新書推薦:
《
古罗马800年
》
售價:NT$
857.0
《
权力与相互依赖(第四版)(中译本修订版)
》
售價:NT$
658.0
《
写出心灵深处的故事:踏上疗愈之旅(修订版)(创意写作书系)
》
售價:NT$
301.0
《
控制权视角下的家族企业管理与传承
》
售價:NT$
398.0
《
冯友兰和青年谈心系列
》
售價:NT$
762.0
《
利他主义的生意:偏爱“非理性”的市场(英国《金融时报》推荐读物!)
》
售價:NT$
352.0
《
认知行为疗法:心理咨询的顶层设计
》
售價:NT$
454.0
《
FANUC工业机器人装调与维修
》
售價:NT$
454.0
|
內容簡介: |
作为当前国内讲述电力行业数据安全实践的著作,本书以铸造电力行业数据安全防御之剑,提高电力行业从业人员数据安全能力为目的,讲述了塑模、铸范、锻造、淬火、抛光、出鞘、剑舞七个步骤的内容,从基本概念到具体实践,主要涵盖了电力行业数据安全概述、数据安全政策法规、数据安全保护体系、数据安全防护技术、数据全生命周期安全风险分析及对策、数据安全典型事件、数据安全未来发展趋势等方面的内容。本书条理清晰,通俗易懂,语言流畅,内容丰富、实用,将理论与实践相结合。本书适合广大数据安全爱好者、数据安全与网络安全从业者学习和掌握数据安全相关技术和知识,更适合电力行业信息技术从业人员开展数据安全业务,还适用于大专及本科院校数据安全相关课程的案例与实践教学。
|
關於作者: |
周文婷,女,硕士研究生,正高级工程师,现任新疆思极信息技术有限公司总经理,历任国网新疆电力信息通信有限公司副总经理、国网新疆电力有限公司科技数字化部副主任等职位,先后从事电网调度通信、客户服务、企业发展、电网安全生产管理、科技创新等领域,从事重点工程 30余项,组织开展科技项目50 多项,获得国网公司、新疆维吾尔自治区、国家能源学会、全国电子学会、新疆电机工程学会科技进步奖 15 项。荣获国家电网公司、自治区、国网新疆电力有限公司各类荣誉称号。
|
目錄:
|
第一章 塑模:电力行业数据安全概述 ····································································.2 1.1 电力系统简介 ·····················································································.2 1.1.1 传统电力系统·············································································.3 1.1.2 新型电力系统·············································································.5 1.2 电力行业数据特点 ···············································································.8 1.2.1 数据来源广泛·············································································.8 1.2.2 数据应用全面·············································································.9 1.2.3 数据特征显著·············································································.9 1.3 做好电力行业数据安全保护为何重要 ·······················································10 1.4 电力行业数据安全风险与挑战 ································································12 1.4.1 数据泄露危及国家安全·································································12 1.4.2 非法入侵导致电力系统服务中断·····················································13 1.4.3 数据滥用带来违法与犯罪风险························································13 1.4.4 数字化技术蕴含新的安全风险························································14 1.4.5 数据全生命周期管理不足引发短板效应············································15 1.5 本章小结 ···························································································16 第二章 铸范:电力行业数据安全政策法规 ······························································18 2.1 电力行业数据安全相关法律法规解读 ·······················································18 2.1.1 《中华人民共和国网络安全法》 ······················································19 2.1.2 《中华人民共和国数据安全法》 ······················································22 2.1.3 《中华人民共和国密码法》 ····························································24 2.1.4 《中华人民共和国个人信息保护法》 ················································24 2.1.5 《最高人民法院、最高人民检察院关于办理侵犯公民个人信息刑事案件适用法律若干问题的解释》····················26 2.1.6 《网络安全审查办法》 ··································································29 2.1.7 《信息安全技术—网络安全等级保护基本要求》 ·································30 2.1.8 《关键信息基础设施安全保护条例》 ················································33 2.2 电力行业数据安全相关政策要求 ·····························································35 2.2.1 《电力监控系统安全防护规定》 ······················································35 2.2.2 《电力监控系统安全防护总体方案》 ················································37 2.2.3 《加强工业互联网安全工作的指导意见》 ··········································37 2.2.4 《工业和信息化领域数据安全管理办法(试行)》································38 2.2.5 《关于加强电力行业网络安全工作的指导意见》 ·································40 2.2.6 《电力行业网络安全管理办法》 ······················································41 2.2.7 《电力可靠性管理办法(暂行)》·····················································42 2.2.8 《电力行业网络安全等级保护管理办法》 ··········································43 2.3 本章小结 ···························································································44 第三章 锻造:电力行业数据安全保护体系 ······························································46 3.1 如何做好电力企业的数据安全管理 ··························································48 3.1.1 至关重要的组织架构····································································48 3.1.2 缺一不可的制度流程····································································50 3.1.3 必不可少的管理机制····································································52 3.1.4 不可或缺的人员管理····································································54 3.2 如何做好电力企业数据安全技术防护 ·······················································56 3.2.1 数据分级分类安全防护·································································58 3.2.2 数据安全精准防护·······································································59 3.2.3 数据交互开放可信·······································································60 3.3 如何做好电力企业数据安全运营及服务 ····················································61 3.3.1 数据安全监测·············································································61 3.3.2 数据安全评估·············································································61 3.3.3 数据安全审计······································································
|
|