Skip to main content

The Application of Information Security on the Computer Terminals of 3rd-Generation Nuclear Power Plant

  • Conference paper
  • 1520 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 236))

Abstract

The paper aims to develop a computer terminal solution which suits with the status of the company to eliminate risks of information security caused by the huge amount of computer terminals. The research carries out analysis on Intranet access, standard configuration, information data management, etc. through introduction of standards fit with national information security requirements. To make the analysis smooth, the author uses a real example of computer terminal configuration in a nuclear power plant. Results of implementing the solution in the real example show that security risk of computer terminals are eliminated, and the information security level of the company is significantly improved. The configuration solution is scientific and effective. It is capable of reducing risks from computer terminals to enterprise information security, and it can provide reference to information security construction in companies of the similar situations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Objectives, measures & strategies of information security (CGN-IT-C4-A01). The standard program of CGNPG (2009)

    Google Scholar 

  2. Scope of the information security management system (CGN-IT-C4-A02), The standard program of CGNPG (2009)

    Google Scholar 

  3. Regulations of information assets’ security management (CGN-IT-C4-D01), The standard program of CGNPG (2009)

    Google Scholar 

  4. Symantec. Symantec endpoint security solution—a reliable foundation of enterprise information protection. Inform. Netw. Secur. 3, 28 (2007)

    Google Scholar 

  5. Zhang, T.: Specialist Clinic of Network Security technology. Tsinghua University Publishing House, Tsinghua (2005)

    Google Scholar 

  6. Chi, T., Chen, P.: The discussion of information security of removable storage medium. Secur. Inform. Netw. 10, 62 (2008)

    Google Scholar 

  7. Harold, F. Krause, T.M.: Administrative manual of information security (2004)

    Google Scholar 

  8. Sun, Q., Chen, W.: Information security management. Tsinghua University Publishing House, Tsinghua (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiping Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Song, Z., Luo, Y. (2013). The Application of Information Security on the Computer Terminals of 3rd-Generation Nuclear Power Plant. In: Wong, W.E., Ma, T. (eds) Emerging Technologies for Information Systems, Computing, and Management. Lecture Notes in Electrical Engineering, vol 236. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7010-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7010-6_4

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7009-0

  • Online ISBN: 978-1-4614-7010-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics