Cyber-Security Threats and Response Models in Nuclear Power Plants

Cyber-Security Threats and Response Models in Nuclear Power Plants
Author :
Publisher : Springer Nature
Total Pages : 100
Release :
ISBN-10 : 9783031127113
ISBN-13 : 3031127110
Rating : 4/5 (13 Downloads)

Book Synopsis Cyber-Security Threats and Response Models in Nuclear Power Plants by : Carol Smidts

Download or read book Cyber-Security Threats and Response Models in Nuclear Power Plants written by Carol Smidts and published by Springer Nature. This book was released on 2022-10-10 with total page 100 pages. Available in PDF, EPUB and Kindle. Book excerpt: This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.


Cyber-Security Threats and Response Models in Nuclear Power Plants Related Books

Cyber-Security Threats and Response Models in Nuclear Power Plants
Language: en
Pages: 100
Authors: Carol Smidts
Categories: Computers
Type: BOOK - Published: 2022-10-10 - Publisher: Springer Nature

DOWNLOAD EBOOK

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in indu
Cyber Security at Civil Nuclear Facilities
Language: en
Pages: 0
Authors: Caroline Baylon
Categories: Computer networks
Type: BOOK - Published: 2016-02 - Publisher: Chatham House (Formerly Riia)

DOWNLOAD EBOOK

"The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing us
Development, Use and Maintenance of the Design Basis Threat
Language: en
Pages: 30
Authors: International Atomic Energy Agency
Categories: Business & Economics
Type: BOOK - Published: 2009 - Publisher:

DOWNLOAD EBOOK

This publication provides guidance on how to develop, use and maintain a design basis threat (DBT). It is intended for decision makers from organisations with r
Countering Cyber Sabotage
Language: en
Pages: 240
Authors: Andrew A. Bochman
Categories: Political Science
Type: BOOK - Published: 2021-01-20 - Publisher: CRC Press

DOWNLOAD EBOOK

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners,
NUREG/CR.
Language: en
Pages: 140
Authors: U.S. Nuclear Regulatory Commission
Categories: Nuclear energy
Type: BOOK - Published: 1978 - Publisher:

DOWNLOAD EBOOK