Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 7
Parameters for engineering workstation (EWS).
| Attack surface | Parameter of the security control | Applicable target | Security principle | Life stage |
| (S,DW,M) | Logic | Authorization | Development | (U,DA,P) | OS and platform | Authorization | Development |
|
|