CN111414394A - Power grid company compliance checking and tracking method and system - Google Patents
Power grid company compliance checking and tracking method and system Download PDFInfo
- Publication number
- CN111414394A CN111414394A CN202010246761.0A CN202010246761A CN111414394A CN 111414394 A CN111414394 A CN 111414394A CN 202010246761 A CN202010246761 A CN 202010246761A CN 111414394 A CN111414394 A CN 111414394A
- Authority
- CN
- China
- Prior art keywords
- compliance
- module
- data
- grid company
- power grid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 230000002776 aggregation Effects 0.000 claims abstract description 34
- 238000004220 aggregation Methods 0.000 claims abstract description 34
- 238000007726 management method Methods 0.000 claims abstract description 34
- 238000001514 detection method Methods 0.000 claims abstract description 21
- 238000004364 calculation method Methods 0.000 claims abstract description 16
- 238000007689 inspection Methods 0.000 claims description 27
- 238000011157 data evaluation Methods 0.000 claims description 9
- 238000007405 data analysis Methods 0.000 claims description 6
- 238000011156 evaluation Methods 0.000 claims description 6
- 241000721662 Juniperus Species 0.000 claims description 2
- 238000013523 data management Methods 0.000 abstract description 3
- 230000008569 process Effects 0.000 abstract description 3
- 230000000737 periodic effect Effects 0.000 abstract 1
- 239000002245 particle Substances 0.000 description 25
- 239000010433 feldspar Substances 0.000 description 9
- 239000011435 rock Substances 0.000 description 8
- 239000010453 quartz Substances 0.000 description 7
- VYPSYNLAJGMNEJ-UHFFFAOYSA-N silicon dioxide Inorganic materials O=[Si]=O VYPSYNLAJGMNEJ-UHFFFAOYSA-N 0.000 description 7
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000007619 statistical method Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 238000007670 refining Methods 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24553—Query execution of query operations
- G06F16/24554—Unary operations; Data partitioning operations
- G06F16/24556—Aggregation; Duplicate elimination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2462—Approximate or statistical queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S10/00—Systems supporting electrical power generation, transmission or distribution
- Y04S10/50—Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Computational Linguistics (AREA)
- Probability & Statistics with Applications (AREA)
- General Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Strategic Management (AREA)
- Primary Health Care (AREA)
- Fuzzy Systems (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Water Supply & Treatment (AREA)
- Public Health (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method and a system for checking and tracking compliance of a power grid company, which utilize a compliance data aggregation module to obtain asset information of the power grid company and send the asset and related information of a corresponding responsible person to a compliance data pre-calculation module; the compliance data aggregation module receives vulnerability data of the vulnerability scanning engine and sends the vulnerability and corresponding vulnerability information to the compliance data aggregation module; generating a corresponding compliance check table according to the internal management compliance check requirements of the power grid company, and sending the corresponding compliance check table to a compliance data aggregation module; according to the method, the system and the device, the base line configuration check is carried out according to the actual condition of a power grid company, the compliance data management, the compliance detection management, the compliance disposal management and the compliance report management are completed, the full automation and the periodic automatic execution of the compliance detection process are realized, the human intervention is reduced, a user can regularly receive the latest asset compliance report, the working efficiency of related workers is improved, and the labor and time costs are saved.
Description
Technical Field
The invention relates to the technical field of power grids, in particular to a method and a system for checking and tracking the compliance of a power grid company.
Background
The whole of the substation and the transmission and distribution line of various voltages in the power grid system is called as a power grid. The system comprises three units of power transformation, power transmission and power distribution. The task of the power grid is to deliver and distribute electrical energy, changing the voltage.
The power grid company is responsible for data management, detection management, report management and the like of various data in the power system, and the management of various information data by the existing power grid company is not standardized enough and has low efficiency.
Disclosure of Invention
The present invention is directed to a method and a system for checking and tracking compliance of a power grid company, so as to solve the problems mentioned in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a power grid company compliance checking and tracking method comprises the following specific steps: the compliance data aggregation module acquires asset information of a power grid company and sends the asset and related information of a corresponding responsible person to the compliance data pre-calculation module; the compliance data aggregation module receives vulnerability data of the vulnerability scanning engine and sends the vulnerability and corresponding vulnerability information to the compliance data aggregation module; generating a corresponding compliance check table according to the internal management compliance check requirements of the power grid company, and sending the corresponding compliance check table to a compliance data aggregation module; performing baseline configuration check according to the actual condition of the power grid company, and sending baseline configuration check condition data to a compliance data aggregation module; carrying out weak password inspection according to a power grid company, and sending inspection result data to a compliance data pre-calculation module; acquiring asset information inside a power grid company, driving a content compliance detection scanning engine, generating a content compliance inspection result and sending the content compliance inspection result to a compliance data aggregation module; the compliance data pre-calculation module receives vulnerability data, asset information, baseline configuration inspection conditions, weak passwords and content compliance inspection results from the compliance data aggregation module, and after data formatting, the data are sent to the compliance evaluation function module, the data to be inspected are analyzed, the characteristics of the data to be inspected in a data set of items to be inspected in the data are determined, and matching information is generated by matching each compliance item; obtaining a compliance examination result of the compliance item based on the generated matching result information; and the compliance detection and tracking module sends the generated compliance examination result to a compliance examination result reporting module, generates and outputs a compliance detection report matched with the examination result, and simultaneously sends the compliance detection report to the compliance detection and tracking module to track the non-compliance examination result.
A compliance checking and tracking system for a power grid company comprises a database, a data aggregation module, a file storage module, a compliance data pre-calculation module, a compliance data analysis module, a compliance data evaluation module, a compliance checking result reporting module and a compliance checking result reporting module, wherein the database is respectively connected with the data aggregation module and the file storage module, the data aggregation module and the file storage module are respectively connected with the compliance data pre-calculation module, the compliance data pre-calculation module is also connected with the compliance data analysis module and the compliance data evaluation module, the compliance data evaluation module is also connected with the compliance checking result reporting module, and the compliance checking result reporting module is also connected with the compliance checking result reporting module.
As a further technical scheme of the invention, the database comprises Oracle, SQ L Server and Informix.
As a further technical scheme of the invention: also includes a management module.
As a further technical scheme of the invention: transaction application data stored in the database.
As a further technical scheme of the invention: the operating systems adopted by the management module comprise Windows2000, Windows2003, Windows XP, Windows Vista and UNIX operating systems.
As a further technical scheme of the invention: the management module is internally provided with safety equipment, and the safety equipment comprises a Juniper firewall and a Cisco firewall.
Compared with the prior art, the invention has the beneficial effects that: the invention completes compliance data management, compliance detection management, compliance disposal management and compliance report management, realizes full automation of compliance detection process, periodically and automatically executes, reduces human intervention, and ensures that a user can regularly receive the latest asset compliance report, thereby improving the working efficiency of related workers and saving labor and time cost.
Drawings
FIG. 1 is a system diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1: referring to fig. 1, a method for checking and tracking compliance of a power grid company includes the following steps: the compliance data aggregation module acquires asset information of a power grid company and sends the asset and related information of a corresponding responsible person to the compliance data pre-calculation module; the compliance data aggregation module receives vulnerability data of the vulnerability scanning engine and sends the vulnerability and corresponding vulnerability information to the compliance data aggregation module; generating a corresponding compliance check table according to the internal management compliance check requirements of the power grid company, and sending the corresponding compliance check table to a compliance data aggregation module; performing baseline configuration check according to the actual condition of the power grid company, and sending baseline configuration check condition data to a compliance data aggregation module; carrying out weak password inspection according to a power grid company, and sending inspection result data to a compliance data pre-calculation module; acquiring asset information inside a power grid company, driving a content compliance detection scanning engine, generating a content compliance inspection result and sending the content compliance inspection result to a compliance data aggregation module; the compliance data pre-calculation module receives vulnerability data, asset information, baseline configuration inspection conditions, weak passwords and content compliance inspection results from the compliance data aggregation module, and after data formatting, the data are sent to the compliance evaluation function module, the data to be inspected are analyzed, the characteristics of the data to be inspected in a data set of items to be inspected in the data are determined, and matching information is generated by matching each compliance item; obtaining a compliance examination result of the compliance item based on the generated matching result information; and the compliance detection and tracking module sends the generated compliance examination result to a compliance examination result reporting module, generates and outputs a compliance detection report matched with the examination result, and simultaneously sends the compliance detection report to the compliance detection and tracking module to track the non-compliance examination result.
A compliance checking and tracking system for a power grid company comprises a database, a data aggregation module, a file storage module, a compliance data pre-calculation module, a compliance data analysis module, a compliance data evaluation module, a compliance checking result reporting module and a compliance checking result reporting module, wherein the database is respectively connected with the data aggregation module and the file storage module, the data aggregation module and the file storage module are respectively connected with the compliance data pre-calculation module, the compliance data pre-calculation module is also connected with the compliance data analysis module and the compliance data evaluation module, the compliance data evaluation module is also connected with the compliance checking result reporting module, and the compliance checking result reporting module is also connected with the compliance checking result reporting module.
1. Establishment of configuration checking library
And identifying the service system, analyzing the functional architecture of the service system by combining the baseline security model, and refining the functional architecture to different modules of a system level. On the basis, aiming at the characteristics of a business system, the possible security threats are analyzed, and the countermeasures aiming at the threats are decomposed into a system implementation layer by layer. The method mainly comprises the check items of a security vulnerability aspect, a security configuration aspect and the like.
The research range of the baseline policy library mainly comprises an operating system, a database, network equipment, security equipment and the like, wherein the operating system mainly comprises Windows2000, Windows2003, Windows XP, Windows Vista, UNIX operating system series (AIX, HP UNIX, L inux) and the like, the database mainly comprises network equipment such as Oracle, SQ L Server, Informix and the like, the database mainly comprises Huawei/Cisco equipment, and the security equipment mainly comprises Junper, Cisco firewall and the like.
The research content of the baseline policy library mainly comprises account numbers, passwords, authorization, logs, IP addresses and other contents. The content relates to the content of the enterprise's inspection and aspects that may affect the security of the device or system, such as the complexity of passwords, lifetime, historical passwords, password modifications, password deposits, and the like. The configuration checking part in the specification defines basic configuration safety requirements of the equipment and provides guidance for defining relevant safety requirements in the links of equipment network access testing, engineering acceptance and equipment operation and maintenance.
2. System architecture design
The configuration checking system is a WEB-based management mode, and a user uses a browser to interact with a system WEB interface module through an SS L encryption channel, so that the user management is facilitated.
1) And the scanning core module is one of the most important modules of the system and is responsible for finishing the detection and evaluation work of the target, including judging the survival state of the host, identifying the operating system, analyzing and matching rules and the like.
2) And a safety baseline configuration knowledge base, wherein the safety baseline configuration knowledge base comprises a safety configuration guide parameter checking o list of a known system, network equipment, an application, middleware, a database and the like, and is a basis for system operation, and a scanning scheduling module and a Web management module both rely on the safety configuration guide parameter checking o list to work.
3) And the scanning result library comprises result information of the scanning task, is a basis for generating a scanning result report and is a data source of the query and analysis result.
4) And the data synchronization module is responsible for version upgrading of each module in the system and provides data synchronization with the external data summarizing server.
5) And the Web interface module is responsible for interacting with the user and completing management work in cooperation with the request of the user. The Web management module comprises a plurality of sub-modules which together complete the request of the user.
6) And the local execution tool is used for providing a matched local execution tool by the configuration checking system, generating a report file after the local execution of the equipment to be checked, and importing the report file into the system for summarizing and analyzing. The tool can complete the functions of scanning, data output, report generation and the like through a functional interface provided by a WEB interface, and provides docking with other systems, and the tool has the following main functions:
and the task management function is used for finishing the management work of the user evaluation task.
And the report management function is used for reading the scanning result base and generating a scanning report according to the vulnerability description information and the solution.
And the user management function is used for completing the creation, deletion, modification and authorization management of the operation tool user.
And the audit management function is used for finishing the correction management of the tool operation records and the task result reports.
And completing the conventional configuration management of the tool.
And the template management function is used for completing the creation, deletion, modification management and maintenance of a local inspection tool of the security baseline inspection template.
3. Design of statistical analysis
The safety baseline verification tool analyzes risks from both macroscopic and microscopic perspectives. Macroscopically, the system deeply reflects the overall safety condition of the network from a plurality of visual angles, carries out fine-grained statistical analysis on multi-visual angle information such as problem distribution, harm, host information and the like, intuitively and clearly reflects the safety baseline problem distribution condition of information assets on the whole through forms such as bar charts, pie charts and the like, and microscopically, the system provides a detailed safety configuration solution for each information, supports the user to input keywords by himself to retrieve related information, so that the user can specifically know the detailed information of a certain host or a certain configuration. The method not only carries out statistical analysis on the safety baseline result and the like of a single scanning task, but also carries out comprehensive risk change and safety comparison evaluation on a plurality of scanning processes.
Example 2: on the basis of example 1, step B was carried out in two steps: firstly, simulating the irregular shape and size of particles: stretching a sphere with the radius R into an ellipsoid in any direction to enable the middle points of the sphere and the ellipsoid to be matched; the ellipsoidal surface is arbitrarily provided with N tangent planes; the smallest space enclosed by the tangent plane and the ellipsoid is the irregular-shaped particles, and the largest distance between the gravity center of the particles and the outermost surface is the radius of the particles; secondly, simulating the components of the particles: the sandstone mainly comprises three components of quartz, feldspar and rock debris, and according to different component compositions, the sandstone can be divided into seven types of quartz sandstone, feldspar sandstone, rock debris sandstone, feldspar quartz sandstone, rock debris quartz sandstone, feldspar rock debris sandstone and rock debris feldspar sandstone, so that the sandstone particles are determined to be of the seven types, and if the particles of each type are the seven typesThe ratio of particles in turn is P1、P2、P3、P4、P5、P6And P7And P is1+P2+P3+P4+P5+P6+P7=1, generate a random number P for each particle, if P ∈ [0, P1]The particle is quartz sandstone particle, if P ∈ [ P ]1, P1+P2]If the particle is feldspar sandstone particle, if P ∈ [ P ]1+P2, P1+P2+P3]The particles are rock debris sandstone particles, if P ∈ [ P ]1+P2+P3, P1+P2+P3+P4]If the particle is feldspar quartz sandstone particle, P ∈ [ P ]1+P2+P3+P4,P1+P2+P3+P4+P5]The particles are rock debris quartz sandstone particles, if P ∈ [ P ]1+P2+P3+P4+P5, P1+P2+P3+P4+P5+P6]The particle is feldspar quarry debris sandstone particle, if P ∈ [ P ]1+P2+P3+P4+P5+P6, 1]If the particles are the rock debris feldspar sandstone particles; on the basis of the two steps, all the sandstone particles are simulated by combining the distribution characteristics of the sizes of the sandstone particles.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.
Claims (7)
1. A power grid company compliance checking and tracking method is characterized by comprising the following specific steps: the compliance data aggregation module acquires asset information of a power grid company and sends the asset and related information of a corresponding responsible person to the compliance data pre-calculation module; the compliance data aggregation module receives vulnerability data of the vulnerability scanning engine and sends the vulnerability and corresponding vulnerability information to the compliance data aggregation module; generating a corresponding compliance check table according to the internal management compliance check requirements of the power grid company, and sending the corresponding compliance check table to a compliance data aggregation module; performing baseline configuration check according to the actual condition of the power grid company, and sending baseline configuration check condition data to a compliance data aggregation module; carrying out weak password inspection according to a power grid company, and sending inspection result data to a compliance data pre-calculation module; acquiring asset information inside a power grid company, driving a content compliance detection scanning engine, generating a content compliance inspection result and sending the content compliance inspection result to a compliance data aggregation module; the compliance data pre-calculation module receives vulnerability data, asset information, baseline configuration inspection conditions, weak passwords and content compliance inspection results from the compliance data aggregation module, and after data formatting, the data are sent to the compliance evaluation function module, the data to be inspected are analyzed, the characteristics of the data to be inspected in a data set of items to be inspected in the data are determined, and matching information is generated by matching each compliance item; obtaining a compliance examination result of the compliance item based on the generated matching result information; and the compliance detection and tracking module sends the generated compliance examination result to a compliance examination result reporting module, generates and outputs a compliance detection report matched with the examination result, and simultaneously sends the compliance detection report to the compliance detection and tracking module to track the non-compliance examination result.
2. The utility model provides a power grid company compliance inspection and tracking system, includes database, data aggregation module, file storage module, compliance data precalculation module, compliance data analysis module, compliance data evaluation module, compliance inspection result report module and compliance inspection result report module, its characterized in that, the database is connected data aggregation module and file storage module respectively, and data aggregation module, file storage module all link to the compliance data precalculation module, and compliance data precalculation module still links to the compliance data analysis module and still connects the compliance data evaluation module, and the compliance data evaluation module still links to the compliance inspection result report module, and the compliance inspection result report module still links to the compliance inspection result report module.
3. The grid company compliance checking and tracking system of claim 2, wherein the database comprises Oracle, SQ L Server, Informix.
4. The grid company compliance checking and tracking system of claim 2, further comprising a management module.
5. A grid company compliance checking and tracking system according to claim 3, wherein said database stores transaction application data.
6. The grid company compliance checking and tracking system of claim 4, wherein the management module uses operating systems including Windows2000, Windows2003, Windows XP, Windows Vista, UNIX operating systems.
7. The grid company compliance checking and tracking system of claim 4, wherein the management module is internally provided with a security device, and the security device comprises a Juniper firewall and a Cisco firewall.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010246761.0A CN111414394A (en) | 2020-03-31 | 2020-03-31 | Power grid company compliance checking and tracking method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010246761.0A CN111414394A (en) | 2020-03-31 | 2020-03-31 | Power grid company compliance checking and tracking method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111414394A true CN111414394A (en) | 2020-07-14 |
Family
ID=71491677
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010246761.0A Pending CN111414394A (en) | 2020-03-31 | 2020-03-31 | Power grid company compliance checking and tracking method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111414394A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113469546A (en) * | 2021-07-13 | 2021-10-01 | 宝能(广州)汽车研究院有限公司 | Project management and control method based on standard and regulation, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683127A (en) * | 2013-11-27 | 2015-06-03 | 北京神州泰岳软件股份有限公司 | Method and system for centrally checking weak passwords of equipment |
CN107547228A (en) * | 2016-06-29 | 2018-01-05 | 南京联成科技发展股份有限公司 | A kind of safe operation management platform based on big data realizes framework |
CN108763957A (en) * | 2018-05-29 | 2018-11-06 | 电子科技大学 | A kind of safety auditing system of database, method and server |
CN109102407A (en) * | 2018-08-10 | 2018-12-28 | 中募网络科技(北京)股份有限公司 | A kind of Si Mu company closes rule and checks and monitoring method and system |
CN109379390A (en) * | 2018-12-25 | 2019-02-22 | 中国电子科技网络信息安全有限公司 | A kind of network security baseline generation method based on full flow |
CN109687586A (en) * | 2018-12-28 | 2019-04-26 | 广东电网有限责任公司 | A kind of power monitoring Host Security inspection system |
-
2020
- 2020-03-31 CN CN202010246761.0A patent/CN111414394A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683127A (en) * | 2013-11-27 | 2015-06-03 | 北京神州泰岳软件股份有限公司 | Method and system for centrally checking weak passwords of equipment |
CN107547228A (en) * | 2016-06-29 | 2018-01-05 | 南京联成科技发展股份有限公司 | A kind of safe operation management platform based on big data realizes framework |
CN108763957A (en) * | 2018-05-29 | 2018-11-06 | 电子科技大学 | A kind of safety auditing system of database, method and server |
CN109102407A (en) * | 2018-08-10 | 2018-12-28 | 中募网络科技(北京)股份有限公司 | A kind of Si Mu company closes rule and checks and monitoring method and system |
CN109379390A (en) * | 2018-12-25 | 2019-02-22 | 中国电子科技网络信息安全有限公司 | A kind of network security baseline generation method based on full flow |
CN109687586A (en) * | 2018-12-28 | 2019-04-26 | 广东电网有限责任公司 | A kind of power monitoring Host Security inspection system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113469546A (en) * | 2021-07-13 | 2021-10-01 | 宝能(广州)汽车研究院有限公司 | Project management and control method based on standard and regulation, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110852601B (en) | Big data application method and system for environmental monitoring law enforcement decision | |
CN112001586B (en) | Enterprise networking big data audit risk control architecture based on block chain consensus mechanism | |
CN111815132A (en) | Network security management information publishing method and system for power monitoring system | |
CN105184642A (en) | Comprehensive tax administration platform | |
CN211905008U (en) | Online automatic monitoring system platform for catering oil fume | |
CN109582717A (en) | A kind of database unified platform and its read method towards electric power big data | |
CN106528828A (en) | Multi-dimensional checking rule-based data quality detection method | |
CN110806730A (en) | Big data operation and maintenance platform, server and storage medium | |
Wu et al. | Enterprise Digital Intelligent Remote Control System Based on Industrial Internet of Things | |
CN102043986A (en) | Online processing system for abnormal electricity information transferring and application method of system | |
CN111538720B (en) | Method and system for cleaning basic data of power industry | |
CN115239144A (en) | Dual prevention mechanism information system based on regional risk management | |
CN111414394A (en) | Power grid company compliance checking and tracking method and system | |
CN116961241B (en) | Unified application monitoring platform based on power grid business | |
CN105975595A (en) | Data quality monitoring and assessing method of real-time data center | |
CN115544133A (en) | Big data analysis method based on hybrid energy data | |
CN115208641A (en) | Software method based on safe operation of Internet data | |
CN113361949A (en) | Performance management system based on big data analysis | |
CN114490634A (en) | Multi-energy complementary data asset management method and system based on big data | |
CN112615812A (en) | Information network unified vulnerability multi-dimensional security information collection, analysis and management system | |
CN112883013A (en) | Consistency auditing system for urban atmospheric pollution source emission list | |
CN112463853A (en) | Financial data behavior screening working method through cloud platform | |
Ionescu et al. | The privacy case: Matching privacy-protection goals to human and organizational privacy concerns | |
CN111369211A (en) | Project operation data management system and method based on business intelligence | |
Wu et al. | Research and application of intelligent maintenance of relay protection equipment based on internet of things technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200714 |