HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GBZ25320.1-2010 English PDF

US$594.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GBZ25320.1-2010: Power systems management and associated information exchange -- Data and communications security -- Part 1: Communication network and system security -- Introduction to security issues
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/Z 25320.1-2010English594 Add to Cart 4 days [Need to translate] Power systems management and associated information exchange -- Data and communications security -- Part 1: Communication network and system security -- Introduction to security issues Valid GB/Z 25320.1-2010

PDF similar to GBZ25320.1-2010


Standard similar to GBZ25320.1-2010

GB/T 40427   GB/T 40588   GB/T 33593   GB/T 25320.4   GB/T 25320.6   GB/Z 25320.7   

Basic data

Standard ID GB/Z 25320.1-2010 (GB/Z25320.1-2010)
Description (Translated English) Power systems management and associated information exchange -- Data and communications security -- Part 1: Communication network and system security -- Introduction to security issues
Sector / Industry National Standard
Classification of Chinese Standard F21
Classification of International Standard 29.240.30
Word Count Estimation 30,346
Date of Issue 2010-11-10
Date of Implementation 2011-05-01
Quoted Standard GB/T 18700.1; GB/T 18700.2; GB/T 18700.3; GB/T 18700.6; GB/T 18700.8; DL/T 860.3; DL/T 860.4; DL/T 860.5; DL/T 860.6; DL/T 860.10; DL/T 860.71; DL/T 860.72; DL/T 860.73; DL/T 860.74; DL/T 860.81; DL/T 860.91; DL/T 860.92; IEC 60870-5-1; IEC 60870-5-2; IEC 60870-5-3; IEC 60870-5-4; IEC 60870-5-5; IEC 60870-5-6; IEC 60870-5-101; IEC 60870-5-102; IEC 60870-5-103; IEC 60870 -5-104; IEC/TS 62351-2
Adopted Standard IEC/TS 62351-1-2007, IDT
Regulation (derived from) ?National Standard Approval Announcement 2010 No.8 (Total No.163)
Issuing agency(ies) Ministry of Health of the People's Republic of China
Summary This standard specifies the information security control of the power system operation. The main purpose of this section is " safe IECTC57 develop communication protocols, especially IEC60870-5, IEC60870-6, IEC61850, IEC61970 and IEC61968 safety standards bear, assume the end-to- safety standards and technical reports development. "

GBZ25320.1-2010: Power systems management and associated information exchange -- Data and communications security -- Part 1: Communication network and system security -- Introduction to security issues



---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Power systems management and associated information exchange. Data and communications security. Part 1. Communication network and system security. Introduction to security issues ICS 29.240.30 F21 People's Republic of China national standardization of technical guidance documents Power System Management and Information Exchange Data and communications security Part 1. Communication networks and system security Introduction to safety issues Powersystems management and associated information exchange- Part 1.Communicationnetworkandsystemsecurity- (IEC TS62351-1.2007, IDT) 2010-11-10.2011-05-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Foreword Ⅲ Introduction IV 1 Scope and purpose 1 2 Normative references 2 3 Terms, definitions and abbreviations 2 4 background of information security standards 2 4.1 The information involved in the operation of the power system 2 4.2 IEC TC57 data communication protocol 3 4.3 Develop the history of these safety standards 3 5 GB /Z 25320 Security issues involved 4 5.1 General safety information 4 5.2 types of security threats 4 5.3 Security Needs, Threats, Vulnerability, Attacks and Responses 6 5.4 The importance of safety measures 11 5.5 Security Risk Assessment 11 5.6 Understanding safety needs and the impact of safety precautions on the operation of the power system 12 5.7 five-step safety process 13 5.8 Application safety protection in power system operation 14 6 GB /Z 25320 Overview 15 Range of 6.1 GB /Z 25320 15 6.2 Certification as a Key Security Requirement 15 Target 15 of GB /Z 25320 6.4 GB /Z 25320 various parts of the relationship between the IEC protocol 15 6.5 GB /Z 25320.1 Introduction to safety issues 16 6.6 GB /Z 25320.2 Terminology 16 6.7 GB /Z 25320.3 Protocol Set Containing TCP/IP 17 6.8 GB /Z 25320.4 Protocol set containing MMS 17 6.9 GB /Z 25320.5 Safety of IEC 60870-5 and its derivatives 18 6.10 GB /Z 25320.6 Safety of DL/T 860 19 6.11 GB /Z 25320.7 Network and system management data object model 20 7 Conclusion 23 Appendix NA (informative) IEC 60870-5 parts and the corresponding national standards and consistency 24 References 25

Foreword

International Electrotechnical Commission 57 Technical Committee (IEC TC57) for the management of power systems and the exchange of information developed by IEC 62351 " Force system management and information exchange data and communications security "standard. We use IEC 62351, prepared GB /Z 25320 guidance Technical documents, including the following sections. --- Part 1. Introduction to communication network and system security and safety issues; --- Part 2. Terms; --- Part 3. Communication network and system security Protocol set containing TCP/IP; --- Part 4. Protocol set containing MMS; --- Part 5. IEC 60870-5 and its derivatives standards; --- Part 6. DL/T 860 security; --- Part 7. Network and system management data object model; --- Part 8. Role-based access control of power system management. This section identical with IEC TS62351-1.2007 "Power System Management and Information Exchange Part 1 Data and Communication Security Sub-communication network and system security and safety issues introduced "(in English). This part adds an informative annex NA, to reflect the normative references IEC 60870-5 (all parts) and the corresponding parts The standard of our country and the degree of consistency. This part is proposed by China Electricity Council. This part of the National Power System Management and Information Exchange Standardization Technical Committee (SAC/TC82) centralized. This section drafted unit. State Grid Electric Power Research Institute, the State Power Dispatching and Communication Center, China Electric Power Research Institute, Fujian Electric Power Co., Ltd., Huazhong Power Grid Co., Ltd., East China Power Grid Co., Ltd., Liaoning Provincial Power Co., Ltd. The main drafters of this section. Xu Mu Liang, South Guilin, Deng Zhaoyun, Yang Qiuheng, Han Shui Bao, Li Genwei, Cao Lianjun, Yuan and Lin, Lin Weimin. This guideline is for reference only. For advice or comments on this guidance document, be directed to the Director of Standardization Administration of the State Council Department reflected.

Introduction

Computer, communications and networking technologies are currently widely used in power systems. There are various kinds of information in communications and computer networks Possible security attacks pose a threat to the security of data and communications in power systems. These potential possible attacks target the power system Security vulnerabilities in communication protocols at various levels of the system and imperfections in the security management of power system information infrastructure. To this end, we adopted the international standard to develop GB /Z 25320 "Power System Management and its information exchange data and communication security", pass Over the relevant communication protocols and in the information infrastructure management to add specific security measures to enhance and enhance the power system data and communications Security. Power System Management and Information Exchange Data and communications security Part 1. Communication networks and system security Introduction to safety issues

1 Scope and purpose

1.1 Scope The scope of this part of GB /Z 25320 is the information security of power system control operation. The main purpose of this section is "as IEC TC57 Safety of communication protocols developed, in particular safety of IEC 60870-5, IEC 60870-6, IEC 61850, IEC 61970 and IEC 61968 All, to undertake the development of standards; commitment to end-to-end safety standards and technical report of the development. " 1.2 purpose Specific purpose includes. ● GB /Z 25320.1 introduced the other parts of GB /Z 25320, the main introduction to the reader applied to the power system operation information All aspects of safety knowledge ● GB /Z 25320.3 ~ GB /Z 25320.6 specifies the IEC TC57 communication protocol safety standards. Can use these standards mentioned It is safe for protocols at all levels, depending on the protocols and parameters selected for a particular implementation. Again, they have been designed For backward compatibility and can be phased implementation; ● GB /Z 25320.7 relates to one of many possible areas of end-to-end information security that enhances support for power system transport Line communication network to conduct a comprehensive management; ● The rest of GB /Z 25320 follow more areas of information security. Safety, security and reliability in the power industry are always important issues in system design and operation. As the industry grows more and more dependent on Depending on the information infrastructure, the information security is becoming increasingly important, which is the reason for the development of information security standards. Some new threats are already around To deregulated electricity markets, where knowledge of competitors' assets and their systems operations may benefit, intercepted Such information is very likely to happen. In addition, unintended behavior (such as carelessness and natural disasters) can create information Into danger. The additional threats now posed by terrorism have become apparent. 1) ATIS (Aliance for Telecommunications Industry Solutions) [The United States for Communication and Related Information Technology rapid development and promotion of technology And running standards organizations. ATIS has been accredited by the American National Standards Institute (ANSI). ] .FS-1037C expansion, US federal government telecommunications items Purpose Standard terminology. Although there are many definitions of "end-to-end" security, a standard definition (multiple representations) is. "1. The use of cryptographic technology Security of information in a messaging system or a protected distribution system means protection from the point of origin to the point of destination. 2. Information system In the information from the starting point to the point of security "1). Based on this definition to start the four standards for IEC TC57 The security of communication protocol sets is enhanced because these communication protocol sets are considered to be the obvious first for security control of power system control operations step. However, these security enhancements address only the security needs between the two systems and do not address the real "end-to-end" End "security, including security measures, security enforcement, intrusion detection, robustness of internal systems and applications, and broader security needs. Therefore, the present concluding remarks of this chapter is very important.I recognize the addition of a firewall or simply the use of protocol encryption, such as adding links Bump-in-the-wire or even Virtual Private Network (VPN) technology does not seem to be sufficient in many cases. Security is True "end-to-end" requirements to ensure certified access to sensitive power system equipment, authorized access to sensitive market data, Rely on timely and timely implementation of equipment functions and equipment failure information, backup of critical systems and audits that allow the detection and reproduction of decisive events