Abstract
Defense-in-Depth (DID) is a crucial concept for the cyber security of computer systems. The strategies for DID have been suggested in many researches. In this work, a DID strategy is proposed for smart service servers in more concrete manner. We tried to find out the special features in applying DID concept to nuclear industry cyber security. To do this, we assigned cyber security levels to a typical digital I&C system using the DID concept in nuclear industry cyber security. Based on the lessons learned from the security level assignment case study, we could set up a DID strategy for smart service servers. The main strategy for smart service server security is an n-tier and ‘thin’ server architecture which is based on the DID concept. This work is expected to be very useful in applying the concept of DID to smart service industry with respect to cyber security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wallance, E.G., Fleming, K.N., Buras, E.M.: Next Generation Nuclear Plant Defense-in-Depth Approach. Idaho National Laboratory (INL) (December 01, 2009)
Regulatory Guide 5.71, Cyber Security Programs for Nuclear Facilities, U.S. Nuclear Regulatory Commission (January 2010)
Gan, B., Brendlen, J.H.: Nuclear power plant digital instrumentation and control modifications. In: IEEE Conference Record Nuclear Science Symp. and Medical Imaging Conf., October 25-31, vol. 2 (1992)
ANSTO Replacement Research Reactor Project Safety Analysis Report Chapter 8 Instrumentation and Control (November 01, 2004)
Lui, J., Chan, M.: An Efficient Partitioning Algorithm for Distributed Virtual Environment Systems. IEEE Trans. on Parallel and Distributed System 13(2), 193–211 (2002)
Morllo, P., et al.: Improving the Performance of Distributed Virtual Environment Systems. IEEE Trans. on Parallel and Distributed System 16(7), 637–649 (2005)
Jordan, H., et al.: Dynamic Load Management for MMOGs in Distributed Environments. In: Proc. of the 7th ACM International Conference on Computing Frontiers, pp. 337–346 (2010)
Rynson, W., Lau, H.: Hybrid Load Balancing for Online Games. In: Proc. of the International Conference on Multimedia, pp. 100–103 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Son, H., Kim, S. (2012). Defense–in–Depth Strategy for Smart Service Sever Cyber Security. In: Kim, Th., Ko, Ds., Vasilakos, T., Stoica, A., Abawajy, J. (eds) Computer Applications for Communication, Networking, and Digital Contents. FGCN 2012. Communications in Computer and Information Science, vol 350. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35594-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-35594-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35593-6
Online ISBN: 978-3-642-35594-3
eBook Packages: Computer ScienceComputer Science (R0)