Cyber-Security Threats and Response Models in Nuclear Power Plants

Cyber-Security Threats and Response Models in Nuclear Power Plants

Author: Carol Smidts

Publisher: Springer Nature

Published: 2022-10-10

Total Pages: 100

ISBN-13: 3031127110

DOWNLOAD EBOOK

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.


Cyber Security at Civil Nuclear Facilities

Cyber Security at Civil Nuclear Facilities

Author: Caroline Baylon

Publisher: Chatham House (Formerly Riia)

Published: 2016-02

Total Pages: 0

ISBN-13: 9781784130794

DOWNLOAD EBOOK

"The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing use of commercial 'off-the-shelf' software, according to a new Chatham House report." --


Development, Use and Maintenance of the Design Basis Threat

Development, Use and Maintenance of the Design Basis Threat

Author: International Atomic Energy Agency

Publisher:

Published: 2009

Total Pages: 30

ISBN-13: 9789201025098

DOWNLOAD EBOOK

This publication provides guidance on how to develop, use and maintain a design basis threat (DBT). It is intended for decision makers from organisations with roles and responsibilities for the development, use and maintenance of the DBT. This implementing guide describes a DBT; identifies and recommends the roles and responsibilities of organisations that should be involved in the development, use and maintenance of a DBT; describes how to conduct a national threat assessment as a precursor to a DBT; explains how a DBT can be developed; explains how a DBT is incorporated into a State's nuclear security regime; and explains the conditions for a review of the DBT, and how the review and update are conducted.


Countering Cyber Sabotage

Countering Cyber Sabotage

Author: Andrew A. Bochman

Publisher: CRC Press

Published: 2021-01-20

Total Pages: 232

ISBN-13: 1000292975

DOWNLOAD EBOOK

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.


NUREG/CR.

NUREG/CR.

Author: U.S. Nuclear Regulatory Commission

Publisher:

Published: 1977

Total Pages: 16

ISBN-13:

DOWNLOAD EBOOK


Computer Security Incident Response Planning at Nuclear Facilities

Computer Security Incident Response Planning at Nuclear Facilities

Author: International Atomic Energy Agency

Publisher:

Published: 2016

Total Pages: 0

ISBN-13: 9789201044167

DOWNLOAD EBOOK

The purpose of this publication is to assist member states in developing comprehensive contingency plans for computer security incidents with the potential to impact nuclear security and/or nuclear safety. It provides an outline and recommendations for establishing a computer security incident response capability as part of a computer security programme.


CEH Certified Ethical Hacker Study Guide

CEH Certified Ethical Hacker Study Guide

Author: Kimberly Graves

Publisher: John Wiley & Sons

Published: 2010-06-03

Total Pages: 424

ISBN-13: 0470642882

DOWNLOAD EBOOK

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf


Nuclear Terrorism

Nuclear Terrorism

Author: Graham Allison

Publisher: Macmillan

Published: 2004-08-09

Total Pages: 292

ISBN-13: 1429945516

DOWNLOAD EBOOK

A leading strategist opens our eyes to the greatest terrorist threat of all-and how to prevent it before it's too late Americans in the twenty-first century are keenly aware of the many forms of terrorism: hijackings, biological attacks, chemical weapons. But rarely do we allow ourselves to face squarely the deadliest form of terrorism, because it is almost too scary to think about-a terrorist group exploding a nuclear device in an American city. In this urgent call to action, Graham Allison, one of America's leading experts on nuclear weapons and national security, presents the evidence for two provocative, compelling conclusions. First, if policy makers in Washington keep doing what they are currently doing about the threat, a nuclear terrorist attack on America is likely to occur in the next decade. And if one lengthens the time frame, a nuclear strike is inevitable. Second, the surprising and largely unrecognized good news is that nuclear terrorism is, in fact, preventable. In these pages, Allison offers an ambitious but feasible blueprint for eliminating the possibility of nuclear terrorist attacks. The United States once relied on the threat of mutually assured destruction to deter the Soviet Union from launching a nuclear strike. But in today's fragmented world, a new strategy is needed, especially with nuclear material vulnerable to theft or sale through black-market channels. The choice is ours: to grab this beast by the horns or to be impaled on those horns. We do not have the luxury of hoping the problem will go away, and Allison shows why.


Effective Model-Based Systems Engineering

Effective Model-Based Systems Engineering

Author: John M. Borky

Publisher: Springer

Published: 2018-09-08

Total Pages: 788

ISBN-13: 3319956698

DOWNLOAD EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.