Overview and Recommendations for Cyber Risk Assessment in Nuclear Power Plants

被引:4
作者
Zhang, Fan [1 ]
Kelly, Kevin [1 ]
机构
[1] Georgia Inst Technol, 770 State St NW, Atlanta, GA 30313 USA
关键词
Cybersecurity; risk assessment; digital instrumentation and control; Bayesian network; nuclear power plants; C SYSTEMS; SECURITY; MODEL;
D O I
10.1080/00295450.2022.2092356
中图分类号
TL [原子能技术]; O571 [原子核物理学];
学科分类号
0827 ; 082701 ;
摘要
Digital instrumentation and control (I&C) systems are being deployed in nuclear power plants (NPPs) for both existing and advanced reactor designs. As I&C systems become more digitized to allow features like near autonomous control and remote operation, they introduce greater cyber risk to NPPs. Cyberattacks targeting industrial control systems (ICSs) are growing in both qualities and capabilities, which indicates that cybersecurity needs to be an integral part of risk assessment in the industry. Although there are some risk assessment methods in traditional information technology (IT) cybersecurity, the differences between IT and ICS cybersecurity make it infeasible to apply these risk assessment methods directly to ICSs. Some research has focused on risk assessment methods for ICSs, but few studies focus on applications to NPPs. Ideal risk frameworks for the nuclear industry are dynamic and account for system dependencies; this survey review focuses on such risk assessment methods both in and outside the nuclear field. The major challenges in cybersecurity risk assessment research are pointed out, and further research suggestions and considerations for cyber risk assessment in I&C systems are identified.
引用
收藏
页码:488 / 502
页数:15
相关论文
共 50 条
[1]   Continuous Risk Management for Industrial IoT: A Methodological View [J].
Adaros-Boye, Carolina ;
Kearney, Paul ;
Josephs, Mark .
RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 :34-49
[2]  
[Anonymous], The Cyber Security Evaluation Tool (CSET)
[3]  
[Anonymous], 2010, Regulatory Guide 5.71
[4]  
[Anonymous], 2009, REGULATORY GUIDE 120, P191
[5]  
[Anonymous], 2004, IEEE C INT INFRASTRU
[6]  
[Anonymous], 2013, SP 800 82
[7]   A review of cyber security risk assessment methods for SCADA systems [J].
Cherdantseva, Yulia ;
Burnap, Pete ;
Blyth, Andrew ;
Eden, Peter ;
Jones, Kevin ;
Soulsby, Hugh ;
Stoddart, Kristan .
COMPUTERS & SECURITY, 2016, 56 :1-27
[8]  
Clark A J., 2018, Transactions of the American Nuclear Society
[9]   Hazard and operability (HAZOP) analysis. A literature review [J].
Dunjo, Jordi ;
Fthenakis, Vasilis ;
Vilchez, Juan A. ;
Arnaldos, Josep .
JOURNAL OF HAZARDOUS MATERIALS, 2010, 173 (1-3) :19-32
[10]   Survey of cyber risk analysis techniques for use in the nuclear industry [J].
Eggers, Shannon ;
Le Blanc, Katya .
PROGRESS IN NUCLEAR ENERGY, 2021, 140