EVALUATION AND RECOMMENDATIONS FOR SECURITY INFORMATION STANDARDS IN ELECTRIC POWER SYSTEMS
This article offers tips for those with cyber security in the electric utility.Traditional mistrust between IT and SCADA engineer who has been broken.It is becoming widespread, and traditional information technology expert replaced by a range of specialists.The Internet and related technologies, it has allowed the use of information technology solutions such as SCADA e.g.Ethernet, IP suite of protocols.IT hardware and software is developed and improved their performance to the extent that specialized SCADA systems are Public information technology solutions to replace (e.g.SQL databases, PCs).The relative ease of the interface between the system allows data to be easily SCADA To other business applications has passed.
security SCADA management system protocols Electric Power Utility
NASER MASHAYEKHI HOSSEIN SHAHINZADEH PARISA RASTEGARI HADI JAFARI EMAMZADE
Department of Electrical Engineering Najafabad Branch,Islamic Azad University Najafabad,Isfahan,Iran Department of Electrical Engineering Najafabad Branch,Islamic Azad University Najafabad Branch,Isfah
国际会议
成都
英文
723-727
2011-11-25(万方平台首次上网日期,不代表论文的发表时间)