版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
PAGE|1
NationalCyber-InformedEngineeringStrategy
PAGE|2
NationalCyber-InformedEngineeringStrategy
NotefromtheSecretary
Intoday’sincreasinglyinterconnectedworld,America’ssafetyandwell-beingdependoncybersecurity.
That’swhyPresidentBidenconsidershardeningthenationagainstcyberattacksatoppriorityforhisadministration—andonethathasonlygrowninimportanceasthecountryembarksonthebiggestbuildoutofcriticalinfrastructureandmanufacturingcapacityinageneration.
Eachstageofthecleanenergytransformationthatwillbringwithitanopportunityandanimperativetofurtherincreasesecurity,reliability,andresilienceinAmerican’senergysector.TheCyber-InformedEngineering(CIE)Strategyshowsushowwecanseizetheopportunitytoaddressthesechallenges.
Thisframework,grownfromearlierCongressionaldirectionregardingthreatstothenation’senergysector,advocatesforanevolutionaryshiftacrosstheenergyindustryandrelatedinstitutions,includingresearchers,standardsbodies,Federalpartners,andothers.Itsrecommendationsreflectexpertiseandinsightfromenergycompanies,energysystemsandcybersecuritymanufacturers,standardsbodies,researchers,DOENationalLaboratories,andFederalpartnersinthecybersecurityandengineeringmissionspace.Itencouragestheadoptionofa“security-by-design”mindsetwithintheEnergySectorIndustrialBase,whichreferstobuildingcybersecurityintoourenergysystemsattheearliestpossiblestagesratherthantryingtosecurethesecriticalsystemsafterdeployment.ThankstoPresidentBiden’sBipartisanInfrastructureLaw,wecanmatchtheCIEframeworkwithnewinvestmentsincleanenergyinfrastructureandmanufacturingtobeginbuildingmoresecurecleanenergysystemshereathome.
CIEfurtherguidesourcyberworkforcedevelopmentbyhelpingusandourpartnersfocusonthestrategicintersectionbetweencybersecurityandengineering,addressinggapsinhowwetrainengineersandtechniciansandprovidingthemwiththemeanstobuildinsecurityfromthegroundup.Whenourworkforceisproperlyeducatedandsupported,wearebetterpositionedtomanufactureandmaintainthetoolsthathelpuspreventandquicklyrecoverfromcyberattacks.
Thisframeworkoffersusaclearpathforwardtothefutureofenergysecurity,inwhichAmericawillstandattheforefrontofglobalinnovationandcleanenergymanufacturing.FollowingtheCIEstrategywillhelpensurethatourgridisnotonlyresistanttoinitialattacks,butresilientenoughtopreventandmitigatedisruptionstoourenergysupplies,economy,andeverydaylives.
I’dliketooffermydeepgratitudeandappreciationfortheSecuringEnergyInfrastructureExecutiveTaskForce(SEIETF)whohelpedustakeacriticalstepforwardbyleadingthedevelopmentoftheCIEstrategy.Thework,however,continues.Itwilltakeclosecollaborationbetweengovernmentandindustrytoensureenergysystemsofthefuturearedesignedandbuiltforsecurityandreliability.Aswe
PAGE|3
NationalCyber-InformedEngineeringStrategy
pursueourtransitiontoacompletelycleanenergysector,wewillkeepsecurityandreliabilityfrontandcenter,andwillneedtostandshoulder-to-shoulderwithourinter-agencypartnersattheCybersecurityandInfrastructureSecurityAgency(CISA),NationalInstituteforStandardsandTechnology(NIST),andmoretoensurethisCIEstrategyisimplementedtoaddresscurrentandfuturethreatlandscapes.Together,wewillsecureourenergysectoranddeliverastronger,cleanerfuture.
JenniferGranholm
Secretary
U.S.DepartmentofEnergy
PAGE|4
NationalCyber-InformedEngineeringStrategy
NotefromtheDirector
TheU.S.energysectorfacesever-evolvingcybersecuritythreats.Accordingtothe2022OfficeoftheDirectorofNationalIntelligence(DNI)AnnualThreatAssessment1,ouradversariesmaintaincapabilitiestolaunchcyberattacksthatcoulddisruptcriticalinfrastructure,includingindustrialcontrolsystemsintheU.S.energysector.Cybersecurityattacksoncriticalinfrastructureareparticularlyconsequentialandensuringthesecurity,reliability,andresilienceofthesesystemsisatoppriorityfortheU.S.DepartmentofEnergy’s(DOE)OfficeofCybersecurity,EnergySecurity,andEmergencyResponse(CESER)anditspartnersingovernmentandtheprivatesector.
Thiswilltakeaconcerted,collaborativeeffortbetweengovernmentandindustrytoensureenergysystemsofthefuturearebuiltsecurelytoprovidereliableenergytothenation.Buildingenergysystemssecurelybydesignmeansensuringallphasesoftheenergysystemlifecycle–fromdesignanddevelopmenttoinstallationandoperation–aresecureandcanquicklyrecoverfromcyberattacks.Thenationnowhasanunprecedentedopportunitytoshapethecybersecurityofourmostcriticalinfrastructurefordecadestocome.
ThereleaseoftheCyber-InformedEngineering(CIE)supportsCESER’sfivepriorities.Thoseprioritiesinclude:1)Strengtheningthevisibilityofcyberthreatsinenergysystems;2)Addressingsupplychainrisks;3)Promotingsecurity-andresilience-by-design;4)BuildingcyberandresiliencecapacityintheprivatesectorandtheState,local,territorial,andtribalcommunities;and5)Beingpreparedtorespondinpartnershipwithourgovernmentandindustrypartnerswhenacyberincidentoccursintheenergysector.CIE,inmanyways,cutsacrossallthoseprioritiesthroughitsfivepillars:awareness,education,development,currentinfrastructure,andfutureinfrastructure.
CIEisanemergingframework,originatedbytheNationalLaboratoriesandadvancedbyDOE,tobuildcybersecurityintothenation’senergysystemsattheearliestpossiblestagesratherthantryingtosecurethesecriticalsystemsafterdeployment.CESERleadsDOE’seffortstoimplementCIEtoprotectcriticalenergyinfrastructureassetsandleveragesexpertiseofitsintra-agencypartners.Forexample,CESERworkscloselywithofficesacrosstheDepartmentsuchastheOfficeofEnergyEfficiencyandRenewableEnergy,theOfficeofElectricity,theOfficeofIntelligenceandCounterintelligence,andotherstoensurecybersecurityisbuiltintoenergysystemsoftodayandintothefuture.
Asapowersystemsengineer,Iknowhowcriticalitistoensurethatcybersecurityisbuiltintostandardsusedtodesignenergysystemsofthefuture.Tothatend,wewillneedpartnerswithstandardsbodiessuchastheInstituteofElectricalandElectronicsEngineers(IEEE)andtheInternationalElectrotechnical
1OfficeoftheDirectorofNationalIntelligence,AnnualThreatAssessmentoftheU.S.IntelligenceCommunity(April2022),4-24.
/files/ODNI/documents/assessments/ATA-2022-Unclassified-Report.pdf
.
PAGE|5
NationalCyber-InformedEngineeringStrategy
Commission,educatorsandresearchersinacademia,andmanyotherstohelpuschampiontheCIEprinciples.Weneedtoensurethatcybersecurityissynonymouswithreliabilityandsafetyinstandardsdevelopmentworkinggroupsandinthehallwaysofengineeringcollegestoensurewearesuccessful.Wecanaccomplishmuchmorewhenwetackletheseissuescollaboratively.
Further,whileDOEisleadingthiseffortfromanenergyindustryperspective,theoverallapproachwillrequireclosecollaborationandsignificantworkwithitsinter-agencypartnersattheCybersecurityandInfrastructureSecurityAgency(CISA),NationalInstituteforStandardsandTechnology(NIST),andotherstoensuretheCIErecommendationshereinareimplementedacrossthecountrytoaddressthecurrentandfuturethreatlandscapes.
IextendmythankstotheSecuringEnergyInfrastructureExecutiveTaskForceandIdahoNationalLaboratorywhowereinstrumentalinthedevelopmentofthestrategy.TherecommendationshereinreflecttheexpertiseofEnergySectorIndustrialBase(ESIB)stakeholderscomprisedofenergycompanies,manufacturers,standardsbodies,researchers,DOENationalLaboratories,andFederalpartnersinthecybersecurityandengineeringmissionspace.
PueshKumar
Director
OfficeofCybersecurity,EnergySecurity,andEmergencyResponse(CESER)
U.S.DepartmentofEnergy
PAGE|6
NationalCyber-InformedEngineeringStrategy
TABLEOFCONTENTS
NOTEFROMTHESECRETARY 2
NOTEFROMTHEDIRECTOR 4
EXECUTIVESUMMARY 7
CIEInPractice:ExamplesofEngineeringDecisionsInformedbyCyberRisks 9
INTRODUCTION 10
DefiningtheProblem 11
PrinciplesofCIE 12
KEYPREMISESOFTHENATIONALCIESTRATEGY 15
STRATEGICPILLARSANDRECOMMENDEDACTIONS 16
THECIESTRATEGYASAMODELFOROTHERCRITICALINFRASTRUCTURESECTORS 31
NEXTSTEPS 32
APPENDIXA:SECURINGENERGYINFRASTRUCTUREEXECUTIVETASKFORCEPARTICIPANTS 33
SeniorExecutiveGroup 33
SeniorTechnicalGroup 34
TechnicalProjectTeam:NationalCIEStrategy 35
APPENDIXB:EXAMPLESOFCIEIMPLEMENTATION 36
Consequence-drivenCyber-informedEngineering(CCE) 36
IntegratingCIEintoNuclearMicroreactorDesign 37
CybersecurityfortheOperationalTechnologyEnvironment(CyOTE?) 37
CIEinEducation 37
PAGE|7
NationalCyber-InformedEngineeringStrategy
Cyber-informedengineering(CIE)offersanopportunityto“engineerout”somecyberriskacrosstheentiredeviceorsystemlifecycle,startingfromtheearliestpossiblephaseofdesign—themostoptimaltimetointroducebothlowcostandeffectivecybersecurityapproaches.
CIEisanemergingmethodtointegratecybersecurityconsiderationsintotheconception,design,development,andoperationofanyphysicalsystemthathasdigitalconnectivity,monitoring,orcontrol.CIEapproachesusedesigndecisionsandengineeringcontrolstomitigateoreveneliminateavenuesforcyber-enabledattack,orreducetheconsequenceswhenanattackoccurs.
ExecutiveSummary
ThePersistentCybersecurityChallenge
Theindustrialcontrolsystemsthatoperatecriticalenergyinfrastructurefaceincreasinglysevereandsophisticatedcyberattacksfromdeterminedadversaries.Toavoiddisruptionstothenation’scriticalenergyfunctions,energysystemsmustbeengineeredtowithstandintentionalcybercompromise,exploitation,andmisuse.
Whiletraditionalengineeringincludesconsiderablesafetyandfailuremodeanalysis,theseriskmanagementapproachesrarelyaddresstherisksintroducedbyanintelligentandcapableadversarywiththegoalofdenying,disrupting,ordestroyingacriticalfunctionusingcybermeans.Mostcybersecuritysolutionsare“boltedon”lateintheengineeringlifecycle,ratherthanintrinsicallybuiltintothesystemdesign.
TheOpportunityofCyber-InformedEngineering
NationalCIEStrategyDirective
EnactedintolawonDecember20,2019,Section5726oftheNationalDefenseAuthorizationActforFiscalYear2020directedtheSecretaryofEnergytoestablishagovernment-industryworkinggrouptoaccomplishaseriesoftasks,includingtodevelopanationalcyber-informedengineeringstrategytoisolateanddefendenergyinfrastructurefromsecurityvulnerabilitiesandexploitsinthemostcriticalsystems.TheSecuringEnergyInfrastructureExecutiveTaskForcedevelopedthisNationalCIEStrategyforadoptionbytheDepartmentofEnergy.
Whilespecializedinformationtechnology(IT)andoperationaltechnology(OT)cybersecurityexpertsbringstrongcybersecuritycapabilitiestosecuringtoday’senergysystems,manyoftheengineersandtechnicianswhodesignandoperatetheseenergysystemscurrentlylacksufficientcybersecurityeducationandtrainingtoengineersystemsforcybersecurityfromtheoutset,inthesamewaytheyengineerthesesystemsforsafety.
ANationalCIEStrategyforEnergy
Pursuanttocongressionaldirection,2theU.S.DepartmentofEnergyandtheSecuringEnergyInfrastructureExecutiveTaskForcehavedevelopedastrategytoenabletheenergysectortoleadthenationinincorporatingCIEintothedesignandoperationofinfrastructuresystemsthatrelyondigitalmonitoringorcontrols.
2Section5726oftheNationalDefenseAuthorizationActforFiscalYear2020.
PAGE|8
NationalCyber-InformedEngineeringStrategy
TheNationalCIEStrategyisbuiltonfiveintegratedpillars(see
Figure1)
,offeringasetofrecommendationstoincorporateCIEasacommonpracticeacrosstheenergysector.Together,theseapproachesprovidethebodyofknowledge,thediverseandexpandedworkforce,andtheengineeringandmanufacturingcapacitytoapplyCIEtotoday’senergyinfrastructure,andtoengineerfutureenergysystemstoeliminateorreducetheabilityofacyber-enabledattacktosucceed.
Figure1.NationalCyber-InformedEngineeringStrategy
CIEprovidesthebasisandapproachforinstitutingacultureofcybersecuritywithintheenergyindustry,akintotheindustry’sstrongcultureofsafety.Leadingthisculturalshiftwillbetheengineers,industrialcontrolsystemtechnicians,cybersecurityprofessionals,manufacturers,andownersandoperatorsintheEnergySectorIndustrialBase.TheNationalCIEStrategypillarsprovideastrong,integratedfoundationtoacceleratethisculturalshift.ThenextstepinmovingCIEforwardwillbetoconveneabroadsetofstakeholderstodevelopdetailedimplementationplansforeachpillarofthestrategy.
WhilethisNationalCyber-InformedEngineeringStrategyhasbeendevelopedfortheenergysector,itcanserveasaleverageablemodelforothercriticalinfrastructuresectorstoadoptandincorporateCIEintoindustrypractices.CIEconceptsandstrategiesincludefoundationalengineeringprinciplesthatapplytoalltypesofengineeringforcriticalinfrastructure.EmbeddingCIEmethodsintotheeducationandcredentialingofthenation’snextgenerationofengineersandindustrialcontrolsystemtechnicianswillcreateacyber-awareworkforcethatcandesignandmanufactureresilientinfrastructuresystemsacrosssectors.
PAGE|9
NationalCyber-InformedEngineeringStrategy
CIEInPractice:ExamplesofEngineeringDecisionsInformedbyCyberRisks
CIEguidesanengineeringteamtoconsiderandmitigatethepotentialforcybercompromisethroughouttheengineeringdesignlifecycle,leveragingengineeringsolutionstolimitthepathwaysforcybersabotage,exploitation,theft,andmisusewithinthesystem.
InafullymatureCIEdesign,requirementswouldbedevelopedtodescribenotonlyexpectationsforhowthesystemwouldfunction,butalsospecifichigh-consequencecyberimpactswhichmustbepreventedwithinthesystemdesign.Duringthedesignprocess,theteamwouldmakeaffirmativedecisionsabouthowtobestaccomplishthoserequirements,whetherbyenactingmanualengineeringcontrols,limitingdigitalfunctionality,employingoperationalcybersecuritysolutions,orenactingmonitoringschemes,orcombinationsofalltheabove.Theriskofafuturecybercompromisewouldbetrackedanddiminishedasafundamentalengineeringrisk.
Whatdoesthismeanintoday’spractice?ThefollowinghypotheticalscenarioshighlightthetypesofdesignchangesandengineeringdecisionsthatcouldresultfromapplyingCIEduringthedesignandbuildprocess:
?A60-percentdesignreviewofagreenfieldwatertreatmentplantrevealsthatthedesignengineerreplacedthemanualhand-off-autoswitches—whichallowoperationsstafftoruntheplantmanually—withanetwork-basedcommunicationdevicewithoutmanualoverrides.Theteamelectstoundothismodification,justifyingthehighercostofconstructionwiththebenefitofassuredmanualcontrolsintheeventofacybercompromise.
?Adesignteamnotesthatthevibrationtripsensorforagasturbineisaddressableonthesameoperationaltechnologynetworkwiththeturbine,andthus,couldbecompromisedalongwiththeturbinebyanadversarywhogainsaccesstothenetwork.Becausethissensorisasafetyfeaturefortheturbine,theteamchoosestodeployitonanisolatednetwork—sothatitismoreinaccessibletocyberadversaries—andtoemployahigherlevelofsecuritycontrols,includingamonitoringsystem,toheightenawarenessofnetworkanomaliesaffectingthesensor.
?Acyberexerciserevealsthepotentialforadigitalcontrollertobeusedtosupplyaharmfulamountoftreatmentchemicalsintoaprocess,potentiallycausingdamagetoplantequipment.Theengineeringteamisunabletoremovethecontrollerfromserviceortoenactmanualoverrides,sotheychoosetoadoptanengineeringcontrollimitingthechemicalavailabletotheprocesstoanamountbelowtheharmfullevel.ThiscontrolisenactedthroughphysicalchangestothedispensingtankanddocumentedintheStandardOperatingProcedures.
?Duringthevalueengineeringprocessforawastewatertreatmentplantcontrolsystem,thedesignteamdecidedtosavemoneybyremovingredundanthardwiredcontrolsandreplacingthemwithdigitalinput/outputsfromtheindustrialcontroller.Duringareview,theengineeringteamnotedthatthisdecisionwouldremoveallmanualoperatingcapabilitiesfromthepumps,meaningasuccessfulransomwareattackonthecontrolsystemcouldleavethepumpsinoperable,resultinginpotentialspillsandequipmentdamage.Theprojectownerelectedtoabsorbtheadditionalcostinordertoensurethepotentialformanualcontrolsintheeventofacyberattack.
PAGE|10
NationalCyber-InformedEngineeringStrategy
Today,engineersandindustrialcontrolsystemtechniciansbuildenergysystemswithspecificgoalsforsafety,reliability,andfunctionality.Whilesystemsengineeringincludesconsiderablesafetyandfailuremodeanalysis,cybersecurityrisksareoftennotspecificallyaddressed—particularlytherisksofintentionalcybercompromise,exploitation,andmisuse.Simplyput,traditionalengineeringriskmanagementapproachesrarelyaddresstherisksintroducedbyanintelligentandcapableadversarywiththegoalofhigh-consequencecyber-enabledimpacts.4
Asaresult,mostcybersecuritysolutionsareintroducedlateintheengineeringlifecycle,ifatall,providinginadequateandmorecostlyprotectionforthenation’senergyindustrialcontrolsystems(ICS).This
Introduction
Currently,cybersecurityformostcriticalinfrastructurecontrolsystemsisaddressedseparatelyfromsystemdesignandengineering.Thisgaphasresultedinanever-growinglistofadditivesecuritytechnologiesthatareintroducedafterthefacttomitigatecybervulnerabilities.Addingsecuritytechnologiesafterthefactismorecostlyandlesseffective.Whatifcriticalenergyinfrastructuresystemsweredesignedandoperatedwithcybersecuritybuiltin,ratherthanboltedonafterdeployment?CIEprovidesawaytogreatlyreduce,andinsomecaseseliminate,cyberrisksfromtheoutsetandincreaseoverallefficiencyandeffectiveness.
CIEisanemergingapproachthataimstointegratecybersecurityconsiderationsintotheconception,design,build,andoperationofanyphysicalsystemthathasdigitalconnectivity,monitoring,orcontrol.3CIEcanbebroadlydefinedas:Theinclusionofcybersecurityconsiderationsasafoundationalelementofengineeringriskmanagementforanyfunctionaidedbydigitaltechnology.
CIELinkagetoZeroTrustandSecurebyDesign
Cyber-informedengineeringembraces“securebydesign”and“zerotrust”softwaresecuritystrategies,andexpandstheseconceptsbeyondsoftwareengineeringtotheengineeringofcyber-physicalsystems.
Secure-by-designsoftwaredevelopmentshiftsthesecurityfocusfromfindingandpatchingvulnerabilitiestoeliminatingdesignflawsinthearchitectureofasoftwaresystem.CIEexpandsthisconcepttobuildsecurearchitecturesintophysicalinfrastructuresystemsthathavedigitalaccessorcontrol.
Azero-trustarchitectureremovesanyimplicittrustfromdevicesoruseraccounts,movingawayfromtheconceptofasecurityperimeterthatkeepsattackersout.CIEembodiesthisapproachbyassumingthatcompromiseislikely,anddeployingresilientlayereddefensesthatminimizetheconsequencespossiblewhenanassetorcredentialiscompromised.
CIErepresentstheDepartmentofEnergy’sstrategyforimplementingtheseapproachesintoenergyinfrastructure.
approachmissessignificantopportunitiesto“engineerout”cyberrisk—thatis,usingearlydesigndecisionsandengineeringcontrolstomitigateoreveneliminateavenuesforcyber-enabledattack,orreducetheconsequenceswhenanattackoccurs.CIEembracesmanycomplementarysecurityapproachestoday,suchas“zerotrust”and“securebydesign,”conceptuallyextendingthembeyondapplicationtosoftwaresystemstoincludeapplicationtocyber-physicalinfrastructure.
CIEproposesashiftinfocusinthewaythenation’sengineers,controlsystemtechnicians,manufacturers,andoperatorsapproachsecurityinenergysystemsdesign.Researchersbegantodefine
3SeemoreinformationonCIEat
/cie
.
4High-consequenceimpacts,achievedusingcybermeans,thatmaydisruptenergysectorfunctionsthatarecriticaltothenation.
PAGE|11
NationalCyber-InformedEngineeringStrategy
Theadoptionofdigitaltechnologyintocriticaloperationalandengineeringfunctionscanintroducevulnerabilitiesthatcouldcompromisetheavailability,integrity,trustworthiness,orauthenticityofthecomplexcontrolsystemsservingthosefunctions.Unlesscybersecurityrisksareexplicitlyconsideredwithincurrentapproachestohazardevaluation,6thesevulnerabilitiesarenottypicallycaptured,missingcriticalopportunitiestoreduceoreliminatethemduringengineeringanddesign.Theengineerswhooversee,invent,design,create,install,maintain,anddisposeofthesecomplexcyber-physicalsystemsmaylackthenecessaryrequirements,context,7education,practices,andtools(inorderofdescendingimportance)toidentify,understand,andmitigatetheserisks.Instead,engineersandthetechnicianswhosupportthemtoooftenrelyontheexternalapplicationofcybersecuritymeasuresbyspecializedpractitionerslateinthesystemimplementationlifecycle.Thiscurrentstate
theCIEapproachin2017.5intheinterveningyears,thefederalgovernmenthassupportedseveraleffortsthatreducecyberriskstothenationbyapplyingCIEprinciplestocriticalenergyinfrastructureandnewsystemdesigns.However,thereisnotyetamatureengineeringdisciplineforidentifyingandaddressingcybersecurityriskearlyinintheconceptanddesignphases.TherearealsofewcommonlyappliedstandardsorguidelinestoperformsystemsengineeringriskmanagementforICScybersecurityrisksthroughoutthesystemslifecycle.
CIEremainsapromisingapproachthatisnotyetwidelyknown,understood,orimplemented.ThisNationalCIEStrategyoffersanintegratedsetofrecommendationstobringabouttheawareness,education,andresourcestointegrateCIEasacommonpracticewithintheEnergySectorIndustrialBase.
DefiningtheProblem
Engineers—andthetechnicianswhosupporttheengineeringprocess—arecriticaltothedesign,implementation,andsecureoperationofcomplexenergyinfrastructureandcontrolsystems.Eveninthiscriticalrole,engineersoftenlacktraining,abodyofknowledge,andotherreinforcementofcybersecuritypracticestoeffectivelyaddresscyberthreatsinenergyinfrastructure.Giventhecurrentandincreasingcriticalityofdigitalcontrolsystemswithincriticalenergyinfrastructure,thisisaprioritygapthatmustbeaddressedbytheengineeringcommunityandthenation.
CurrentState
AlignmentofCIEwithIndustryStandardsandGuidelines
TheNationalCIEStrategywillinformtheevolutionandmaturationofindustrystandardsandguidelinestoalignwithCIEprinciplesandprovidemanufacturersandassetownerswithessentialtoolstodemonstratetheiradoptionofCIE.RecentguidanceshowsstrongalignmentwithCIE.AlignmentwithCIEcanbeanearlytargetforthestandardsspecificationactivitiesrecommendedintheDevelopmentpillar.ExamplesincludetheInternationalSocietyofAutomation(ISA)/InternationalElectrotechnicalCommission(IEC)62443seriesofstandards,theNationalInstituteofStandardsandTechnology(NIST)SP800-160guideline,andtheSAEInternationalG-32Cyber-PhysicalSystemsSecurityCommitteestandardswork.
5RobertS.Anderson,JacobBenjamin,VirginiaL.Wright,LuisQuinones,andJonathanPaz,Cyber-InformedEngineering,IdahoNationalLaboratory,2017.
doi:10.2172/1369373
.
6Suchas:failuremodeseffectsanalysis(FMEA),What-Ifanalysis,hazardandoperabilitystudy(HAZOP),faulttreeanalysis(FTA),andeventtreeanalysis(ETA).
7Contextreferstothebroaderenvironmentinwhich
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 玉米采購(gòu)合同
- 北京中醫(yī)藥大學(xué)《水工藝設(shè)備基礎(chǔ)》2023-2024學(xué)年第一學(xué)期期末試卷
- 2024年高頻接收模塊項(xiàng)目可行性研究報(bào)告
- 二零二五安徽氨水集中采購(gòu)與質(zhì)量認(rèn)證服務(wù)協(xié)議3篇
- 保潔服務(wù)合同個(gè)人
- 2025年度大型活動(dòng)安保服務(wù)外包詳細(xì)合同3篇
- 北京郵電大學(xué)世紀(jì)學(xué)院《房地產(chǎn)項(xiàng)目規(guī)劃》2023-2024學(xué)年第一學(xué)期期末試卷
- 二零二五年度二手車交易車輛檢測(cè)服務(wù)合同標(biāo)準(zhǔn)2篇
- 教師求職信合集15篇
- 教導(dǎo)主任的辭職報(bào)告集合六篇
- 2022年北京市密云區(qū)中考二模語(yǔ)文試題及參考答案
- 五態(tài)人格表單
- 部分預(yù)應(yīng)力混凝土A類梁課程設(shè)計(jì)
- 企業(yè)節(jié)前安全教育培訓(xùn)
- 小學(xué)體育知識(shí)樹(shù)PPT課件(帶內(nèi)容)
- 全球試驗(yàn)室儀器耗材國(guó)際品牌簡(jiǎn)介
- 鋼抱箍+工字鋼梁在蓋梁施工中的應(yīng)用
- 消防聯(lián)動(dòng)調(diào)試記錄(2)
- 追求“真實(shí)、樸實(shí)、扎實(shí)”的語(yǔ)文課堂
- 螺桿空壓機(jī)操作規(guī)程完整
- 702班素質(zhì)評(píng)價(jià)觀測(cè)學(xué)生填寫完成情況檢查
評(píng)論
0/150
提交評(píng)論