INTERWEAVING BETWEEN THE CYBER AND PHYSICAL DOMAINS IN THE THREAT ANALYSIS FOR NUCLEAR SITES
Abstract
Abstract: In this paper we overview the threat analysis process in the fields of physical and cyber security, as part of the requirements preparation for the implementation of security measures in nuclear sites. We highlight the essential characteristics of capability, motivation and intent, used as criteria in qualifying the threats. We analyse the interweaving between the two domains and the dynamic aspects of the threat.
Keywords: threats; physical security; cyber security; nuclear; design basis threat.
References
Arora, Sunpreet S.ș Cao, Kaiș Jain, Anil 1. K., 3D Fingerprint Phantoms, 2013, http://www.cse.msu.edu/rgroups/biometrics/Publications/Fingerprint/Aroraetal_MSUTechReportMSU-CSE-13-12.pdf, accessed 30.05.2015.
CERT RO, 2. RAPORT cu privire la alertele de securitate cibernetica procesate de CERT-RO in anul 2014, 2015, http://www.cert-ro.eu/files/doc/915_20150325000331012990800_X.pdf, accessed 30.05.2015.
Chinchani, R.; Iyer, A.; Ngo, H.Q.; 3. Upadhyaya, S., Towards a theory of insider threat assessment, 2005 International Conference on Dependable Systems and Networks (DSN’05) (2005).
Clapper, James R., 4. Worldwide Threat Assessment of the US Intelligence Community, 2015, http://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf, accessed 30.05.2015.
CNCAN, 5. Norma privind protecția instalațiilor nucleare împotriva amenințărilor cibernetice
Hutchins, Eric M., Cloppert, Michael 6. J., Amin, Rohan M. Intelligence-Driven Computer Network Defense Informedby Analysis of Adversary Campaigns and Intrusion Kill Chains, 6th Annual International Conference on Information Warfare and Security July 2005 (2011), pp. 1-14, http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf, accessed 30.05.2015.
IAEA, 7. Amendment to the Convention on the Physical Protection of Nuclear Material, IAEA, 2005, http://www.iaea.org/About/Policy/GC/GC49/Documents/gc49inf-6.pdf, accessed 30.05.2015.
IAEA, 8. Development, Use and Maintenance of the Design Basis Threat, 2009, http://www-pub.iaea.org/MTCD/publications/PDF/Pub1386_web.pdf, accessed 30.05.2015.
Lee, Edward A., 9. Cyber Physical Systems: Design Challenges, in 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), 2008, pp. 363-369,http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4519604, accessed 30.05.2015.
Moore, G E, 10. Cramming more components onto integrated circuits (Reprinted from Electronics, pg 114-117, April 19, 1965), Proceedings of the IEEE 86, 1 (1998), pp. 82-85.
SR ISO/CEI 27001 - Tehnologia informației, 11. Tehnici de securitate, Sisteme de management al securității informației - Cerințe, 2006.
Dell SecureWorks Counter Threat Unit12. , http://www.secureworks.com/cyber-threat-intelligence/, accessed 30.05.2015.
iSightPartners ThreatScape13. , http://www.isightpartners.com/products/threatscape/, accessed 30.05.2015.
Downloads
Published
How to Cite
Issue
Section
License
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.