Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology

被引:5
|
作者
Jung, Daun [1 ]
Shin, Jiho [2 ]
Lee, Chaechang [3 ]
Kwon, Kookheui [3 ]
Seo, Jung Taek [4 ]
机构
[1] Gachon Univ, Dept Informat Secur, Seongnam 13120, South Korea
[2] Korean Natl Police Univ, Police Sci Inst, Asan 31539, South Korea
[3] Korea Inst Nucl Nonproliferat & Control, Daejeon 34054, South Korea
[4] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
关键词
Security; Risk management; Cyberattack; Control system security; Analytical models; Nuclear power generation; Technical management; Industrial control; industrial control; nuclear facility regulation; security; SYSTEMS;
D O I
10.1109/ACCESS.2023.3244991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid increase in cyber attacks on industrial control systems, the significance of the application of cyber security controls and the evaluation of security against such attacks has also increased. Among them, cyber attacks on nuclear power plants (NPPs) can cause not only economic loss, but also human casualties. Thus, the application of cyber security controls is necessary for mitigating security threats, especially to NPPs. However, currently, there are limited resources pertaining to information protection, which is essential to uniformly deploy all the controls required to meet cyber security regulations. To overcome this challenge, effective cyber security controls need to be identified and adequate information protection resources must be allocated to each NPP. Although NPPs apply a differential security control according to its characteristics based on NEI 13-10 (Cyber Security Control Assessments), this alone is not only insufficient in reflecting the latest security threats, but also fails to confirm whether the security controls have actually mitigated such threats. To address this challenge, the Electric Power Research Institute (ETRI) developed the technical assessment methodology (TAM), which can be used to generate a quantitative score by assessing the effects of potential cyber attacks on an asset and the relevant security controls. This methodology allows for the application of differential security control based on the score to identify whether the security controls have actually mitigated the risks. Considering this context, the purpose of this paper is to conduct a comparative analysis of the results derived from applying security controls and assessing risks using only NEI 13-10 as well as both NEI 13-10 and TAM on the plant protection system of the nuclear power reactor APR1400. Furthermore, this paper discusses the scopes for subsequent research by addressing the limitations of the TAM and considerations for its use.
引用
收藏
页码:15229 / 15241
页数:13
相关论文
共 50 条
  • [1] Cyber security assessment of a power plant
    Fovino, Igor Nai
    Guidi, Luca
    Masera, Marcelo
    Stefanini, Alberto
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2011, 81 (02) : 518 - 526
  • [2] Risk Analysis of Cyber Security in Nuclear Power Plant
    Yan, Zhen-Yu
    Chun, Zeng-Jun
    Liu, Gao-Jun
    Zou, Lai-Long
    [J]. NUCLEAR POWER PLANTS: INNOVATIVE TECHNOLOGIES FOR INSTRUMENTATION AND CONTROL SYSTEMS, 2018, 455 : 139 - 147
  • [3] Cyber Security Impact on Power Grid Including Nuclear Plant
    Soupionis, Yannis
    Piccinelli, Roberta
    Benoist, Thierry
    [J]. PROCEEDINGS OF THE 2016 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2016, 8 : 767 - 773
  • [4] ANALYSIS OF CYBER SECURITY INCIDENT IN SOUTH KOREAN NUCLEAR POWER PLANT AND CYBER SECURITY SOLUTIONS FOR NUCLEAR POWER INDUSTRIAL CONTROL SYSTEM
    Bian, Yufang
    Li, Jing
    Yin, Baojuan
    [J]. PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2017, VOL 4, 2017,
  • [5] Study on Cyber Security Risk Assessment of Digital Instrumentation &Control System of Nuclear Power Plant
    Liu, Dongbo
    Chen, Yujuan
    Shi, Ji
    Chen, Donglei
    [J]. 2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 4742 - 4750
  • [6] Cyber Security and Nuclear Power
    Wesselmann, Christopher
    [J]. ATW-INTERNATIONAL JOURNAL FOR NUCLEAR POWER, 2020, 65 (6-7): : 303 - 303
  • [7] A study on classification of the security controls for the effective implementation to nuclear power plant
    Han, Sang Min
    Lee, Chanyoung
    Chae, Young Ho
    Seong, Poong Hyun
    [J]. NUCLEAR ENGINEERING AND TECHNOLOGY, 2022, 54 (04) : 1245 - 1252
  • [8] Methodology of Cyber Security Assessment in the Smart Grid
    Woo, Pil Sung
    Kim, Balho H.
    [J]. JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2017, 12 (02) : 495 - 501
  • [9] The Cyber Security Evaluation of China's Nuclear Power Plant DCS System
    Yang, Anyi
    Li, Jing
    Bian, Yufang
    Wang, Xiaofeng
    [J]. PROCEEDINGS OF THE 20TH PACIFIC BASIN NUCLEAR CONFERENCE, VOL 1, 2017, : 689 - 700
  • [10] A Cyber-Security Implementation Framework for Nuclear Power Plant Control Systems
    Lee, Cheol-kwon
    Song, Jae-gu
    Lee, Dong-young
    Jung, Hyun-mi
    Lee, Gang-soo
    [J]. CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 190 - +