{"title":"成本有效地检测、预防和减轻对核能系统的网络威胁","authors":"","doi":"10.47485/2767-3901.1023","DOIUrl":null,"url":null,"abstract":"Cost-effectively detecting, preventing, and mitigating cyber threats are a concern for most organizations, especially those in critical infrastructure sectors. The electrical and mechanical equipment for nuclear power plants is very important to nuclear safety and dependent upon computer-based equipment, appropriate standards and practices for the development and testing of computer hardware and software shall be established and implemented throughout the service life of the system, and in particular throughout the software development cycle. Security systems do not need more tools, they just need more rules, because fighting new threats with more tools just adds complexity and more degrees of freedom; that these new tools always bring on board. It is time to rethink our approach to Cyber Security.","PeriodicalId":431835,"journal":{"name":"International Journal of Theoretical & Computational Physics","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cost-Effectively Detecting, Preventing and Mitigating Cyber Threats to Nuclear Energy Systems\",\"authors\":\"\",\"doi\":\"10.47485/2767-3901.1023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cost-effectively detecting, preventing, and mitigating cyber threats are a concern for most organizations, especially those in critical infrastructure sectors. The electrical and mechanical equipment for nuclear power plants is very important to nuclear safety and dependent upon computer-based equipment, appropriate standards and practices for the development and testing of computer hardware and software shall be established and implemented throughout the service life of the system, and in particular throughout the software development cycle. Security systems do not need more tools, they just need more rules, because fighting new threats with more tools just adds complexity and more degrees of freedom; that these new tools always bring on board. It is time to rethink our approach to Cyber Security.\",\"PeriodicalId\":431835,\"journal\":{\"name\":\"International Journal of Theoretical & Computational Physics\",\"volume\":\"106 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Theoretical & Computational Physics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47485/2767-3901.1023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Theoretical & Computational Physics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47485/2767-3901.1023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cost-Effectively Detecting, Preventing and Mitigating Cyber Threats to Nuclear Energy Systems
Cost-effectively detecting, preventing, and mitigating cyber threats are a concern for most organizations, especially those in critical infrastructure sectors. The electrical and mechanical equipment for nuclear power plants is very important to nuclear safety and dependent upon computer-based equipment, appropriate standards and practices for the development and testing of computer hardware and software shall be established and implemented throughout the service life of the system, and in particular throughout the software development cycle. Security systems do not need more tools, they just need more rules, because fighting new threats with more tools just adds complexity and more degrees of freedom; that these new tools always bring on board. It is time to rethink our approach to Cyber Security.