel to information by monitoring information master station
Terminal, so that communicating terminal is controlled and be detected by staff;
Step 5, data storage and maintenance: needing to store the data of transmission before transmitting data, main logical
Crossing the external equipment that do not network will store after data receiver, and carry out multiple duplication, and be divided in real time storage information
Class, and storage information check every a week and is surveyed.
Preferably, main information security is divided into personal safety and system safety, mainly not in the step 2
The all parts of power information system are detected and checked under conditions of injury human health.
Preferably, when passing through image transmission, poisoning intrusion is easy to carry out shadow to transmission data in the step 3
It rings, to make to transmit corrupted data, is unable to real-time detection field conditions, needs to arrange testing staff, equipment and data are carried out
Transmission and investigation.
Preferably, reducing data diffusion effect by way of encryption in the step 4, electric power letter also can increase
Cease the secrecy effect of data.
Technical effect and advantage of the invention:
1, the present invention, mainly will be in each data and safe radix in power information system by contrasting detection data
Data compare, to obtain the changing condition of each data, can quickly detect the data more than safe radix, thus
Data are alternatively put and carry out actually detected and adjusting, the data for front and back of taking off then are compared into preservation, it is convenient to identical
The data of problem are saved, to reinforce further protecting a certain security breaches emphatically;
2, the present invention needs to store the data of transmission by protection transmission data before transmitting data, main
It will be stored after data receiver by the external equipment that do not network, and carry out multiple duplication, utilize encryption and number of not networking
Reinforce data protection effect according to two kinds of forms of transmission, increases the data protection to power information system, avoid hacker from network
Steal data information.
Specific embodiment
Below in conjunction with the embodiment of the present invention, technical scheme in the embodiment of the invention is clearly and completely described,
Obviously, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based in the present invention
Embodiment, every other embodiment obtained by those of ordinary skill in the art without making creative efforts, all
Belong to the scope of protection of the invention.
Below with reference to embodiment, the present invention is further described.
Embodiment 1
A kind of power information system monitoring method, comprising the following steps:
Safe cardinal data when obtaining the overall operation of goal systems: step 1 takes the safe radix of goal systems
Data, main includes the first personal secure data, the second equipment safety data, third finance correlation data, the 4th host data
Library data and the 5th line security data, and data comparison table is established according to each data, daily data variation is carried out
Comparison, it is convenient that entire goal systems is monitored;
Step 2, safe cardinal data configuration: in each data in one that take steps, principal security safety device, peace
Total state and security breaches, wherein safety device includes operating system security, equipment management safety, personal safety and route peace
Entirely, safe condition includes that port security, process safety, Host Security and data daily update safety, and security breaches include system
Loophole, database loophole, network hole and property loophole;
Step 3, real time data imaging monitoring: in step 2 obtain data information after, need to carry out information calculate and
Processing, detects the changing condition of each route by way of monitoring and the monitoring video of each equipment safety, needs
It wants personnel that equipment is taken off and observed often, in personal safety, needs for the work clothes of worker's allocation criterion, work
Clothes need the Vital status by Multiple detection, avoided the occurrence of, and the data situation inside network and host then needs to pass through
Visual examination system was checked and is overhauled to the problem of company property;
Step 4, data transmission: when being acquired to data, communicating terminal by monitoring information transmission to information terminal, into
And acquisition information is inputted to host by access interface, the information after host receives is arrived after multi-enciphering using optical cable transmission
Information is transferred to communication by the encrypted form of wireless network after being monitored by monitoring personnel to information by monitoring information master station
Terminal, so that communicating terminal is controlled and be detected by staff;
Step 5, data storage and maintenance: needing to store the data of transmission before transmitting data, main logical
Crossing the external equipment that do not network will store after data receiver, and carry out multiple duplication, and be divided in real time storage information
Class, and storage information check every a week and is surveyed.
The effect of the embodiment technical solution are as follows: mainly will be in each data and safe radix in power information system
Data compare, to obtain the changing condition of each data, can quickly detect the data more than safe radix, thus
Data are alternatively put and carry out actually detected and adjusting, the data for front and back of taking off then are compared into preservation, it is convenient to identical
The data of problem are saved, to reinforce further protecting a certain security breaches emphatically.
Embodiment 2
In the step 2, main information security is divided into personal safety and system safety, mainly not injure human body strong
The all parts of power information system are detected and checked under conditions of health, increase the advantage of the inspection of line, reduce reparation
The economic loss of personal safety.
In the step 3, when passing through image transmission, poisoning intrusion is easy to influence transmission data, to make to transmit
Corrupted data is unable to real-time detection field conditions, needs to arrange testing staff, and equipment and data are transmitted and checked, and increases
The working effect of oil (gas) filling device can guarantee the service life of equipment.
In the step 4, reduce data diffusion effect by way of encryption, also can increase the guarantor of power information data
Close effect, mainly using encryption and two kinds of forms of networked data transmission do not reinforce data protection effects when data are transmitted, and increase pair
The data protection of power information system, avoids hacker from stealing data information from network.
Working principle of the present invention: mainly each data in power information system and the data in safe radix are carried out pair
Than to obtain the changing condition of each data, the data more than safe radix can be quickly detected, thus to data variation
Place carries out actually detected and adjusting, and the data for front and back of taking off then are compared preservation, the convenient data to same problem
It is saved, to reinforce further protecting a certain security breaches emphatically;Data transmit when mainly using encryption and
Two kinds of forms of networked data transmission do not reinforce data protection effect, increase the data protection to power information system, avoid hacker
Data information is stolen from network.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention,
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features,
All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention
Within protection scope.
Claims (4)
1. a kind of power information system monitoring method, which comprises the following steps:
Step 1, safe cardinal data when obtaining the overall operation of goal systems: taking the safe cardinal data of goal systems,
Main includes the first personal secure data, the second equipment safety data, third finance correlation data, the 4th host data base data
With the 5th line security data, and data comparison table is established according to each data, daily data variation is compared, side
Just entire goal systems is monitored;
Step 2, safe cardinal data configuration: in each data in one that take steps, principal security safety device, safe shape
State and security breaches, wherein safety device includes operating system security, equipment management safety, personal safety and line security, peace
Total state includes that port security, process safety, Host Security and data daily update safety, security breaches include system vulnerability,
Database loophole, network hole and property loophole;
Real time data imaging monitoring: step 3 after obtaining data information in step 2, needs to calculate information and located
Reason, detects the changing condition of each route by way of monitoring and the monitoring video of each equipment safety, needs
Personnel take off and observe to equipment often, in personal safety, need for the work clothes of worker's allocation criterion, work clothes
The Vital status for needing, by Multiple detection, to avoid the occurrence of is filled, and the data situation inside network and host is then needed by outer
Portion checks that system was checked and overhauled to the problem of company property;
Step 4, data transmission: when being acquired to data, communicating terminal is by monitoring information transmission to information terminal, Jin Ertong
It crosses access interface and inputs acquisition information to host, the information after host receives utilizes optical cable transmission to monitoring after multi-enciphering
Information is transferred to communication eventually by the encrypted form of wireless network after being monitored by monitoring personnel to information by central information facility
End, so that communicating terminal is controlled and be detected by staff;
Step 5, data storage and maintenance: needing to store the data of transmission before transmitting data, main by not
The external equipment of networking will store after data receiver, and carry out multiple duplication, and carry out real-time grading to storage information, and
Storage information check every a week and is surveyed.
2. a kind of power information system monitoring method according to claim 1, it is characterised in that: main in the step 2
The information security wanted is divided into personal safety and system safety, mainly to power information system under conditions of not injuring human health
All parts detected and checked.
3. a kind of power information system monitoring method according to claim 1, it is characterised in that: in the step 3, lead to
When crossing image transmission, poisoning intrusion is easy to influence transmission data, to make to transmit corrupted data, it is existing to be unable to real-time detection
Field situation, needs to arrange testing staff, equipment and data is transmitted and checked.
4. a kind of power information system monitoring method according to claim 1, it is characterised in that: in the step 4, lead to
The mode for crossing encryption reduces data diffusion effect, also can increase the secrecy effect of power information data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811036009.2A CN109361650A (en) | 2018-09-06 | 2018-09-06 | A kind of power information system monitoring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811036009.2A CN109361650A (en) | 2018-09-06 | 2018-09-06 | A kind of power information system monitoring method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109361650A true CN109361650A (en) | 2019-02-19 |
Family
ID=65350364
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811036009.2A Pending CN109361650A (en) | 2018-09-06 | 2018-09-06 | A kind of power information system monitoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109361650A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014178926A1 (en) * | 2013-04-29 | 2014-11-06 | Enernoc, Inc. | Building management system false-positive fault indications reduction mechanism |
CN105785895A (en) * | 2016-03-30 | 2016-07-20 | 国网山东省电力公司荣成市供电公司 | Intelligent transformer station monitoring system |
CN107689954A (en) * | 2017-08-21 | 2018-02-13 | 国家电网公司 | Power information system monitoring method and device |
CN108418302A (en) * | 2018-02-01 | 2018-08-17 | 广东聚晨知识产权代理有限公司 | A kind of power distribution network platform based on big data analysis |
-
2018
- 2018-09-06 CN CN201811036009.2A patent/CN109361650A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014178926A1 (en) * | 2013-04-29 | 2014-11-06 | Enernoc, Inc. | Building management system false-positive fault indications reduction mechanism |
CN105785895A (en) * | 2016-03-30 | 2016-07-20 | 国网山东省电力公司荣成市供电公司 | Intelligent transformer station monitoring system |
CN107689954A (en) * | 2017-08-21 | 2018-02-13 | 国家电网公司 | Power information system monitoring method and device |
CN108418302A (en) * | 2018-02-01 | 2018-08-17 | 广东聚晨知识产权代理有限公司 | A kind of power distribution network platform based on big data analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111770108A (en) | Network safety system based on artificial intelligence | |
CN104495549A (en) | Elevator maintenance monitoring system and monitoring method | |
CN105573291B (en) | A kind of threat detection method and safety device based on key parameter fusion verification | |
CN104063987B (en) | Master control room of nuclear power station back-up disk alarm method and system thereof | |
CN112437041B (en) | Industrial control safety audit system and method based on artificial intelligence | |
CN107508831A (en) | A kind of intrusion detection method based on bus | |
CN107122685A (en) | A kind of big data method for secure storing and equipment | |
CN114266081A (en) | Operation and maintenance computer safety protection system and method of power monitoring system | |
CN111147521B (en) | Enterprise private network security event management system | |
CN111176153A (en) | Machine room moving ring alarm system | |
CN114741255A (en) | Fault self-healing technology based on automatic execution of service scene | |
CN109361650A (en) | A kind of power information system monitoring method | |
CN116720836A (en) | Intelligent campus safety management alarm system | |
CN109308062A (en) | A kind of production equipment monitoring network integrated system | |
CN108924095A (en) | A kind of government website security monitoring alarm platform | |
CN111343276A (en) | Safety production education and training system frame | |
CN107277070A (en) | A kind of computer network instrument system of defense and intrusion prevention method | |
CN110912869A (en) | Big data-based monitoring and reminding method | |
CN115037536B (en) | Security information management is with preventing early warning platform that data is lost based on big data | |
CN106254163B (en) | Monitor the method and device of the USB port of computer in local area network | |
CN109510312A (en) | A kind of safety utilization of electric power monitoring system | |
CN107968777A (en) | Network Security Monitor System | |
CN113704061A (en) | Secret-related computer protection system | |
CN114398642A (en) | Enterprise economic management information safety system | |
CN112995220A (en) | Security data security system for computer network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |
|
RJ01 | Rejection of invention patent application after publication |