STUDY OF REQUIREMENTS AND CYBER SECURITY ANALYSIS OF THE SOFTWARE OF INFORMATION AND CONTROL SYSTEMS OF NPP, IMPORTANT FOR SECURITY

Author:

Vintenko Borys1ORCID,Myronets Iryna1ORCID,Smirnov Oleksii2ORCID,Kravchuk Oksana2ORCID,Kozirova Nataliia2ORCID,Savelenko Hryhorii2ORCID,Kovalenko Anna2ORCID

Affiliation:

1. Cherkasy State Technological University

2. Central Ukrainian National Technical University

Abstract

In order to counter cryptoattacks on elements of critical infrastructure, in particular on computer control systems of nuclear power plants, the goal achieved in this work is to analyze the requirements for computer security (cyber security) of the software of this system, which are relevant to the stage of its design, development and operation, as well as proposed criteria and methodology for calculating the quality of compliance with these requirements. To achieve the goal, the first section of the article provides information on standards and identified requirements for software cyber security. In the second section, an analysis of the requirements is carried out and an approach to software development is described, taking into account these requirements and analyzing their consideration. In the third section, an approach to calculating the performance indicator of software cyber security requirements is proposed. The fourth chapter provides an example of the application of this approach to the existing computerized NPP management system to assess compliance with cyber security requirements. The article discusses the requirements of the international standard IEC62645 and the industry standard of Ukraine “NP 306.2.237-2022”, which are related to the development of software for the computer control system of nuclear power plants. Ensuring cyber protection of the software of the NPP computer management system is a complex task that includes administrative, legal, technical, cultural, and organizational components. From the point of view of software development and operation, the main cyber security measures include software code verification, ensuring the absence of hidden functions, implementing physical equipment protection, security of software components, authentication, security during data exchange. To determine the compliance of the software with the requirements of cyber protection, it is necessary to determine the requirements applicable to each component of the software and conduct an analysis of their implementation. This action should occur continuously during the development of new software and software evaluation of existing computer control systems. After the analysis of the applicability and fulfillment of the requirements, the calculation of the coefficient of the fulfillment of the requirements can be carried out. It was noted that cyber protection is only a component of the quality of the software of the NPP computer control system, which is important for the performance of security functions. The analysis of requirements and the calculation of the coefficient of their fulfillment can be an integral part of the complex model of the software development process of the computer system of NPP management.

Publisher

Borys Grinchenko Kyiv Metropolitan University

Reference20 articles.

1. Nuclear power plant. (2019). VUE. https://vue.gov.ua/Атомна_електростанція

2. Operating NPPs of Ukraine. (n.d.). Uatom.org. https://www.uatom.org/zagalni-vidomosti

3. War and atomic energy: how Zaporizhia NPP works under occupation. (n.d.). Suspilne|News. https://suspilne.media/254222-vijna-ta-atomna-energia-ak-pracue-zaporizka-aes-pid-okupacieu/

4. These countries have the most nuclear reactors. (2019). Weforum. https://www.weforum.org/agenda/2019/11/countries-that-have-the-most-nuclear-power-alternative-energy-electricity-climate-change/?DAG=3&gad_source=1&gclid=CjwKCAiAyp-sBhBSEiwAWWzTnlkktfFh8DZ27khXqhSO76F18heFwSfVPxqo1oN07YwKaMUU_SjOMBoCpe0QAvD_BwE

5. Cyber attacks of the Russian Federation. Chronology. (2018). Ministry of Defence Ukraine. https://www.mil.gov.ua/ukbs/kiberataki-rosijskoi-federaczii-hronologiya.html.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3