监管视角下的核网络安全:根本问题

Q4 Social Sciences
U. Arinze, O. Longe, Agozie Eneh
{"title":"监管视角下的核网络安全:根本问题","authors":"U. Arinze, O. Longe, Agozie Eneh","doi":"10.7290/ijns060103","DOIUrl":null,"url":null,"abstract":"We are living in a digital and information-driven age and need to store information related to virtually every aspect of our lives, nuclear information included. For computer system to be reliable and secure in nuclear facilities, unauthorized event changes must be prevented (which means maintaining confidentiality), field device inputs and outputs must remain immutable throughout their usable lifetime (which means maintaining integrity), and all component parts should remain in an operable state (which means maintaining availability).The dynamic and complex nature of cyber threats has made it a serious challenge to secure computer systems in nuclear facilities. A number of varied cyber security services, policies, mechanisms, strategies and regulatory frameworks have been adopted , including: confidentiality, integrity, availability, non-repudiation, encipherment, defense-in-depth (DID), design basis threat (DBT), IAEA technical guidance documents such as: GS-R-1, GS-R-2, GS-R-3, GS-G-3.13.5, NSS20, NSS23-G, NSS13, NSS17, NST036, NST045, and NST047, IEEE standard 7-4.3.2-2010, NIST SP 800-53, NIST SP 800-82, NEI 04-04, NEI 08-09 and country-specific requirements such as: 10 CFR 73.54, RG 5.71 (U.S.NRC), KINS/RG-N08.22 (South Korea). However, threats remain persistent. This paper is aimed at providing a regulatory perspective on nuclear cyber security, its relationship to nuclear safety and security, regulatory requirements and global best practice recommendations for nuclear cyber security, and strategies to prevent and counteract threats. This study is imperative as Nigeria prepares to join the league of countries with operational nuclear power plants and research reactors 1 Arinze et al.: Regulatory Perspective on Nuclear Cyber Security: The Fundamental Issues","PeriodicalId":36043,"journal":{"name":"International Journal of Nuclear Security","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Regulatory Perspective on Nuclear Cyber Security: The Fundamental Issues\",\"authors\":\"U. Arinze, O. Longe, Agozie Eneh\",\"doi\":\"10.7290/ijns060103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We are living in a digital and information-driven age and need to store information related to virtually every aspect of our lives, nuclear information included. For computer system to be reliable and secure in nuclear facilities, unauthorized event changes must be prevented (which means maintaining confidentiality), field device inputs and outputs must remain immutable throughout their usable lifetime (which means maintaining integrity), and all component parts should remain in an operable state (which means maintaining availability).The dynamic and complex nature of cyber threats has made it a serious challenge to secure computer systems in nuclear facilities. A number of varied cyber security services, policies, mechanisms, strategies and regulatory frameworks have been adopted , including: confidentiality, integrity, availability, non-repudiation, encipherment, defense-in-depth (DID), design basis threat (DBT), IAEA technical guidance documents such as: GS-R-1, GS-R-2, GS-R-3, GS-G-3.13.5, NSS20, NSS23-G, NSS13, NSS17, NST036, NST045, and NST047, IEEE standard 7-4.3.2-2010, NIST SP 800-53, NIST SP 800-82, NEI 04-04, NEI 08-09 and country-specific requirements such as: 10 CFR 73.54, RG 5.71 (U.S.NRC), KINS/RG-N08.22 (South Korea). However, threats remain persistent. This paper is aimed at providing a regulatory perspective on nuclear cyber security, its relationship to nuclear safety and security, regulatory requirements and global best practice recommendations for nuclear cyber security, and strategies to prevent and counteract threats. This study is imperative as Nigeria prepares to join the league of countries with operational nuclear power plants and research reactors 1 Arinze et al.: Regulatory Perspective on Nuclear Cyber Security: The Fundamental Issues\",\"PeriodicalId\":36043,\"journal\":{\"name\":\"International Journal of Nuclear Security\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Nuclear Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.7290/ijns060103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Nuclear Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7290/ijns060103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0

摘要

我们生活在一个数字和信息驱动的时代,需要存储与我们生活的几乎每一个方面有关的信息,包括核信息。为了使计算机系统在核设施中可靠和安全,必须防止未经授权的事件更改(这意味着保持机密性),现场设备的输入和输出必须在其可用寿命内保持不变(这意味着您保持完整性),所有组成部分应保持可操作状态(这意味意味着您保持可用性)。网络威胁的动态性和复杂性使其成为核设施中计算机系统安全的严峻挑战。已经采用了许多不同的网络安全服务、政策、机制、战略和监管框架,包括:保密性、完整性、可用性、不可否认性、加密、纵深防御(DID)、设计基础威胁(DBT)、IAEA技术指导文件,如:GS-R-1、GS-R-2、GS-R-3、GS-G-3.13.5、NSS20、NSS23-G、NSS13、NSS17、NST036、NST045和NST047,IEEE标准7-4.3.2-2010、NIST SP 800-53、NIST SP 800-82、NEI 04-04、NEI 08-09和国家特定要求,如:10 CFR 73.54、RG 5.71(U.S.NRC)、KINS/RG-N08.22(韩国)。然而,威胁依然存在。本文旨在就核网络安全、其与核安全和安保的关系、核网络安全的监管要求和全球最佳实践建议,以及预防和应对威胁的战略提供监管视角。随着尼日利亚准备加入核电站和研究反应堆运营国家联盟,这项研究势在必行。1 Arinze等人:核网络安全的监管视角:根本问题
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Regulatory Perspective on Nuclear Cyber Security: The Fundamental Issues
We are living in a digital and information-driven age and need to store information related to virtually every aspect of our lives, nuclear information included. For computer system to be reliable and secure in nuclear facilities, unauthorized event changes must be prevented (which means maintaining confidentiality), field device inputs and outputs must remain immutable throughout their usable lifetime (which means maintaining integrity), and all component parts should remain in an operable state (which means maintaining availability).The dynamic and complex nature of cyber threats has made it a serious challenge to secure computer systems in nuclear facilities. A number of varied cyber security services, policies, mechanisms, strategies and regulatory frameworks have been adopted , including: confidentiality, integrity, availability, non-repudiation, encipherment, defense-in-depth (DID), design basis threat (DBT), IAEA technical guidance documents such as: GS-R-1, GS-R-2, GS-R-3, GS-G-3.13.5, NSS20, NSS23-G, NSS13, NSS17, NST036, NST045, and NST047, IEEE standard 7-4.3.2-2010, NIST SP 800-53, NIST SP 800-82, NEI 04-04, NEI 08-09 and country-specific requirements such as: 10 CFR 73.54, RG 5.71 (U.S.NRC), KINS/RG-N08.22 (South Korea). However, threats remain persistent. This paper is aimed at providing a regulatory perspective on nuclear cyber security, its relationship to nuclear safety and security, regulatory requirements and global best practice recommendations for nuclear cyber security, and strategies to prevent and counteract threats. This study is imperative as Nigeria prepares to join the league of countries with operational nuclear power plants and research reactors 1 Arinze et al.: Regulatory Perspective on Nuclear Cyber Security: The Fundamental Issues
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Nuclear Security
International Journal of Nuclear Security Social Sciences-Safety Research
CiteScore
0.50
自引率
0.00%
发文量
0
审稿时长
8 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信