Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 2

Mapping between methods of attack and security principles.

Attack MethodSecurity principle

SpoofingAuthentication
TamperingIntegrity
RepudiationNonrepudiation
Information disclosureConfidentiality
Denial of serviceAvailability
Elevation of privilegeAuthorization
-Hardening