首页> 外文会议>Conference on Nuclear Plant Instrumentation, Control and Human-Machine Interface Technologies >Application of a Graded Approach and Defence in Depth for Computer Security at Nuclear Facilities
【24h】

Application of a Graded Approach and Defence in Depth for Computer Security at Nuclear Facilities

机译:在核设施中应用分级方法和防御深度计算机安全性

获取原文

摘要

Computer security (or Cyber Security) of I&C systems (i.e. sensitive digital assets) at nuclearfacilities is of increasing importance based upon the adoption of cyber-attacks as a key componentof a potential adversary’s Tactics, Techniques and Procedures (TTPs). This new capability (i.e. tolaunch cyber-attacks) demands that operators of nuclear facilities put in place a programme andmeasures ensure protection of I&C systems.However, given that resources and time are limited, operators need to apply their limitedresources in a manner that maximizes the security benefit. The International Atomic EnergyAgency (IAEA) recognizes the need for efficient and effective approaches to security. IAEANuclear Security Series (NSS) Fundamentals NSS 20 [1], Essential Element 9: Use of RiskInformed Approaches states “A nuclear security regime uses risk informed approaches, includingin the allocation of resources for nuclear security systems and nuclear security measures and in theconduct of nuclear security related activities that are based on a graded approach and defence indepth.”For computer security, the IAEA defines the concepts of computer security levels andcomputer security zones in NSS 17 [2]. Computer security levels exist as a requirementsspecification that details the constraints and conditions imposed that must be met to ensure thatappropriate protection is provided to sensitive digital assets. Each individual computer securitylevel will require a graded level of effort (i.e. allocated resources), level of confidence inmeasures, and a level of adherence to requirements (or procedures) when conducting activities thatmay affect computer security.Computer security zones have logical and/or physical boundaries for which a common set ofrequirements (i.e. computer security level) are imposed or applied. Computer security zones existand consists of boundaries, devices and measures that are observable and/or measurable. Thearrangement of computer security zones within a defensive computer security architecture ensurethat defence-in-depth is achieved.The purpose of this paper is to provide an overview of IAEA guidance on the application of agraded approach and defence in depth to computer security at nuclear facilities. The paper willalso discuss the concepts of computer security levels and zones as found in IAEA Nuclear SecuritySeries (NSS) publications on computer security.
机译:I&C系统的计算机安全(或网络安全)(即敏感数字资产)在核根据通过网络攻击作为关键组件,设施越来越重要潜在的敌对策略,技术和程序(TTP)。这种新能力(即发起网络攻击)要求核设施运营商所建立的计划和措施确保I&C系统的保护。但是,鉴于资源和时间有限,运营商需要申请其有限公司资源以最大化安全效益的方式。国际原子能代理机构(原子能机构)认识到需要有效和有效的安全方法。原子能机构核安全系列(NSS)基本面NSS 20 [1],基本要素9:风险的使用知情方法国家“核安全政权使用风险通知方法,包括在核安保系统和核安保措施的资源分配中,以及核安保相关活动的行为,依据进行评级方法和防御深度。”对于计算机安全性,IAEA定义了计算机安全级别的概念和NSS 17中的计算机安全区域[2]。计算机安全级别作为要求存在规范详细介绍必须满足的限制和条件,以确保提供适当的保护以提供敏感数字资产。每个计算机安全性水平将需要分级的努力(即分配资源),信心水平在进行活动时,措施,以及对需求(或程序)的遵守程度可能会影响计算机安全性。计算机安全区域具有逻辑和/或身体边界,其中一个常见的一组施加或应用要求(即计算机安全级别)。存在计算机安全区域由观察和/或可测量的边界,设备和测量组成。这在防御性计算机安全架构中的计算机安全区域的安排确保实现了防御深度。本文的目的是概述原子能机构对A的应用指导核设施的计算机安全深入分级方法和防御。纸将是还讨论了IAEA核安全中发现的计算机安全级别和区域的概念计算机安全系列(NSS)出版物。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号