Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 4
Example of an attack pattern expression (human-machine interfaces (HMIs)).
| SUB-ID | Attack surface | M | AT | RD | EE | CH | SRV |
| SANS–ICS–01-01 | User | Authorization | Application, platform | EP | SRV | CD | SANS–ICS–01-02 | System | Authorization | Application, platform | EP | SRV | CD | SANS–ICS–01-03 | System | Authorization | Application, platform | EP | SRV | CD |
|
|