Èlektron. model. 2018, 41(1):93-104
The information on ways to ensure functioning of the networks of electric power companies is given. The traditional means of information protection are described. The results of the review of the vulnerabilities of industrial networks are presented. The analysis of approaches to protection from threats to cybersecurity is given.
cybersecurity, power company, vulnerability, perimeter protection, network protection, firewall.
- Shangin, F. (2017), Informatsionnaya bezopasnost i zaschita informatsii [Information security and protection of information], DMK-Press, Moscow, Russia.
- Gureev, A. and Suleymanova, O.V. (1987), “Development of the architecture of the mini knowledge base of emergency training”, Energy and electrification, no. 1, pp. 44-46.
- Gureev, V.A., Redkovsky, N.N. and Sumanenkov, V.G. (1994), “Information technology management of complex distributed technical systems”, Informatsionnyye tekhnologii i noveysheye primeneniye teorii upravleniya. Tez. dokl. 1-y Ukrainskoy konf. [Information technology and the latest application of control theory (Automation-94). Conference proceeding of the 1 st Ukrainian Conf], Part 1, Kiev, pp. 230-231.