LEADER 03351nam 22004573 450 001 9910915680403321 005 20230330080239.0 010 $a9789201468222$b(electronic bk.) 010 $z9789201469229 035 $a(MiAaPQ)EBC30456323 035 $a(Au-PeEL)EBL30456323 035 $a(Exl-AI)30456323 035 $a(CKB)26334010300041 035 $a(EXLCZ)9926334010300041 100 $a20230330d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security Approaches to Reduce Cyber Risks in the Nuclear Supply Chain 205 $a1st ed. 210 1$aVienna :$cInternational Atomic Energy Agency,$d2023. 210 4$dİ2022. 215 $a1 online resource (133 pages) 225 1 $aNon-Serial Publication 311 08$aPrint version: IAEA Computer Security Approaches to Reduce Cyber Risks in the Nuclear Supply Chain Vienna : International Atomic Energy Agency,c2023 9789201469229 327 $a1. Introduction -- 1.1. Background -- 1.2. Objective -- 1.3. Scope -- 1.4. Structure -- 2. Supply chain management -- 2.1. Supply relationships -- 2.2. Nuclear material and facilities -- 2.3. Other radioactive material -- 2.4. Material out of regulatory control -- 2.5. Computer security requirements based on products and services -- 2.6. Risk treatment options -- 2.7. Informed customer -- 3. Information and computer security essentials for the supply chain -- 3.1. Policy -- 3.2. Essential elements of computer security -- 3.3. Risk management -- 3.3.1. A State?s nuclear security regime -- 3.3.2. Information security management systems -- 3.4. Digital assets and security level identification -- 4. Supply chain attack surface -- 4.1. Supply chain flow paths -- 4.2. Relevant entities -- 4.3. Supply chain touchpoints -- 4.4. Attack types -- 5. Typical procurement process -- 6. Specify stage -- 6.1. Needs identification -- 6.2. Procurement planning (management of procurement stages) -- 6.3. Defining acceptance criteria and methods$7Generated by AI. 330 $aThis publication by the International Atomic Energy Agency (IAEA) addresses the critical issue of computer security within the nuclear supply chain. The book emphasizes the importance of preventing, detecting, and responding to cyber threats that could compromise nuclear facilities and operations. It provides detailed guidance on best practices for managing digital security risks, including design, development, testing, installation, operation, maintenance, and decommissioning of nuclear computer-based systems. The intended audience includes Member States, nuclear security professionals, and stakeholders in the nuclear industry.$7Generated by AI. 410 0$aNon-Serial Publication 606 $aNuclear industry$xSecurity measures$7Generated by AI 606 $aNuclear facilities$xSafety measures$7Generated by AI 615 0$aNuclear industry$xSecurity measures. 615 0$aNuclear facilities$xSafety measures. 700 $aIAEA$01594159 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910915680403321 996 $aComputer Security Approaches to Reduce Cyber Risks in the Nuclear Supply Chain$94301003 997 $aUNINA