Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Main menu
Environmental Topics
Laws & Regulations
About EPA
Health & Environmental Research Online (HERO)
Contact Us
Print
Feedback
Export to File
Search:
This record has one attached file:
Add More Files
Attach File(s):
Display Name for File*:
Save
Citation
Tags
HERO ID
8783043
Reference Type
Journal Article
Title
Cyber attack taxonomy for digital environment in nuclear power plants
Author(s)
Kim, S; Heo, G; Zio, E; Shin, J; Song, J
Year
2020
Is Peer Reviewed?
1
Journal
Nuclear Engineering and Technology
ISSN:
1738-5733
Volume
52
Issue
5
Page Numbers
995-1001
Language
English
DOI
10.1016/j.net.2019.11.001
Web of Science Id
WOS:000526899400014
Abstract
With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. ever, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. refore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG. 5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs. (C) 2019 Korean Nuclear Society, Published by Elsevier Korea LLC.
Keywords
Cyber-attack taxonomy; Cyber security; Nuclear power plant; ICS; SCADA; FUTURE
Tags
IRIS
•
Uranium Toxicological Review
Date limited literature search 2011-2021
New to this search
WOS
Home
Learn about HERO
Using HERO
Search HERO
Projects in HERO
Risk Assessment
Transparency & Integrity