Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 2
Mapping between methods of attack and security principles.
| Attack Method | Security principle |
| Spoofing | Authentication | Tampering | Integrity | Repudiation | Nonrepudiation | Information disclosure | Confidentiality | Denial of service | Availability | Elevation of privilege | Authorization | - | Hardening |
|
|