Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jung, Daun | - |
dc.contributor.author | Shin, Jiho | - |
dc.contributor.author | Lee, Chaechang | - |
dc.contributor.author | Kwon, Kookheui | - |
dc.contributor.author | Seo, Jung Taek | - |
dc.date.accessioned | 2023-05-11T06:40:08Z | - |
dc.date.available | 2023-05-11T06:40:08Z | - |
dc.date.created | 2023-05-08 | - |
dc.date.issued | 2023-02 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/87656 | - |
dc.description.abstract | With the rapid increase in cyber attacks on industrial control systems, the significance of the application of cyber security controls and the evaluation of security against such attacks has also increased. Among them, cyber attacks on nuclear power plants (NPPs) can cause not only economic loss, but also human casualties. Thus, the application of cyber security controls is necessary for mitigating security threats, especially to NPPs. However, currently, there are limited resources pertaining to information protection, which is essential to uniformly deploy all the controls required to meet cyber security regulations. To overcome this challenge, effective cyber security controls need to be identified and adequate information protection resources must be allocated to each NPP. Although NPPs apply a differential security control according to its characteristics based on NEI 13-10 (Cyber Security Control Assessments), this alone is not only insufficient in reflecting the latest security threats, but also fails to confirm whether the security controls have actually mitigated such threats. To address this challenge, the Electric Power Research Institute (ETRI) developed the technical assessment methodology (TAM), which can be used to generate a quantitative score by assessing the effects of potential cyber attacks on an asset and the relevant security controls. This methodology allows for the application of differential security control based on the score to identify whether the security controls have actually mitigated the risks. Considering this context, the purpose of this paper is to conduct a comparative analysis of the results derived from applying security controls and assessing risks using only NEI 13-10 as well as both NEI 13-10 and TAM on the plant protection system of the nuclear power reactor APR1400. Furthermore, this paper discusses the scopes for subsequent research by addressing the limitations of the TAM and considerations for its use. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.title | Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000937146600001 | - |
dc.identifier.doi | 10.1109/ACCESS.2023.3244991 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.11, pp.15229 - 15241 | - |
dc.description.isOpenAccess | Y | - |
dc.identifier.scopusid | 2-s2.0-85149183257 | - |
dc.citation.endPage | 15241 | - |
dc.citation.startPage | 15229 | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 11 | - |
dc.contributor.affiliatedAuthor | Jung, Daun | - |
dc.contributor.affiliatedAuthor | Seo, Jung Taek | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Risk management | - |
dc.subject.keywordAuthor | Cyberattack | - |
dc.subject.keywordAuthor | Control system security | - |
dc.subject.keywordAuthor | Analytical models | - |
dc.subject.keywordAuthor | Nuclear power generation | - |
dc.subject.keywordAuthor | Technical management | - |
dc.subject.keywordAuthor | Industrial control | - |
dc.subject.keywordAuthor | industrial control | - |
dc.subject.keywordAuthor | nuclear facility regulation | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordPlus | SYSTEMS | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.