|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1317842413 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220518s2021 au a ob 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d EBLCP
|d N$T
|d OCLCF
|d OCLCQ
|
020 |
|
|
|a 9789201213204
|q (electronic bk.)
|
020 |
|
|
|a 9201213204
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)1317842413
|
050 |
|
4 |
|a TK9153
|
082 |
0 |
4 |
|a 621.48/35
|2 23/eng/20220531
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Computer security for nuclear security :
|b implementation guide.
|
264 |
|
1 |
|a Vienna :
|b International Atomic Energy Agency,
|c 2021.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IAEA nuclear security series ;
|v no. 42-6
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
|
|
|a Online resource; title from PDF title page (EBSCO, viewed May 31, 2022).
|
505 |
0 |
|
|a Intro -- 1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. CONCEPTS AND CONTEXT -- Key terminology -- Identification of sensitive digital assets -- Cyber-attack -- Computer security across nuclear security -- Nuclear material and nuclear facilities -- Radioactive material and associated facilities -- Nuclear and other radioactive material out of regulatory control -- Threats, vulnerabilities and computer security measures -- Threats -- Vulnerabilities -- A graded approach and defence in depth for computer security
|
505 |
8 |
|
|a Computer security responsibilities within a nuclear security regime -- Computer security competences and capabilities -- 3. ROLES AND RESPONSIBILITIES OF THE STATE -- Legislative and regulatory considerations -- Competent authority for computer security in the nuclear security regime -- Interfaces with other domains -- Nuclear safety -- Physical protection -- Information technology and operational technology functions -- Intelligence organizations -- Response organizations -- International assistance and cooperation (including information exchange)
|
505 |
8 |
|
|a 4. ROLES AND RESPONSIBILITIES OF COMPETENT AUTHORITIES AND OPERATORS -- Working with vendors, contractors and suppliers -- Competent authority for computer security -- Prescriptive approach -- Performance based approach -- Combined approach -- Regulatory body -- 5. ESTABLISHING THE COMPUTER SECURITY STRATEGY -- Computer security strategy for the nuclear security regime -- Assessment of cyberthreat to the nuclear security regime -- Assigning a competent authority for cyberthreat assessment -- Assessment of the impact arising from mal-operation of SDAs
|
505 |
8 |
|
|a Risk assessment method to determine computer security measures -- 6. IMPLEMENTING THE COMPUTER SECURITY STRATEGY -- Assignment of computer security responsibilities -- Relationships between competent authorities and operators -- Computer security competences and capabilities -- Responding to computer security incidents -- Exercises -- Assurance activities -- Security qualification of parts and services -- International cooperation and assistance -- 7. DEVELOPING A COMPUTER SECURITY PROGRAMME -- Contents of a computer security programme -- Organizational level risk assessment
|
505 |
8 |
|
|a Computer security measures -- A graded approach for determining computer security measures -- Design of computer security measures -- Defence in depth for computer security measures -- Management of vendors, contractors and suppliers -- 8. SUSTAINING COMPUTER SECURITY -- Security culture -- Training -- Contingency plans and response -- Computer security assurance activities -- Appendix NUCLEAR SAFETY INTERFACE CONSIDERATIONS FOR COMPUTER SECURITY AT FACILITIES -- REFERENCES -- Annex I SUGGESTED RECOMMENDATIONS LEVEL GUIDANCE ON COMPUTER SECURITY FOR A NATIONAL NUCLEAR SECURITY REGIME
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Nuclear facilities
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Nuclear facilities
|x Security measures.
|2 fast
|0 (OCoLC)fst01040157
|
710 |
2 |
|
|a International Atomic Energy Agency.
|
830 |
|
0 |
|a IAEA nuclear security series ;
|v no. 42-6.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3282317
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6985994
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3282317
|
994 |
|
|
|a 92
|b IZTAP
|