Computer Security Incident Response Planning at Nuclear Facilities

Computer Security Incident Response Planning at Nuclear Facilities
Title Computer Security Incident Response Planning at Nuclear Facilities PDF eBook
Author International Atomic Energy Agency
Publisher
Pages 0
Release 2016
Genre Technology & Engineering
ISBN 9789201044167

Download Computer Security Incident Response Planning at Nuclear Facilities Book in PDF, Epub and Kindle

The purpose of this publication is to assist member states in developing comprehensive contingency plans for computer security incidents with the potential to impact nuclear security and/or nuclear safety. It provides an outline and recommendations for establishing a computer security incident response capability as part of a computer security programme.

Cyber Security at Civil Nuclear Facilities

Cyber Security at Civil Nuclear Facilities
Title Cyber Security at Civil Nuclear Facilities PDF eBook
Author Caroline Baylon
Publisher Chatham House (Formerly Riia)
Pages 0
Release 2016-02
Genre Computer networks
ISBN 9781784130794

Download Cyber Security at Civil Nuclear Facilities Book in PDF, Epub and Kindle

"The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing use of commercial 'off-the-shelf' software, according to a new Chatham House report." --

Conducting Computer Security Assessments at Nuclear Facilities

Conducting Computer Security Assessments at Nuclear Facilities
Title Conducting Computer Security Assessments at Nuclear Facilities PDF eBook
Author International Atomic Energy Agency
Publisher
Pages 0
Release 2016
Genre Technology & Engineering
ISBN 9789201046161

Download Conducting Computer Security Assessments at Nuclear Facilities Book in PDF, Epub and Kindle

Computer security is increasingly recognized as a key component in nuclear security. This publication outlines a methodology for conducting computer security assessments at nuclear facilities. The methodology can likewise be easily adapted to provide assessments at facilities with other radioactive materials.

Computer Security Techniques for Nuclear Facilities

Computer Security Techniques for Nuclear Facilities
Title Computer Security Techniques for Nuclear Facilities PDF eBook
Author IAEA
Publisher International Atomic Energy Agency
Pages 152
Release 2021-10-06
Genre Technology & Engineering
ISBN 9201237200

Download Computer Security Techniques for Nuclear Facilities Book in PDF, Epub and Kindle

This revision provides guidance on how to establish or improve, develop, implement, maintain, and sustain computer security within nuclear facilities. This publication addresses the use of risk informed approaches to establish and enhance computer security policies, programmes; it describes the integration of computer security into the management system of a facility; establishes a systematic approach to identifying facility functions and appropriate computer security measures that protect sensitive digital assets and the facility from the consequence of cyber-attacks consistent with the threat assessment or design basis threat.

Computer Security of Instrumentation and Control Systems at Nuclear Facilities

Computer Security of Instrumentation and Control Systems at Nuclear Facilities
Title Computer Security of Instrumentation and Control Systems at Nuclear Facilities PDF eBook
Author International Atomic Energy Agency
Publisher
Pages 0
Release 2018
Genre Technology & Engineering
ISBN 9789201031174

Download Computer Security of Instrumentation and Control Systems at Nuclear Facilities Book in PDF, Epub and Kindle

Computer security as a discipline is challenged by increasing threat vectors targeting a dynamic technological environment. This publication establishes guidance addressing the challenge of applying computer security measures to instrumentation and control (I&C) systems at nuclear facilities. The measures are intended to protect these I&C systems throughout their entire lifecycles against malicious acts perpetrated by threat actors. The technical basis and methodologies for the application of these computer security measures are considered. The publication also addresses the application of such measures to the development, simulation and maintenance environments of the I&C systems. In addition, account is taken of developments in the human factors engineering and nuclear safety. This Technical Guidance references and takes into account other Safety Guides and IAQEA Nuclear Security Series publications that provide guidance relating to I&C design.

Computer Security Incident Response Planning at Nuclear Facilities (Spanish Edition)

Computer Security Incident Response Planning at Nuclear Facilities (Spanish Edition)
Title Computer Security Incident Response Planning at Nuclear Facilities (Spanish Edition) PDF eBook
Author IAEA
Publisher
Pages 0
Release 2018-06-30
Genre Computer networks
ISBN 9789203067171

Download Computer Security Incident Response Planning at Nuclear Facilities (Spanish Edition) Book in PDF, Epub and Kindle

This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

Cyber-Security Threats and Response Models in Nuclear Power Plants

Cyber-Security Threats and Response Models in Nuclear Power Plants
Title Cyber-Security Threats and Response Models in Nuclear Power Plants PDF eBook
Author Carol Smidts
Publisher Springer Nature
Pages 100
Release 2022-10-10
Genre Computers
ISBN 3031127110

Download Cyber-Security Threats and Response Models in Nuclear Power Plants Book in PDF, Epub and Kindle

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.