Providing Security Assurance in Line with National DBT Assumptions

被引:1
|
作者
Bajramovic, Edita [1 ,2 ]
Gupta, Deeksha [2 ]
机构
[1] Friedrich Alexander Univ Erlangen Nuremberg, Dept Comp Sci, D-91058 Erlangen, Germany
[2] AREVA GmbH, D-91058 Erlangen, Germany
关键词
D O I
10.1063/1.4972939
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Information Assurance for security protocols
    Bella, G
    Bistarelli, S
    [J]. COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
  • [32] Demanding software security assurance
    Cusimano, John
    [J]. Control (Chicago, Ill), 2011, 24 (02): : 14 - 16
  • [33] Using trust assumptions with security requirements
    Haley, CB
    Laney, RC
    Moffett, JD
    Nuseibeh, B
    [J]. REQUIREMENTS ENGINEERING, 2006, 11 (02) : 138 - 151
  • [34] Empirical Software Security Assurance
    Harper, Dave
    [J]. WEB APPLICATION SECURITY, 2010, 72 : 11 - 11
  • [35] The Landscape of Security from Physical Assumptions
    Koch, Alexander
    [J]. 2021 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [36] SOCIAL-SECURITY AND THE POLITICS OF ASSUMPTIONS
    LIGHT, PC
    [J]. PUBLIC ADMINISTRATION REVIEW, 1985, 45 (03) : 363 - 371
  • [37] Unhelpful Assumptions in Software Security Research
    Ryan, Ita
    Roedig, Utz
    Stol, Klaas-Jan
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3460 - 3474
  • [38] WEAKENING SECURITY ASSUMPTIONS AND OBLIVIOUS TRANSFER
    CREPEAU, C
    KILIAN, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 2 - 7
  • [39] Essential Assumptions for Effective Data Security
    Alvero, Kevin M.
    Alvero, Brian
    [J]. ISACA Journal, 2022, 6 : 15 - 18
  • [40] The Assumptions and Profiles Behind IT Security Behavior
    Balozian, Puzant
    Leidner, Dorothy
    [J]. PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 4987 - 4996