作为当前国内讲述电力行业数据安全实践的著作,本书以铸造电力行业数据安全防御之剑,提高电力行业从业人员数据安全能力为目的,讲述了塑模、铸范、锻造、淬火、抛光、出鞘、剑舞七个步骤的内容,从基本概念到具体实践,主要涵盖了电力行业数据安全概述、数据安全政策法规、数据安全保护体系、数据安全防护技术、数据全生命周期安全风险分析及对策、数据安全典型事件、数据安全未来发展趋势等方面的内容。本书条理清晰,通俗易懂,语言流畅,内容丰富、实用,将理论与实践相结合。本书适合广大数据安全爱好者、数据安全与网络安全从业者学习和掌握数据安全相关技术和知识,更适合电力行业信息技术从业人员开展数据安全业务,还适用于大专及本科院校数据安全相关课程的案例与实践教学。
周文婷,女,硕士研究生,正高级工程师,现任新疆思极信息技术有限公司总经理,历任国网新疆电力信息通信有限公司副总经理、国网新疆电力有限公司科技数字化部副主任等职位,先后从事电网调度通信、客户服务、企业发展、电网安全生产管理、科技创新等领域,从事重点工程 30余项,组织开展科技项目50 多项,获得国网公司、新疆维吾尔自治区、国家能源学会、全国电子学会、新疆电机工程学会科技进步奖 15 项。荣获国家电网公司、自治区、国网新疆电力有限公司各类荣誉称号。
第一章 塑模:电力行业数据安全概述 ····································································.2
1.1 电力系统简介 ·····················································································.2
1.1.1 传统电力系统·············································································.3
1.1.2 新型电力系统·············································································.5
1.2 电力行业数据特点 ···············································································.8
1.2.1 数据来源广泛·············································································.8
1.2.2 数据应用全面·············································································.9
1.2.3 数据特征显著·············································································.9
1.3 做好电力行业数据安全保护为何重要 ·······················································10
1.4 电力行业数据安全风险与挑战 ································································12
1.4.1 数据泄露危及国家安全·································································12
1.4.2 非法入侵导致电力系统服务中断·····················································13
1.4.3 数据滥用带来违法与犯罪风险························································13
1.4.4 数字化技术蕴含新的安全风险························································14
1.4.5 数据全生命周期管理不足引发短板效应············································15
1.5 本章小结 ···························································································16
第二章 铸范:电力行业数据安全政策法规 ······························································18
2.1 电力行业数据安全相关法律法规解读 ·······················································18
2.1.1 《中华人民共和国网络安全法》 ······················································19
2.1.2 《中华人民共和国数据安全法》 ······················································22
2.1.3 《中华人民共和国密码法》 ····························································24
2.1.4 《中华人民共和国个人信息保护法》 ················································24
2.1.5 《最高人民法院、最高人民检察院关于办理侵犯公民个人信息刑事案件适用法律若干问题的解释》····················26
2.1.6 《网络安全审查办法》 ··································································29
2.1.7 《信息安全技术—网络安全等级保护基本要求》 ·································30
2.1.8 《关键信息基础设施安全保护条例》 ················································33
2.2 电力行业数据安全相关政策要求 ·····························································35
2.2.1 《电力监控系统安全防护规定》 ······················································35
2.2.2 《电力监控系统安全防护总体方案》 ················································37
2.2.3 《加强工业互联网安全工作的指导意见》 ··········································37
2.2.4 《工业和信息化领域数据安全管理办法(试行)》································38
2.2.5 《关于加强电力行业网络安全工作的指导意见》 ·································40
2.2.6 《电力行业网络安全管理办法》 ······················································41
2.2.7 《电力可靠性管理办法(暂行)》·····················································42
2.2.8 《电力行业网络安全等级保护管理办法》 ··········································43
2.3 本章小结 ···························································································44
第三章 锻造:电力行业数据安全保护体系 ······························································46
3.1 如何做好电力企业的数据安全管理 ··························································48
3.1.1 至关重要的组织架构····································································48
3.1.2 缺一不可的制度流程····································································50
3.1.3 必不可少的管理机制····································································52
3.1.4 不可或缺的人员管理····································································54
3.2 如何做好电力企业数据安全技术防护 ·······················································56
3.2.1 数据分级分类安全防护·································································58
3.2.2 数据安全精准防护·······································································59
3.2.3 数据交互开放可信·······································································60
3.3 如何做好电力企业数据安全运营及服务 ····················································61
3.3.1 数据安全监测·············································································61
3.3.2 数据安全评估·············································································61
3.3.3 数据安全审计·············································································63
3.4 本章小结 ···························································································63
第四章 淬火:电力数据安全防护技术 ····································································65
4.1 传统数据安全保护技术 ·········································································65
4.1.1 边界防护···················································································65
4.1.2 身份认证及访问控制····································································66
4.1.3 数据安全审计·············································································68
4.1.4 数据脱敏···················································································70
4.1.5 数据追踪溯源·············································································71
4.1.6 数据加密···················································································72
4.1.7 数字签名···················································································73
4.1.8 数据沙箱···················································································75
4.1.9 数据库防火墙·············································································76
4.2 新型数据安全保护技术 ·········································································77
4.2.1 基于人工智能的数据安全技术························································78
4.2.2 基于区块链的数据安全技术···························································78
4.2.3 基于零信任架构的数据安全技术·····················································79
4.2.4 基于安全多方计算的数据安全技术··················································81
4.2.5 基于差分隐私保护的数据安全技术··················································83
4.2.6 敏感数据识别技术·······································································84
4.2.7 基于 API 监测的数据安全技术 ·······················································86
4.2.8 基于数据流转监测的数据安全技术··················································87
4.3 本章小结 ···························································································88
第五章 抛光:电力行业数据全生命周期安全风险分析及对策 ······································91
5.1 数据全生命周期概述 ············································································91
5.2 数据采集阶段 ·····················································································92
5.2.1 电力行业数据采集方式·································································93
5.2.2 风险分析···················································································98
5.2.3 应对措施···················································································99
5.3 数据传输阶段 ··················································································.102
5.3.1 电力行业常用数据传输方式························································.102
5.3.2 风险分析················································································.107
5.3.3 应对措施················································································.108
5.4 数据存储阶段 ··················································································.109
5.4.1 电力行业数据存储方式······························································.109
5.4.2 风险分析················································································.111
5.4.3 应对措施················································································.112
5.5 数据处理阶段 ··················································································.114
5.5.1 电力行业常见数据处理场景························································.114
5.5.2 风险分析················································································.115
5.5.3 应对措施················································································.116
5.6 数据交换阶段 ··················································································.120
5.6.1 电力数据交换场景····································································.120
5.6.2 风险分析················································································.120
5.6.3 应对措施················································································.122
5.7 数据销毁阶段 ··················································································.124
5.7.1 风险分析················································································.125
5.7.2 应对措施················································································.126
5.8 运维环节的安全风险 ·········································································.128
5.8.1 风险分析················································································.128
5.8.2 应对措施················································································.129
5.9 本章小结 ························································································.129
第六章 出鞘:电力行业数据安全典型事件 ···························································.131
6.1 电力行业黑客攻击典型案例 ································································.131
6.1.1 乌克兰电力系统遭受攻击···························································.132
6.1.2 委内瑞拉电网遭受攻击······························································.134
6.1.3 暴露的问题·············································································.135
6.1.4 应对措施················································································.135
6.2 供应链安全引发数据泄露事件 ·····························································.136
6.2.1 Equifax 公司信息泄露事件··························································.137
6.2.2 SolarWinds 供应链攻击事件························································.137
6.2.3 暴露的问题·············································································.138
6.2.4 应对措施················································································.138
6.3 内部人员由于安全意识淡薄导致数据泄露 ··············································.139
6.3.1 APT 黑客组织“蜻蜓”入侵美国电网 ···········································.139
6.3.2 乌克兰某核电厂发生重大网络安全事故·········································.140
6.3.3 暴露的问题·············································································.141
6.3.4 应对措施················································································.141
6.4 系统配置不当造成数据泄露 ································································.142
6.4.1 美国德州电气工程公司(PQE)服务器配置引发数据泄露 ·················.142
6.4.2 德国电网公司数据泄露事件························································.143
6.4.3 暴露的问题·············································································.144
6.4.4 应对措施················································································.144
6.5 典型的电力行业成功防御网络攻击案例 ·················································.144
6.5.1 美国新墨西哥公共服务公司成功应对网络攻击事件 ··························.144
6.5.2 爱尔兰国家电网公司成功应对网络攻击事件···································.145
6.6 本章小结 ························································································.146
第七章 剑舞:电力行业数据安全未来发展趋势 ·····················································.148
7.1 电力行业数据安全面临新挑战 ·····························································.148
7.1.1 电力数据主权维护面临着“新数据孤岛”挑战 ···································.148
7.1.2 个人信息和隐私保护成为电力数据保护的主战场·····························.149
7.1.3 电力行业数据安全管控更加依赖新技术应用···································.149
7.2 电力行业数据安全未来发展趋势 ··························································.149
7.2.1 数据安全政策法规和监管措施将日趋完善······································.149
7.2.2 电力数据版权管理体系发展步入正轨············································.149
7.2.3 电力行业的安全体系建设逐步落地···············································.150
7.2.4 电力行业数据安全重要性日益突出···············································.150