成本有效地检测、预防和减轻对核能系统的网络威胁

{"title":"成本有效地检测、预防和减轻对核能系统的网络威胁","authors":"","doi":"10.47485/2767-3901.1023","DOIUrl":null,"url":null,"abstract":"Cost-effectively detecting, preventing, and mitigating cyber threats are a concern for most organizations, especially those in critical infrastructure sectors. The electrical and mechanical equipment for nuclear power plants is very important to nuclear safety and dependent upon computer-based equipment, appropriate standards and practices for the development and testing of computer hardware and software shall be established and implemented throughout the service life of the system, and in particular throughout the software development cycle. Security systems do not need more tools, they just need more rules, because fighting new threats with more tools just adds complexity and more degrees of freedom; that these new tools always bring on board. It is time to rethink our approach to Cyber Security.","PeriodicalId":431835,"journal":{"name":"International Journal of Theoretical & Computational Physics","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cost-Effectively Detecting, Preventing and Mitigating Cyber Threats to Nuclear Energy Systems\",\"authors\":\"\",\"doi\":\"10.47485/2767-3901.1023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cost-effectively detecting, preventing, and mitigating cyber threats are a concern for most organizations, especially those in critical infrastructure sectors. The electrical and mechanical equipment for nuclear power plants is very important to nuclear safety and dependent upon computer-based equipment, appropriate standards and practices for the development and testing of computer hardware and software shall be established and implemented throughout the service life of the system, and in particular throughout the software development cycle. Security systems do not need more tools, they just need more rules, because fighting new threats with more tools just adds complexity and more degrees of freedom; that these new tools always bring on board. It is time to rethink our approach to Cyber Security.\",\"PeriodicalId\":431835,\"journal\":{\"name\":\"International Journal of Theoretical & Computational Physics\",\"volume\":\"106 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Theoretical & Computational Physics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47485/2767-3901.1023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Theoretical & Computational Physics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47485/2767-3901.1023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

成本有效地检测、预防和减轻网络威胁是大多数组织(尤其是关键基础设施部门)所关注的问题。核电厂的电气和机械设备对核安全非常重要,并且依赖于计算机设备,在系统的整个使用寿命期间,特别是在整个软件开发周期内,应建立和实施计算机硬件和软件的开发和测试的适当标准和规范。安全系统不需要更多的工具,只需要更多的规则,因为用更多的工具对抗新的威胁只会增加复杂性和自由度;这些新工具总是能把它们带到船上。是时候重新思考我们的网络安全方法了。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cost-Effectively Detecting, Preventing and Mitigating Cyber Threats to Nuclear Energy Systems
Cost-effectively detecting, preventing, and mitigating cyber threats are a concern for most organizations, especially those in critical infrastructure sectors. The electrical and mechanical equipment for nuclear power plants is very important to nuclear safety and dependent upon computer-based equipment, appropriate standards and practices for the development and testing of computer hardware and software shall be established and implemented throughout the service life of the system, and in particular throughout the software development cycle. Security systems do not need more tools, they just need more rules, because fighting new threats with more tools just adds complexity and more degrees of freedom; that these new tools always bring on board. It is time to rethink our approach to Cyber Security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信