Abstract
We are living in a digital and information-driven age; hence need to retain information on virtually every aspect of our lives, nuclear information inclusive. Security in computer systems is strongly related to the notion of dependability. For such system to be reliable and secure in a nuclear facility, unauthorized logic changes must be prevented - confidentiality, field device inputs and outputs must remain immutable throughout their usable lifetime - integrity, and everything should remain in an operable state - availability. The dynamic and complex nature of cyber threats has made it a serious challenge to secure computer systems in nuclear facilities. Despite the adoption of varied cyber security services, policies, mechanisms, strategies and regulatory frameworks like confidentiality, integrity, availability, non-repudiation, encipherment, defence-in-depth, design basis threat, IAEA technical guidance documents such as: GS-R-1, GS-R-2, NSS13, NSS17, NST036, NST045, and NST047, IEEE standard 7-4.3.2-2010, NIST SP 800-53, NIST SP 800-82, NEI 08-09 and country-specific requirements such as: 10 CFR 73.54, 10 CFR 73.1, RG 5.71 (USNRC), KINS/RG-N08.22 (South Korea) respectively, the threats remain persistent. This paper is aimed at providing a regulatory perspective on nuclear cyber security, its relationship to nuclear safety and security, regulatory requirements and cyber security global best practice recommendations and strategies to prevent its occurrence. This is imperative as Nigeria prepares to join the league of countries with operational nuclear power plants and reactors by its approval and adoption of the nuclear power programme roadmap in 2007.
Highlights
In order to counter this growing threat, this paper examines the current nuclear cyber security landscape vis-a-vis national and international regulatory frameworks and standards and studies incidents and lessons learned with a view toward identifying critical gaps and making appropriate recommendations
Recommendation Provides a set of Recommendations on Physical recommended
The computers used in safety and safety-related systems must be very well protected from possible intrusions
Summary
Hackers directly employed directly Cyber espionage an arm of a national government to penetrate commercial and/or government computer systems in other countries. In order to counter this growing threat, this paper examines the current nuclear cyber security landscape vis-a-vis national and international regulatory frameworks and standards and studies incidents and lessons learned with a view toward identifying critical gaps and making appropriate recommendations. This task was accomplished by adopting an open-source data gathering and analysis approach via International Atomic Energy Agency (IAEA) nuclear security and safety guidance documents and by examining country-specific cyber security standards and practices from five selected nuclear-powered nations namely: China, Germany, Russian Federation, South Africa and the United States.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.