A graded approach to cyber security in a research reactor facility

被引:6
|
作者
Park, JaeKwan [1 ]
Park, JeYun [1 ]
Kim, YoungKi [1 ]
机构
[1] Korea Atom Energy Res Inst, Taejon, South Korea
关键词
Software project management; Computer-based safety systems; Cyber security; Security program;
D O I
10.1016/j.pnucene.2013.01.007
中图分类号
TL [原子能技术]; O571 [原子核物理学];
学科分类号
0827 ; 082701 ;
摘要
Recently, several accidents caused by cyber attacks on digital systems have been reported in the nuclear industry. To cope with such threats, regulatory agency and standardization organization have published several guidelines for nuclear power plants. However it is difficult to apply the requirements to research reactor facilities directly because the characteristics in terms of facility scale, purpose, and system design, are different from those of power plants. This paper suggests a graded approach to cyber security in a research reactor facility. It introduces cyber security activities for guarding digital systems of a reactor facility safely as a cyber security program based on the practices at a research reactor facility. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:81 / 87
页数:7
相关论文
共 50 条
  • [1] System lifecycle processes for cyber security in a research reactor facility
    PARK JaeKwan
    PARK JeYun
    KIM YoungKi
    ScienceChina(InformationSciences), 2014, 57 (07) : 247 - 258
  • [2] System lifecycle processes for cyber security in a research reactor facility
    Park, JaeKwan
    Park, JeYun
    Kim, YoungKi
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (07) : 1 - 12
  • [3] System lifecycle processes for cyber security in a research reactor facility
    JaeKwan Park
    JeYun Park
    YoungKi Kim
    Science China Information Sciences, 2014, 57 : 1 - 12
  • [4] HSL: a Cyber Security Research Facility for Sensitive Data Experiments
    Beck, Frederic
    Lahmadi, Abdelkader
    Francois, Jerome
    2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 956 - 961
  • [5] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [6] A bibliometric analysis of cyber security and cyber forensics research
    Sharma, Deepak
    Mittal, Ruchi
    Sekhar, Ravi
    Shah, Pritesh
    Renz, Matthias
    RESULTS IN CONTROL AND OPTIMIZATION, 2023, 10
  • [7] Development of cyber risk analysis framework for core computational system of TRIGA reactor using graded approach
    Vechgama, Wasin
    Dararutana, Chotika
    Pechrak, Anantachai
    Wetchagarun, Saensuk
    Sasawattakul, Watcha
    Silva, Kampanart
    ANNALS OF NUCLEAR ENERGY, 2024, 197
  • [8] An Ensemble approach to Big Data Security (Cyber Security)
    Hashmani, Manzoor Ahmed
    Jameel, Syed Muslim
    Ibrahim, Aidarus M.
    Zaffar, Maryam
    Raza, Kamran
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (09) : 75 - 77
  • [9] Cyber Security, a Threat to Cyber Banking in South Africa An approach to Network and application security
    Mbelli, Thierry Mbah
    Dwolatzky, Barry
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 1 - 6
  • [10] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (03): : 55 - 63