Skip to main content

Defense–in–Depth Strategy for Smart Service Sever Cyber Security

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 350))

Abstract

Defense-in-Depth (DID) is a crucial concept for the cyber security of computer systems. The strategies for DID have been suggested in many researches. In this work, a DID strategy is proposed for smart service servers in more concrete manner. We tried to find out the special features in applying DID concept to nuclear industry cyber security. To do this, we assigned cyber security levels to a typical digital I&C system using the DID concept in nuclear industry cyber security. Based on the lessons learned from the security level assignment case study, we could set up a DID strategy for smart service servers. The main strategy for smart service server security is an n-tier and ‘thin’ server architecture which is based on the DID concept. This work is expected to be very useful in applying the concept of DID to smart service industry with respect to cyber security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wallance, E.G., Fleming, K.N., Buras, E.M.: Next Generation Nuclear Plant Defense-in-Depth Approach. Idaho National Laboratory (INL) (December 01, 2009)

    Google Scholar 

  2. Regulatory Guide 5.71, Cyber Security Programs for Nuclear Facilities, U.S. Nuclear Regulatory Commission (January 2010)

    Google Scholar 

  3. Gan, B., Brendlen, J.H.: Nuclear power plant digital instrumentation and control modifications. In: IEEE Conference Record Nuclear Science Symp. and Medical Imaging Conf., October 25-31, vol. 2 (1992)

    Google Scholar 

  4. ANSTO Replacement Research Reactor Project Safety Analysis Report Chapter 8 Instrumentation and Control (November 01, 2004)

    Google Scholar 

  5. Lui, J., Chan, M.: An Efficient Partitioning Algorithm for Distributed Virtual Environment Systems. IEEE Trans. on Parallel and Distributed System 13(2), 193–211 (2002)

    Article  Google Scholar 

  6. Morllo, P., et al.: Improving the Performance of Distributed Virtual Environment Systems. IEEE Trans. on Parallel and Distributed System 16(7), 637–649 (2005)

    Article  Google Scholar 

  7. Jordan, H., et al.: Dynamic Load Management for MMOGs in Distributed Environments. In: Proc. of the 7th ACM International Conference on Computing Frontiers, pp. 337–346 (2010)

    Google Scholar 

  8. Rynson, W., Lau, H.: Hybrid Load Balancing for Online Games. In: Proc. of the International Conference on Multimedia, pp. 100–103 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Son, H., Kim, S. (2012). Defense–in–Depth Strategy for Smart Service Sever Cyber Security. In: Kim, Th., Ko, Ds., Vasilakos, T., Stoica, A., Abawajy, J. (eds) Computer Applications for Communication, Networking, and Digital Contents. FGCN 2012. Communications in Computer and Information Science, vol 350. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35594-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35594-3_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35593-6

  • Online ISBN: 978-3-642-35594-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics