首页 | 本学科首页   官方微博 | 高级检索  
     

调控终端安全管控技术研究与应用
引用本文:王先强,张睿,张华.调控终端安全管控技术研究与应用[J].四川电力技术,2021,44(4):43-49.
作者姓名:王先强  张睿  张华
作者单位:国网四川省电力公司南充供电公司
摘    要:在能源互联网和电网智能化的发展趋势下,各类新型电网业务和工作场景访问调度主站系统的需求增多,需要规范调度终端的权限配置,加强操作过程安全审计,完善管理制度和技术手段,有效防范安全攻击,提升应对极端情况的风险防控水平。通过对现有调度终端键盘、显示器、鼠标延伸技术的使用现状分析,提出了一种基于云计算和生物多因子认证的调控终端安全管控技术。该技术根据电网调度自动化的业务场景,融合计算虚拟化、网络虚拟化、存储虚拟化、运维监控管理、云桌面业务流程交付等软件技术,形成标准化的调控终端安全管控系统解决方案。

关 键 词:调度终端  调控终端安全管控  云计算  生物多因子认证

Research and Application of Security Control Technology for Dispatching Control Terminal
Wang Xianqiang,Zhang Rui,Zhang Hua.Research and Application of Security Control Technology for Dispatching Control Terminal[J].Sichuan Electric Power Technology,2021,44(4):43-49.
Authors:Wang Xianqiang  Zhang Rui  Zhang Hua
Affiliation:State Grid Nanchong Electric Power Supply Company
Abstract:Under the intelligent development of energy Internet and power grids, various new power grid services and work scenarios have a increased demand for the access to dispatching master station system. It is necessary to standardize the authority configuration of dispatching terminals, strengthen the safety audit of operation process, improve the management system and technical means, which can effectively prevent security attacks and improve risk prevention level in response to extreme situations. By analyzing the current status of the use of KVM extension technology for dispatching terminals, a regulatory terminal security control technology based on cloud computing and biological multi-factor authentication is proposed. According to the business scenarios of power grid dispatching automation, the proposed technology integrates software technologies such as computing virtualization, network virtualization, storage virtualization, operation and maintenance monitoring and management, and cloud desktop business process delivery to form a standardized regulatory terminal security management and control system solution.
Keywords:dispatching control terminal  security control technology for control terminal  cloud computing  biological multi-factor authentication
本文献已被 CNKI 维普 等数据库收录!
点击此处可从《四川电力技术》浏览原始摘要信息
点击此处可从《四川电力技术》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号