Cargando…

Computer security for nuclear security : implementation guide.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: International Atomic Energy Agency
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Vienna : International Atomic Energy Agency, 2021.
Colección:IAEA nuclear security series ; no. 42-6.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1317842413
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220518s2021 au a ob 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d N$T  |d OCLCF  |d OCLCQ 
020 |a 9789201213204  |q (electronic bk.) 
020 |a 9201213204  |q (electronic bk.) 
035 |a (OCoLC)1317842413 
050 4 |a TK9153 
082 0 4 |a 621.48/35  |2 23/eng/20220531 
049 |a UAMI 
245 0 0 |a Computer security for nuclear security :  |b implementation guide. 
264 1 |a Vienna :  |b International Atomic Energy Agency,  |c 2021. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IAEA nuclear security series ;  |v no. 42-6 
504 |a Includes bibliographical references. 
588 |a Online resource; title from PDF title page (EBSCO, viewed May 31, 2022). 
505 0 |a Intro -- 1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. CONCEPTS AND CONTEXT -- Key terminology -- Identification of sensitive digital assets -- Cyber-attack -- Computer security across nuclear security -- Nuclear material and nuclear facilities -- Radioactive material and associated facilities -- Nuclear and other radioactive material out of regulatory control -- Threats, vulnerabilities and computer security measures -- Threats -- Vulnerabilities -- A graded approach and defence in depth for computer security 
505 8 |a Computer security responsibilities within a nuclear security regime -- Computer security competences and capabilities -- 3. ROLES AND RESPONSIBILITIES OF THE STATE -- Legislative and regulatory considerations -- Competent authority for computer security in the nuclear security regime -- Interfaces with other domains -- Nuclear safety -- Physical protection -- Information technology and operational technology functions -- Intelligence organizations -- Response organizations -- International assistance and cooperation (including information exchange) 
505 8 |a 4. ROLES AND RESPONSIBILITIES OF COMPETENT AUTHORITIES AND OPERATORS -- Working with vendors, contractors and suppliers -- Competent authority for computer security -- Prescriptive approach -- Performance based approach -- Combined approach -- Regulatory body -- 5. ESTABLISHING THE COMPUTER SECURITY STRATEGY -- Computer security strategy for the nuclear security regime -- Assessment of cyberthreat to the nuclear security regime -- Assigning a competent authority for cyberthreat assessment -- Assessment of the impact arising from mal-operation of SDAs 
505 8 |a Risk assessment method to determine computer security measures -- 6. IMPLEMENTING THE COMPUTER SECURITY STRATEGY -- Assignment of computer security responsibilities -- Relationships between competent authorities and operators -- Computer security competences and capabilities -- Responding to computer security incidents -- Exercises -- Assurance activities -- Security qualification of parts and services -- International cooperation and assistance -- 7. DEVELOPING A COMPUTER SECURITY PROGRAMME -- Contents of a computer security programme -- Organizational level risk assessment 
505 8 |a Computer security measures -- A graded approach for determining computer security measures -- Design of computer security measures -- Defence in depth for computer security measures -- Management of vendors, contractors and suppliers -- 8. SUSTAINING COMPUTER SECURITY -- Security culture -- Training -- Contingency plans and response -- Computer security assurance activities -- Appendix NUCLEAR SAFETY INTERFACE CONSIDERATIONS FOR COMPUTER SECURITY AT FACILITIES -- REFERENCES -- Annex I SUGGESTED RECOMMENDATIONS LEVEL GUIDANCE ON COMPUTER SECURITY FOR A NATIONAL NUCLEAR SECURITY REGIME 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Nuclear facilities  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Nuclear facilities  |x Security measures.  |2 fast  |0 (OCoLC)fst01040157 
710 2 |a International Atomic Energy Agency. 
830 0 |a IAEA nuclear security series ;  |v no. 42-6. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3282317  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6985994 
938 |a EBSCOhost  |b EBSC  |n 3282317 
994 |a 92  |b IZTAP