Critical Infrastructures at Risk Addressing Information Security in Power Systems

Authors

  • Temia Temeglio
  • Ram Gei

DOI:

https://doi.org/10.54097/9t5lh7jk

Keywords:

Information network, Security management

Abstract

According to the power system network security risks and problems, this paper presents the work of information security and the general principles of information security from a technical and safety management put forward the idea of addressing security issues and methods of analysis of local area network security management related to issues, and according to their own experience of a relatively effective way of thinking.

References

Guo Hulin. Analysis of Enterprise Network Information Security [J]. Computer Security, 2002 (6).

Yan Bin, Qu Junhua, Qi Linhai. Research on the construction scheme of power enterprise network information security system [J]. Computer Security, 2003 (1).

Feng Dengguo. Computer Communication Network Security [M]. Tsinghua University Press, 2004.

Zhu Guiqiang. On enterprise network information security management.2005(6).

Yang Zanguo. On Enterprise Network Information Security and Prevention Strategies [J]. Computer Security, 2005 (6).

Wang Yingxin, Niu Dongxiao. Research on Network Information Security Management of Electric Power Enterprises [J]. Computer Security, 2007 (3).

Li, X., Wang, X., Chen, X., Lu, Y., Fu, H., & Wu, Y. C. (2024). Unlabeled data selection for active learning in image classification. Scientific Reports, 14(1), 424.

Liang, Y., Wang, X., Wu, Y. C., Fu, H., & Zhou, M. (2023). A Study on Blockchain Sandwich Attack Strategies Based on Mechanism Design Game Theory. Electronics, 12(21), 4417.

Lee, Zhitong, Ying Cheng Wu, and Xukang Wang. "Automated Machine Learning in Waste Classification: A Revolutionary Approach to Efficiency and Accuracy." Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition. 2023.

Guo, H., Ma, Z., Chen, X., Wang, X., Xu, J., & Zheng, Y. (2024). Generating Artistic Portraits from Face Photos with Feature Disentanglement and Reconstruction. Electronics, 13(5), 955.

Wang, X., Wu, Y. C., Ma, Z. (2024). Blockchain in the courtroom: exploring its evidentiary significance and procedural implications in U.S. judicial processes. Frontiers in Blockchain, 7, 1306058.

Strahilevitz, L. J. (2010). Reunifying Privacy Law. Calif. L. Rev., 98, 2007.

Solove, D. J., & Schwartz, P. M. (2020). Information privacy law. Aspen Publishing.

Richards, N. M., & Solove, D. J. (2010). Prosser's privacy law: A mixed legacy. Calif. L. Rev., 98, 1887.

Kephart, J. O., & White, S. R. (1993, May). Measuring and modeling computer virus prevalence. In Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy (pp. 2-15). IEEE.

Downloads

Published

30-04-2024

Issue

Section

Articles

How to Cite

Temeglio, T., & Gei, R. (2024). Critical Infrastructures at Risk Addressing Information Security in Power Systems. Journal of Computing and Electronic Information Management, 12(3), 42-46. https://doi.org/10.54097/9t5lh7jk