A Study on Method to Establish Cyber Security Technical System in NPP Digital I&C |
Chung, Manhyun
(The Attached Institute of ETRI)
Ahn, Woo-Geun (The Attached Institute of ETRI) Min, Byung-Gil (The Attached Institute of ETRI) Seo, Jungtaek (The Attached Institute of ETRI) |
1 | KISA, "ISMS certification criteria of detailed inspection items," KISA, 2013. |
2 | International Organization for Standardization, "Information technology - Security techniques - Information security management systems - Requirements," ISO/IEC 27001:2005, International Organization for Standardization, 2013. |
3 | KISA, "G-ISMS specification of information protection measures," KISA, 2013 |
4 | Ministry of Security and public Administration, "Information and Communication Security business rules," Ministry of Security and public Administration, 2009. |
5 | Ministry of Security and public Administration, "Critical information and communication infrastructure vulnerability assessment, evaluation criteria," Notice No. 2012-54, Ministry of Security and public Administration, 2012. |
6 | Korea Communications Commission, "Information Security Management Guidelines," Directive No.109, Korea Communications Commission, 2012. |
7 | KINS, "instrumentation and control system," RG chapter 8, KINS, 2011. |
8 | In-Soo Koo, Kwan-Woong Kim, Seok-Boong Hong, Geun-Ok Park, and Jae-Yoon Park, "Digital asset analysis methodology against cyber threat to instrumentation and control system in nuclear power plants," The Journal of Korea Information and Communications society, 6(6), pp.839-847, Dec. 2011. 과학기술학회마을 |
9 | Nicolas Falliere, Liam O Murchu a, and Eric Chien, "W32.Stuxnet Dossier," Version 1.4, Symantec Security Response, February 2011. |
10 | Dong-Hoon Kim, "Concept of KNICS Development," The proceedings of KIEE, 52(9), pp.24-32, Sep. 2003. |
11 | US NRC, "Cyber Security Programs for Nuclear Power Facilities," NRC Regulatory Guide 5.71, January. 2010. |
12 | US NRC, "Criteria for Use of Computers in Safety Systems of Nuclear Power Plants," Regulatory Guide 1.152, Rev. 03, June. 2010. |
13 | Nuclear Energy Institute, "Cyber Security Plan for Nuclear Power Reactors," NEI 08-09 ,January. 2010. |
14 | IAEA, "Computer Security at Nuclear Facilities," IAEA Nuclear Security Series N0.17, 2010. |
15 | KAERI, "Development of digital reactor safety systems: Development of network protocol for the integrated safety system," KAERI, 2007. |
16 | KAERI, "Development of digital reactor safety system - Production of the digital reactor safety systems," KAERI, 2004 |
17 | Ministry of Trade, Industry and Energy, "Development of digital reactor safety system," Ministry of Trade, Industry and Energy, 2008 |
18 | KAERI, "Development of digital reactor safety system - Design support for ESF-CCS," KAERI, 2008. |
19 | US.ICS-CERT, http://ics-cert.us-cert.gov/ics-archive |
20 | Louis Marinos, ENISA, "ENISA Threat Landscape 2013," European Network and Information Security Agency, 2013. |
21 | Gunhee Lee, Jungtaek Seo, and Eung-ki Park, "Smart Grid Security Threats and Security Requirements Analysis," Review of KIISC, 21(7), pp 7-17, Nov. 2011. |
22 | National Institute of Standards and Technology, "Special Publication 800-53," National Institute of Standards and Technology, August. 2009 |
23 | Cheol-kwon Lee, "Trend of technology of instrumentation and control system in nuclear power plants," Review of KIISC, 22(5), pp 28-34, Aug. 2012. |
24 | National Institute of Standards and Technology, "Special Publication 800-82," National Institute of Standards and Technology, June. 2011 |