DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Seong, Poong Hyun | - |
dc.contributor.advisor | 성풍현 | - |
dc.contributor.author | Lee, Chanyoung | - |
dc.date.accessioned | 2018-06-20T06:20:27Z | - |
dc.date.available | 2018-06-20T06:20:27Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=675325&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/243196 | - |
dc.description | 학위논문(석사) - 한국과학기술원 : 원자력및양자공학과, 2017.2,[v,55 p. :] | - |
dc.description.abstract | Although many regulatory documents, guides, and standards have been published in the nuclear industry, there are still difficulties when it comes to deciding which security controls are needed and to defining appropriate security control requirements [11]. To evaluate the efficacy of security controls, this study has developed a measure of ‘cyber security improvement’. The ‘cyber security improvement’ is defined as the reduction ratio of the probability that a cyber attack will damage the target system. In addition, the concept of ‘intrusion tolerance system’ is applied to the measure of ‘cyber security improvement’ for ensuring the capability to protect, detect, respond and recover from cyber attacks. To estimate the ratio of the failure probability of the resistance strategy between a baseline system and an enhanced system, the concept of ‘mean time to compromise’ is adopted, and the adopted model is revised in accordance with the method. The validity of the suggested method is proven by conducting a case study. The suggested method can help assess how much system security can be improved by specific cyber security controls and which types of additional cyber security controls should be taken. However, this work has some limitations in estimating the efficacy of cyber security controls. The methods for obtaining the probabilities of detection strategy and the mitigation strategy need to be elaborated. Also, the verification and validation of the suggested method need to be improved. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Cyber Security Control | - |
dc.subject | Cyber Security Improvement | - |
dc.subject | Intrusion Tolerance System | - |
dc.subject | Resistance Strategy | - |
dc.subject | Detection Strategy | - |
dc.subject | Mitigation Strategy | - |
dc.subject | Mean Time to Compromise | - |
dc.subject | 사이버 보안 조치 | - |
dc.subject | 사이버 보안 향상도 | - |
dc.subject | 친입 내성 시스템 | - |
dc.subject | 방어전략 | - |
dc.subject | 탐지전략 | - |
dc.subject | 완화전략 | - |
dc.subject | 공격에 필요한 평균시간 | - |
dc.title | Development of a quantitative method for evaluating the efficacy of cyber security controls in NPPs based on intrusion tolerance concpet | - |
dc.title.alternative | 침입 내성 개념을 이용한 원자력 발전소 내 사이버 보안조치 효과의 정량적 평가 방법론 개발 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :원자력및양자공학과, | - |
dc.contributor.alternativeauthor | 이찬영 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.