Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 3
Example of an attack description.
| Human-machine interfaces (HMIs) |
| - Can be a traditional indicator and switch-based | - Can be serial interface based | - Can be network-based | - Most modern HMIs are now web interfaces | - Some leverage web services to a user front-end | - Some older ones may use RPC calls | - If we can gain access to the HMI, we can often control the system |
|
|