z-logo
open-access-imgOpen Access
Information Hiding Technology in Power System Network Security
Author(s) -
Jie Huang,
Jing Li,
Jie Wang,
Li Tian
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/750/1/012151
Subject(s) - electric power , information security , computer security , prosperity , electric power industry , information security management , information technology , electric power system , network security , network information system , electricity , business , security information and event management , computer science , telecommunications , power (physics) , cloud computing security , engineering , economics , cloud computing , electrical engineering , network architecture , physics , quantum mechanics , network management station , economic growth , operating system
Since the beginning of the 21st century, with the popularization and application of electronic information technology in the power system, the power system information network security has begun to attract the attention of all walks of life, especially the power enterprises. To ensure the safety of electric power information network is not only the need to ensure the safety of industrial production and residents’ daily electricity consumption, but also the internal demand to ensure the stability, development and prosperity of national economy. In the electric power industry, the information security of the electric power system is directly related to the production, operation, management and operation of the electric power enterprises. When these information data are illegally violated, it will bring adverse effects to the electric power enterprises. It can be seen from this paper that the network security of the telecommunications industry accounts for a large proportion of 18.7%. Therefore, information security is the important protection content of power enterprise network security. The emergence of information hiding technology, a good realization of the power network information security protection, this paper will be information hiding technology as the focus of research, analysis of its application in the power network security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here