Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 5
Parameters for BP, ITP, and CP.
| Attack surface | Parameter of the security control | Applicable target | Security principle | Life stage |
| (S,DW,M) | Logic | Authorization | Development | (S,DW,A) | Logic | Authorization | Development | Logic | Authorization | Development |
| (S,WN,A) | Logic | Authentication | Development | Channel | Confidentiality | Development |
|
|