您好,欢迎来到聚文网。
登录
免费注册
网站首页
|
搜索
热搜:
磁力片
|
购物车
0
我的订单
商品分类
首页
幼儿
文学
社科
教辅
生活
销量榜
铸剑:电力行业数据安全保障之路
装帧: 平装
出版社: 电子工业出版社
作者: 主编周文婷 著
出版日期: 2024-01-01
商品条码: 9787121472893
版次: 1
开本: 其他
页数: 151
出版年份: 2024
定价:
¥79
销售价:
登录后查看价格
¥{{selectedSku?.salePrice}}
库存:
{{selectedSku?.stock}}
库存充足
{{item.title}}:
{{its.name}}
加入购物车
立即购买
加入书单
收藏
精选
¥5.83
世界图书名著昆虫记绿野仙踪木偶奇遇记儿童书籍彩图注音版
¥5.39
正版世界名著文学小说名家名译中学生课外阅读书籍图书批发 70册
¥8.58
简笔画10000例加厚版2-6岁幼儿童涂色本涂鸦本绘画本填色书正版
¥5.83
世界文学名著全49册中小学生青少年课外书籍文学小说批发正版
¥4.95
全优冲刺100分测试卷一二三四五六年级上下册语文数学英语模拟卷
¥8.69
父与子彩图注音完整版小学生图书批发儿童课外阅读书籍正版1册
¥24.2
好玩的洞洞拉拉书0-3岁宝宝早教益智游戏书机关立体翻翻书4册
¥7.15
幼儿认字识字大王3000字幼儿园中班大班学前班宝宝早教启蒙书
¥11.55
用思维导图读懂儿童心理学培养情绪管理与性格培养故事指导书
¥19.8
少年读漫画鬼谷子全6册在漫画中学国学小学生课外阅读书籍正版
¥64
科学真好玩
¥12.7
一年级下4册·读读童谣和儿歌
¥38.4
原生态新生代(传统木版年画的当代传承国际研讨会论文集)
¥11.14
法国经典中篇小说
¥11.32
上海的狐步舞--穆时英(中国现代文学馆馆藏初版本经典)
¥21.56
猫的摇篮(精)
¥30.72
幼儿园特色课程实施方案/幼儿园生命成长启蒙教育课程丛书
¥24.94
旧时风物(精)
¥12.04
三希堂三帖/墨林珍赏
¥6.88
寒山子庞居士诗帖/墨林珍赏
¥6.88
苕溪帖/墨林珍赏
¥6.88
楷书王维诗卷/墨林珍赏
¥9.46
兰亭序/墨林珍赏
¥7.74
祭侄文稿/墨林珍赏
¥7.74
蜀素帖/墨林珍赏
¥12.04
真草千字文/墨林珍赏
¥114.4
进宴仪轨(精)/中国古代舞乐域外图书
¥24.94
舞蹈音乐的基础理论与应用
内容简介
本书以铸造电力行业数据安全防御之剑, 提高电力行业从业人员数据安全能力为目的, 讲述了塑模、铸范、锻造、淬火、抛光、出鞘、剑舞七个步骤的内容, 从基本概念到具体实践, 主要涵盖了电力行业数据安全概述、数据安全政策法规、数据安全保护体系、数据安全防护技术、数据全生命周期安全风险分析及对策、数据安全典型事件、数据安全未来发展趋势等方面的内容。
目录
第一章 塑模:电力行业数据安全概述 ····································································.2 1.1 电力系统简介 ·····················································································.2 1.1.1 传统电力系统·············································································.3 1.1.2 新型电力系统·············································································.5 1.2 电力行业数据特点 ···············································································.8 1.2.1 数据来源广泛·············································································.8 1.2.2 数据应用全面·············································································.9 1.2.3 数据特征显著·············································································.9 1.3 做好电力行业数据安全保护为何重要 ·······················································10 1.4 电力行业数据安全风险与挑战 ································································12 1.4.1 数据泄露危及国家安全·································································12 1.4.2 非法入侵导致电力系统服务中断·····················································13 1.4.3 数据滥用带来违法与犯罪风险························································13 1.4.4 数字化技术蕴含新的安全风险························································14 1.4.5 数据全生命周期管理不足引发短板效应············································15 1.5 本章小结 ···························································································16 第二章 铸范:电力行业数据安全政策法规 ······························································18 2.1 电力行业数据安全相关法律法规解读 ·······················································18 2.1.1 《中华人民共和国网络安全法》 ······················································19 2.1.2 《中华人民共和国数据安全法》 ······················································22 2.1.3 《中华人民共和国密码法》 ····························································24 2.1.4 《中华人民共和国个人信息保护法》 ················································24 2.1.5 《最高人民法院、最高人民检察院关于办理侵犯公民个人信息刑事案件适用法律若干问题的解释》····················26 2.1.6 《网络安全审查办法》 ··································································29 2.1.7 《信息安全技术―网络安全等级保护基本要求》 ·································30 2.1.8 《关键信息基础设施安全保护条例》 ················································33 2.2 电力行业数据安全相关政策要求 ·····························································35 2.2.1 《电力监控系统安全防护规定》 ······················································35 2.2.2 《电力监控系统安全防护总体方案》 ················································37 2.2.3 《加强工业互联网安全工作的指导意见》 ··········································37 2.2.4 《工业和信息化领域数据安全管理办法(试行)》································38 2.2.5 《关于加强电力行业网络安全工作的指导意见》 ·································40 2.2.6 《电力行业网络安全管理办法》 ······················································41 2.2.7 《电力可靠性管理办法(暂行)》·····················································42 2.2.8 《电力行业网络安全等级保护管理办法》 ··········································43 2.3 本章小结 ···························································································44 第三章 锻造:电力行业数据安全保护体系 ······························································46 3.1 如何做好电力企业的数据安全管理 ··························································48 3.1.1 至关重要的组织架构····································································48 3.1.2 缺一不可的制度流程····································································50 3.1.3 必不可少的管理机制····································································52 3.1.4 不可或缺的人员管理····································································54 3.2 如何做好电力企业数据安全技术防护 ·······················································56 3.2.1 数据分级分类安全防护·································································58 3.2.2 数据安全精准防护·······································································59 3.2.3 数据交互开放可信·······································································60 3.3 如何做好电力企业数据安全运营及服务 ····················································61 3.3.1 数据安全监测·············································································61 3.3.2 数据安全评估·············································································61 3.3.3 数据安全审计·············································································63 3.4 本章小结 ···························································································63 第四章 淬火:电力数据安全防护技术 ····································································65 4.1 传统数据安全保护技术 ·········································································65 4.1.1 边界防护···················································································65 4.1.2 身份认证及访问控制····································································66 4.1.3 数据安全审计·············································································68 4.1.4 数据脱敏···················································································70 4.1.5 数据追踪溯源·············································································71 4.1.6 数据加密···················································································72 4.1.7 数字签名···················································································73 4.1.8 数据沙箱···················································································75 4.1.9 数据库防火墙·············································································76 4.2 新型数据安全保护技术 ·········································································77 4.2.1 基于人工智能的数据安全技术························································78 4.2.2 基于区块链的数据安全技术···························································78 4.2.3 基于零信任架构的数据安全技术·····················································79 4.2.4 基于安全多方计算的数据安全技术··················································81 4.2.5 基于差分隐私保护的数据安全技术··················································83 4.2.6 敏感数据识别技术·······································································84 4.2.7 基于 API 监测的数据安全技术 ·······················································86 4.2.8 基于数据流转监测的数据安全技术··················································87 4.3 本章小结 ···························································································88 第五章 抛光:电力行业数据全生命周期安全风险分析及对策 ······································91 5.1 数据全生命周期概述 ············································································91 5.2 数据采集阶段 ·····················································································92 5.2.1 电力行业数据采集方式·································································93 5.2.2 风险分析···················································································98 5.2.3 应对措施···················································································99 5.3 数据传输阶段 ··················································································.102 5.3.1 电力行业常用数据传输方式························································.102 5.3.2 风险分析················································································.107 5.3.3 应对措施················································································.108 5.4 数据存储阶段 ··················································································.109 5.4.1 电力行业数据存储方式······························································.109 5.4.2 风险分析················································································.111 5.4.3 应对措施················································································.112 5.5 数据处理阶段 ··················································································.114 5.5.1 电力行业常见数据处理场景························································.114 5.5.2 风险分析················································································.115 5.5.3 应对措施················································································.116 5.6 数据交换阶段 ··················································································.120 5.6.1 电力数据交换场景····································································.120 5.6.2 风险分析················································································.120 5.6.3 应对措施················································································.122 5.7 数据销毁阶段 ··················································································.124 5.7.1 风险分析················································································.125 5.7.2 应对措施················································································.126 5.8 运维环节的安全风险 ·········································································.128 5.8.1 风险分析················································································.128 5.8.2 应对措施················································································.129 5.9 本章小结 ························································································.129 第六章 出鞘:电力行业数据安全典型事件 ···························································.131 6.1 电力行业黑客攻击典型案例 ································································.131 6.1.1 乌克兰电力系统遭受攻击···························································.132 6.1.2 委内瑞拉电网遭受攻击······························································.134 6.1.3 暴露的问题·············································································.135 6.1.4 应对措施················································································.135 6.2 供应链安全引发数据泄露事件 ·····························································.136 6.2.1 Equifax 公司信息泄露事件··························································.137 6.2.2 SolarWinds 供应链攻击事件························································.137 6.2.3 暴露的问题·············································································.138 6.2.4 应对措施················································································.138 6.3 内部人员由于安全意识淡薄导致数据泄露 ··············································.139 6.3.1 APT 黑客组织“蜻蜓”入侵美国电网 ···········································.139 6.3.2 乌克兰某核电厂发生重大网络安全事故·········································.140 6.3.3 暴露的问题·············································································.141 6.3.4 应对措施················································································.141 6.4 系统配置不当造成数据泄露 ································································.142 6.4.1 美国德州电气工程公司(PQE)服务器配置引发数据泄露 ·················.142 6.4.2 德国电网公司数据泄露事件························································.143 6.4.3 暴露的问题·············································································.144 6.4.4 应对措施················································································.144 6.5 典型的电力行业成功防御网络攻击案例 ·················································.144 6.5.1 美国新墨西哥公共服务公司成功应对网络攻击事件 ··························.144 6.5.2 爱尔兰国家电网公司成功应对网络攻击事件···································.145 6.6 本章小结 ························································································.146 第七章 剑舞:电力行业数据安全未来发展趋势 ·····················································.148 7.1 电力行业数据安全面临新挑战 ·····························································.148 7.1.1 电力数据主权维护面临着“新数据孤岛”挑战 ···································.148 7.1.2 个人信息和隐私保护成为电力数据保护的主战场·····························.149 7.1.3 电力行业数据安全管控更加依赖新技术应用···································.149 7.2 电力行业数据安全未来发展趋势 ··························································.149 7.2.1 数据安全政策法规和监管措施将日趋完善······································.149 7.2.2 电力数据版权管理体系发展步入正轨············································.149 7.2.3 电力行业的安全体系建设逐步落地···············································.150 7.2.4 电力行业数据安全重要性日益突出···············································.150
×
Close
添加到书单
加载中...
点此新建书单
×
Close
新建书单
标题:
简介:
蜀ICP备2024047804号
Copyright 版权所有 © jvwen.com 聚文网