• Title/Summary/Keyword: Nuclear security

Search Result 389, Processing Time 0.032 seconds

Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems (원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선)

  • Shin-woo Lee;Jung-hee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.537-552
    • /
    • 2024
  • Domestic nuclear power plants operate under the establishment of the "Information System Security Regulations" in accordance with the Nuclear Safety Act, introducing and implementing a cybersecurity system that encompasses organizational structure as well as technical, operational, and managerial security measures for assets. Despite attempts such as phased approaches and alternative measures for physical protection systems, the reduction in managed items has not been achieved, leading to an increased burden on security capabilities due to limited manpower at the site. In the main text, an analysis is conducted on Type A1 assets performing nuclear safety functions using Maintenance Rules (MR) and EPRI Technical Assessment Methodology (TAM) from both a maintenance perspective and considering device characteristics. Through this analysis, approaches to re-evaluate the impact of cyber intrusions on asset functionality are proposed.

U.S. FUEL CYCLE TECHNOLOGIES R&D PROGRAM FOR NEXT GENERATION NUCLEAR MATERIALS MANAGEMENT

  • Miller, M.C.;Vega, D.A.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.6
    • /
    • pp.803-810
    • /
    • 2013
  • The U.S. Department of Energy's Fuel Cycle Technologies R&D program under the Office of Nuclear Energy is working to advance technologies to enhance both the existing and future fuel cycles. One thrust area is in developing enabling technologies for next generation nuclear materials management under the Materials Protection, Accounting and Control Technologies (MPACT) Campaign where advanced instrumentation, analysis and assessment methods, and security approaches are being developed under a framework of Safeguards and Security by Design. An overview of the MPACT campaign's activities and recent accomplishments is presented along with future plans.

A Study on Design Elements of Main Control Room in Nuclear Power Plants by Analyzing Space Characteristics (원자력발전소 주제어실의 공간특성에 따른 디자인 요소에 관한 연구)

  • Lee, Seung-Hoon;Lee, Tae-Yeon
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.6
    • /
    • pp.249-256
    • /
    • 2010
  • For guaranteeing for security of nuclear power plant, ergonomic factors have been applied to design of main control room, core area for management and control of nuclear power plant, but design elements for performance of operators have been ignored. As the behaviors of operators are important for security of nuclear power plant, space design which makes them pleasant psychologically and makes them maintain attention on security equipments ceaselessly is required. Therefore, the purpose of this study is to analyze space characteristics of main control rooms according to regulations of nuclear power plant and general guidelines of space design, and to offer basic data for designing of main control room which makes operators pleasant psychologically and physically. At first, theoretical issues related with design of main control room are reviewed and several premises of space are developed by abstracting design elements from common space and regulations of nuclear power plant and, then integrating each design elements interactively. In short, the improvement of system environment based on human-machine interface space has brought about perceptual, cognitive, and spatial changes and has realized next generation of main control rooms. And, differences and similarities between ordinary space and main control room, which ergonomic sizes and regulations are applied and is VDT environment based on LDP, are discussed in relation to 13 design elements and 17 space premise.

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

Regulatory Requirements Analysis for Development of Nuclear Power Plants Cyber Security Vulnerability Inspection Tool (원전 사이버 보안 취약점 점검 도구 개발을 위한 규제요건 분석)

  • Kim, Seung-Hyun;Lim, Su-Chang;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.725-730
    • /
    • 2017
  • The use of general IT resources in the Instrumentation and Control system(I&C) for the safety of Nuclear Power Plants(NPPs) is increasing. As a result, potential security vulnerabilities of existing IT resources may cause cyber attack to NPPs, which may cause serious consequences not only to shutdown of NPPs but also to national disasters. In order to respond to this, domestic nuclear regulatory agencies are developing guidelines for regulating nuclear cyber security regulations and expanding the range of regulatory targets. However, it is necessary to take measures to cope with not only general security problems of NPPs but also attacks specific to NPPs. In this paper, we select 42 items related to the vulnerability inspection in the contents defined in R.G.5.71 and classify it into 5 types. If the vulnerability inspection tool is developed based on the proposed analysis, it will be possible to improve the inspection efficiency of the cyber security vulnerability of the NPPs.

Security Criteria for Design and Evaluation of Secure Plant Data Network on Nuclear Power Plants (원전 계측제어계통의 안전 네트워크 설계 및 평가를 위한 보안 기준)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.267-271
    • /
    • 2014
  • Nuclear power plant data networks and their associated safety systems are being modernized to include many information technology (IT) networks and applications. Along with the advancement of plant data networks (PDN), instrumentation and control systems are being upgraded with modern digital, microprocessor-based systems. However, nuclear PDN is confronted significant side-effects, which PDN is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in nuclear PDN. Consequently, it should be designed fully ensuring the PDN meet all reliability, performance and security requirements in order to overcome the disadvantages raised from adaption of IT technology. In this paper, we provide technical security criteria should be used in design and evaluation of secure PDN. It is believed PDN, which is designed and operated along with these technical security critera, effectively protect against possible outside cyber threats.

An assessment of sanctions on North Korea and the prospect (대북 제재 조치 평가 및 전망)

  • Cheon, Seong- Whu
    • Strategy21
    • /
    • s.31
    • /
    • pp.5-26
    • /
    • 2013
  • The South Korean society has experienced many changes since the sinking of ROKS Cheonan. The government reviewed its defense posture and adopted the 5·24 Measure in its relations with North Korea. As a result, the people of South Korea became more conscious of security situations on the Korean peninsula while North Korea's economy suffered badly. Meanwhile, the South Korean government has taken a flexible stance toward North Korea in terms of exchange and cooperation since September 2011. The flexible stance was to manage inter-Korea relations in a stable manner and relieve the hardships of the North Korean people while preserving the spirits and purposes of the 5·24 Measure. The UN Security Council adopted twenty-six resolutions and statements on North Korea since June 25, 1950. They include thirteen U.N. Security Council resolutions including those concerning nuclear weapons or missile programs, nine Presidential statements, and four press statements. Resolution 82, the first U.N. resolution on North Korea, came when the Korean War broke out. Resolution 825, the first one related to nuclear or missile programs, was adopted in response to North Korea's withdrawal from the NPT. Apart from these U.N. resolutions, the United States has imposed separate sanctions against North Korea. North Korea's nuclear weapons program can be considered in comparison with that of Iran in terms of the consequences they create for the regional security. The Security Council has adopted six resolutions on Iran so far. One should note that the resolutions on Iran have had much stronger sanctions compared to those imposed on North Korea. That is, while the North Korea case may be viewed as a more serious threat to international security from the perspective of nuclear weapons development or proliferation, tougher sanctions have been placed on Iran. There are two approaches that South Korea should take in addressing the related issues. First, we should aim to reduce the gap between sanctions imposed on Iran and North Korea. It is difficult to understand that a country with more serious problems is rewarded with lighter sanctions. We should take measures through the Security Council Sanctions Committee to make individuals and groups in North Korea that play a central role in developing nuclear weapons and missiles subject to additional sanctions. Second, we have to change. Other countries in the international community have become tired of North Korea's nuclear issue and now they look to South Korea for initiative. We should correctly understand this current situation and play a leading role within our capacity. Knowingly and unknowingly, the notion that the North Korean nuclear issue may be left to South Korea has been spread around the international community. Although the situation is grave, we should try to open a new horizon in ushering in the unification era by taking the initiative with confidence that there is a looming hope ahead of us. For these tasks, we should stop thinking in the old way that has been ossified for the last two decades. We should not be pushed around by neighboring great powers in dealing with North Korea related issues anymore; we should take the initiative with resolution that we will play our role at the center of four great powers and with confidence that we can do it. Based on the confidence that the Republic of Korea has become a country with enough capacity to take the initiative, we should establish a 'National Grand Strategy' representing South Korea's strategic vision that the unification is the ultimate solution to the problems related to North Korea's nuclear weapons program.

  • PDF

Security Measures against Assembly and Demonstration during International Conference - the Case of the Nuclear Security Summit - (국제회의 시 집회시위에 관한 안전관리 방안 - 핵 안보정상회의 개최를 중심으로 -)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.193-222
    • /
    • 2011
  • Our country successfully hosted the G20 summit in Seoul in November, 2010. Afterwards, however, the Yeonpyungdo shelling incident took place by the North, and the North Korean nuclear issue have strained interKorean relations. Our country is going to host the nuclear security summit, which is of great significance at this point of time. The nuclear security summit is to be attended by 47 countries. The participant countries of this summit is larger in number than those of the ASEM, APEC and the G20 summit that our country has ever hosted. That is a large-scale international conference that invites the UN, the IAEA and the EU, which are three major nuclear-related international organizations. A successful hosting of the nuclear security summit will serve as an opportunity to boost our country's national prestige, and is likely be beneficial to the settlement of the North Korean nuclear issue. Like other international submits in foreign countries, however, violent anti-globalization demonstrations are expected to occur when the nuclear security summit is held in April next year. The purpose of this study was to make a case analysis of demonstrations during multilateral international conferences hosted by foreign countries over ten years between 1999 and 2009, to examine the controversial points over the demonstrations, and ultimately to seek ways of ensuring safety against possible assemblies and demonstrations during the forthcoming nuclear security summit, which is scheduled to be held in April next year. The findings of the study on feasible security measures are as follows: First, information and intelligence gathering should be reinforced, and the inspection should be stepped up. Second, pacification among domestic NGOs and the supplementation of the existing legal devices are required. Third, publicity should be strengthened. Fourth, riot police officers should be selected as early as possible to bolster their education and training, and more reinforced emergency measures should be taken. It's needed to seek assistance from the military as one of emergency measures, and national defense readiness should be bolstered across the nation in collaboration with the Ministry of National Defense when the summit is near at hand. Finally, CBR countermeasures should be taken in preparation for CBR terrorism.

  • PDF