版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
PAGE|1
NationalCyber-InformedEngineeringStrategy
PAGE|2
NationalCyber-InformedEngineeringStrategy
NotefromtheSecretary
Intoday’sincreasinglyinterconnectedworld,America’ssafetyandwell-beingdependoncybersecurity.
That’swhyPresidentBidenconsidershardeningthenationagainstcyberattacksatoppriorityforhisadministration—andonethathasonlygrowninimportanceasthecountryembarksonthebiggestbuildoutofcriticalinfrastructureandmanufacturingcapacityinageneration.
Eachstageofthecleanenergytransformationthatwillbringwithitanopportunityandanimperativetofurtherincreasesecurity,reliability,andresilienceinAmerican’senergysector.TheCyber-InformedEngineering(CIE)Strategyshowsushowwecanseizetheopportunitytoaddressthesechallenges.
Thisframework,grownfromearlierCongressionaldirectionregardingthreatstothenation’senergysector,advocatesforanevolutionaryshiftacrosstheenergyindustryandrelatedinstitutions,includingresearchers,standardsbodies,Federalpartners,andothers.Itsrecommendationsreflectexpertiseandinsightfromenergycompanies,energysystemsandcybersecuritymanufacturers,standardsbodies,researchers,DOENationalLaboratories,andFederalpartnersinthecybersecurityandengineeringmissionspace.Itencouragestheadoptionofa“security-by-design”mindsetwithintheEnergySectorIndustrialBase,whichreferstobuildingcybersecurityintoourenergysystemsattheearliestpossiblestagesratherthantryingtosecurethesecriticalsystemsafterdeployment.ThankstoPresidentBiden’sBipartisanInfrastructureLaw,wecanmatchtheCIEframeworkwithnewinvestmentsincleanenergyinfrastructureandmanufacturingtobeginbuildingmoresecurecleanenergysystemshereathome.
CIEfurtherguidesourcyberworkforcedevelopmentbyhelpingusandourpartnersfocusonthestrategicintersectionbetweencybersecurityandengineering,addressinggapsinhowwetrainengineersandtechniciansandprovidingthemwiththemeanstobuildinsecurityfromthegroundup.Whenourworkforceisproperlyeducatedandsupported,wearebetterpositionedtomanufactureandmaintainthetoolsthathelpuspreventandquicklyrecoverfromcyberattacks.
Thisframeworkoffersusaclearpathforwardtothefutureofenergysecurity,inwhichAmericawillstandattheforefrontofglobalinnovationandcleanenergymanufacturing.FollowingtheCIEstrategywillhelpensurethatourgridisnotonlyresistanttoinitialattacks,butresilientenoughtopreventandmitigatedisruptionstoourenergysupplies,economy,andeverydaylives.
I’dliketooffermydeepgratitudeandappreciationfortheSecuringEnergyInfrastructureExecutiveTaskForce(SEIETF)whohelpedustakeacriticalstepforwardbyleadingthedevelopmentoftheCIEstrategy.Thework,however,continues.Itwilltakeclosecollaborationbetweengovernmentandindustrytoensureenergysystemsofthefuturearedesignedandbuiltforsecurityandreliability.Aswe
PAGE|3
NationalCyber-InformedEngineeringStrategy
pursueourtransitiontoacompletelycleanenergysector,wewillkeepsecurityandreliabilityfrontandcenter,andwillneedtostandshoulder-to-shoulderwithourinter-agencypartnersattheCybersecurityandInfrastructureSecurityAgency(CISA),NationalInstituteforStandardsandTechnology(NIST),andmoretoensurethisCIEstrategyisimplementedtoaddresscurrentandfuturethreatlandscapes.Together,wewillsecureourenergysectoranddeliverastronger,cleanerfuture.
JenniferGranholm
Secretary
U.S.DepartmentofEnergy
PAGE|4
NationalCyber-InformedEngineeringStrategy
NotefromtheDirector
TheU.S.energysectorfacesever-evolvingcybersecuritythreats.Accordingtothe2022OfficeoftheDirectorofNationalIntelligence(DNI)AnnualThreatAssessment1,ouradversariesmaintaincapabilitiestolaunchcyberattacksthatcoulddisruptcriticalinfrastructure,includingindustrialcontrolsystemsintheU.S.energysector.Cybersecurityattacksoncriticalinfrastructureareparticularlyconsequentialandensuringthesecurity,reliability,andresilienceofthesesystemsisatoppriorityfortheU.S.DepartmentofEnergy’s(DOE)OfficeofCybersecurity,EnergySecurity,andEmergencyResponse(CESER)anditspartnersingovernmentandtheprivatesector.
Thiswilltakeaconcerted,collaborativeeffortbetweengovernmentandindustrytoensureenergysystemsofthefuturearebuiltsecurelytoprovidereliableenergytothenation.Buildingenergysystemssecurelybydesignmeansensuringallphasesoftheenergysystemlifecycle–fromdesignanddevelopmenttoinstallationandoperation–aresecureandcanquicklyrecoverfromcyberattacks.Thenationnowhasanunprecedentedopportunitytoshapethecybersecurityofourmostcriticalinfrastructurefordecadestocome.
ThereleaseoftheCyber-InformedEngineering(CIE)supportsCESER’sfivepriorities.Thoseprioritiesinclude:1)Strengtheningthevisibilityofcyberthreatsinenergysystems;2)Addressingsupplychainrisks;3)Promotingsecurity-andresilience-by-design;4)BuildingcyberandresiliencecapacityintheprivatesectorandtheState,local,territorial,andtribalcommunities;and5)Beingpreparedtorespondinpartnershipwithourgovernmentandindustrypartnerswhenacyberincidentoccursintheenergysector.CIE,inmanyways,cutsacrossallthoseprioritiesthroughitsfivepillars:awareness,education,development,currentinfrastructure,andfutureinfrastructure.
CIEisanemergingframework,originatedbytheNationalLaboratoriesandadvancedbyDOE,tobuildcybersecurityintothenation’senergysystemsattheearliestpossiblestagesratherthantryingtosecurethesecriticalsystemsafterdeployment.CESERleadsDOE’seffortstoimplementCIEtoprotectcriticalenergyinfrastructureassetsandleveragesexpertiseofitsintra-agencypartners.Forexample,CESERworkscloselywithofficesacrosstheDepartmentsuchastheOfficeofEnergyEfficiencyandRenewableEnergy,theOfficeofElectricity,theOfficeofIntelligenceandCounterintelligence,andotherstoensurecybersecurityisbuiltintoenergysystemsoftodayandintothefuture.
Asapowersystemsengineer,Iknowhowcriticalitistoensurethatcybersecurityisbuiltintostandardsusedtodesignenergysystemsofthefuture.Tothatend,wewillneedpartnerswithstandardsbodiessuchastheInstituteofElectricalandElectronicsEngineers(IEEE)andtheInternationalElectrotechnical
1OfficeoftheDirectorofNationalIntelligence,AnnualThreatAssessmentoftheU.S.IntelligenceCommunity(April2022),4-24.
/files/ODNI/documents/assessments/ATA-2022-Unclassified-Report.pdf
.
PAGE|5
NationalCyber-InformedEngineeringStrategy
Commission,educatorsandresearchersinacademia,andmanyotherstohelpuschampiontheCIEprinciples.Weneedtoensurethatcybersecurityissynonymouswithreliabilityandsafetyinstandardsdevelopmentworkinggroupsandinthehallwaysofengineeringcollegestoensurewearesuccessful.Wecanaccomplishmuchmorewhenwetackletheseissuescollaboratively.
Further,whileDOEisleadingthiseffortfromanenergyindustryperspective,theoverallapproachwillrequireclosecollaborationandsignificantworkwithitsinter-agencypartnersattheCybersecurityandInfrastructureSecurityAgency(CISA),NationalInstituteforStandardsandTechnology(NIST),andotherstoensuretheCIErecommendationshereinareimplementedacrossthecountrytoaddressthecurrentandfuturethreatlandscapes.
IextendmythankstotheSecuringEnergyInfrastructureExecutiveTaskForceandIdahoNationalLaboratorywhowereinstrumentalinthedevelopmentofthestrategy.TherecommendationshereinreflecttheexpertiseofEnergySectorIndustrialBase(ESIB)stakeholderscomprisedofenergycompanies,manufacturers,standardsbodies,researchers,DOENationalLaboratories,andFederalpartnersinthecybersecurityandengineeringmissionspace.
PueshKumar
Director
OfficeofCybersecurity,EnergySecurity,andEmergencyResponse(CESER)
U.S.DepartmentofEnergy
PAGE|6
NationalCyber-InformedEngineeringStrategy
TABLEOFCONTENTS
NOTEFROMTHESECRETARY 2
NOTEFROMTHEDIRECTOR 4
EXECUTIVESUMMARY 7
CIEInPractice:ExamplesofEngineeringDecisionsInformedbyCyberRisks 9
INTRODUCTION 10
DefiningtheProblem 11
PrinciplesofCIE 12
KEYPREMISESOFTHENATIONALCIESTRATEGY 15
STRATEGICPILLARSANDRECOMMENDEDACTIONS 16
THECIESTRATEGYASAMODELFOROTHERCRITICALINFRASTRUCTURESECTORS 31
NEXTSTEPS 32
APPENDIXA:SECURINGENERGYINFRASTRUCTUREEXECUTIVETASKFORCEPARTICIPANTS 33
SeniorExecutiveGroup 33
SeniorTechnicalGroup 34
TechnicalProjectTeam:NationalCIEStrategy 35
APPENDIXB:EXAMPLESOFCIEIMPLEMENTATION 36
Consequence-drivenCyber-informedEngineering(CCE) 36
IntegratingCIEintoNuclearMicroreactorDesign 37
CybersecurityfortheOperationalTechnologyEnvironment(CyOTE?) 37
CIEinEducation 37
PAGE|7
NationalCyber-InformedEngineeringStrategy
Cyber-informedengineering(CIE)offersanopportunityto“engineerout”somecyberriskacrosstheentiredeviceorsystemlifecycle,startingfromtheearliestpossiblephaseofdesign—themostoptimaltimetointroducebothlowcostandeffectivecybersecurityapproaches.
CIEisanemergingmethodtointegratecybersecurityconsiderationsintotheconception,design,development,andoperationofanyphysicalsystemthathasdigitalconnectivity,monitoring,orcontrol.CIEapproachesusedesigndecisionsandengineeringcontrolstomitigateoreveneliminateavenuesforcyber-enabledattack,orreducetheconsequenceswhenanattackoccurs.
ExecutiveSummary
ThePersistentCybersecurityChallenge
Theindustrialcontrolsystemsthatoperatecriticalenergyinfrastructurefaceincreasinglysevereandsophisticatedcyberattacksfromdeterminedadversaries.Toavoiddisruptionstothenation’scriticalenergyfunctions,energysystemsmustbeengineeredtowithstandintentionalcybercompromise,exploitation,andmisuse.
Whiletraditionalengineeringincludesconsiderablesafetyandfailuremodeanalysis,theseriskmanagementapproachesrarelyaddresstherisksintroducedbyanintelligentandcapableadversarywiththegoalofdenying,disrupting,ordestroyingacriticalfunctionusingcybermeans.Mostcybersecuritysolutionsare“boltedon”lateintheengineeringlifecycle,ratherthanintrinsicallybuiltintothesystemdesign.
TheOpportunityofCyber-InformedEngineering
NationalCIEStrategyDirective
EnactedintolawonDecember20,2019,Section5726oftheNationalDefenseAuthorizationActforFiscalYear2020directedtheSecretaryofEnergytoestablishagovernment-industryworkinggrouptoaccomplishaseriesoftasks,includingtodevelopanationalcyber-informedengineeringstrategytoisolateanddefendenergyinfrastructurefromsecurityvulnerabilitiesandexploitsinthemostcriticalsystems.TheSecuringEnergyInfrastructureExecutiveTaskForcedevelopedthisNationalCIEStrategyforadoptionbytheDepartmentofEnergy.
Whilespecializedinformationtechnology(IT)andoperationaltechnology(OT)cybersecurityexpertsbringstrongcybersecuritycapabilitiestosecuringtoday’senergysystems,manyoftheengineersandtechnicianswhodesignandoperatetheseenergysystemscurrentlylacksufficientcybersecurityeducationandtrainingtoengineersystemsforcybersecurityfromtheoutset,inthesamewaytheyengineerthesesystemsforsafety.
ANationalCIEStrategyforEnergy
Pursuanttocongressionaldirection,2theU.S.DepartmentofEnergyandtheSecuringEnergyInfrastructureExecutiveTaskForcehavedevelopedastrategytoenabletheenergysectortoleadthenationinincorporatingCIEintothedesignandoperationofinfrastructuresystemsthatrelyondigitalmonitoringorcontrols.
2Section5726oftheNationalDefenseAuthorizationActforFiscalYear2020.
PAGE|8
NationalCyber-InformedEngineeringStrategy
TheNationalCIEStrategyisbuiltonfiveintegratedpillars(see
Figure1)
,offeringasetofrecommendationstoincorporateCIEasacommonpracticeacrosstheenergysector.Together,theseapproachesprovidethebodyofknowledge,thediverseandexpandedworkforce,andtheengineeringandmanufacturingcapacitytoapplyCIEtotoday’senergyinfrastructure,andtoengineerfutureenergysystemstoeliminateorreducetheabilityofacyber-enabledattacktosucceed.
Figure1.NationalCyber-InformedEngineeringStrategy
CIEprovidesthebasisandapproachforinstitutingacultureofcybersecuritywithintheenergyindustry,akintotheindustry’sstrongcultureofsafety.Leadingthisculturalshiftwillbetheengineers,industrialcontrolsystemtechnicians,cybersecurityprofessionals,manufacturers,andownersandoperatorsintheEnergySectorIndustrialBase.TheNationalCIEStrategypillarsprovideastrong,integratedfoundationtoacceleratethisculturalshift.ThenextstepinmovingCIEforwardwillbetoconveneabroadsetofstakeholderstodevelopdetailedimplementationplansforeachpillarofthestrategy.
WhilethisNationalCyber-InformedEngineeringStrategyhasbeendevelopedfortheenergysector,itcanserveasaleverageablemodelforothercriticalinfrastructuresectorstoadoptandincorporateCIEintoindustrypractices.CIEconceptsandstrategiesincludefoundationalengineeringprinciplesthatapplytoalltypesofengineeringforcriticalinfrastructure.EmbeddingCIEmethodsintotheeducationandcredentialingofthenation’snextgenerationofengineersandindustrialcontrolsystemtechnicianswillcreateacyber-awareworkforcethatcandesignandmanufactureresilientinfrastructuresystemsacrosssectors.
PAGE|9
NationalCyber-InformedEngineeringStrategy
CIEInPractice:ExamplesofEngineeringDecisionsInformedbyCyberRisks
CIEguidesanengineeringteamtoconsiderandmitigatethepotentialforcybercompromisethroughouttheengineeringdesignlifecycle,leveragingengineeringsolutionstolimitthepathwaysforcybersabotage,exploitation,theft,andmisusewithinthesystem.
InafullymatureCIEdesign,requirementswouldbedevelopedtodescribenotonlyexpectationsforhowthesystemwouldfunction,butalsospecifichigh-consequencecyberimpactswhichmustbepreventedwithinthesystemdesign.Duringthedesignprocess,theteamwouldmakeaffirmativedecisionsabouthowtobestaccomplishthoserequirements,whetherbyenactingmanualengineeringcontrols,limitingdigitalfunctionality,employingoperationalcybersecuritysolutions,orenactingmonitoringschemes,orcombinationsofalltheabove.Theriskofafuturecybercompromisewouldbetrackedanddiminishedasafundamentalengineeringrisk.
Whatdoesthismeanintoday’spractice?ThefollowinghypotheticalscenarioshighlightthetypesofdesignchangesandengineeringdecisionsthatcouldresultfromapplyingCIEduringthedesignandbuildprocess:
?A60-percentdesignreviewofagreenfieldwatertreatmentplantrevealsthatthedesignengineerreplacedthemanualhand-off-autoswitches—whichallowoperationsstafftoruntheplantmanually—withanetwork-basedcommunicationdevicewithoutmanualoverrides.Theteamelectstoundothismodification,justifyingthehighercostofconstructionwiththebenefitofassuredmanualcontrolsintheeventofacybercompromise.
?Adesignteamnotesthatthevibrationtripsensorforagasturbineisaddressableonthesameoperationaltechnologynetworkwiththeturbine,andthus,couldbecompromisedalongwiththeturbinebyanadversarywhogainsaccesstothenetwork.Becausethissensorisasafetyfeaturefortheturbine,theteamchoosestodeployitonanisolatednetwork—sothatitismoreinaccessibletocyberadversaries—andtoemployahigherlevelofsecuritycontrols,includingamonitoringsystem,toheightenawarenessofnetworkanomaliesaffectingthesensor.
?Acyberexerciserevealsthepotentialforadigitalcontrollertobeusedtosupplyaharmfulamountoftreatmentchemicalsintoaprocess,potentiallycausingdamagetoplantequipment.Theengineeringteamisunabletoremovethecontrollerfromserviceortoenactmanualoverrides,sotheychoosetoadoptanengineeringcontrollimitingthechemicalavailabletotheprocesstoanamountbelowtheharmfullevel.ThiscontrolisenactedthroughphysicalchangestothedispensingtankanddocumentedintheStandardOperatingProcedures.
?Duringthevalueengineeringprocessforawastewatertreatmentplantcontrolsystem,thedesignteamdecidedtosavemoneybyremovingredundanthardwiredcontrolsandreplacingthemwithdigitalinput/outputsfromtheindustrialcontroller.Duringareview,theengineeringteamnotedthatthisdecisionwouldremoveallmanualoperatingcapabilitiesfromthepumps,meaningasuccessfulransomwareattackonthecontrolsystemcouldleavethepumpsinoperable,resultinginpotentialspillsandequipmentdamage.Theprojectownerelectedtoabsorbtheadditionalcostinordertoensurethepotentialformanualcontrolsintheeventofacyberattack.
PAGE|10
NationalCyber-InformedEngineeringStrategy
Today,engineersandindustrialcontrolsystemtechniciansbuildenergysystemswithspecificgoalsforsafety,reliability,andfunctionality.Whilesystemsengineeringincludesconsiderablesafetyandfailuremodeanalysis,cybersecurityrisksareoftennotspecificallyaddressed—particularlytherisksofintentionalcybercompromise,exploitation,andmisuse.Simplyput,traditionalengineeringriskmanagementapproachesrarelyaddresstherisksintroducedbyanintelligentandcapableadversarywiththegoalofhigh-consequencecyber-enabledimpacts.4
Asaresult,mostcybersecuritysolutionsareintroducedlateintheengineeringlifecycle,ifatall,providinginadequateandmorecostlyprotectionforthenation’senergyindustrialcontrolsystems(ICS).This
Introduction
Currently,cybersecurityformostcriticalinfrastructurecontrolsystemsisaddressedseparatelyfromsystemdesignandengineering.Thisgaphasresultedinanever-growinglistofadditivesecuritytechnologiesthatareintroducedafterthefacttomitigatecybervulnerabilities.Addingsecuritytechnologiesafterthefactismorecostlyandlesseffective.Whatifcriticalenergyinfrastructuresystemsweredesignedandoperatedwithcybersecuritybuiltin,ratherthanboltedonafterdeployment?CIEprovidesawaytogreatlyreduce,andinsomecaseseliminate,cyberrisksfromtheoutsetandincreaseoverallefficiencyandeffectiveness.
CIEisanemergingapproachthataimstointegratecybersecurityconsiderationsintotheconception,design,build,andoperationofanyphysicalsystemthathasdigitalconnectivity,monitoring,orcontrol.3CIEcanbebroadlydefinedas:Theinclusionofcybersecurityconsiderationsasafoundationalelementofengineeringriskmanagementforanyfunctionaidedbydigitaltechnology.
CIELinkagetoZeroTrustandSecurebyDesign
Cyber-informedengineeringembraces“securebydesign”and“zerotrust”softwaresecuritystrategies,andexpandstheseconceptsbeyondsoftwareengineeringtotheengineeringofcyber-physicalsystems.
Secure-by-designsoftwaredevelopmentshiftsthesecurityfocusfromfindingandpatchingvulnerabilitiestoeliminatingdesignflawsinthearchitectureofasoftwaresystem.CIEexpandsthisconcepttobuildsecurearchitecturesintophysicalinfrastructuresystemsthathavedigitalaccessorcontrol.
Azero-trustarchitectureremovesanyimplicittrustfromdevicesoruseraccounts,movingawayfromtheconceptofasecurityperimeterthatkeepsattackersout.CIEembodiesthisapproachbyassumingthatcompromiseislikely,anddeployingresilientlayereddefensesthatminimizetheconsequencespossiblewhenanassetorcredentialiscompromised.
CIErepresentstheDepartmentofEnergy’sstrategyforimplementingtheseapproachesintoenergyinfrastructure.
approachmissessignificantopportunitiesto“engineerout”cyberrisk—thatis,usingearlydesigndecisionsandengineeringcontrolstomitigateoreveneliminateavenuesforcyber-enabledattack,orreducetheconsequenceswhenanattackoccurs.CIEembracesmanycomplementarysecurityapproachestoday,suchas“zerotrust”and“securebydesign,”conceptuallyextendingthembeyondapplicationtosoftwaresystemstoincludeapplicationtocyber-physicalinfrastructure.
CIEproposesashiftinfocusinthewaythenation’sengineers,controlsystemtechnicians,manufacturers,andoperatorsapproachsecurityinenergysystemsdesign.Researchersbegantodefine
3SeemoreinformationonCIEat
/cie
.
4High-consequenceimpacts,achievedusingcybermeans,thatmaydisruptenergysectorfunctionsthatarecriticaltothenation.
PAGE|11
NationalCyber-InformedEngineeringStrategy
Theadoptionofdigitaltechnologyintocriticaloperationalandengineeringfunctionscanintroducevulnerabilitiesthatcouldcompromisetheavailability,integrity,trustworthiness,orauthenticityofthecomplexcontrolsystemsservingthosefunctions.Unlesscybersecurityrisksareexplicitlyconsideredwithincurrentapproachestohazardevaluation,6thesevulnerabilitiesarenottypicallycaptured,missingcriticalopportunitiestoreduceoreliminatethemduringengineeringanddesign.Theengineerswhooversee,invent,design,create,install,maintain,anddisposeofthesecomplexcyber-physicalsystemsmaylackthenecessaryrequirements,context,7education,practices,andtools(inorderofdescendingimportance)toidentify,understand,andmitigatetheserisks.Instead,engineersandthetechnicianswhosupportthemtoooftenrelyontheexternalapplicationofcybersecuritymeasuresbyspecializedpractitionerslateinthesystemimplementationlifecycle.Thiscurrentstate
theCIEapproachin2017.5intheinterveningyears,thefederalgovernmenthassupportedseveraleffortsthatreducecyberriskstothenationbyapplyingCIEprinciplestocriticalenergyinfrastructureandnewsystemdesigns.However,thereisnotyetamatureengineeringdisciplineforidentifyingandaddressingcybersecurityriskearlyinintheconceptanddesignphases.TherearealsofewcommonlyappliedstandardsorguidelinestoperformsystemsengineeringriskmanagementforICScybersecurityrisksthroughoutthesystemslifecycle.
CIEremainsapromisingapproachthatisnotyetwidelyknown,understood,orimplemented.ThisNationalCIEStrategyoffersanintegratedsetofrecommendationstobringabouttheawareness,education,andresourcestointegrateCIEasacommonpracticewithintheEnergySectorIndustrialBase.
DefiningtheProblem
Engineers—andthetechnicianswhosupporttheengineeringprocess—arecriticaltothedesign,implementation,andsecureoperationofcomplexenergyinfrastructureandcontrolsystems.Eveninthiscriticalrole,engineersoftenlacktraining,abodyofknowledge,andotherreinforcementofcybersecuritypracticestoeffectivelyaddresscyberthreatsinenergyinfrastructure.Giventhecurrentandincreasingcriticalityofdigitalcontrolsystemswithincriticalenergyinfrastructure,thisisaprioritygapthatmustbeaddressedbytheengineeringcommunityandthenation.
CurrentState
AlignmentofCIEwithIndustryStandardsandGuidelines
TheNationalCIEStrategywillinformtheevolutionandmaturationofindustrystandardsandguidelinestoalignwithCIEprinciplesandprovidemanufacturersandassetownerswithessentialtoolstodemonstratetheiradoptionofCIE.RecentguidanceshowsstrongalignmentwithCIE.AlignmentwithCIEcanbeanearlytargetforthestandardsspecificationactivitiesrecommendedintheDevelopmentpillar.ExamplesincludetheInternationalSocietyofAutomation(ISA)/InternationalElectrotechnicalCommission(IEC)62443seriesofstandards,theNationalInstituteofStandardsandTechnology(NIST)SP800-160guideline,andtheSAEInternationalG-32Cyber-PhysicalSystemsSecurityCommitteestandardswork.
5RobertS.Anderson,JacobBenjamin,VirginiaL.Wright,LuisQuinones,andJonathanPaz,Cyber-InformedEngineering,IdahoNationalLaboratory,2017.
doi:10.2172/1369373
.
6Suchas:failuremodeseffectsanalysis(FMEA),What-Ifanalysis,hazardandoperabilitystudy(HAZOP),faulttreeanalysis(FTA),andeventtreeanalysis(ETA).
7Contextreferstothebroaderenvironmentinwhich
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年度房地產(chǎn)項(xiàng)目債權(quán)債務(wù)擔(dān)保協(xié)議書(shū)范本3篇
- 2024年碎石供應(yīng)專(zhuān)項(xiàng)協(xié)議范本版B版
- 瑜伽課程設(shè)計(jì)思路
- 2024年標(biāo)準(zhǔn)荒山開(kāi)發(fā)承包協(xié)議樣本版
- 2024年員工職務(wù)作品知識(shí)產(chǎn)權(quán)歸屬、保密及競(jìng)業(yè)限制合同6篇
- 粘球游戲主題課程設(shè)計(jì)
- 2024年版商業(yè)樓現(xiàn)澆樓板建設(shè)合同3篇
- 整形醫(yī)院銷(xiāo)售課課程設(shè)計(jì)
- 2024女方離婚贍養(yǎng)協(xié)議書(shū)范本及解讀3篇
- 2024年大棚設(shè)施購(gòu)置與農(nóng)業(yè)產(chǎn)業(yè)鏈整合合作協(xié)議3篇
- 2ttk7d6.0gd空調(diào)裝置使用維護(hù)說(shuō)明書(shū)法補(bǔ)充
- 重大火災(zāi)隱患判定培訓(xùn)課件
- 經(jīng)濟(jì)思想史課后習(xí)題答案
- 大學(xué)生就業(yè)與創(chuàng)業(yè)指導(dǎo)課件
- 如何理解歐盟MDR臨床評(píng)價(jià)要求
- (新平臺(tái))國(guó)家開(kāi)放大學(xué)《政治學(xué)原理》形考任務(wù)1-4參考答案
- 被動(dòng)用法學(xué)習(xí)課件 高中日語(yǔ)人教版第三冊(cè)
- 清華大學(xué)電力系統(tǒng)分析課件孫宏斌
- 高考地理一輪復(fù)習(xí)-人類(lèi)活動(dòng)與地表形態(tài)(共25張)課件
- 德能勤績(jī)廉量化考核表格范例
- 互聯(lián)網(wǎng)+大賽創(chuàng)新創(chuàng)業(yè)路演PPT課件(帶內(nèi)容)
評(píng)論
0/150
提交評(píng)論