Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism
碩士 === 國立聯合大學 === 資訊管理學系碩士班 === 107 === In the past decade, the advancement of information and communication technology has driven the development of the industry and the convenience of life. The information system handles large and small affairs such as ticketing systems, payment systems, power sup...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/48bqzs |
id |
ndltd-TW-107NUUM0396002 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107NUUM03960022019-11-27T05:17:54Z http://ndltd.ncl.edu.tw/handle/48bqzs Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism 以威脅分類及風險評估機制建立智慧電網電能負載平衡資訊安全威脅模型 HUANG, CHUANG-CHIAO 黃莊喬 碩士 國立聯合大學 資訊管理學系碩士班 107 In the past decade, the advancement of information and communication technology has driven the development of the industry and the convenience of life. The information system handles large and small affairs such as ticketing systems, payment systems, power supply systems, etc., and people's lives cannot be separated from such information. System, and when these information systems are abnormal, not only will it cause inconvenience, but it will also cause huge losses. Pre-existing prevention is better than remediation after the incident occurs. In order to avoid system anomalies and threats caused by threats, threat analysis when designing the information system can help to solve the problem, identify the threats the system may face, and avoid losses. The threat model can be used to resolve this issue. The threat model can be used to examine threats that may be faced in the system, allowing the system to prescribe the right medicine at the design stage, identify possible high-risk items, and prevent it early. Different from the previous threat model modeling method, this study proposes that the threat modeling method utilizes the threat decomposition structure, examines the threat attack items that the information system may encounter, and adds influences and possibilities to examine the risk of the project and conduct threat projects. filter. In order to verify the process proposed in this study, a case demonstration will also be conducted with applications in the smart grid. The power-related industry is an inseparable important industry in life. After the power system is added to the information system, the smart grid is proposed. Information systems make grid efficiency, energy management improvement, and power supply and demand smarter. However, before designing and promoting smart grids, how to identify information security threats and ensure the reliability of applications and the availability of system operations is a Important practical issues. This study will use the application in the smart grid as an example to establish an information security model and evaluate the risk of each threat attack project to verify the threat modeling process proposed in this study. CHEN, YU-TSO 陳宇佐 2018 學位論文 ; thesis 139 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立聯合大學 === 資訊管理學系碩士班 === 107 === In the past decade, the advancement of information and communication technology has driven the development of the industry and the convenience of life. The information system handles large and small affairs such as ticketing systems, payment systems, power supply systems, etc., and people's lives cannot be separated from such information. System, and when these information systems are abnormal, not only will it cause inconvenience, but it will also cause huge losses. Pre-existing prevention is better than remediation after the incident occurs. In order to avoid system anomalies and threats caused by threats, threat analysis when designing the information system can help to solve the problem, identify the threats the system may face, and avoid losses. The threat model can be used to resolve this issue. The threat model can be used to examine threats that may be faced in the system, allowing the system to prescribe the right medicine at the design stage, identify possible high-risk items, and prevent it early. Different from the previous threat model modeling method, this study proposes that the threat modeling method utilizes the threat decomposition structure, examines the threat attack items that the information system may encounter, and adds influences and possibilities to examine the risk of the project and conduct threat projects. filter. In order to verify the process proposed in this study, a case demonstration will also be conducted with applications in the smart grid. The power-related industry is an inseparable important industry in life. After the power system is added to the information system, the smart grid is proposed. Information systems make grid efficiency, energy management improvement, and power supply and demand smarter. However, before designing and promoting smart grids, how to identify information security threats and ensure the reliability of applications and the availability of system operations is a Important practical issues. This study will use the application in the smart grid as an example to establish an information security model and evaluate the risk of each threat attack project to verify the threat modeling process proposed in this study.
|
author2 |
CHEN, YU-TSO |
author_facet |
CHEN, YU-TSO HUANG, CHUANG-CHIAO 黃莊喬 |
author |
HUANG, CHUANG-CHIAO 黃莊喬 |
spellingShingle |
HUANG, CHUANG-CHIAO 黃莊喬 Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism |
author_sort |
HUANG, CHUANG-CHIAO |
title |
Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism |
title_short |
Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism |
title_full |
Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism |
title_fullStr |
Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism |
title_full_unstemmed |
Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism |
title_sort |
establishing smart grid load balancing information security threat model based on threat classification and risk assessment mechanism |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/48bqzs |
work_keys_str_mv |
AT huangchuangchiao establishingsmartgridloadbalancinginformationsecuritythreatmodelbasedonthreatclassificationandriskassessmentmechanism AT huángzhuāngqiáo establishingsmartgridloadbalancinginformationsecuritythreatmodelbasedonthreatclassificationandriskassessmentmechanism AT huangchuangchiao yǐwēixiéfēnlèijífēngxiǎnpínggūjīzhìjiànlìzhìhuìdiànwǎngdiànnéngfùzàipínghéngzīxùnānquánwēixiémóxíng AT huángzhuāngqiáo yǐwēixiéfēnlèijífēngxiǎnpínggūjīzhìjiànlìzhìhuìdiànwǎngdiànnéngfùzàipínghéngzīxùnānquánwēixiémóxíng |
_version_ |
1719296584480456704 |