<dd id="rw0xn"></dd>

  • <label id="rw0xn"></label>

  • <sup id="rw0xn"><strike id="rw0xn"></strike></sup><label id="rw0xn"></label>
      <th id="rw0xn"></th>
    1. <var id="rw0xn"></var>
        1. <table id="rw0xn"></table>

          <sub id="rw0xn"><meter id="rw0xn"></meter></sub>

          You are here

          Computer Security for Nuclear Security

          Implementing Guide

          IAEA Nuclear Security Series No. 42-G
          Implementing Guide

          English STI/PUB/1918 | 978-92-0-121120-0

          86 pages | 8 figures | € 40.00 | Date published: 2021

          Download PDF (2.16 MB)

          EPUB format available (6.08 MB)

          Description

          This publication provides detailed guidance on developing, implementing, and integrating computer security as a key component of nuclear security. This guidance applies to computer security aspects of nuclear security and its interfaces with nuclear safety and with other elements of a State’s nuclear security regime, including the security of nuclear material and nuclear facilities, of radioactive material and associated facilities, and of nuclear and other radioactive material outside of regulatory control. The scope of this publication includes: computer-based systems, the compromise of which could adversely affect nuclear security or nuclear safety; the State’s and relevant entities roles and responsibilities in relation to computer security in the nuclear security regime; the activities of the State in establishing and implementing a computer security strategy for nuclear security; the elements and measures for subordinate computer security programmes; and the activities to sustain the strategy.

          More Information on reusing IAEA copyright material.

          Keywords

          Nuclear Security, Computer Security, Security, Guidance, Safety, Nuclear Safety, Nuclear Material, Nuclear Facility, Radioactive Material, Regulatory Control, Computer-Based System, Member State, Role, Responsibility, Strategy, Implementing Guide, Digital Asset, Cyber-Attack, Threat, Vulnerability, Competence, Capability, Regulatory Consideration, Competent Authority, Operator, Blended Attack, CSP, Computer Security Programme, Information Security, SDA, Sensitive Digital Asset

          Related publications

          Stay in touch

          Newsletter

          <dd id="rw0xn"></dd>

        2. <label id="rw0xn"></label>

        3. <sup id="rw0xn"><strike id="rw0xn"></strike></sup><label id="rw0xn"></label>
            <th id="rw0xn"></th>
          1. <var id="rw0xn"></var>
              1. <table id="rw0xn"></table>

                <sub id="rw0xn"><meter id="rw0xn"></meter></sub>
                97碰成人国产免费公开视频