Education, Science, Technology, Innovation and Life
Open Access
Sign In

Exploration on the Construction of Security Protection System for Nuclear Power Critical Information Infrastructure

Download as PDF

DOI: 10.23977/infse.2023.040307 | Downloads: 10 | Views: 392

Author(s)

Anman Luo 1, Youqin Hu 1, Xianhe Shang 2, Yalin Xiao 2, Nan Wu 1

Affiliation(s)

1 China Nuclear Power Operation Management Co. LTD, Network Security Division, Information Management Office, Jiaxing, China
2 China Nuclear Power Operation Management Co. LTD, Jiaxing, China

Corresponding Author

Anman Luo

ABSTRACT

With the promulgation of the "Network Security Law", "Personal Information Protection Law", "Data Security Law" and other laws and regulations, the state implements the "Regulations on the security protection of critical information Infrastructure" supporting the security protection of critical information foundation, which will be officially implemented on September 1, 2021, marking the maturity of laws and regulations in the field of the security protection of critical information infrastructure. Nuclear power enterprises should carry out substantive work in accordance with the safety technology and safety management requirements mentioned in laws and standards, and do a good job in the network security protection of the critical information infrastructure of nuclear power enterprises. Based on the work experience in the security protection management of critical information infrastructure, this paper considers and studies the construction of the security protection system of critical information infrastructure in nuclear power enterprises, summarizes and puts forward relevant suggestions for the development of the security protection management procedures of critical information infrastructure.

KEYWORDS

Nuclear power enterprises; Critical information infrastructure; Safety protection; System construction

CITE THIS PAPER

Anman Luo, Youqin Hu, Xianhe Shang, Yalin Xiao, Nan Wu, Exploration on the Construction of Security Protection System for Nuclear Power Critical Information Infrastructure. Information Systems and Economics (2023) Vol. 4: 48-53. DOI: http://dx.doi.org/10.23977/infse.2023.040307.

REFERENCES

[1] Krundyshev V. M., Kalinin M. O. Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure. Automatic Control and Computer Sciences, 2023, 56(8).
[2] Yu H C. Exploration and Thinking of Network security operation in petrochemical industry. Petrochemical Technology, 2020, 27(3):218, 215. (in Chinese)
[3] Wei Chengfei, Jiang Jie. Global cross-border dimensional logical data security governance and China's response to Books and intelligence: 1-8 [2023-02-22]. http://kns.cnki.net/kcms/detail/62.1026.G2.20230221.1533.001.html
[4] Zhao Zhiyuan. Endogenous Security Framework to realize the "Three chemical and six prevention" of equal protection and customs protection. Network security and Informatization, 2020 (10):11-12.
[5] Xinhua News Agency. Promulgation of Regulations on Security Protection of Critical Information Infrastructure. Internet World, 2021, (8):2.
[6] Bolcato Matteo, Beverina Ivo. Organisational strategies for the safe management of intravenous iron therapy: a revolutionary tool for implementing Patient Blood Management. Blood transfusion=Trasfusione del sangue, 2022, 20(2).
[7] Zhang Yawen. Research on Optimization of Performance Appraisal System of Internet Emergency Center in Gansu Province. Lanzhou University, 2021.
[8] Zou Jing, Wang Ying, Liu Yi. Comprehensive improvement of safety and quality management level of distribution network construction by taking the Four Modernizations into consideration. Agricultural Electricity Management, 2022 (01):40-41.
[9] Zhu D F. Network security protection System of critical information infrastructure. Information and Computer (Theoretical Edition), 2018 (13):198-199+202. (in Chinese)
[10] Zhang Bin, Chen Yi, Wang Xinxia, et al. Research on Network security protection system of key information infrastructure in industrial field. China Informatization, 2022, (3):60-61.

Downloads: 7931
Visits: 151958

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.