The application of information security on the computer terminals of 3rd-generation nuclear power plant

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The paper aims to develop a computer terminal solution which suits with the status of the company to eliminate risks of information security caused by the huge amount of computer terminals. The research carries out analysis on Intranet access, standard configuration, information data management, etc. through introduction of standards fit with national information security requirements. To make the analysis smooth, the author uses a real example of computer terminal configuration in a nuclear power plant. Results of implementing the solution in the real example show that security risk of computer terminals are eliminated, and the information security level of the company is significantly improved. The configuration solution is scientific and effective. It is capable of reducing risks from computer terminals to enterprise information security, and it can provide reference to information security construction in companies of the similar situations. © 2013 Springer Science+Business Media New York.

Cite

CITATION STYLE

APA

Song, Z., & Luo, Y. (2013). The application of information security on the computer terminals of 3rd-generation nuclear power plant. In Lecture Notes in Electrical Engineering (Vol. 236 LNEE, pp. 33–40). Springer Verlag. https://doi.org/10.1007/978-1-4614-7010-6_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free