Browse > Article

국외 원전 디지털자산 공급망 사이버보안 규제 동향  

LIM, SOO MIN (원자력통제기술원)
KIM, ARAM (원자력통제기술원)
SHIN, ICKHYUN (원자력통제기술원)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Department of commerce, "Defense industrial base assessment: Counterfeit electronics", January 2010
2 Department of justice, http://www.justice.gov/archive/opa/pr/2008/February/08_crm_150.html
3 NetMarketShare, "Mobile/Tablet Operating System Market Share", December 2015
4 Palo alto networks, http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-attacker-can-phish-passwords-and-open-urls-though-infected-apps/
5 Dailymail, http://www.dailymail.co.uk/wires/ap/article-2647551/Man-pleads-guilty-counterfeit-sub-parts-case.html
6 NRC Regulatory Guide 5.71, "Cyber Security Programs for Nuclear Facilities", January 2010
7 NRC, 10 CFR 73.54, "Protection of digital computer and communication systems and network", November 2009
8 NRC, http://www.nrc.gov/public-involve/conference-symposia/ric/past/2014/docs/posters/53-nsircurrent-status-of-cyber-security-implementation.pdf
9 NRC Regulatory Guide 1.152, "Criteria for use of computers in safety systems of nuclear power plants Rev 3", July 2011
10 NRC, http://www.nrc.gov/reading-rm/basic-ref/glossary/safety-related.html
11 NIST SP 800.53, "Security and Privacy Controls for Federal Information Systems and Organizations", February 2014
12 IAEA-TECDOC-919 "Procurement Engineering and Supply Chain Guidelines in Support of Operation and Maintenance of Nuclear Power Plants", December 1996
13 IAEA-TECDOC-1169 "Managing Suspect and CounterFeit Items in the Nuclear Industry", August 2000