Security of cyber-space in nuclear facilities

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Fast efficient promotion of “Information Technology” (IT), expansion of visual space, vast application of internet all over the world have contributed a lot to the “man to man relation” contributing to sustainable development in the 21st century. However, the instrumental malicious use of such an advanced technology has created a serious global concern. Serious cyber-attacks occurred in all over world have given warnings to public and decision maker. It seems no one is immune. Thus it needs collective mobilized efforts to combat such threat. Among the cyber-attacks, the most serious and worrisome is the attacks against nuclear facilities since it shall have radiological consequences for the mankind and the environment. It is no more speculation but a bitter reality. Iranian nuclear facilities were attacked, by so called “Stuxnet”, by those who could not tolerate sustainable development through peaceful uses of nuclear energy in Iran. Though the top eminent IT expert of Iran were able to neutralize the attack and prevent the planned impacts, and the fact that they are all alarmed and prepare to defend, for the sake of all people of the world, the peace loving experts have to work together at this time juncture before it is too late. Convening such important conferences, facilitating exchange of information and experiences would surely contribute to the common goal. The Cyber security fits in the domain of nuclear security, which has got more attention nowadays. The International Atomic Energy Agency (IAEA) has taken some steps, such as technical meetings on promotion of industrial security, SCADA, but has to further promote its activities on the protection of nuclear facilities by armed attacks as well as cyber-attacks.

Cite

CITATION STYLE

APA

Soltanieh, A. A., & Esmailbagi, H. (2017). Security of cyber-space in nuclear facilities. In Advanced Sciences and Technologies for Security Applications (pp. 265–274). Springer. https://doi.org/10.1007/978-3-319-54975-0_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free