
Analysis for Nuclear Cyber Security Incorporated with Industrial Research and Development (R&D) for Commercialized Nuclear Power Plants (NPPs)
Author(s) -
Kyung Bae Jang,
Tae Ho Woo
Publication year - 2022
Publication title -
webology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.259
H-Index - 18
ISSN - 1735-188X
DOI - 10.14704/web/v19i1/web19287
Subject(s) - nuclear power , terrorism , the internet , work (physics) , computer security , control (management) , business , engineering , computer science , political science , law , artificial intelligence , physics , mechanical engineering , world wide web , nuclear physics
The multidisciplinary analysis for the training with research and development (R&D) regarding nuclear terrorism is studied. The cyber terror attack on nuclear power plants (NPPs) has provoked necessities of the education importance. The system dynamics (SD) is applied to this work, which was created in MIT around 1950s to promote the corporations of managers to enhance their understandings in industrial and political processes and the SD is nowadays being used throughout the public and private sector for policy analysis and design. SD simulations are shown as Records Retention, New R&D, New Education, Change Control, and Security Program Review. In these simulations, the continuous increasing values are shown in Records Retention. The New R&D and New Education are randomly generated values between 0.0 and 1.0. After the summations with these values, Change Control and Security Program Review are obtained. The effect of simulation is highest in the 10th month. Otherwise, it is minimized in 19th month. The higher values mean in the situation much more secure for the cyber terror in the nuclear industry. Internationally agreed training center could be established for the prevention and preparations for the potential terror cases. Regarding the other kinds of energy facility, the oil and coal powered plants have many susceptible situations. For example, the power line control system could be attacked by the networking computer system. Considering the common characteristics of the cyber terror on industry, the international attacking is possibly done due to the networking of the internet systems. The education program will be constructed and modified reflecting the situations of each nation.