Physical protection of hardware and software -: Linking access control systems with operational computer systems

被引:0
|
作者
Hagemann, A [1 ]
Hagenmeyer, H [1 ]
机构
[1] Gesell Anlagen & Reaktorsicherheit GRS mbH, Cologne, Germany
关键词
D O I
暂无
中图分类号
TL [原子能技术]; O571 [原子核物理学];
学科分类号
0827 ; 082701 ;
摘要
The existence and use of software and networks have generated another possibility for perpetrators to influence systems in nuclear facilities or to prepare malevolent acts. Data security has become an element of physical protection plans, not as an end in itself but as a means to achieve physical protection objectives. Physical protection measures are additional measures, which become necessary when other measures that have to be taken (e.g. in compliance with international standards) are insufficient to prevent a hazard to the protection goals through data manipulation by software and hardware. In planning or assessing data protection measures for the purpose of physical protection, it is necessary to differentiate between applications which can, if manipulated, directly endanger the protection goals, e.g. safety control systems, and those applications which only have an indirect effect, e.g. material accountancy and access control systems. The following questions have to be considered: Which possibilities of influencing systems via software and data manipulation need to be considered? What effects can software and data manipulation have on the protection goals? Will the operating personnel act appropriately, e.g. by using conventional gauges? The problem ranges from conventional data security to the human factor and classical safety related analyses. The importance of software protection is growing. In particular, because of ageing of components, the existing instrumentation and control systems with their fixed wiring and discrete elements will have to be updated. Computerized access control systems play an eminent role in the physical protection of a nuclear facility. Therefore, most systems are operated as islands. The paper shows that linking of certain systems with other computer systems is possible without inadmissible drawbacks for the physical protection level. It is shown by means of the example of linking together the computer networks of access control, health physics, the flexitime system, the key administration and the operational management system that such linking of systems in nuclear facilities has hidden advantages for all participants.
引用
收藏
页码:321 / 327
页数:7
相关论文
共 50 条
  • [31] Hardware architectures of computer systems
    Makita, A
    NEC RESEARCH & DEVELOPMENT, 1998, 39 (04): : 361 - 361
  • [32] ON-LINE COMPUTER CONTROL IN PHYSICAL SYSTEMS
    OSNAGHI, S
    PETERLON.G
    ELETTROTECNICA, 1969, 56 (8A): : 486 - &
  • [33] HARDWARE-IN-THE-LOOP TESTING OF ELECTRICAL PROTECTION AND CONTROL SYSTEMS
    Ravikumar, Krishnanjan Gubba
    Hamilton, Roy
    Lya, Anshuman Mal
    Mendiola, Michael
    2018 IEEE INDUSTRY APPLICATIONS SOCIETY 65TH ANNUAL PETROLEUM AND CHEMICAL INDUSTRY TECHNICAL CONFERENCE (PCIC), 2018, : 189 - 196
  • [34] PERFORMANCE MEASUREMENT OF OPERATIONAL HARDWARE/SOFTWARE SYSTEMS: A CASE STUDY ON COMPARISON OF METHODS.
    Schmitz, Carlfried
    1974, : 336 - 342
  • [35] A software testbed for configuring distributed computer control systems
    Hassapis, G
    Moschopoulos, A
    Theos, D
    Giapitzis, G
    COMPUTERS IN INDUSTRY, 1996, 31 (01) : 15 - 30
  • [36] A SOFTWARE ARCHITECTURE FOR DISTRIBUTED COMPUTER CONTROL-SYSTEMS
    KRAMER, J
    MAGEE, J
    SLOMAN, M
    AUTOMATICA, 1984, 20 (01) : 93 - 102
  • [37] Hardware-software co-synthesis of heterogeneous embedded computer systems
    Khan, Gul N.
    Levman, Jacob
    Alirezaie, Javad
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 2185 - +
  • [38] A Software and Hardware Classification Algorithm for Computer Systems Based on Improved PSO model
    Liu, Xiaomei
    Dong, Zhongbo
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1472 - 1477
  • [39] Software and hardware means of protection from the unsanctioned access to videoinformation
    Makhmudov, E.B.
    Huagong Kuangshan Jishu/Technology for Chemical Mines, 1998, 27 (04): : 31 - 32
  • [40] Software of the standalone control systems for the insertion physical devices
    Ilyin, I
    Miginsky, E
    PROCEEDINGS OF THE SECOND IASTED INTERNATIONAL MULTI-CONFERENCE ON AUTOMATION, CONTROL, AND INFORMATION TECHNOLOGY - AUTOMATION, CONTROL, AND APPLICATIONS, 2005, : 135 - 137