Cyber Security Service Mode Innovation: Comprehensive Operation & Support

Qiyao Tang, Jie Xu

Abstract


With the rapid development of information technology, traditional nation state is faced with challenges from various aspects. However, the state can still lead the internet information security and create a variety of Internet security governance forms based on accepting the uncertainty of Internet security. Countries should focus on the impact of specific information technologies in specific areas and government agencies at specific points in time. This article talks about the cyber security protection and it is mainly focused on implementation schedule of cyber protection and experience exchange during this activity. Also it introduces current support service.


Keywords


Security Operations Center; Penetration Test; Hidden Dangers Troubleshooting; Safety Services; Total-Process Safety

Full Text:

PDF

Included Database


References


Leszczyna, Rafal. (2018). A Review of Standards with Cybersecurity Requirements for Smart Grid. Computers & Security. 77.

Song ZW, Liu ZH. (2019). Abnormal detection method of industrial control system based on behavior model. Comput. Secur. 84, C (Jul 2019), 166–178.

Myers D, Suriadi S, Radke K & Foo E (2018) Anomaly detection for industrial control systems using process mining. Computers and Security, 78, pp. 103-125.

Mousavian S, Erol-Kantarci M, Wu L and Ortmeyer T, "A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks," in IEEE Transactions on Smart Grid, vol. 9, no. 6, pp. 6160-6169, Nov. 2018.

Soltan S, Mittal P and Poor HV, "Bayesian Regression for Robust Power Grid State Estimation Following a Cyber-Physical Attack," 2018 IEEE Power & Energy Society General Meeting (PESGM), 2018, pp. 1-5.

Dai Q, Shi L and Ni Y, "Risk Assessment for Cyber Attacks in Feeder Automation System," 2018 IEEE Power & Energy Society General Meeting (PESGM), 2018, pp. 1-5.




DOI: https://doi.org/10.18686/esta.v9i3.277

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Qiyao Tang, Jie Xu

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.