INTERWEAVING BETWEEN THE CYBER AND PHYSICAL DOMAINS IN THE THREAT ANALYSIS FOR NUCLEAR SITES

Tudor RĂDULESCU

Abstract


Abstract: In this paper we overview the threat analysis process in the fields of physical and cyber security, as part of the requirements preparation for the implementation of security measures in nuclear sites. We highlight the essential characteristics of capability, motivation and intent, used as criteria in qualifying the threats. We analyse the interweaving between the two domains and the dynamic aspects of the threat.
Keywords: threats; physical security; cyber security; nuclear; design basis threat.


Full Text:

PDF

References


Arora, Sunpreet S.ș Cao, Kaiș Jain, Anil 1. K., 3D Fingerprint Phantoms, 2013, http://www.cse.msu.edu/rgroups/biometrics/Publications/Fingerprint/Aroraetal_MSUTechReportMSU-CSE-13-12.pdf, accessed 30.05.2015.

CERT RO, 2. RAPORT cu privire la alertele de securitate cibernetica procesate de CERT-RO in anul 2014, 2015, http://www.cert-ro.eu/files/doc/915_20150325000331012990800_X.pdf, accessed 30.05.2015.

Chinchani, R.; Iyer, A.; Ngo, H.Q.; 3. Upadhyaya, S., Towards a theory of insider threat assessment, 2005 International Conference on Dependable Systems and Networks (DSN’05) (2005).

Clapper, James R., 4. Worldwide Threat Assessment of the US Intelligence Community, 2015, http://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf, accessed 30.05.2015.

CNCAN, 5. Norma privind protecția instalațiilor nucleare împotriva amenințărilor cibernetice

Hutchins, Eric M., Cloppert, Michael 6. J., Amin, Rohan M. Intelligence-Driven Computer Network Defense Informedby Analysis of Adversary Campaigns and Intrusion Kill Chains, 6th Annual International Conference on Information Warfare and Security July 2005 (2011), pp. 1-14, http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf, accessed 30.05.2015.

IAEA, 7. Amendment to the Convention on the Physical Protection of Nuclear Material, IAEA, 2005, http://www.iaea.org/About/Policy/GC/GC49/Documents/gc49inf-6.pdf, accessed 30.05.2015.

IAEA, 8. Development, Use and Maintenance of the Design Basis Threat, 2009, http://www-pub.iaea.org/MTCD/publications/PDF/Pub1386_web.pdf, accessed 30.05.2015.

Lee, Edward A., 9. Cyber Physical Systems: Design Challenges, in 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), 2008, pp. 363-369,http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4519604, accessed 30.05.2015.

Moore, G E, 10. Cramming more components onto integrated circuits (Reprinted from Electronics, pg 114-117, April 19, 1965), Proceedings of the IEEE 86, 1 (1998), pp. 82-85.

SR ISO/CEI 27001 - Tehnologia informației, 11. Tehnici de securitate, Sisteme de management al securității informației - Cerințe, 2006.

Dell SecureWorks Counter Threat Unit12. , http://www.secureworks.com/cyber-threat-intelligence/, accessed 30.05.2015.

iSightPartners ThreatScape13. , http://www.isightpartners.com/products/threatscape/, accessed 30.05.2015.


Refbacks

  • There are currently no refbacks.