The spear is sharp and the shield is thick, one is growing while the other is declining, and the way of defense changes with the situation. General Secretary Xi Jinping emphasized at the first meeting of the Central Leading Group for Cybersecurity and Informatization that there is no national security without cybersecurity, and there is no modernization without informatization. With the rapid development of new technologies such as big data, the Internet of Things, and blockchain, cybersecurity has also entered a new stage and faces new challenges.
In the process of State Grid Corporation of China building a world-class energy Internet enterprise with "three types and two networks", network security is an important cornerstone. How to build a network security defense system that adapts to the construction of ubiquitous power Internet of Things and ensure the stable operation of various businesses?
Building a ubiquitous power Internet of Things active defense system
In ancient Chinese wars, the Central Plains dynasties were often at a disadvantage when fighting against the nomadic peoples in the north. For this reason, rulers of successive dynasties invested a lot of manpower and material resources to build the Great Wall and strengthen the city defenses, but the results were mediocre. Emperor Wu of the Han Dynasty, Liu Che, took the initiative in the battles with the Huns with his powerful cavalry, advanced protective equipment and offensive weapons, defeated the nomadic peoples many times, and brought long-term peace to the country.
The attack and defense process of network security is like the battle between the Central Plains and the Huns. Traditional security protection methods adopt the method of "building the Great Wall", that is, investing a lot of manpower and material resources to build technical defense measures from the dimensions of boundaries, terminals, hosts, applications, data, etc. to achieve passive defense. With the penetration of the Internet into industry and industry, the era of the Internet of Everything has arrived, and the tentacles of network security risks have spread to all aspects of infrastructure. The traditional wall-building passive defense system can no longer meet the needs. It is necessary to defeat the attacker in an active defense way, strangle the network security risk in the cradle, and ensure the safe development of various business of the enterprise.
The construction of the ubiquitous power Internet of Things is to connect all people, things and equipment related to the power grid, gather energy resources, network resources, user resources, data resources, and reputation resources, and provide intelligent services for users, power grids, power generation, suppliers and all sectors of society. People, things and things (equipment) are the three major elements of the construction of the ubiquitous power Internet of Things. The design of the security protection system should also start from the "three defenses" of physical defense, event defense and human defense, and build a full-scenario network security system that is compatible with the "three types and two networks" enterprises. Among them, physical defense is the basic guarantee for the safe operation of the ubiquitous power Internet of Things, event defense is the part that reflects the main value of security protection, and human defense is an important link to ensure that the company becomes a platform-based and sharing-based enterprise.
Data security protection is the core of active defense
The idea of combining physical defense, incident defense, and human defense is an optional path for designing the active defense system of the ubiquitous power Internet of Things. So, what do physical defense, incident defense, and human defense include, and what is the focus of protection?
The focus of physical defense corresponds to the perception layer, network layer and platform layer in the ubiquitous power Internet of Things technology architecture. The perception layer protection is mainly based on the core, identifying "self" and "non-self" to achieve data collection security; the network layer protection focuses on protocol analysis and full flow monitoring to achieve data transmission security; the platform layer protection focuses on situational awareness and secure interaction to achieve data integration security.
The focus of incident prevention corresponds to the application layer in the ubiquitous power Internet of Things technology architecture. Application layer protection focuses on data classification authorization to achieve data application security. In the process of building the ubiquitous power Internet of Things, the special feature of incident prevention is that it is aimed at various application scenarios, especially new businesses such as e-commerce, smart energy services, source-grid-load-storage collaborative services, new energy cloud, multi-station integration, and Internet finance, which involve a large amount of personal information and other content, and strict measures need to be taken to control related risks.
Civil defense is mainly aimed at the protection of internal and external users and the security management system followed by users. The focus of civil defense is on the difference between internal and external. For emerging Internet businesses in the market that need to be expanded quickly and flexibly, we should adapt to the protection concept of the Internet and adopt the security protection strategy of "light authentication and easy access"; for internal business of the company, we should adopt the security protection principle of "strong authentication and detailed control" and implement trusted identity authentication and data encryption transmission.
The key to the “three defenses” is data security protection, which is the core of the active defense system. Data in the energy Internet is the company’s basic strategic resource and a “diamond mine” for sustainable development and value-added realization in the future. Ensuring the security of IoT data from collection, transmission, integration to application, and proposing targeted technical defense measures and management methods that can be implemented are the value of active defense system design.
The key to implementation lies in professional ability and professional team
The reason why Emperor Wu of Han dared to take the initiative to attack the Xiongnu was because of his three magic weapons: a strong cavalry, advanced horses and weapons, and a mature combat system. Among them, a strong cavalry was the root of his success. The same is true for the implementation of the active defense system. The development of new technologies such as basic protection, situational awareness, and accurate early warning is certainly important, but no matter how sophisticated the system design is and how advanced the product deployment is, the main body and key to the success of the new security defense line of the ubiquitous power Internet of Things still lies in the professional security team.
Whether the active defense security team is professional depends on whether it has good major guarantee, service support, attack and defense penetration, technical support and detection and testing capabilities.
In recent years, the national network security protection work has been arduous and demanding. Enterprises should focus on accumulating a network security talent pool, solution pool, and equipment pool, and form a complete set of technical defense measures, hidden danger investigation, security reinforcement, monitoring and early warning, emergency response and other protection plans and implementation methods, laying a good foundation for the rapid and systematic development of future protection work.
A professional security team is needed between the company headquarters and provincial power companies to ensure that the requirements of the security protection system are effectively implemented. On the one hand, the service support team must have sufficient personnel and concurrent service capabilities covering multiple provincial power companies; on the other hand, it must accumulate service qualifications and accumulate general capabilities through qualifications. The service support team should also have the ability to assist various units in the security operation and advanced analysis of the network security analysis room.
One of the characteristics of active defense is the ability to identify the source of network actions and implement preemptive, preventive or countermeasure actions. Therefore, efforts should be made to introduce external high-end talents and cultivate internal talents, establish a company red and blue team with complete attack and defense capabilities, and cultivate a loyal, responsible and technically proficient network attack and defense team for the construction of ubiquitous power Internet of Things.
技术支持能力的构建前提是产品自主研发能力的积累。国网信息通信产业集团有限公司所属网安公司自主研发的基础安全设备配置核查工具、思极慧眼主动安全保障平台等产品使用成效显著,在专业支持方面,也为通信、营销、设备等专业提供了网络安全专业技术支持。
Most of the risks of IoT are caused by undiscovered vulnerabilities in IoT applications and terminal devices during the R&D process. Security vulnerabilities should be fully tested and tested during the R&D and production process to improve delivery quality, which will play an important role in "moving the checkpoints forward and preventing risks before they occur" in network security work during the construction of IoT.
The cross-border characteristics of the ubiquitous power Internet of Things are more obvious, covering all aspects of information perception, data transmission and intelligent processing. As the construction continues to deepen, only by taking timely and proactive measures through more accurate and intelligent security protection measures and quickly solving problems in the construction of the Internet of Things can the network security of power grid companies be effectively guaranteed.
Previous article:South Korean lithium battery experts visited Changhong Sanjie for training and exchange
Next article:High reliability power supply ensures Shanghai power grid to pass smoothly in summer
- Popular Resources
- Popular amplifiers
- Increase the proportion of capacity leasing! Ningxia issued a notice on promoting the healthy development of energy storage
- A brief discussion on the application of energy storage power stations in cement plants
- Indian Army uses hydrogen microgrid to supply electricity in Himalayas
- CATL's Xiaoyao super hybrid battery fully opens the era of hybrid "large capacity"
- Gansu's new energy storage installed capacity exceeds 4 million kilowatts
- Hebei Weixian 100MW/400MWh energy storage power station project with a total investment of 650 million yuan started
- The world's first pioneering technology! Chengdu East New District's first 10 billion-level leading project is fully operational
- Shandong publishes registration information of two virtual power plants, capable of regulating 14.625 MW of electricity
- Musk: Tesla's energy storage business 'growing like wildfire'
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- Beautiful Smart NeoPixel LED Cube
- Several issues about dual-port RAM memory
- How to choose an adjustable DC power supply?
- What electrical and electronic engineers must know
- Have you ever used a BP machine? It's 8012, but Japan has just said goodbye to BP machines
- Questions about ccsv8
- Exposing a black-hearted supplier
- About AD17 export step file SOLIDWORKS
- [ESP32-Audio-Kit Audio Development Board Review]——(1): Selecting a development environment based on vs code
- I don't understand the concept of divergence. Can anyone explain this concept in a vivid way and its relationship with inflow and outflow?