In recent years, there have been frequent incidents of network information security internationally, and electricity, as an important infrastructure, has been regarded as one of the targets of "cyber warfare" attacks. As the main power facility, the network security situation of power plants is also extremely severe.
Security risks associated with the power information system in power plants:
Cross regional network attacks
Malicious code infection attack on industrial control host
Network intrusion behavior
Missing key log information
Security issues in operation and maintenance management
Design Scheme for Information Security Architecture of Power Station
Deploying physical isolation gateways between the main server and each node ensures both physical isolation and data exchange between internal and external networks. Effectively prevent network security vulnerabilities and protect the security of network data information.
To address security issues such as network misoperation and malicious operations faced by power monitoring systems in power plants. The monitoring and auditing system is deployed among the nodes within the system to realize the audit and recording of abnormal flow and operation behavior for the investigation and tracing after the information security incident.
Program features
After deployment, solve the problems faced by the power network information security of the power plant, and avoid the spread of information security incidents that occur in one system or region to other systems or main servers.
Resolve the safety issues of misoperation and malicious operation faced by the power monitoring system of the power generation plant, achieve monitoring and auditing of abnormal flow and operation behavior in the power generation area, and facilitate investigation and traceability.
The deployed isolation gateway and monitoring audit equipment are equipped with domestic processors, domestic trusted network cards, etc. The product adopts industrial design to ensure independent and reliable hardware while ensuring safe and reliable operation in harsh environments.
Support the localization of secure operating systems and enhance information security in system software.
It adopts dual power supply independent power supply, and supports dual DC power supply and dual AC power supply at the same time. The seamless online switching of dual power sources has been achieved, and any interruption of power supply in any circuit will not cause device failure or restart.
Introduction to Network Information Security Selection Products
GNS-1302-DL
GNS-1302-DL Network Security Computer. Suitable for application encryption, gateway isolation, firewall UTM、 Many network security applications, such as security auditing, network traffic management, and data collection, have low power consumption and rich expansion buses.
Product features:
Supports 2 DDR4 2666MHz UDIMM memories
Support Trusted Huatai TPCM Trusted Card and Security Software, Datang Gaohong Security Software
Onboard network communication card
Onboard 6 RJ45 gigabit electrical ports, 1 gigabit management port, with 3 sets of bypass functions
GNS-1302-WZ
A 2U gateway based on FT-2000/4-core or D2000 8-core processors.
Product features:
CPU, Provide high IPC and support hardware virtualization
uEFI, Firmware architecture, secure and controllable, integrated with secure and trustworthy solutions
Support localization of operating systems
Support Trustworthy Huatai Trustworthy Card
2U shelf model, can support customization