...
首页> 外文期刊>Transactions of the American nuclear society >Research on the Methodology of Verification of Vital Digital Assets
【24h】

Research on the Methodology of Verification of Vital Digital Assets

机译:重要数字资产验证方法论研究

获取原文
获取原文并翻译 | 示例

摘要

In order to investigate the methodology of VDA verification, we reviewed the overview of simulators which are representative facilities of verification environments for cyber security, and the current status of simulator operations inside and outside of the R.O.K. And we examined verifition methodology that can be applied in this study. In addition, we have found that targets, initiating events, codes, and scenarios are required for this verification environments and applied these requirements into example of accidents. In this study, we used the methodology of VDA identification that was studied previously. It will be possible to identify targets and events through the derived result, and the scenario based on this will be applied to the verification environments to be developed in the future. Then we can reach a goal of this study to describe each of these scenarios in the verification environments and to describe the impact of the target sets when they are attacked and when the protection sets have succeeded in protecting them. Through this, it will be possible to verify the effects of cyber attacks on VDA, and it will be possible to develop ways to more effectively regulate cyber security at nuclear power plants.
机译:为了研究VDA验证的方法,我们回顾了作为网络安全验证环境代表设备的模拟器概述以及R.O.K内外模拟器运行的当前状态。并且我们研究了可以在本研究中应用的验证方法。此外,我们发现此验证环境需要目标,启动事件,代码和方案,并将这些要求应用于事故示例中。在这项研究中,我们使用了以前研究过的VDA识别方法。通过导出的结果可以识别目标和事件,并且基于此的方案将应用于将来要开发的验证环境。然后,我们可以达到研究的目的,以描述验证环境中的每种情况,并描述目标集在受到攻击时以及保护集成功保护它们时的影响。通过这种方式,有可能验证网络攻击对VDA的影响,并且有可能开发出更有效地监管核电厂网络安全的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号