This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification...This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future.展开更多
Around the world, radioactive sources have been widely used for decades to benefit humankind; industry food; health, etc. However, the malicious use of radiological sources poses a significant threat globally. As Irra...Around the world, radioactive sources have been widely used for decades to benefit humankind; industry food; health, etc. However, the malicious use of radiological sources poses a significant threat globally. As Irradiation facility for research the goal of this paper is to show a case study of application of nuclear security and nuclear security culture code of contact in irradiation facility using cobalt 60. And it will show the necessary work done to achieve the goal of protection of radioactive material and continue working in safe conditions. This objective could not be achieved without the collaboration of all department involved in security and nuclear safety. In this work we applied the nuclear security and nuclear security culture procedures in order to define the type of system used to achieve the global objective in accordance with Global Threat Reduction Program to reduce the threat of a RDD (Radiological Dispersion Device) in collaboration with The United States Department of Energy's NNSA (National Nuclear Security Administration). The objective of this paper is to share a local experience in upgrading security with return of experience in practice and very good collaboration with general direction of national security and all departments involved in security and nuclear safety.展开更多
This paper describes the definition of nuclear security that has been changing from the cold war age to the post-911 period, and clarifies the close relationship and yet a clear distinction between nuclear security, n...This paper describes the definition of nuclear security that has been changing from the cold war age to the post-911 period, and clarifies the close relationship and yet a clear distinction between nuclear security, nuclear safety and nuclear safeguard. Based on analyses of the current state of nuclear security activities in China as well as the requirements and the law infrastructure, a legislative and regulatory framework of nuclear security and the mandate of a regulatory body in China are recommended.展开更多
The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper...The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper considers, implemented by the authors within the project of advanced digital control system for NPP with the reactor VVER-1000, a system of unauthorized access protection, partially built up on the technology of AA (active audit) and expert system. The AA technology is based on response of the system on deviation of current signature of the automated process control system from stable state rather than on a certain signature of attack and relies on the estimation of the behavioral models of the particular digital control system. The advent of active audit reflects the current situation in the digital control systems where complex distributed platforms are used to construct automated process control system. The active audit allows one to make the digital control system functionally closed, provided that it is determinate. The methodology of the active audit does not give u external (barrier) and traditional (password, antivirus) methods of unauthorized access protection. These methods can be used when it is appropriate to achieve a required protection level.展开更多
KEY issues that were discussed at the Summit included how stockpiles of hazardous nuclear material can be reduced, how nuclear material, facilities and radioactive sources can be secured and how international coopera-...KEY issues that were discussed at the Summit included how stockpiles of hazardous nuclear material can be reduced, how nuclear material, facilities and radioactive sources can be secured and how international coopera-tion can be enhanced. As with previous summits, the 2014 Summit produced a communiqu6, which sets out meas-ures that states should implement in order to strengthen global nuclear security.展开更多
An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to ...An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to focus on companies’personnel.Nonetheless,several hacking incidents,involving major companies and public/financial institutions,were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work.Specifically,institutions that operate industrial control systems(ICSs)associated with critical national infrastructures,such as traffic or energy,have contracted several cooperative firms.Nonetheless,ICT’s importance is gradually increasing,due to outsourcing,and is the most vulnerable factor in security.This paper proposes a virtualized security management scheme for the resident cooperative firms in the industrial control infrastructure.Since such companies often cannot afford adequate investment in security,the scheme is to let an ICS company provide the virtualized system.One of its merits is the convenience of controlling a VDI server at the center.The cooperative firms were classified,based on their respective security levels,and statistics were collected throughout a four-year period for the results.This paper analyzes the policies and virtualization systems that have been applied to the security of the partner companies,which engaged in ICS security.A suitable model for ICS security was then proposed by analyzing their effects on the system efficiencies,based on the comparisons of the security inspection results obtained before and after virtualization.The proposed system is expected to contribute to industrial safety.展开更多
文摘This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future.
文摘Around the world, radioactive sources have been widely used for decades to benefit humankind; industry food; health, etc. However, the malicious use of radiological sources poses a significant threat globally. As Irradiation facility for research the goal of this paper is to show a case study of application of nuclear security and nuclear security culture code of contact in irradiation facility using cobalt 60. And it will show the necessary work done to achieve the goal of protection of radioactive material and continue working in safe conditions. This objective could not be achieved without the collaboration of all department involved in security and nuclear safety. In this work we applied the nuclear security and nuclear security culture procedures in order to define the type of system used to achieve the global objective in accordance with Global Threat Reduction Program to reduce the threat of a RDD (Radiological Dispersion Device) in collaboration with The United States Department of Energy's NNSA (National Nuclear Security Administration). The objective of this paper is to share a local experience in upgrading security with return of experience in practice and very good collaboration with general direction of national security and all departments involved in security and nuclear safety.
文摘This paper describes the definition of nuclear security that has been changing from the cold war age to the post-911 period, and clarifies the close relationship and yet a clear distinction between nuclear security, nuclear safety and nuclear safeguard. Based on analyses of the current state of nuclear security activities in China as well as the requirements and the law infrastructure, a legislative and regulatory framework of nuclear security and the mandate of a regulatory body in China are recommended.
文摘The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper considers, implemented by the authors within the project of advanced digital control system for NPP with the reactor VVER-1000, a system of unauthorized access protection, partially built up on the technology of AA (active audit) and expert system. The AA technology is based on response of the system on deviation of current signature of the automated process control system from stable state rather than on a certain signature of attack and relies on the estimation of the behavioral models of the particular digital control system. The advent of active audit reflects the current situation in the digital control systems where complex distributed platforms are used to construct automated process control system. The active audit allows one to make the digital control system functionally closed, provided that it is determinate. The methodology of the active audit does not give u external (barrier) and traditional (password, antivirus) methods of unauthorized access protection. These methods can be used when it is appropriate to achieve a required protection level.
文摘KEY issues that were discussed at the Summit included how stockpiles of hazardous nuclear material can be reduced, how nuclear material, facilities and radioactive sources can be secured and how international coopera-tion can be enhanced. As with previous summits, the 2014 Summit produced a communiqu6, which sets out meas-ures that states should implement in order to strengthen global nuclear security.
基金This research was supported by the Energy Cloud R&D Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Science,ICT(NRF2019M3F2A1073385).
文摘An analysis of the recent major security incidents related to industrial control systems,revealed that most had been caused by company employees.Therefore,enterprise security management systems have been developed to focus on companies’personnel.Nonetheless,several hacking incidents,involving major companies and public/financial institutions,were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work.Specifically,institutions that operate industrial control systems(ICSs)associated with critical national infrastructures,such as traffic or energy,have contracted several cooperative firms.Nonetheless,ICT’s importance is gradually increasing,due to outsourcing,and is the most vulnerable factor in security.This paper proposes a virtualized security management scheme for the resident cooperative firms in the industrial control infrastructure.Since such companies often cannot afford adequate investment in security,the scheme is to let an ICS company provide the virtualized system.One of its merits is the convenience of controlling a VDI server at the center.The cooperative firms were classified,based on their respective security levels,and statistics were collected throughout a four-year period for the results.This paper analyzes the policies and virtualization systems that have been applied to the security of the partner companies,which engaged in ICS security.A suitable model for ICS security was then proposed by analyzing their effects on the system efficiencies,based on the comparisons of the security inspection results obtained before and after virtualization.The proposed system is expected to contribute to industrial safety.