Abstract

We are living in a digital and information-driven age; hence need to retain information on virtually every aspect of our lives, nuclear information inclusive. Security in computer systems is strongly related to the notion of dependability. For such system to be reliable and secure in a nuclear facility, unauthorized logic changes must be prevented - confidentiality, field device inputs and outputs must remain immutable throughout their usable lifetime - integrity, and everything should remain in an operable state - availability. The dynamic and complex nature of cyber threats has made it a serious challenge to secure computer systems in nuclear facilities. Despite the adoption of varied cyber security services, policies, mechanisms, strategies and regulatory frameworks like confidentiality, integrity, availability, non-repudiation, encipherment, defence-in-depth, design basis threat, IAEA technical guidance documents such as: GS-R-1, GS-R-2, NSS13, NSS17, NST036, NST045, and NST047, IEEE standard 7-4.3.2-2010, NIST SP 800-53, NIST SP 800-82, NEI 08-09 and country-specific requirements such as: 10 CFR 73.54, 10 CFR 73.1, RG 5.71 (USNRC), KINS/RG-N08.22 (South Korea) respectively, the threats remain persistent. This paper is aimed at providing a regulatory perspective on nuclear cyber security, its relationship to nuclear safety and security, regulatory requirements and cyber security global best practice recommendations and strategies to prevent its occurrence. This is imperative as Nigeria prepares to join the league of countries with operational nuclear power plants and reactors by its approval and adoption of the nuclear power programme roadmap in 2007.

Highlights

  • In order to counter this growing threat, this paper examines the current nuclear cyber security landscape vis-a-vis national and international regulatory frameworks and standards and studies incidents and lessons learned with a view toward identifying critical gaps and making appropriate recommendations

  • Recommendation Provides a set of Recommendations on Physical recommended

  • The computers used in safety and safety-related systems must be very well protected from possible intrusions

Read more

Summary

Motivation

Hackers directly employed directly Cyber espionage an arm of a national government to penetrate commercial and/or government computer systems in other countries. In order to counter this growing threat, this paper examines the current nuclear cyber security landscape vis-a-vis national and international regulatory frameworks and standards and studies incidents and lessons learned with a view toward identifying critical gaps and making appropriate recommendations. This task was accomplished by adopting an open-source data gathering and analysis approach via International Atomic Energy Agency (IAEA) nuclear security and safety guidance documents and by examining country-specific cyber security standards and practices from five selected nuclear-powered nations namely: China, Germany, Russian Federation, South Africa and the United States.

Related Works
Regulatory framework
Regulations and guidance
Licensing
Associated regulatory activities
Cyber Security Education
Analysis of Model Frameworks and Standards
Summary
11. IAEA Computer Security Incident
13. Department of Homeland
19. Korea Institute of Nuclear
Cyber Security Regulatory Requirements for Nuclear Facilities
Global Best Practice Recommendations on Nuclear Cyber Security for Regulators
Implications for Research and Practices
VIII. Lessons Learned
Summary and Conclusion
Findings
Works Cited
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.