Skip to main content
Log in

System lifecycle processes for cyber security in a research reactor facility

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

The digitalization of nuclear facilities has brought many benefits, including high performance and convenient maintainability, in terms of facility operation. However, cyber accidents accompanied by the use of digital technologies have increased, and cyber security has been one of the most important issues in the nuclear industry area. Several guidelines have been published for nuclear power plants, but it is difficult to apply all requirements within the guidelines to research reactor facilities because the characteristics in terms of facility scale, purpose, and system design, are different from those of power plants. To address this emerging topic, this paper introduces system lifecycle processes for cyber security in a research reactor facility. It addresses the integration of activities for securing systems and guarding a facility safely using the practices at a research reactor facility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Kesler B. The vulnerability of nuclear facilities to cyber attack. Strategic Insights, 2011, 10: 15–25

    Google Scholar 

  2. Saleh Z I, Refai H, Mashhour A. Proposed framework for security risk assessment. J Inf Secur, 2011, 2: 85–90

    Article  Google Scholar 

  3. Nai Fovino I, Guidi L, Masera M, et al. Cyber security assessment of a power plant. Elec Power Syst Res, 2011, 81: 518–526

    Article  Google Scholar 

  4. Lee C K, Park G Y, Kwon K C, et al. Cyber security design requirements based on a risk assessment. In: Proceedings of the Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, Knoxville, 2009. 1638–1646

    Google Scholar 

  5. USNRC. Regulatory Guide 1.152 Revision 3. Criteria for use of computers in safety systems of nuclear power plants, 2011

    Google Scholar 

  6. USNRC. Regulatory guide 5.71. Cyber security programs for nuclear facilities, 2010

    Google Scholar 

  7. USNRC. 10 CFR 50.55a(h). Protection and safety systems, 1971

    Google Scholar 

  8. USNRC. 10 CFR 73.1. Physical protection of plants and materials, 2007

    Google Scholar 

  9. USNRC. 10 CFR 73.54. Protection of digital computer and communication systems and networks, 2009

    Google Scholar 

  10. USNRC. Regulatory guide 1.152 revision 2. Criteria for use of computers in safety systems of nuclear power plants, 2006

    Google Scholar 

  11. IEEE. IEEE Std. 7-4.3.2-2010. Criteria for digital computers in safety systems of nuclear power generating stations, 2010

    Google Scholar 

  12. IAEA. Nuclear Security Series No. 17. Computer Security at Nuclear Facilities, 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to JaeKwan Park.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Park, J., Park, J. & Kim, Y. System lifecycle processes for cyber security in a research reactor facility. Sci. China Inf. Sci. 57, 1–12 (2014). https://doi.org/10.1007/s11432-013-4792-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-013-4792-y

Keywords

Navigation