Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 5

Parameters for BP, ITP, and CP.

Attack surfaceParameter of the security control
Applicable targetSecurity principleLife stage

(S,DW,M)LogicAuthorizationDevelopment
(S,DW,A)LogicAuthorizationDevelopment
LogicAuthorizationDevelopment

(S,WN,A)LogicAuthenticationDevelopment
ChannelConfidentialityDevelopment