Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants |
Koo, In-Soo
(한국원자력연구원)
Kim, Kwan-Woong (한국원자력연구원) Hong, Seok-Boong (한국원자력연구원) Park, Geun-Ok (한국원자력연구원) Park, Jae-Yoon (한국원자력연구원) |
1 | D. Dzung, M. Naedele, T. Von Hoff, and M. Crevatin, "Security for industrial communication systems," Proc. IEEE, Vol. 93, No. 6, pp. 1152 - 1177, Jun., 2005. DOI |
2 | G. Ericsson, "Information security for electric power utilities (EPUs)-CIGRE developments on frameworks, risk assessment, and technology," IEEE Trans. Power Del., Vol. 24, No. 3, pp. 1174 - 1181, Jul., 2009. DOI |
3 | Robert J. Turk, "Cyber Incidents Involving Control Systems", INL/EXT-05-00671, Oct., 2005. |
4 | Symantec Security Respon se, "W32.Stuxnet Dossier", Rev. 1.4, Feb., 2011. |
5 | Symantec Security Response, "W32.Duqu The precursor to the next stuxnet", Rev. 1.2, Oct., 2011. |
6 | ISO/IEC 27005, "Information Technology - Security Techniques - Information Security Risk Management", 2008. |
7 | Regulatory Guide 5.71, "Cyber Security Programs for Nuclear Facilities", US-NRC, 2010. |
8 | IAEA, IAEA Nuclear Security Series No.XX, "Computer Security at Nuclear Facilities", Draft version, 2010. |
9 | Gary Stoneburner, Alice Goguen, and Alexis Firnga, "Risk Management Guide for Information Technology Systems", NIST, Jul., 2002. |
10 | 서우석, 전문석, "스마트그리드(Smart Grid) 전력망과 정보통신망 융합 보안 방향", 한국전자통신학회논문지, 5권, 5호, pp. 477-486, 2010. |
11 | 차인환, "내부 정보보호를 위한 인원보안 관리 방안 연구", 한국전자통신학회논문지, 3권, 4호, pp. 210-220, 2008. |