With the rapidly development of computer and network technology, information technology has been widely used in many energy systems, such as power system. Power system is a very important sector and energy industry in China, but it presents more and more weakness in its information systems along with the increasing dependence on information and network system. Information security has threatened the security and steady operation of the power system which means that the grid information security will face great threats and challenges. Therefore, information security risk assessment is vital important for state grid whose electric power information level is very deep. Risk assessment of power system provides the data of current risks and points out the future risks and potential impact of these risks in power system. Therefore, the risk assessment supports very important analysis methods and assessment tools for power system. In currently, grid system is lack of effective information security assessment. In this paper, we carried out an improved theoretical model using analytic hierarchy process (AHP) method based on the current state in power system. Finally, we simplified the situation and evaluate the terminals’ risk in details using the data in power system through another simplified model. We can conclude that both of the models are effective in evaluate the assessment risk in power systems. Index Terms information security risk assessment, power system, Analytic Hierarchy Process
[1]
Shawn A. Butler.
Security attribute evaluation method: a cost-benefit approach
,
2002,
ICSE '02.
[2]
I. Monitor.
Information Security Management Handbook
,
2000
.
[3]
D. A. Jones,et al.
The Development of a model for testing and evaluation of security equipment within Australian standard/ New Zealand Standard AS/NZS 4360:2004- Risk Management
,
2005
.
[4]
Daniel E. Geer,et al.
Information security is information risk management
,
2001,
NSPW '01.
[5]
Ling Jie.
Research on network terminal security assessment index system
,
2010
.
[6]
Thomas Peltier,et al.
Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital
,
2006
.
[7]
Kwo-Jean Farn,et al.
A study on information security management system evaluation - assets, threat and vulnerability
,
2004,
Comput. Stand. Interfaces.
[8]
M. J. Kenning.
Security Management Standard — ISO 17799/BS 7799
,
2001
.
[9]
Wenyuan Li,et al.
Risk Assessment Of Power Systems: Models, Methods, and Applications
,
2004
.
[10]
T. Saaty.
Analytic Hierarchy Process
,
2005
.