Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism

碩士 === 國立聯合大學 === 資訊管理學系碩士班 === 107 === In the past decade, the advancement of information and communication technology has driven the development of the industry and the convenience of life. The information system handles large and small affairs such as ticketing systems, payment systems, power sup...

Full description

Bibliographic Details
Main Authors: HUANG, CHUANG-CHIAO, 黃莊喬
Other Authors: CHEN, YU-TSO
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/48bqzs
id ndltd-TW-107NUUM0396002
record_format oai_dc
spelling ndltd-TW-107NUUM03960022019-11-27T05:17:54Z http://ndltd.ncl.edu.tw/handle/48bqzs Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism 以威脅分類及風險評估機制建立智慧電網電能負載平衡資訊安全威脅模型 HUANG, CHUANG-CHIAO 黃莊喬 碩士 國立聯合大學 資訊管理學系碩士班 107 In the past decade, the advancement of information and communication technology has driven the development of the industry and the convenience of life. The information system handles large and small affairs such as ticketing systems, payment systems, power supply systems, etc., and people's lives cannot be separated from such information. System, and when these information systems are abnormal, not only will it cause inconvenience, but it will also cause huge losses. Pre-existing prevention is better than remediation after the incident occurs. In order to avoid system anomalies and threats caused by threats, threat analysis when designing the information system can help to solve the problem, identify the threats the system may face, and avoid losses. The threat model can be used to resolve this issue. The threat model can be used to examine threats that may be faced in the system, allowing the system to prescribe the right medicine at the design stage, identify possible high-risk items, and prevent it early. Different from the previous threat model modeling method, this study proposes that the threat modeling method utilizes the threat decomposition structure, examines the threat attack items that the information system may encounter, and adds influences and possibilities to examine the risk of the project and conduct threat projects. filter. In order to verify the process proposed in this study, a case demonstration will also be conducted with applications in the smart grid. The power-related industry is an inseparable important industry in life. After the power system is added to the information system, the smart grid is proposed. Information systems make grid efficiency, energy management improvement, and power supply and demand smarter. However, before designing and promoting smart grids, how to identify information security threats and ensure the reliability of applications and the availability of system operations is a Important practical issues. This study will use the application in the smart grid as an example to establish an information security model and evaluate the risk of each threat attack project to verify the threat modeling process proposed in this study. CHEN, YU-TSO 陳宇佐 2018 學位論文 ; thesis 139 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立聯合大學 === 資訊管理學系碩士班 === 107 === In the past decade, the advancement of information and communication technology has driven the development of the industry and the convenience of life. The information system handles large and small affairs such as ticketing systems, payment systems, power supply systems, etc., and people's lives cannot be separated from such information. System, and when these information systems are abnormal, not only will it cause inconvenience, but it will also cause huge losses. Pre-existing prevention is better than remediation after the incident occurs. In order to avoid system anomalies and threats caused by threats, threat analysis when designing the information system can help to solve the problem, identify the threats the system may face, and avoid losses. The threat model can be used to resolve this issue. The threat model can be used to examine threats that may be faced in the system, allowing the system to prescribe the right medicine at the design stage, identify possible high-risk items, and prevent it early. Different from the previous threat model modeling method, this study proposes that the threat modeling method utilizes the threat decomposition structure, examines the threat attack items that the information system may encounter, and adds influences and possibilities to examine the risk of the project and conduct threat projects. filter. In order to verify the process proposed in this study, a case demonstration will also be conducted with applications in the smart grid. The power-related industry is an inseparable important industry in life. After the power system is added to the information system, the smart grid is proposed. Information systems make grid efficiency, energy management improvement, and power supply and demand smarter. However, before designing and promoting smart grids, how to identify information security threats and ensure the reliability of applications and the availability of system operations is a Important practical issues. This study will use the application in the smart grid as an example to establish an information security model and evaluate the risk of each threat attack project to verify the threat modeling process proposed in this study.
author2 CHEN, YU-TSO
author_facet CHEN, YU-TSO
HUANG, CHUANG-CHIAO
黃莊喬
author HUANG, CHUANG-CHIAO
黃莊喬
spellingShingle HUANG, CHUANG-CHIAO
黃莊喬
Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism
author_sort HUANG, CHUANG-CHIAO
title Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism
title_short Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism
title_full Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism
title_fullStr Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism
title_full_unstemmed Establishing Smart Grid Load Balancing Information Security Threat Model Based on Threat Classification and Risk Assessment Mechanism
title_sort establishing smart grid load balancing information security threat model based on threat classification and risk assessment mechanism
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/48bqzs
work_keys_str_mv AT huangchuangchiao establishingsmartgridloadbalancinginformationsecuritythreatmodelbasedonthreatclassificationandriskassessmentmechanism
AT huángzhuāngqiáo establishingsmartgridloadbalancinginformationsecuritythreatmodelbasedonthreatclassificationandriskassessmentmechanism
AT huangchuangchiao yǐwēixiéfēnlèijífēngxiǎnpínggūjīzhìjiànlìzhìhuìdiànwǎngdiànnéngfùzàipínghéngzīxùnānquánwēixiémóxíng
AT huángzhuāngqiáo yǐwēixiéfēnlèijífēngxiǎnpínggūjīzhìjiànlìzhìhuìdiànwǎngdiànnéngfùzàipínghéngzīxùnānquánwēixiémóxíng
_version_ 1719296584480456704