b'0 1 1 0 0 1 1 0 0 1 0 0 1 1 0 0 0 0 1 1 0 0 0 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 1 0 0 1 1 0 00 1 0 0 1 1 0 0 0 1 0 1 1 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 1 0 1 0 01 0 1 0 1 0 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 1 1 0 00 0 0 1 0 0 1 1 0 1 1 0 1 0 0 0 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 01 0 1 1 0 0 0 1 0 1 1 0 1 1 0 0 0 0 1 0 1 I N T E L L I G E N C E 1 1 0 1 0 1 1 0 0 0 1 0 1 1 0 M A C H I N E 0 1 0 11 0 1 0 1 0 0 0 1 L 0 1 0 1 1 0 1 0 0 0 1 1 0 0 1 1 0 0 D E F E N S E 0 1 1 1 1 0 1 0 0 0 L E A R N I N G 1 1 0 1 00 1 1 0 0 1 1 0 0 0 0 1 1 0 0 1 R E S I L I E N C E 1 0 1 0 0 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 1 1 0 1 0 0 0 1 1 0 0 10 1 1 0 0 1 C Y B E R S E C U R I T Y 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 S A F E T Y 1 1 0 1 0 0 1 1 0 0 1 1 0 1 00 1 1 0 0 1 1 0 0 1 0 1 0 CRITICAL FUNCTION0 1 0 0 0 0 1 1 0 1 0 0 1 1 0 0 0 00 1 1 0 0 0 1 1 0 0 0 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 10 1 0 0 1 1 0 0 0 1 0 1 1 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 1 0 11 0 1 0 1 0 0 0 1 0 1 1 0 1 0 1 ASSURANCE 0 0 1 1 0 1 0 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 1 1 0 01 0 1 0 0 0 0 1 1 1 0 0 0 1 10 0 0 1 0 0 1 1 0 1 1 0 1 0 0 0 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0INL applies digital engineering principles to build and maintain the cybersecurity of critical infrastructure functions. INL employs advanced infrastructure hardware, software, and system knowledge to manage network defense services and actively remediate unauthorized activities. Consequence-driven, Cyber-informed Engineering (CCE)Cyber defense IT architecture and design uses is a methodology focused on securing the nations criticalinformation technology (IT) automation and systems infrastructure systems. CCE begins with the assumptionintegration to design stronger cyber-defense that if a critical infrastructure system is targeted by a skilledinfrastructure. INL provides secure design and integration and determined adversary, the targeted network can andservices into cyber-physical testing ranges.will be penetrated. This think like the adversary approach provides critical infrastructure owners and operators a four- Cyber defense infrastructure research is conducted phase process for safeguarding their critical operations. with special focus on system innovation and resilience integration. This research informs cyber-defense Cyber-informed Engineering is a strategic initiativeinfrastructure design and strengthens testing capabilities.to integrate cybersecurity into engineering practices for critical infrastructure. INL leads in implementingCyber systems support is the process of designing systems the national strategy by developing engineering tools,and networks for testing and research findings. INL uses data standards and educational resources that prioritizewarehousing to manage and secure a high volume of cyber-cybersecurity in infrastructure design and operation. defense infrastructure information from many sources. Cyber-Informed Engineering Microgrid Analysis Tool (CIEMAT) can inform engineering CIEMAT and traditional cybersecurity mitigations to make microgrid site installation more resilient to the impact of cyberattacks.R E L A T E D I N L T O O L SCyber-Informed Engineering Battery Analysis Tool (CIEBAT) can inform engineering and traditional CIEBAT cybersecurity mitigations to make battery energy storage systems (BESS) more resilient to impact of cyberattacks from concept to operations.For more info, contact:
[email protected] Capabilities Catalog'