Computer Security Aspects of Design for Instrumentation and Control Systems at Nuclear Power Plants
eBook - ePub

Computer Security Aspects of Design for Instrumentation and Control Systems at Nuclear Power Plants

,
  1. 57 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Computer Security Aspects of Design for Instrumentation and Control Systems at Nuclear Power Plants

,

About this book

The transition to digital technology has changed the nature of instrumentation and control (l&C) systems by enabling extensive interconnection of reprogrammable, functionally interdependent I&C systems. This development has made computer security a necessary element for consideration in I&C system design. The benefits and challenges of the various computer security methods and controls with their implementation in nuclear power plant I&C systems are discussed and described in this publication. The publication provides an overview of current knowledge, up to date good practices, experience, and benefits and challenges related to the application of computer security measures. The publication defines the key concepts for computer security for I&C systems at nuclear facilities, explains the risk informed approach to computer security and describes how computer security measures are applied throughout the l&C system life cycle. Situations where I&C systems are interconnected with enterprise management systems are also addressed. The three appendices present case studies with practical application examples.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Computer Security Aspects of Design for Instrumentation and Control Systems at Nuclear Power Plants by in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Mechanical Engineering. We have over one million books available in our catalogue for you to explore.

1. INTRODUCTION

1.1. Background

Historically, computer security was not given significant consideration in the design of instrumentation and control (I&C) systems at nuclear power plants (NPPs). These systems were traditionally seen as being invulnerable or resilient to cyberattacks due to rigid (i.e. hardwired or analogue) implementation, segregation, independence, redundancy and diversity; isolation from external networks; and a general absence of interactive communications (especially with external networks). However, the transition to digital technology has changed the nature of these systems by enabling extensive interconnection of reprogrammable, functionally interdependent I&C systems. This development has made computer security a necessary element for consideration in I&C system design. Malicious cyberattacks on these systems could have serious effects on plant safety and security, which could have the potential to lead to severe and unacceptable consequences. Also, particularly for countries where nuclear power represents a significant part of electricity production, the availability and performance of NPPs can be of vital economic and societal interest.
Computer security vulnerabilities may be introduced into a system during its design, development, operations or maintenance, and vulnerabilities may be discovered or attacks launched against the system at any time. As a result, computer security needs to be established throughout the I&C system life cycle to prevent computer security incidents that could lead to nuclear security events. The IAEA’s Division of Nuclear Security has prepared an IAEA Nuclear Security Series publication, No. 33-T, Computer Security of Instrumentation and Control Systems at Nuclear Facilities [1], which provides guidance on computer security considerations that need to be addressed during the life cycle of I&C systems at nuclear facilities. This publication [1] describes computer security measures that prevent, manage (i.e. detect, delay and respond), mitigate and foster recovery from cyberattacks.
The members of the Technical Working Group on Nuclear Power Plant Instrumentation and Control (TWG-NPPIC) recognized the relevance of the above mentioned issues, and in their 2015 meeting recommended that the IAEA provide specific, detailed guidance on the application of computer security concepts and measures to protect and mitigate I&C systems at NPPs against hazards arising from cyberattacks. This guidance was to ensure that security concepts and measures are applied in a manner that is compatible with the safety and performance objectives of the I&C systems. The TWG-NPPIC concluded that there is benefit in engaging I&C subject matter experts to address the practical aspects of implementing computer security measures aligned with both safety and security requirements.
As a starting point, this publication considers the computer security issues to be addressed during the life cycle of I&C systems at nuclear facilities, as identified in Ref. [1]. This publication complements Ref. [1] and provides practical guidance for and case study examples of the implementation of computer security measures in I&C architectures and systems. The guidance is consistent with the requirements and recommendations addressing safety and ensures that application of computer security does not affect the ability of systems to perform their required safety functions.

1.2. Objective

The objective of this publication is to assist Member States in the application of computer security concepts and measures to provide protection from cyberattacks for I&C systems at NPPs; it discusses the benefits and challenges of the various methods. The goal of the publication is to provide an overview of current knowledge, up to date good practices, experience, benefits and challenges. The publication is intended to be used by Member States to support the design, development, implementation, operation, maintenance and modernization of digital I&C systems at NPPs.

1.3. Scope

This publication covers relevant aspects of computer security in the engineering and design of digital I&C systems for NPPs. The information is useful in supporting new system designs and the improvement of existing systems in operating NPPs.
This publication is applicable to I&C systems and their development, simulation and maintenance environments. Attacks against these environments could lead to errors in the I&C system and result in the I&C system being outside of its design basis. This publication also provides advice for situations where I&C systems are interconnected with enterprise management systems. These non-I&C systems may need to be included as part of the defence in depth (DiD) approach to securing the I&C systems. Finally, there may be circumstances where, as part of a DiD approach, non-computerized I&C systems and non-computerized equipment important to safety, including support systems, can be used to provide protection and mitigation against hazards arising from cyberattacks at NPPs.

1.4. Structure

This publication is organized into five major sections, three appendices and two annexes. Section 2 defines the key concepts for computer security for I&C systems at NPPs. Section 3 explains the risk informed approach to computer security. Section 4 describes how computer security measures are applied throughout the I&C system life cycle. Section 5 contains a summary and conclusions. Appendices I to III are case studies. Annex I provides information on data communications security and Annex II suggests data to be collected to support the security of I&C systems.

2. KEY CONCEPTS FOR COMPUTER SECURITY FOR NPP I&C SYSTEMS

Computer security concepts are applied to the design of I&C systems to ensure that safety and security requirements are met, and that the cost of maintaining computer security and the need to retrofit computer security measures in the future are minimized. A key concept is the fundamental conflict between safety and security, which is discussed below. Other key concepts described are computer security levels, security zones and computer security DiD. These...

Table of contents

  1. 1. INTRODUCTION
  2. REFERENCES
  3. Annex I DATA COMMUNICATIONS SECURITY
  4. Annex II RECOMMENDATIONS FOR ESSENTIAL DATA COLLECTION
  5. ABBREVIATIONS
  6. CONTRIBUTORS TO DRAFTING AND REVIEW