2020
DOI: 10.1016/j.anucene.2020.107398
|View full text |Cite
|
Sign up to set email alerts
|

Development of a quantitative method for identifying fault-prone cyber security controls in NPP digital I&C systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…All measures implemented in cybersecurity are mainly prepared to anticipate cyberattacks appearing in various forms. Cyberattacks can be defined as attacks on information systems [19] through intrusion conducted by internal [4] or external malicious attackers [16] that may compromise the confidentiality, integrity, and availability [29] of the system or may result in failure and property loss [30], [31] leading to jeopardized safety functions [16], [4], [6]. Cyberattacks have been classified into three categories: active attacks, passive attacks, and cyberwars.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…All measures implemented in cybersecurity are mainly prepared to anticipate cyberattacks appearing in various forms. Cyberattacks can be defined as attacks on information systems [19] through intrusion conducted by internal [4] or external malicious attackers [16] that may compromise the confidentiality, integrity, and availability [29] of the system or may result in failure and property loss [30], [31] leading to jeopardized safety functions [16], [4], [6]. Cyberattacks have been classified into three categories: active attacks, passive attacks, and cyberwars.…”
Section: Methodsmentioning
confidence: 99%
“…Lee et al [30] developed a quantitative method to estimate fault-proneness in cybersecurity control by implementing: (1) an analysis of fault prediction models, (2) adoption of the software change entropy model, and (3) development of the security control entropy model. Achievement of high-level quality assurance through consistent attempts, fault proneness, and software complexity correlates to the focus of study for this particular method.…”
Section: Fault-proneness In Cybersecurity Controlmentioning
confidence: 99%
“…Furthermore, Lee et al (2020) developed a model that quantitatively estimated the defective probability of cyber security controls using a modification of the software change entropy model, which analyzed the fault activation probability by considering the security control, digital device, and functional requirement group levels [25]. Shin et al (2015) proposed a cyber security list model consisting of an activity quality analysis model for assessing the cyber security regulatory guides of nuclear business operators and an architecture analysis model for assessing the im-pact of system-specific vulnerability mitigation measures on cyber security-both of which are evaluated in an integrated manner.…”
Section: Introductionmentioning
confidence: 99%