核设施计算机安全管理:建议

F. P. Cusmanri, M. S. Putra, Z. Zulfiandri, M. R. Ridhallahi
{"title":"核设施计算机安全管理:建议","authors":"F. P. Cusmanri, M. S. Putra, Z. Zulfiandri, M. R. Ridhallahi","doi":"10.1063/5.0058875","DOIUrl":null,"url":null,"abstract":"The progress and development of information technology has opened up one form of nuclear crime, namely computer crime. The Stuxnet incident that occurred in 2010 is one example of cyber incidents related to nuclear security. The International Atomic Energy Agency (IAEA) as an international regulatory body has paid attention to computer security as outlined in one of the important elements in NSS 20 - Objective and Essentials Elements of a State’s Nuclear Security Regime. The security aspect itself is one of the aspects emphasized in Act Number 10 of 1997 concerning Nuclear Energy. Government Regulation Number 54 of 2012 concerning Nuclear Installation Safety and Security outlines a more detailed discussion of nuclear installation security, which is a more specific discussion on safety in the aspect of physical protection regulated in Regulation of the Head of the Nuclear Power Supervisory Agency Number 1 of 2009 concerning Installation Physical Protection Systems and Nuclear Materials. However, all of these regulations still do not explicitly mention computer security. This paper was prepared to provide recommendations that can be used in the preparation of regulations and guidelines related to computer security in nuclear installations. This paper was prepared using the main reference NSS 17 - Computer Security at Nuclear Facilities which was perfected by the review of Regulatory Guide 5.71 - Cyber Security Programs for Nuclear Facility, CSA N290.7-14 - Cyber Security for Nuclear Power Plants and Small Reactor Facilities, and REGDOC-2.5.2. - Design of Reactor Facilities: Nuclear Power Plants. From the results of the study, it was concluded that several things that need to be considered as required regarding computer security are the establishment of a computer security team, the preparation of a computer security plan, a graded approach to computer security, and risk assessment.","PeriodicalId":20561,"journal":{"name":"PROCEEDINGS OF THE 6TH INTERNATIONAL SYMPOSIUM ON CURRENT PROGRESS IN MATHEMATICS AND SCIENCES 2020 (ISCPMS 2020)","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Computer security regulation for nuclear installation: A suggestion\",\"authors\":\"F. P. Cusmanri, M. S. Putra, Z. Zulfiandri, M. R. Ridhallahi\",\"doi\":\"10.1063/5.0058875\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The progress and development of information technology has opened up one form of nuclear crime, namely computer crime. The Stuxnet incident that occurred in 2010 is one example of cyber incidents related to nuclear security. The International Atomic Energy Agency (IAEA) as an international regulatory body has paid attention to computer security as outlined in one of the important elements in NSS 20 - Objective and Essentials Elements of a State’s Nuclear Security Regime. The security aspect itself is one of the aspects emphasized in Act Number 10 of 1997 concerning Nuclear Energy. Government Regulation Number 54 of 2012 concerning Nuclear Installation Safety and Security outlines a more detailed discussion of nuclear installation security, which is a more specific discussion on safety in the aspect of physical protection regulated in Regulation of the Head of the Nuclear Power Supervisory Agency Number 1 of 2009 concerning Installation Physical Protection Systems and Nuclear Materials. However, all of these regulations still do not explicitly mention computer security. This paper was prepared to provide recommendations that can be used in the preparation of regulations and guidelines related to computer security in nuclear installations. This paper was prepared using the main reference NSS 17 - Computer Security at Nuclear Facilities which was perfected by the review of Regulatory Guide 5.71 - Cyber Security Programs for Nuclear Facility, CSA N290.7-14 - Cyber Security for Nuclear Power Plants and Small Reactor Facilities, and REGDOC-2.5.2. - Design of Reactor Facilities: Nuclear Power Plants. From the results of the study, it was concluded that several things that need to be considered as required regarding computer security are the establishment of a computer security team, the preparation of a computer security plan, a graded approach to computer security, and risk assessment.\",\"PeriodicalId\":20561,\"journal\":{\"name\":\"PROCEEDINGS OF THE 6TH INTERNATIONAL SYMPOSIUM ON CURRENT PROGRESS IN MATHEMATICS AND SCIENCES 2020 (ISCPMS 2020)\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PROCEEDINGS OF THE 6TH INTERNATIONAL SYMPOSIUM ON CURRENT PROGRESS IN MATHEMATICS AND SCIENCES 2020 (ISCPMS 2020)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1063/5.0058875\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PROCEEDINGS OF THE 6TH INTERNATIONAL SYMPOSIUM ON CURRENT PROGRESS IN MATHEMATICS AND SCIENCES 2020 (ISCPMS 2020)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1063/5.0058875","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

信息技术的进步和发展开辟了一种核犯罪形式,即计算机犯罪。2010年发生的Stuxnet事件是与核安全相关的网络事件的一个例子。国际原子能机构(IAEA)作为一个国际监管机构,在《国家核安全制度的目标和基本要素》(NSS 20)的重要要素之一中概述了计算机安全问题。安全方面本身是1997年关于核能的第10号法案所强调的方面之一。2012年《核设施安全与安保政府条例》第54号对核设施安保进行了更详细的讨论,这是对2009年《核电监督机构第1号关于设施实物保护系统和核材料的条例》中规定的实物保护方面的安全进行更具体的讨论。然而,所有这些规定仍然没有明确提到计算机安全。编写这份文件的目的是提供建议,以便在编制有关核设施计算机安全的规章和准则时使用。本文是根据主要参考文献NSS 17 -核设施计算机安全编写的,该参考文献是通过审查监管指南5.71 -核设施网络安全计划、CSA N290.7-14 -核电站和小型反应堆设施网络安全以及REGDOC-2.5.2而完善的。-反应堆设施设计:核电站。根据研究的结果,我们得出结论,在电脑保安方面需要考虑的几件事是成立电脑保安小组、编制电脑保安计划、采用分级方法来处理电脑保安,以及进行风险评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Computer security regulation for nuclear installation: A suggestion
The progress and development of information technology has opened up one form of nuclear crime, namely computer crime. The Stuxnet incident that occurred in 2010 is one example of cyber incidents related to nuclear security. The International Atomic Energy Agency (IAEA) as an international regulatory body has paid attention to computer security as outlined in one of the important elements in NSS 20 - Objective and Essentials Elements of a State’s Nuclear Security Regime. The security aspect itself is one of the aspects emphasized in Act Number 10 of 1997 concerning Nuclear Energy. Government Regulation Number 54 of 2012 concerning Nuclear Installation Safety and Security outlines a more detailed discussion of nuclear installation security, which is a more specific discussion on safety in the aspect of physical protection regulated in Regulation of the Head of the Nuclear Power Supervisory Agency Number 1 of 2009 concerning Installation Physical Protection Systems and Nuclear Materials. However, all of these regulations still do not explicitly mention computer security. This paper was prepared to provide recommendations that can be used in the preparation of regulations and guidelines related to computer security in nuclear installations. This paper was prepared using the main reference NSS 17 - Computer Security at Nuclear Facilities which was perfected by the review of Regulatory Guide 5.71 - Cyber Security Programs for Nuclear Facility, CSA N290.7-14 - Cyber Security for Nuclear Power Plants and Small Reactor Facilities, and REGDOC-2.5.2. - Design of Reactor Facilities: Nuclear Power Plants. From the results of the study, it was concluded that several things that need to be considered as required regarding computer security are the establishment of a computer security team, the preparation of a computer security plan, a graded approach to computer security, and risk assessment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Singular Integral Operators, Quantitative Flatness, and Boundary Problems Mirzakhani’s Curve Counting and Geodesic Currents The conception of national nuclear emergency preparedness system from the state defense perspective Computer security regulation for nuclear installation: A suggestion Optimal reinsurance combination of quota-share and stop-loss reinsurance based on conditional-tail-expectation (CTE) optimization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1