Telecommunications Science ›› 2020, Vol. 36 ›› Issue (3): 34-41.doi: 10.11959/j.issn.1000-0801.2020065

• Topic:Industrial Internet Platform and Security • Previous Articles     Next Articles

Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises

Daoyuan LIU1,Keda SUN2,Junliang ZHOU3,Haidong FAN3,4   

  1. 1 Huaizhe Coal &Power Co.,Ltd.,Huainan 232000,China
    2 Zhejiang Energy Group Co.,Ltd.,Hangzhou 317000,China
    3 Zhejiang Zheneng Technology Research Institute Co.,Ltd.,Hangzhou 317000,China
    4 Zhejiang Zheneng Industrial Information Engineering Key Enterprise Research Institute,Hangzhou 317000,China
  • Revised:2020-03-12 Online:2020-03-20 Published:2020-03-26
  • Supported by:
    Zhejiang Province Key Research and Development Program(2019C01011)

Abstract:

Nowadays,electric power enterprises have realized the operation and production of information technology,and the importance of network information security evaluation is more and more obvious.Two-level fuzzy comprehensive evaluation method was used to evaluate the security level of network information security system of power enterprises based on PRDD model,and Delphi method was used to determine the weight coefficients of various factors of network security of power enterprises in the evaluation process.Through objective analysis of the evaluation results,the network credit of power enterprises was found out.The prominent problems existing in the informa tion security system should be solved and the corresponding security reinforcement scheme should be formulated.The validation results show that the optimized network information security model is more robust,practicability and operability are significantly improved,which effectively improve the network information security level of power enterprises,and can be used as a favorable reference for the construction of network information security of other power enterprises.

Key words: electric power enterprise, network information security model, security grade evaluation, comprehensive fuzzy evaluation method, secondary fuzzy comprehensive evaluation

CLC Number: 

No Suggested Reading articles found!