Paper
8 December 2022 Comprehensive evaluation of power information system security protection based on entropy weight-TOPSIS algorithm
Shen Yang, Yi Lu, Mingshuang Gao, Ce Wang, Junnan Wang, Yunfeng Guo
Author Affiliations +
Proceedings Volume 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022); 1247404 (2022) https://doi.org/10.1117/12.2653831
Event: Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 2022, Guilin, China
Abstract
At present, with the deep integration of advanced information and communication technologies such as artificial intelligence, big data, and the Internet of Things and power technology, compared with the traditional power grid, the new power system is more multi-source heterogeneous, open and ubiquitous, and its attack surface is greatly expanded, the difficulty of security protection has increased sharply, and it is urgent to improve the security construction of the power information system. Compliance inspection and security assessment are important ways to guide the security construction of power information systems to this end, this paper is in-depth understanding of the current status of the network security of the power information system, combined with the network security classified protection system 2.0. A comprehensive evaluation method of power information system security protection based on entropy weight-TOPSIS algorithm is proposed, and through model case analysis, it provides an important theoretical basis for the safe, reliable and standardized development of power system.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Shen Yang, Yi Lu, Mingshuang Gao, Ce Wang, Junnan Wang, and Yunfeng Guo "Comprehensive evaluation of power information system security protection based on entropy weight-TOPSIS algorithm", Proc. SPIE 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 1247404 (8 December 2022); https://doi.org/10.1117/12.2653831
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Network security

Safety

Computer security

Telecommunications

Standards development

Information technology

Back to Top