Cyber-Security Threats and Response Models in Nuclear Power Plants

Cyber-Security Threats and Response Models in Nuclear Power Plants
Author :
Publisher : Springer Nature
Total Pages : 100
Release :
ISBN-10 : 9783031127113
ISBN-13 : 3031127110
Rating : 4/5 (110 Downloads)

Book Synopsis Cyber-Security Threats and Response Models in Nuclear Power Plants by : Carol Smidts

Download or read book Cyber-Security Threats and Response Models in Nuclear Power Plants written by Carol Smidts and published by Springer Nature. This book was released on 2022-10-10 with total page 100 pages. Available in PDF, EPUB and Kindle. Book excerpt: This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.


Cyber-Security Threats and Response Models in Nuclear Power Plants Related Books

Cyber-Security Threats and Response Models in Nuclear Power Plants
Language: en
Pages: 100
Authors: Carol Smidts
Categories: Computers
Type: BOOK - Published: 2022-10-10 - Publisher: Springer Nature

DOWNLOAD EBOOK

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in indu
Development, Use and Maintenance of the Design Basis Threat
Language: en
Pages: 30
Authors: International Atomic Energy Agency
Categories: Business & Economics
Type: BOOK - Published: 2009 - Publisher:

DOWNLOAD EBOOK

This publication provides guidance on how to develop, use and maintain a design basis threat (DBT). It is intended for decision makers from organisations with r
Cyber Security at Civil Nuclear Facilities
Language: en
Pages: 0
Authors: Caroline Baylon
Categories: Computer networks
Type: BOOK - Published: 2016-02 - Publisher: Chatham House (Formerly Riia)

DOWNLOAD EBOOK

"The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing us
Countering Cyber Sabotage
Language: en
Pages: 232
Authors: Andrew A. Bochman
Categories: Political Science
Type: BOOK - Published: 2021-01-20 - Publisher: CRC Press

DOWNLOAD EBOOK

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners,
NUREG/CR.
Language: en
Pages: 164
Authors: U.S. Nuclear Regulatory Commission
Categories: Nuclear energy
Type: BOOK - Published: 1977 - Publisher:

DOWNLOAD EBOOK