Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Cyber-Security Threats and Response Models in Nuclear Power PlantsExperimental Testbeds and Design of Experiments

Cyber-Security Threats and Response Models in Nuclear Power Plants: Experimental Testbeds and... [With the computerization of control and management systems deployed in nuclear power plants (NPPs), new requirements for cybersecurity assessment are emerging, which motivate the studies on new methodologies and technologies for analyzing the impacts and consequences of cyber-attacks that potentially target the instrumentation and control systems in NPPs. These analyses can also evaluate the reliability and robustness of various system designs of the NPP environment in the resistance to cyber-attacks. Several testing platforms that can emulate cyber-attacks and deduce their impacts on NPPs have recently been studied and developed. This chapter compares these platforms from the perspectives of system structures and the supported attack scenarios.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/cyber-security-threats-and-response-models-in-nuclear-power-plants-69n0pDiWsK
Publisher
Springer International Publishing
Copyright
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
ISBN
978-3-031-12710-6
Pages
71 –87
DOI
10.1007/978-3-031-12711-3_5
Publisher site
See Chapter on Publisher Site

Abstract

[With the computerization of control and management systems deployed in nuclear power plants (NPPs), new requirements for cybersecurity assessment are emerging, which motivate the studies on new methodologies and technologies for analyzing the impacts and consequences of cyber-attacks that potentially target the instrumentation and control systems in NPPs. These analyses can also evaluate the reliability and robustness of various system designs of the NPP environment in the resistance to cyber-attacks. Several testing platforms that can emulate cyber-attacks and deduce their impacts on NPPs have recently been studied and developed. This chapter compares these platforms from the perspectives of system structures and the supported attack scenarios.]

Published: Oct 11, 2022

There are no references for this article.