
Nuclear Industry Computer Security and Global Power Overview
Explore the significance of computer security in the nuclear industry, focusing on digital process control, global nuclear power distribution, and the age of operating reactors. Learn about safety and security measures crucial to safeguarding workers and the environment.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Computer Security in the Nuclear Industry T RI Tam s Project Manager, Paks NPP V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Pieceful use of nuclear energy V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Global Nuclear Power Latin Africa, 2 America, 6 436 reactors in operation (370 GWe) 5 reactors in long-term shutdown 62 reactors under construction As of December 2011 Asia, 116 Europe 187 North America 122 Reactors by region 140 36 1 4 2 120 100 1 17 80 122 60 120 92 40 7 67 20 2 24 0 6 2 0 Europe - W Europe - C&E Asia - FE Asia - ME&S North America Latin America Africa In operation Long-term shutdown Under construction V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban 3
Age of operating reactors 50% 75% 35 30 Number of reactors 25 20 15 10 5 0 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 Age V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban 4 (as of July 2012)
Digital process control Most of the Units were designed more than 30 years ago The nuclear industry is conservative Use of computers in process control was rare Recently designed Nuclear Units have digital process control and even digital safety systems Reconstruction projects in I&C systems install digital systems Nuclear safety was the No1 goal and the requirements reflected to that V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Many languages have the same word for safety and security Safety: The achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation Hazards. Security: The prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities. (IAEA Safety Glossary) V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Safety measures Measures already implemented, in digital I&C systems for safety reasons have cyber security benefit as well Redundancy Diversity Separation Defense in depth A set of comprehensive requirements for computer security was missing in the past decades V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Nuclear safety and nuclear security Significant safety events like TMI, Chernobyl or Fukushima initiate new safety measures and significant security events do the same. Up to the last few years security covered only the physical, personnel and information security but not the computer security Nuclear Industry started to deal with computer security in a systematic way only after September 11 The very recent malicious computer codes (Stuxnet, Duqu, Flame, Gauss) accelerated this process V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Trust and openness We have a good practice to share openly the information about safety events and investigation reports to learn the lesson (Forum of IAEA and WANO) We do not have any practice to share the information about computer security events (Only a few events are published) V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
International activities IEC 62645 New IEC Standard on Cyber Security commenced in 2008 Title: Nuclear Power Plants Instrumentation and Control Requirements for Security Programmes for I&C Systems, (revised title in Garching IEC Meeting March, 2011) Computer Security at Nuclear Facilities Published in 2011 IAEA Nuclear Security Series No17 IAEA Nuclear Security Series Conducting Computer Security Assessments for Nuclear Facilities Last meeting 12 April 2012 Updated Draft Final technical meeting: 2012 IV. quarter 120 day commenting and issue (I. quarter next year?) Applying Security Controls to Instrumentation and Control Systems First meeting: 2012, Jun IAEA Nuclear Security Series V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
The only IAEA document on the subject V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
IAEA services supporting safety and security OSART Operational Safety Review Team (OSART) Services IPPAS International Physical Protection Advisory Service ICSAS International Computer Security Advisory Service V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Methodology for ICSAS missions V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Scope of ICSAS missions V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Block diagram of a typical I&C function Nuclear regulator Disaster management Engineering offices Grid operator Each of these individual components is a potential vulnerable point The challenge is that these components were not necessarily designed with computer security as consideration. V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Exporting information Data Diode No need for fast data transfer, delay is tolerated for 10s of seconds No need to send back even a single bit Reliability can be increased by telegram repetition and application of redundancy Monitoring can be solved by counting telegrams and watching for missing ones V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban
Importing information Only a few (less then 10) signals are needed Set point for the electric power regulator Set point for the reactive power regulator Manual approval is provided for the operator V ltoz k rnyezet,v ltoz biztons g Kiberfenyeget sek kih v sai napjainkban