Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 4

Example of an attack pattern expression (human-machine interfaces (HMIs)).

SUB-IDAttack surfaceMATRD
EECHSRV

SANS–ICS–01-01UserAuthorizationApplication, platformEPSRVCD
SANS–ICS–01-02SystemAuthorizationApplication, platformEPSRVCD
SANS–ICS–01-03SystemAuthorizationApplication, platformEPSRVCD