Skip to main content
Top

2013 | OriginalPaper | Chapter

4. The Application of Information Security on the Computer Terminals of 3rd-Generation Nuclear Power Plant

Authors : Zhiping Song, Yi Luo

Published in: Emerging Technologies for Information Systems, Computing, and Management

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The paper aims to develop a computer terminal solution which suits with the status of the company to eliminate risks of information security caused by the huge amount of computer terminals. The research carries out analysis on Intranet access, standard configuration, information data management, etc. through introduction of standards fit with national information security requirements. To make the analysis smooth, the author uses a real example of computer terminal configuration in a nuclear power plant. Results of implementing the solution in the real example show that security risk of computer terminals are eliminated, and the information security level of the company is significantly improved. The configuration solution is scientific and effective. It is capable of reducing risks from computer terminals to enterprise information security, and it can provide reference to information security construction in companies of the similar situations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Objectives, measures & strategies of information security (CGN-IT-C4-A01). The standard program of CGNPG (2009) Objectives, measures & strategies of information security (CGN-IT-C4-A01). The standard program of CGNPG (2009)
2.
go back to reference Scope of the information security management system (CGN-IT-C4-A02), The standard program of CGNPG (2009) Scope of the information security management system (CGN-IT-C4-A02), The standard program of CGNPG (2009)
3.
go back to reference Regulations of information assets’ security management (CGN-IT-C4-D01), The standard program of CGNPG (2009) Regulations of information assets’ security management (CGN-IT-C4-D01), The standard program of CGNPG (2009)
4.
go back to reference Symantec. Symantec endpoint security solution—a reliable foundation of enterprise information protection. Inform. Netw. Secur. 3, 28 (2007) Symantec. Symantec endpoint security solution—a reliable foundation of enterprise information protection. Inform. Netw. Secur. 3, 28 (2007)
5.
go back to reference Zhang, T.: Specialist Clinic of Network Security technology. Tsinghua University Publishing House, Tsinghua (2005) Zhang, T.: Specialist Clinic of Network Security technology. Tsinghua University Publishing House, Tsinghua (2005)
6.
go back to reference Chi, T., Chen, P.: The discussion of information security of removable storage medium. Secur. Inform. Netw. 10, 62 (2008) Chi, T., Chen, P.: The discussion of information security of removable storage medium. Secur. Inform. Netw. 10, 62 (2008)
7.
go back to reference Harold, F. Krause, T.M.: Administrative manual of information security (2004) Harold, F. Krause, T.M.: Administrative manual of information security (2004)
8.
go back to reference Sun, Q., Chen, W.: Information security management. Tsinghua University Publishing House, Tsinghua (2004) Sun, Q., Chen, W.: Information security management. Tsinghua University Publishing House, Tsinghua (2004)
Metadata
Title
The Application of Information Security on the Computer Terminals of 3rd-Generation Nuclear Power Plant
Authors
Zhiping Song
Yi Luo
Copyright Year
2013
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-7010-6_4