CN210327863U - Information security vulnerability notification management and control system - Google Patents

Information security vulnerability notification management and control system Download PDF

Info

Publication number
CN210327863U
CN210327863U CN201921005420.3U CN201921005420U CN210327863U CN 210327863 U CN210327863 U CN 210327863U CN 201921005420 U CN201921005420 U CN 201921005420U CN 210327863 U CN210327863 U CN 210327863U
Authority
CN
China
Prior art keywords
management
optical
server cluster
control server
information security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201921005420.3U
Other languages
Chinese (zh)
Inventor
樊凯
陈华军
许爱东
戴涛
蒙家晓
关泽武
丁伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China South Power Grid International Co ltd
China Southern Power Grid Co Ltd
Original Assignee
China South Power Grid International Co ltd
China Southern Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China South Power Grid International Co ltd, China Southern Power Grid Co Ltd filed Critical China South Power Grid International Co ltd
Priority to CN201921005420.3U priority Critical patent/CN210327863U/en
Application granted granted Critical
Publication of CN210327863U publication Critical patent/CN210327863U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The utility model discloses an information security vulnerability report management and control system, the system includes management and control server cluster, management and control center computer, a plurality of area substation equipment, management and control server cluster with management and control center computer is connected through internal network, management and control server cluster still through passive optical network simultaneously with area substation equipment is connected. The utility model provides an information security leak report management and control system has good adaptability and scalability, and the compatibility is strong, can effectively save the optic fibre resource simultaneously, can realize the timely report of information security leak, and help the staff realizes the full life cycle management and the risk management and control of security leak.

Description

Information security vulnerability notification management and control system
Technical Field
The utility model relates to an information system field especially relates to an information security leak report management and control system.
Background
The emergence of the power system enables the electric energy which is highly efficient, pollution-free, convenient and easy to control to be widely applied, the change of each field of social production is promoted, the scale and the technical height of the power grid become one of the marks for measuring the national economic development level, however, the power grid is subjected to network attack due to the loophole of the information system of the power grid, so that the power supply is interrupted, the social instability is caused to happen occasionally, the high importance of the country and the industry is aroused, along with the rapid development of the network technology, the attack means adopted by hackers aiming at the loophole of the information system are constantly changed and upgraded, for the huge information network of the power grid company, the information security loophole information is difficult to be reported to all levels of departments in each region in time, therefore, targeted bug repair and defense cannot be timely and effectively performed, and great information safety hidden danger exists.
SUMMERY OF THE UTILITY MODEL
Therefore, an object of the present invention is to provide an information security vulnerability report management and control system to solve the above problems at least.
The information security vulnerability notification management and control system comprises a management and control server cluster, a management and control center computer and a plurality of regional substation equipment, wherein the management and control server cluster is connected with the management and control center computer through an internal network, and meanwhile, the management and control server cluster is connected with the regional substation equipment through a passive optical network.
Further, the management and control server cluster comprises a comprehensive management and control server and a database server cluster, and the comprehensive management and control server is connected with the database server cluster through a GPIO port.
Further, the database server cluster comprises a plurality of rack-mounted servers, the rack-mounted servers are used for storing information security data, and each rack-mounted server is connected with the comprehensive management and control server through a GPIO port.
Further, the passive optical network includes an optical transmitter, an optical multiplexer, a plurality of optical demultiplexer and a plurality of optical receiver, the receiving end of the optical transmitter is connected with the management and control server cluster, the transmitting end is connected with the optical multiplexer, the optical multiplexer is connected with the optical demultiplexer through an optical fiber, the optical demultiplexer is connected with the input end of the optical receiver, and the output end of the optical receiver is connected with the regional station equipment.
Furthermore, a passive optical splitter is arranged between the optical multiplexer and the optical demultiplexer.
Furthermore, the regional substation equipment comprises a substation computer, substation information equipment and a handheld notification terminal, the substation computer is connected with the management and control server cluster through a passive optical network, the substation information equipment is connected with the substation computer, and the handheld notification terminal is connected with the substation computer through a wireless network.
Furthermore, an intelligent gateway and a network hardware firewall are further arranged between the control server cluster and the passive optical network, and the control server cluster, the intelligent gateway, the network hardware firewall and the passive optical network are sequentially connected.
Compared with the prior art, the beneficial effects of the utility model are that:
the utility model provides an information security leak report management and control system possesses good adaptability and scalability, and the passive optical network structure that adopts is little to the optical fiber resource consumption, can in time report the department at different levels with the information security leak based on the fast characteristics of optical fiber transmission speed, to current leak, can find out effectual safety rectification suggestion fast, helps the staff to realize the full life cycle management and the risk management and control of security leak.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only preferred embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive work.
Fig. 1 is a schematic view of the overall system of the management and control system according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of an overall system of a passive optical network according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a passive optical network according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of a specific system of the management and control system according to an embodiment of the present invention.
In the figure, 1 is a management server cluster, 2 is a management center computer, 3 is a regional substation device, 4 is a passive optical network, 5 is an intelligent gateway, 6 is a network hardware firewall, 11 is a comprehensive management server, 12 is a database server cluster, 31 is a substation computer, 32 is a substation information device, 33 is a handheld notification terminal, 41 is an optical transmitter, 42 is an optical multiplexer, 43 is an optical demultiplexer, 44 is an optical receiver, 45 is a passive optical splitter, and 121 is a rack server.
Detailed Description
In the present application, unless expressly stated or limited otherwise, the terms "connected" and "fixed" are to be construed broadly, e.g., "fixed" may be fixedly connected or detachably connected, or integrally formed; can be mechanically or electrically connected; they may be directly connected or indirectly connected through intervening media, or they may be connected internally or in any other suitable relationship, unless expressly stated otherwise. The specific meaning of the above terms in the present invention can be understood according to specific situations by those skilled in the art.
The principles and features of the present invention are described below in conjunction with the following drawings, the illustrated embodiments are provided to explain the present invention and not to limit the scope of the invention.
Referring to fig. 1, the utility model provides an information security vulnerability report management and control system, including management and control server cluster 1, management and control center computer 2 and regional station equipment 3, management and control center computer 2 with management and control server cluster 1 is connected through internal network, management and control server cluster 1 simultaneously through passive optical network 4 with regional station equipment 3 is connected.
The management and control server cluster 1 is used for storing information security vulnerability data and sending security vulnerability notification information to each regional station device 3 as a broadcast node. The management and control server cluster 1 comprises an integrated management and control server 11 and a database server cluster 12, wherein the integrated management and control server 11 is connected with the database server cluster 12. The integrated management and control server 11 is configured to process a service processing request initiated by the management and control center computer 2 or the regional substation device 3, and may be used as a notification initiating node to initiate a security vulnerability information notification to each regional substation device 3. The comprehensive management and control server can adopt a PowerEdge T340 server.
Specifically, the database server cluster 12 includes a plurality of rack servers 121, each rack server is connected to the integrated management and control server through a GPIO port, the rack servers 121 are configured to store information security related data, establish an information security database, and allow local substations to query and share the information security related data through a network, where the information security related data may include information security evaluation indexes, discovered information security threat vulnerability data, information security risk data, information security vulnerability repair and rectification related knowledge data. The utility model discloses an optional embodiment, rack server 121 adopts server cluster framework, and when certain rack server caused the stop work because of trouble or human error reason in the cluster, other rack servers can take over the work that trouble server is carrying out automatically, guarantee continuation, the steady operation of system. The rack-mounted server can adopt a PowerEdge R240 rack-mounted server.
The staff can control the comprehensive management and control server 11 to send information security vulnerability reports to each regional substation device 3 through the management and control center computer 2, and manage, modify and call data stored in the database server cluster 12.
Referring to fig. 2, the management and control server cluster 1 and the regional station device 3 perform data interaction through the passive optical network 4. The passive optical network 4 includes an optical transmitter 41, an optical multiplexer 42, an optical demultiplexer 43, and an optical receiver 44, where a receiving end of the optical transmitter 41 is connected to the management and control server cluster 1, and a transmitting end is connected to the optical multiplexer 42. The optical demultiplexer 43 is disposed in each regional station, the optical multiplexer 42 is connected to the optical demultiplexer 43 through an optical fiber, the optical demultiplexer 43 is connected to the input terminal of the optical receiver 44, and the output terminal of the optical receiver 44 is connected to the regional station apparatus 3. The optical transmitter 41 is configured to convert an electrical signal sent by the management and control server cluster 1 into an optical signal. The optical multiplexer 42 is used for merging optical signals with different wavelengths and carrying various information, and coupling the optical signals to the same optical fiber in the transmission line for transmission. The optical demultiplexer 43 is used to separate the optical signal from the light. The optical receiver 44 is used to convert the optical signal into an electrical signal and transmit the electrical signal to the differentiating station apparatus 3. The use of optical fiber resources can be effectively saved by transmitting data through the passive optical network 4, and the total cost of the information security vulnerability notification management and control system is reduced. The passive optical network can flexibly adopt tree, star or ring topology systems according to specific requirements, and has strong expandability and flexibility.
Referring to fig. 3, in an embodiment of the present invention, a passive optical splitter 45 is further disposed between the optical multiplexer 42 and the optical demultiplexer 43. In order to transmit signals of the management and control server cluster 1 to each regional substation device 3, an optical fiber needs to be erected between the management and control server cluster 1 and each regional substation device 3, a passive optical splitter 45 is arranged between an optical multiplexer 42 at one end of the management and control server cluster 1 and an optical demultiplexer 43 at one end of a regional substation subnet 3, the optical multiplexer 42 and the passive optical splitter 45 perform signal transmission through a single optical fiber line, the passive optical splitter 45 and the optical demultiplexers 43 of each regional substation perform signal transmission through optical fiber lines, and compared with a mode that the optical multiplexer 42 and the optical demultiplexers 43 are directly connected through optical fiber lines, the length of the laid optical fiber is short, the use of optical fiber resources is saved, and the network erection cost is further reduced.
The regional substation apparatus 3 includes a substation computer 31, a substation information apparatus 32, and a handheld notification terminal 33. The substation computer 31 is connected to the optical demultiplexer 43, the substation information device 32 is connected to the substation computer 31, and the handheld notification terminal 33 is connected to the substation computer 31 through a wireless network. The substation computer 31 is configured to receive the information security vulnerability report, and report the information security vulnerability of the substation information device 32 to the management and control server cluster 1. The substation information device 32 includes a power grid, a communication and office automation device, and an IED device. The handheld notification terminal 33 can obtain the information security vulnerability notification from the substation computer 31 so as to facilitate timely processing and repairing of vulnerabilities by workers, and can also edit information security vulnerability information and send the information security vulnerability notification to the substation computer 31, and the handheld notification terminal 33 is an industrial PDA or a tablet computer. The substation computer 31 sends the information security vulnerability information to the management and control server cluster 1 through the passive optical network 4, records the information security vulnerability information in the database server cluster 12 as the existing information security vulnerability, and reports the information security vulnerability information to other regional substation equipment 3, so that the whole life cycle management and risk management and control of the information security vulnerability can be realized. The staff can also call the safety correction suggestion for the existing holes stored by the management and control server cluster 1 through the substation computer 31, so as to strengthen the system safety.
Referring to fig. 4, in an embodiment of the present invention, the management and control server cluster 1 and the passive optical network 4 are provided with an intelligent gateway 5 and a network hardware firewall 6, and the management and control server cluster 1, the intelligent gateway 5, the network hardware firewall 6 and the passive optical network 4 are connected in sequence. The network hardware firewall 6 is used for resisting external malicious network attacks, and the intelligent gateway 5 can monitor the state of the intelligent link and send an alarm to the management and control center computer 2. The intelligent gateway 5 and the network hardware firewall 6 can guarantee whether the flow of the access control server cluster 1 is safe or not, and prevent the control server cluster 1 from being attacked maliciously. The intelligent gateway can adopt an F-G100 industrial intelligent gateway; the network hardware firewall may employ an RG-WALL 1600-X9850 firewall.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the present invention, and any modifications, equivalent replacements, improvements, etc. made within the spirit and principle of the present invention should be included within the protection scope of the present invention.

Claims (7)

1. The information security vulnerability notification management and control system is characterized by comprising a management and control server cluster, a management and control center computer and a plurality of regional substation equipment, wherein the management and control server cluster is connected with the management and control center computer through an internal network, and meanwhile, the management and control server cluster is connected with the regional substation equipment through a passive optical network.
2. The information security vulnerability notification management and control system according to claim 1, wherein the management and control server cluster comprises a comprehensive management and control server and a database server cluster, and the comprehensive management and control server is connected with the database server cluster through a GPIO port.
3. The information security vulnerability notification management and control system according to claim 2, wherein the database server cluster comprises a plurality of rack-mounted servers, the rack-mounted servers are used for storing information security data, and each rack-mounted server is connected with the comprehensive management and control server through a GPIO port.
4. The information security vulnerability notification management and control system according to claim 1, wherein the passive optical network comprises an optical transmitter, an optical multiplexer, a plurality of optical demultiplexers and a plurality of optical receivers, wherein a receiving end of the optical transmitter is connected with the management and control server cluster, a transmitting end is connected with the optical multiplexers, the optical multiplexers are connected with the optical demultiplexers through optical fibers, the optical demultiplexers are connected with input ends of the optical receivers, and output ends of the optical receivers are connected with the regional substation equipment.
5. The system according to claim 4, wherein a passive optical splitter is disposed between the optical multiplexer and the optical demultiplexer.
6. The information security vulnerability notification management and control system according to claim 1, wherein the regional station equipment comprises a substation computer, a substation information device and a handheld notification terminal, the substation computer is connected with the management and control server cluster through a passive optical network, the substation information device is connected with the substation computer, and the handheld notification terminal is connected with the substation computer through a wireless network.
7. The information security vulnerability notification management and control system according to claim 1, wherein an intelligent gateway and a network hardware firewall are further arranged between the management and control server cluster and the passive optical network, and the management and control server cluster, the intelligent gateway, the network hardware firewall and the passive optical network are sequentially connected.
CN201921005420.3U 2019-06-28 2019-06-28 Information security vulnerability notification management and control system Active CN210327863U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201921005420.3U CN210327863U (en) 2019-06-28 2019-06-28 Information security vulnerability notification management and control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201921005420.3U CN210327863U (en) 2019-06-28 2019-06-28 Information security vulnerability notification management and control system

Publications (1)

Publication Number Publication Date
CN210327863U true CN210327863U (en) 2020-04-14

Family

ID=70147782

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201921005420.3U Active CN210327863U (en) 2019-06-28 2019-06-28 Information security vulnerability notification management and control system

Country Status (1)

Country Link
CN (1) CN210327863U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114675582A (en) * 2022-04-20 2022-06-28 许知坚 Big data-based intelligent information security management and control system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114675582A (en) * 2022-04-20 2022-06-28 许知坚 Big data-based intelligent information security management and control system
CN114675582B (en) * 2022-04-20 2023-01-24 希博(张家港)科技有限公司 Big data-based intelligent information security management and control system

Similar Documents

Publication Publication Date Title
CN103812710B (en) Power communication communication terminal special
CN106452571B (en) Electric power terminal communication access net topological relation faulty section determines and analysis method
CN102324968A (en) Alarm management method and device of passive optical network terminal equipment
CN110069011A (en) Fiber optic stretch based on BD and GPS concentrates time dissemination system and time service method
CN107092243B (en) Power supply control intelligent safety monitoring system based on Internet of things
CN210327863U (en) Information security vulnerability notification management and control system
CN104469314A (en) Video monitoring system and method of electric power construction field
CN103036881B (en) A kind of methods, devices and systems to the unified configuration of disrupter
CN108551400B (en) Portable fortune dimension fort machine system
CN104378209A (en) High-speed wireless data secure transmission system and method suitable for distribution network system
CN103686641A (en) Method for sending and receiving short message in power monitoring field
CN103973495A (en) Terminal access network interface adapter and data transmission method thereof
CN102904756A (en) Power information communication scheduling-operation-inspection integrated processing method
CN103957153A (en) Dispatching exchange network interface adapter and data transmission method thereof
CN104486170A (en) Novel mining integrated access system
CN103885422B (en) Hydrogen fuel stand-by power supply monitoring system and method
CN201681280U (en) Remote monitoring wireless transmitter
CN204707132U (en) For centralized monitor and the long distance control system of network management server group
CN208638365U (en) Fire Control system
CN107180524A (en) A kind of network monitoring method of power information acquisition system
CN105182114A (en) On-line monitoring device for distribution transformer
CN202634075U (en) Distribution transformer district equipment abnormal running remote alarm intelligent management center
CN207304565U (en) A kind of hfc plant management system for possessing optical cable on-line monitoring function
CN208386547U (en) A kind of power network security monitoring system
CN103957126A (en) Synchronous clock network interface adaptor and data transmission method thereof

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant