2014
DOI: 10.5516/net.04.2012.061
|View full text |Cite
|
Sign up to set email alerts
|

A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…As a result, NPPs were regarded as being safe from external cyber-attacks [1,18]. However, continuous cyber-attacks against NPPs, such as the Slammer worm attack on the Davis-Besse NPP in 2003 [3], the emergency shutdown of the Hatch NPP in 2008 [3], and the Stuxnet worm attack on the Natanz nuclear facility in 2010 [4], signified that NPPs are as susceptible to cyberattacks [2,7,18] as other critical infrastructures [19,20] and conventional IT systems. In other words, the digital technologies introduced and used in NPPs are susceptible to cyber-attacks.…”
Section: Cyber Security Issues In Nppsmentioning
confidence: 99%
See 3 more Smart Citations
“…As a result, NPPs were regarded as being safe from external cyber-attacks [1,18]. However, continuous cyber-attacks against NPPs, such as the Slammer worm attack on the Davis-Besse NPP in 2003 [3], the emergency shutdown of the Hatch NPP in 2008 [3], and the Stuxnet worm attack on the Natanz nuclear facility in 2010 [4], signified that NPPs are as susceptible to cyberattacks [2,7,18] as other critical infrastructures [19,20] and conventional IT systems. In other words, the digital technologies introduced and used in NPPs are susceptible to cyber-attacks.…”
Section: Cyber Security Issues In Nppsmentioning
confidence: 99%
“…Most NPP systems use various COTS HW/SW [1,2], as listed in Table 4, and are also actively considering introducing new technologies such as wireless sensor networks. Recent attack techniques against such COTS, zero-day vulnerability, and new technologies can be modeled in the form of new nodes and edges in an existing scenario graph, and this can be followed with the construction of new paths and the development of new scenarios.…”
Section: Theft Of Business Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…These technologies transmit information from the station level to the power grid management level and back, implement the operational management of the current regime by operators, track changes in the state of an object in real time, etc. It should be noted that the use of the above-mentioned technologies, many of which are vulnerable to cyber attacks, at installations with limited access requires special attention to the issue of integrated security [1,2].…”
mentioning
confidence: 99%