Analysis of the Key Technologies and Information Security of the 220kV Digital Information Substation

2012 ◽  
Vol 490-495 ◽  
pp. 100-104
Author(s):  
Gui Hua Cai ◽  
Tian Min Song ◽  
Zhi Gang Wang

Due to its unique advantages in the construction, operation, maintenance and management and other aspects, the digital information substation has achieved rapid development in China in recent years, and many areas are conducting the pilot actively. According to the design features of the Baiyangdian 220kV digital information substation in Baoding City of Hebei Province in China, this paper analyzes some key technologies in the engineering design and implementation. The digital substation is mainly hierarchically constructed by the optoelectronic transformer, the intelligent primary devices and the network secondary devices on the basis of IEC61850 communication protocol, and it is the modern substation that can achieve information sharing and interoperability between the devices. Finally, the paper proposes solutions to the information security issue of the digital information substation.

2021 ◽  
pp. 24-38
Author(s):  
Ildar Begishev

The article attempts at the semantic analysis of the term «digital security», revealing the scope of the meaning of this concept on the basis of theoretical and empirical research. The topicality of the problem is determined by the frequency, expansion of the use of the term «information security», which is associated with the phenomenon of the rapid development of digital technologies, and followed by systems to ensure the protection of digital information at all levels – state, corporate, personal. The research problem is connected with the insufficiently studied meaning of this term; therefore, the aim of the work was to identify the specific semantic field of the phrase «digital security». The tasks to be solved during the study are its distinction from semantically related phrases and concepts, clarification of the understanding of the term by representatives of target audiences. Due to the novelty of entering language lexicographic practice (dictionaries), this term has not yet been fully described, which is of interest not only from a scientific and substantive point of view (legal, informational, communication, multimedia, technological, etc.), but with semantic as well. Theoretical and empirical research methods were used in the work: in addition to a thorough analysis of open sources, a survey was conducted of more than a hundred respondents – representatives of target audiences using modern digital technologies and an interactive method of collecting information. The study allowed us to conclude that the semantic core of the concept of «digital security» consists of the following meanings: «security of information, digital data, personal information in a digital environment, digital information»; «protection, digital information security»; «Internet security»; «Confidentiality and integrity of information in digital form»; «Security when using digital technologies», «information security in digital networks, information systems», etc. Associations and connotations form the semantic periphery, such as «protection against hacks and hacker attacks»; «storage (security) of data on a personal device»; «cybersecurity»; «awareness of individuals and the population about certain safe ways of working with information», etc. The analysis also allowed us to conclude that the term (phrase) «digital security» is stable, it is synonymous in the minds of many carriers with combinations of the noun security with the adjectives information, computer, cyber, electronic, as well as the prospects for enhancing its further existence in the language.


2013 ◽  
Vol 846-847 ◽  
pp. 1624-1627
Author(s):  
Song Jie Gong ◽  
Xue Mei Zhang

With the rapid development of Internet, E-mail has been widely applied, and along goes a great deal of useless and harmful information. In the face of todays rampant spam developments, anti-spam mechanism is the mail filtering technology has gradually become the focus of information security. While the technical performance of spam filtering is good or bad, the key lies in the amount of spam sample collection, study and analysis. Through the analyzing and processing of spam, the paper designs and implements the intelligent spam filtering system. It brings forward some new theories. Based on analyzing actuality, origin and characteristic of spam, the paper also mainly expounds several filtering technique applied in E-mail.


2021 ◽  
Vol 13 (12) ◽  
pp. 6750
Author(s):  
Andreja Mihailović ◽  
Julija Cerović Smolović ◽  
Ivan Radević ◽  
Neli Rašović ◽  
Nikola Martinović

The main idea of this research is to examine how teleworking has affected employee perceptions of organizational efficiency and cybersecurity before and during the COVID-19 pandemic. The research is based on an analytical and empirical approach. The starting point of the research is a critical and comprehensive analysis of the relevant literature regarding the efficiency of organizations due to teleworking, digital information security, and cyber risk management. The quantitative approach is based on designing a structural equation model (SEM) on a sample of 1101 respondents from the category of employees in Montenegro. Within the model, we examine simultaneously the impact of their perceptions on the risks of teleworking, changes in cyber-attacks during teleworking, organizations’ capacity to respond to cyber-attacks, key challenges in achieving an adequate response to cyber-attacks, as well as perceptions of key challenges related to cybersecurity. The empirical aspects of our study involve constructing latent variables that correspond to different elements of employee perception; namely, their perception of organizational efficiency and the extent to which the digital information security of their organizations has been threatened during teleworking during the pandemic.


2012 ◽  
Vol 622-623 ◽  
pp. 1378-1383
Author(s):  
Peng Han ◽  
Yang Li

The ship electric field has become a new physical field which is widely concerned at home and abroad in recent years. For the research of ship electric field, one of the most effective methods is to measure it underwater. According to the analysis of ship electric field signal’s characteristics, the ship electric field measurement system based on MSP430F149 was designed and the key technologies of software and hardware were also presented in this paper. The results of experiment demonstrated that the system could effectively measure the ship electric field signal in a low SNR. Meanwhile, it has the advantages of low power consumption, high accuracy and credible.


2022 ◽  
Vol 30 (3) ◽  
pp. 0-0

With the rapid development of information technology, information security has been gaining attention. The International Organization for Standardization (ISO) has issued international standards and technical reports related to information security, which are gradually being adopted by enterprises. This study analyzes the relationship between information security certification (ISO 27001) and corporate financial performance using data from Chinese publicly listed companies. The study focusses on the impact of corporate decisions such as whether to obtain certification, how long to hold certification, and whether to publicize information regarding certification. The results show that there is a positive correlation between ISO 27001 and financial performance. Moreover, the positive impact of ISO 27001 on financial performance gradually increases with time. In addition, choosing not to publicize ISO 27001 certification can negatively affect enterprise performance.


Author(s):  
Yingying Zheng

The rapid development of modern information technology facilitates the reform and innovation of college teaching. A series of technologies, including webpage addition technology, can meet the requirement of aerobics and other shape-related teaching for animation display. Thus, webpage addition technology is a new viewpoint in the education modernization process. The combination of webpage addition technology and Aerobics courses will provide help for Aerobics teaching. Starting from teaching features and the website learning status of Aerobics courses, this paper carried out an application design for webpage addition design. Then, an Aerobics course served as an experimental course. The control experiment method was applied to explore the application practice of webpage addition technology in the control experiment. Furthermore, this paper conducted contrastive analysis on the teaching effect difference with and without webpage addition technology, and drew some conclusions, in the hope of offering reference for combining webpage addition technology with Aerobics courses.


Author(s):  
Sergey Volodenkov

Introduction. The author aims to analyze the phenomenon of information interference with national political processes in the conditions of the contemporary information society and the evolution of the Internet as a space of political communications. The article shows that the digital information intervention is relevant and at the same time, a complex multidimensional phenomenon of contemporary politics. In many respects, the potential of the digital interference phenomenon is closely related to the essential features of functioning and the transformation of the contemporary Internet, which has been actively used when changing political regimes in many countries. The problem of information security and sovereignty of the present state on the Internet is becoming one of the most urgent in the conditions of the rapid development of information and communication technologies. Methods and materials. The issues identified in the article are investigated using the methods of comparative, structural-functional and normative analysis, included observation, as well as the case-study method. The method of scientific forecasting and scripting techniques has allowed to form a scenario for the effective settlement of international conflicts in the field of information security. The empirical base of the study is reports of foreign experts, official materials of state authorities of the Russian Federation and foreign countries, reports of Freedom House international organization, official speeches and statements by the heads of state on the issues outlined in the work. Analysis. Countering external information expansion is becoming one of the most critical tasks of effective political governance at the state level to preserve the sovereignty of the national political communication space, including domestic segments of the Internet. The initiatives of states to form the sovereign national segments of the Internet space are, on the one hand, an attempt to protect their political systems from external influence and invasion, to ensure their own political stability, and on the other hand, they create risks for the democratic potential of the Internet. The article substantiates the thesis that the phenomenon of interference in elections in actual practice often becomes not so much an objective process as an instrument of information warfare, mass political propaganda and discrediting political opponents, a manipulative tool that can be actively used not only by authoritarian regimes with a low level of democratic development. Results. The study shows that differences in understanding and defining the essence of the Internet by various countries give rise to a significant potential for political conflicts on a global scale. This circumstance leads the author to the conclusion that it is necessary to form international institutions capable of preventing and regulating information conflicts in the Internet space, as well as reducing global political risks (including risks associated with potential interference in the electoral process of sovereign states). The implementation of this scenario will allow forming a collective responsibility in the functioning of the global Internet.


2021 ◽  
Vol 7 (3A) ◽  
pp. 504-511
Author(s):  
Volodymyr Bekh ◽  
Valerii Akopian ◽  
Sergiy Yashanov ◽  
Ilya Devterov ◽  
Bogdan Kalinichenko

The rapid development in the world of information and communication technologies makes it possible to say that now they are one of the most common ways of teaching. These technologies influence the formation of methods and methods of pedagogical activity, open up new opportunities for communication and obtaining information. Informatization and computerization of education acts as a component of the general trend of global processes of world development, as an initial information and communication basis for the harmonious development of the individual and social systemic information. Preparing a student for an active and fruitful life in a modern digital information society is one of the main tasks of the modern stage of modernization of the education system.


Author(s):  
A. N. Kirsanov ◽  
A. A. Popovich

Introduction. The use of technical means for copyright protection is regulated not only in Russian legislation, but also in foreign and international law. It means that the international concept of intellectual property protection could be perceived differently by foreign jurisdictions, which, in turn, is of special scientific interest. The foundations of legal regulation are laid down in international treaties, which in the intellectual property law are tools that contain substantive rules of law. The provisions of such treaties are implemented in the national (supranational) legislation, and, therefore, become part of them and subject to additions.. The article is devoted to the study of international legal regulation of the use of technical means for copyright protection.Materials and methods. The methodological basis of the research consists of the following general scientific and special methods of cognition of legal phenomena and processes: dialectical, formal-legal, comparative-legal, formal-logical, structural-functional.Results of the study. The authors found that attempts to protect copyright using technology available at every stage of history were undertaken by individual countries, beginning from the second half of the 19th century. However technical means of protection received legal regulation at the international level relatively recently, the prerequisite for that was the rapid development of digital information technologies. Analysis of international legal norms in the field of legal regulation of technical means of copyright protection has shown that at present international legal regulation is of a general nature, providing each of the states at the national level with ample opportunities for legal concretization of gen-eral norms. However, recently the Internet treaties of WIPO recognized for the first time not only the advisability of the use of technical means of protection, but also the obligation prohibiting circumvention of such protection technologies, and therefore national legislations should contain provisions regulating the circumvention of such protection technologies.Discussion and Conclusions. The introduction of international law with regard to the use of the protection technologies, despite their general and abstract nature, has given a serious impetus to the establishment of legal regulation of this institution at the national level. At the same time, the rules governing the use of the protection technologies in the near future will require greater unification and concretization due to the rapid development of digital information technologies, blurring the borders between states in terms of disseminating the results of intellectual activity, and also in order to avoid a multiplicity of interpretation of law and to ensure effective legal regulation and protection of copyright.


2020 ◽  
Vol 1 (2) ◽  
pp. 1-9
Author(s):  
Jabbor Mukhammadiev

In the international media space the issues of ensuring information security of the state is inseparably interrelated with the political, economic and legal guarantees for exercising freedom of speech and expression. The problem of ensuring the information security of any state is one of the most important aspects of its foreign policy, since it is the information sphere that is today considered to be the most important object of application of the activities of various participants in international relations. In connection with the rapid development of information technologies, threats of a new type are emerging - threats to information security on a national scale, respectively, the state must respond quickly to a changing situation and take decisive steps to organize a coherent complex information security system. The article analyzes the main approaches to providing information security of the country, formulated the goal, tasks, functions, principles of ensuring information security of the country


Sign in / Sign up

Export Citation Format

Share Document