Detailed Information

Cited 0 time in webofscience Cited 2 time in scopus
Metadata Downloads

Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology

Full metadata record
DC Field Value Language
dc.contributor.authorJung, Daun-
dc.contributor.authorShin, Jiho-
dc.contributor.authorLee, Chaechang-
dc.contributor.authorKwon, Kookheui-
dc.contributor.authorSeo, Jung Taek-
dc.date.accessioned2023-05-11T06:40:08Z-
dc.date.available2023-05-11T06:40:08Z-
dc.date.created2023-05-08-
dc.date.issued2023-02-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/87656-
dc.description.abstractWith the rapid increase in cyber attacks on industrial control systems, the significance of the application of cyber security controls and the evaluation of security against such attacks has also increased. Among them, cyber attacks on nuclear power plants (NPPs) can cause not only economic loss, but also human casualties. Thus, the application of cyber security controls is necessary for mitigating security threats, especially to NPPs. However, currently, there are limited resources pertaining to information protection, which is essential to uniformly deploy all the controls required to meet cyber security regulations. To overcome this challenge, effective cyber security controls need to be identified and adequate information protection resources must be allocated to each NPP. Although NPPs apply a differential security control according to its characteristics based on NEI 13-10 (Cyber Security Control Assessments), this alone is not only insufficient in reflecting the latest security threats, but also fails to confirm whether the security controls have actually mitigated such threats. To address this challenge, the Electric Power Research Institute (ETRI) developed the technical assessment methodology (TAM), which can be used to generate a quantitative score by assessing the effects of potential cyber attacks on an asset and the relevant security controls. This methodology allows for the application of differential security control based on the score to identify whether the security controls have actually mitigated the risks. Considering this context, the purpose of this paper is to conduct a comparative analysis of the results derived from applying security controls and assessing risks using only NEI 13-10 as well as both NEI 13-10 and TAM on the plant protection system of the nuclear power reactor APR1400. Furthermore, this paper discusses the scopes for subsequent research by addressing the limitations of the TAM and considerations for its use.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.relation.isPartOfIEEE ACCESS-
dc.titleCyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000937146600001-
dc.identifier.doi10.1109/ACCESS.2023.3244991-
dc.identifier.bibliographicCitationIEEE ACCESS, v.11, pp.15229 - 15241-
dc.description.isOpenAccessY-
dc.identifier.scopusid2-s2.0-85149183257-
dc.citation.endPage15241-
dc.citation.startPage15229-
dc.citation.titleIEEE ACCESS-
dc.citation.volume11-
dc.contributor.affiliatedAuthorJung, Daun-
dc.contributor.affiliatedAuthorSeo, Jung Taek-
dc.type.docTypeArticle-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorRisk management-
dc.subject.keywordAuthorCyberattack-
dc.subject.keywordAuthorControl system security-
dc.subject.keywordAuthorAnalytical models-
dc.subject.keywordAuthorNuclear power generation-
dc.subject.keywordAuthorTechnical management-
dc.subject.keywordAuthorIndustrial control-
dc.subject.keywordAuthorindustrial control-
dc.subject.keywordAuthornuclear facility regulation-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordPlusSYSTEMS-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE