Abstract
The paper aims to develop a computer terminal solution which suits with the status of the company to eliminate risks of information security caused by the huge amount of computer terminals. The research carries out analysis on Intranet access, standard configuration, information data management, etc. through introduction of standards fit with national information security requirements. To make the analysis smooth, the author uses a real example of computer terminal configuration in a nuclear power plant. Results of implementing the solution in the real example show that security risk of computer terminals are eliminated, and the information security level of the company is significantly improved. The configuration solution is scientific and effective. It is capable of reducing risks from computer terminals to enterprise information security, and it can provide reference to information security construction in companies of the similar situations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Objectives, measures & strategies of information security (CGN-IT-C4-A01). The standard program of CGNPG (2009)
Scope of the information security management system (CGN-IT-C4-A02), The standard program of CGNPG (2009)
Regulations of information assets’ security management (CGN-IT-C4-D01), The standard program of CGNPG (2009)
Symantec. Symantec endpoint security solution—a reliable foundation of enterprise information protection. Inform. Netw. Secur. 3, 28 (2007)
Zhang, T.: Specialist Clinic of Network Security technology. Tsinghua University Publishing House, Tsinghua (2005)
Chi, T., Chen, P.: The discussion of information security of removable storage medium. Secur. Inform. Netw. 10, 62 (2008)
Harold, F. Krause, T.M.: Administrative manual of information security (2004)
Sun, Q., Chen, W.: Information security management. Tsinghua University Publishing House, Tsinghua (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Song, Z., Luo, Y. (2013). The Application of Information Security on the Computer Terminals of 3rd-Generation Nuclear Power Plant. In: Wong, W.E., Ma, T. (eds) Emerging Technologies for Information Systems, Computing, and Management. Lecture Notes in Electrical Engineering, vol 236. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7010-6_4
Download citation
DOI: https://doi.org/10.1007/978-1-4614-7010-6_4
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-7009-0
Online ISBN: 978-1-4614-7010-6
eBook Packages: EngineeringEngineering (R0)