Proceedings of the 2022 2nd International Conference on Business Administration and Data Science (BADS 2022)

Systematic Application of Commercial Encryption Technology in New Energy Network Security Protection

Authors
Bo Wu1, Qi Zong1, Lei Chen1, *, Junping Zhou1, Wuyi Zhang2
1Westone Information Industry INC, Sichuan Province, Chengdu City, China
2Guodian Nanjing Automation Co., Ltd, Jiangsu Province, Nanjing City, China
*Corresponding author. Email: 13581669627@163.com
Corresponding Author
Lei Chen
Available Online 29 December 2022.
DOI
10.2991/978-94-6463-102-9_41How to use a DOI?
Keywords
Electric power enterprises; Systematic application; Network security protection; Cryptography; Network security
Abstract

China strives to achieve carbon peak by 2030 and carbon neutrality by 2060. The "double carbon" strategy advocates a green, environment-friendly and low-carbon lifestyle. In order to accelerate the pace of reducing carbon emissions, guide green technology innovation, and improve the global competitiveness of industry and economy, China continues to promote the adjustment of industrial structure and energy structure, vigorously develop renewable energy, accelerate the planning and continuous construction of new energy power generation bases such as wind power and photovoltaic, and strive to give consideration to economic development and green transformation simultaneously. At the same time, since 2017, the number of global cyber attacks against the energy sector has surged. Among them, the power grid and oil and gas infrastructure have become the "key areas" of cyber attacks, accounting for more than 50% of all cyber attacks. In this context, in order to ensure the safe and stable operation of new energy business production, based on the actual requirements of network security protection of typical business information systems and automatic control systems under the new energy scenario of electric power enterprises, this paper studies and proposes systematic encryption applications from encryption service to key management to encryption monitoring. Based on the unified key management and encryption monitoring platform, the technical architecture is jointly developed, combined with business processes; realize the design of encryption related applications and software and hardware monitoring. At the same time, according to the feasibility of technology realization and the characteristics of the new energy physical environment, we put forward suggestions on technology implementation, and finally form a practical application prototype suitable for the pilot construction, so as to realize the systematic application of commercial encryption s in the new energy network security protection, effectively improve the enterprise's network security capabilities and achieve the goal of standardized and safe use of encryption s, so as to ensure the safe and stable operation of new energy business.

Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2022 2nd International Conference on Business Administration and Data Science (BADS 2022)
Series
Atlantis Highlights in Computer Sciences
Publication Date
29 December 2022
ISBN
10.2991/978-94-6463-102-9_41
ISSN
2589-4900
DOI
10.2991/978-94-6463-102-9_41How to use a DOI?
Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Bo Wu
AU  - Qi Zong
AU  - Lei Chen
AU  - Junping Zhou
AU  - Wuyi Zhang
PY  - 2022
DA  - 2022/12/29
TI  - Systematic Application of Commercial Encryption Technology in New Energy Network Security Protection
BT  - Proceedings of the 2022 2nd International Conference on Business Administration and Data Science (BADS 2022)
PB  - Atlantis Press
SP  - 383
EP  - 390
SN  - 2589-4900
UR  - https://doi.org/10.2991/978-94-6463-102-9_41
DO  - 10.2991/978-94-6463-102-9_41
ID  - Wu2022
ER  -