Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima are rare, but their effects are devastating enough to warrant increased vigilance in addressing safety concerns. Nuclear Power Plant Instrumentation and Control Systems for Safety and Security evaluates the risks inherent to nuclear power and methods of preventing accidents through computer control systems and other such emerging technologies. Students and scholars as well as operators and designers will find useful insight into the latest security technologies with the potential to make the future of nuclear energy clean, safe, and reliable.
Computer security is increasingly recognized as a key component in nuclear security. This publication outlines a methodology for conducting computer security assessments at nuclear facilities. The methodology can likewise be easily adapted to provide assessments at facilities with other radioactive materials.
The purpose of this publication is to assist member states in developing comprehensive contingency plans for computer security incidents with the potential to impact nuclear security and/or nuclear safety. It provides an outline and recommendations for establishing a computer security incident response capability as part of a computer security programme.
Computer security as a discipline is challenged by increasing threat vectors targeting a dynamic technological environment. This publication establishes guidance addressing the challenge of applying computer security measures to instrumentation and control (I&C) systems at nuclear facilities. The measures are intended to protect these I&C systems throughout their entire lifecycles against malicious acts perpetrated by threat actors. The technical basis and methodologies for the application of these computer security measures are considered. The publication also addresses the application of such measures to the development, simulation and maintenance environments of the I&C systems. In addition, account is taken of developments in the human factors engineering and nuclear safety. This Technical Guidance references and takes into account other Safety Guides and IAQEA Nuclear Security Series publications that provide guidance relating to I&C design.
The technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before. This book is the first to confront these risks comprehensively. With Cyber Threats and Nuclear Weapons, Herbert Lin provides a clear-eyed breakdown of the cyber risks to the U.S. nuclear enterprise. Featuring a series of scenarios that clarify the intersection of cyber and nuclear risk, this book guides readers through a little-understood element of the risk profile that government decision-makers should be anticipating. What might have happened if the Cuban Missile Crisis took place in the age of Twitter, with unvetted information swirling around? What if an adversary announced that malware had compromised nuclear systems, clouding the confidence of nuclear decision-makers? Cyber Threats and Nuclear Weapons, the first book to consider cyber risks across the entire nuclear enterprise, concludes with crucial advice on how government can manage the tensions between new nuclear capabilities and increasing cyber risk. This is an invaluable handbook for those ready to confront the unique challenges of cyber nuclear risk.
Nuclear Safety provides the methods and data needed to evaluate and manage the safety of nuclear facilities and related processes using risk-based safety analysis, and provides readers with the techniques to assess the consequences of radioactive releases. The book covers relevant international and regional safety criteria (US, IAEA, EUR, PUN, URD, INI). The contents deal with each of the critical components of a nuclear plant, and provide an analysis of the risks arising from a variety of sources, including earthquakes, tornadoes, external impact and human factors. It also deals with the safety of underground nuclear testing and the handling of radioactive waste. - Covers all plant components and potential sources of risk including human, technical and natural factors. - Brings together information on nuclear safety for which the reader would previously have to consult many different and expensive sources. - Provides international design and safety criteria and an overview of regulatory regimes.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
"The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing use of commercial 'off-the-shelf' software, according to a new Chatham House report." --
Each State has the primary responsibility to build the capacity of organizations and people in order to develop, implement, and sustain a nuclear security regime. To discharge its responsibilities, the State has to strengthen its capacity at national, organizational and individual levels. Specifically, the State has to be able to enhance the competences and capabilities of relevant stakeholders in fulfilling their responsibilities within the nuclear security regime. Such endeavour involves various elements in capacity building, ranging from education and training to the development of a knowledge network. This publication is intended to serve as a reference document for Member States to develop a national capacity building strategy for nuclear security. It addresses all organizations involved in nuclear security and reflects the multidisciplinary and cross-institutional nature of this task, as well as the long term efforts that are required. .
Nuclear security culture is an important component of an effective nuclear security regime, as it serves as a tool to improve the performance of the human component at nuclear facilities and organizations to counter both insider and outsider threats. Security culture connotes not only the technical proficiency of the people but also their awareness of security risks and motivation to follow established procedures, comply with regulations and take the initiative when unforeseen circumstances arise. A workforce made up of individuals who are vigilant, who question irregularities, execute their work diligently and exhibit high standards of personal and collective behaviour is able to achieve effective nuclear security. Building upon this understanding of the importance of a strong nuclear security culture, this publication provides practical guidance on how to implement a systematic nuclear security culture enhancement programme.