Framework for evaluating cyber incident response capabilities of nuclear facility operators through operation-based exercises
Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident response system essential. The International Atomic Energy Agency (IAEA) emphasizes the protection of computer-based systems for physical security,...
Saved in:
| Published in | Nuclear engineering and technology Vol. 57; no. 11; p. 103772 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.11.2025
Elsevier 한국원자력학회 |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1738-5733 2234-358X 2234-358X |
| DOI | 10.1016/j.net.2025.103772 |
Cover
| Abstract | Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident response system essential. The International Atomic Energy Agency (IAEA) emphasizes the protection of computer-based systems for physical security, nuclear safety, and nuclear material control from cyber threats. Nuclear facility operators must possess the capability to detect and respond to cyber incidents, and this capability can be evaluated through cyber incident response exercises. This study proposes a framework for evaluating nuclear operators' incident response capabilities. The framework analyzes and builds upon IAEA's cyber incident response phases, breaking them down into six phases, defines key activities and evaluation requirements for each phase, and incorporates existing cyber response evaluation technologies. It also presents criteria and performance indicators to evaluate whether these requirements are met. To examine the applicability and practical relevance of the framework, a cyberattack scenario tailored for nuclear facilities is applied to a simulator replicating real-world conditions. The findings of this study provide a systematic and objective way to evaluate response exercises, offering a foundation for effective cyber incident management and minimizing impacts on nuclear facilities. |
|---|---|
| AbstractList | Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident response system essential. The International Atomic Energy Agency (IAEA) emphasizes the protection of computer-based systems for physical security, nuclear safety, and nuclear material control from cyber threats. Nuclear facility operators must possess the capability to detect and respond to cyber incidents, and this capability can be evaluated through cyber incident response exercises. This study proposes a framework for evaluating nuclear operators' incident response capabilities. The framework analyzes and builds upon IAEA's cyber incident response phases, breaking them down into six phases, defines key activities and evaluation requirements for each phase, and incorporates existing cyber response evaluation technologies. It also presents criteria and performance indicators to evaluate whether these requirements are met. To examine the applicability and practical relevance of the framework, a cyberattack scenario tailored for nuclear facilities is applied to a simulator replicating real-world conditions. The findings of this study provide a systematic and objective way to evaluate response exercises, offering a foundation for effective cyber incident management and minimizing impacts on nuclear facilities. Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident response system essential. The International Atomic Energy Agency (IAEA) emphasizes the protection of computer-based systems for physical security, nuclear safety, and nuclear material control from cyber threats. Nuclear facility operators must possess the capability to detect and respond to cyber incidents, and this capability can be evaluated through cyber incident response exercises. This study proposes a framework for evaluating nuclear operators’ incident response capabilities. The framework analyzes and builds upon IAEA’s cyber incident response phases, breaking them down into six phases, defines key activities and evaluation requirements for each phase, and incorporates existing cyber response evaluation technologies. It also presents criteria and performance indicators to evaluate whether these requirements are met. To examine the applicability and practical relevance of the framework, a cyberattack scenario tailored for nuclear facilities is applied to a simulator replicating real-world conditions. The findings of this study provide a systematic and objective way to evaluate response exercises, offering a foundation for effective cyber incident management and minimizing impacts on nuclear facilities. KCI Citation Count: 0 |
| ArticleNumber | 103772 |
| Author | Park, Cheonho Seo, Jung Taek Jeon, Seungho Choi, Heewon Aneka Lee, JuHyeon |
| Author_xml | – sequence: 1 givenname: Heewon Aneka orcidid: 0009-0007-4938-8359 surname: Choi fullname: Choi, Heewon Aneka email: chw1226@gachon.ac.kr organization: Department of Information Security, Gachon University, Seongnam, Republic of Korea – sequence: 2 givenname: Cheonho surname: Park fullname: Park, Cheonho email: pch3467@gachon.ac.kr organization: Department of Information Security, Gachon University, Seongnam, Republic of Korea – sequence: 3 givenname: JuHyeon surname: Lee fullname: Lee, JuHyeon email: 202240226@gachon.ac.kr organization: Department of Information Security, Gachon University, Seongnam, Republic of Korea – sequence: 4 givenname: Seungho orcidid: 0000-0002-7116-6062 surname: Jeon fullname: Jeon, Seungho email: shjeon90@gachon.ac.kr organization: Department of Smart Security, Gachon University, Seongnam, Republic of Korea – sequence: 5 givenname: Jung Taek surname: Seo fullname: Seo, Jung Taek email: seojt@gachon.ac.kr organization: Department of Smart Security, Gachon University, Seongnam, Republic of Korea |
| BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART003229464$$DAccess content in National Research Foundation of Korea (NRF) |
| BookMark | eNqNkU9r20AQxUVJoU7aD9Dbngty969WoqcQmtYQKJQUeltWo5GztrIrZuWkPvS7V7ZCj6WnYR7ze8zMuywuYopYFO8FXwsuqo-7dcRpLbk0c6-sla-KlZRKl8rUPy-KlbCqLo1V6k1xmfOO80pry1fF71vyj_icaM_6RAyf_HDwU4hbBscWiYUIocM4McI8ppiRgR99G4YwBcws9SweYEBPrPdwUo8sjUh-SpTZ9EDpsH14UUKKZeszdgx_IUHImN8Wr3s_ZHz3Uq-KH7ef72--lnffvmxuru9KUI2ZSt2o-RTe6Z73TW-NQABobQXc666xVYsCalvXErWFGqzWWjZGtWgrz7Ux6qr4sPhG6t0egks-nOs2uT256-_3Gye4VU0tqnl4swx3ye_cSOHR0_FMnIVEW-dpCvPVjneVVmhr6Tul247XCFJho1ptGmGEnL3k4nWIoz8--2H4ayi4OyXndm5Ozp2Sc0tyMyQWCCjlTNj_F_NpYXB-41NAchkCRsAuEMI0rx7-Qf8BWyC0oQ |
| Cites_doi | 10.1016/j.ijcip.2021.100505 10.1016/j.promfg.2018.07.148 10.1016/j.net.2019.11.001 10.1007/s11227-024-06273-9 10.3390/app142411836 10.1016/j.pnucene.2023.104738 10.3390/electronics13193867 10.1016/j.net.2022.02.024 10.1109/MSP.2011.67 |
| ContentType | Journal Article |
| Copyright | 2025 Korean Nuclear Society |
| Copyright_xml | – notice: 2025 Korean Nuclear Society |
| DBID | 6I. AAFTH AAYXX CITATION ADTOC UNPAY DOA ACYCR |
| DOI | 10.1016/j.net.2025.103772 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals Korean Citation Index |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2234-358X |
| ExternalDocumentID | oai_kci_go_kr_ARTI_10739816 oai_doaj_org_article_0d643e782ad34bd08ec23e93b4591512 10.1016/j.net.2025.103772 10_1016_j_net_2025_103772 S1738573325003407 |
| GroupedDBID | 0R~ 123 4.4 457 5VS 6I. 9ZL AAEDW AAFTH AALRI AAXUO AAYWO ABMAC ACGFS ACVFH ACYCR ADBBV ADCNI ADEZE ADVLN AENEX AEUPX AEXQZ AFPUW AFTJW AGHFR AIGII AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ BCNDV EBS EJD FDB GROUPED_DOAJ IPNFZ JDI KQ8 KVFHK M41 O9- OK1 RIG ROL SSZ AAYXX CITATION ADTOC UNPAY |
| ID | FETCH-LOGICAL-c395t-4932340d4f0f9f751ecccb76c0a4d976be1c87882e47c8c74442953be76a04553 |
| IEDL.DBID | UNPAY |
| ISSN | 1738-5733 2234-358X |
| IngestDate | Thu Aug 21 03:14:00 EDT 2025 Fri Oct 03 12:53:28 EDT 2025 Tue Aug 19 23:42:24 EDT 2025 Wed Oct 01 05:18:43 EDT 2025 Sun Oct 19 01:36:41 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 11 |
| Keywords | Evaluation Cybersecurity Exercise Response capability Cyber incident response Cyber-attack |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. cc-by-nc-nd |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c395t-4932340d4f0f9f751ecccb76c0a4d976be1c87882e47c8c74442953be76a04553 |
| ORCID | 0000-0002-7116-6062 0009-0007-4938-8359 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.1016/j.net.2025.103772 |
| ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_10739816 doaj_primary_oai_doaj_org_article_0d643e782ad34bd08ec23e93b4591512 unpaywall_primary_10_1016_j_net_2025_103772 crossref_primary_10_1016_j_net_2025_103772 elsevier_sciencedirect_doi_10_1016_j_net_2025_103772 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | November 2025 2025-11-00 2025-11-01 2025-11 |
| PublicationDateYYYYMMDD | 2025-11-01 |
| PublicationDate_xml | – month: 11 year: 2025 text: November 2025 |
| PublicationDecade | 2020 |
| PublicationTitle | Nuclear engineering and technology |
| PublicationYear | 2025 |
| Publisher | Elsevier B.V Elsevier 한국원자력학회 |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier – name: 한국원자력학회 |
| References | Greiman (bib6) 2023 (bib43) 2012 (bib26) 2009 Chen, Chen, Hsiung (bib13) 2014; 2014 (bib36) 2006 Langner (bib50) 2011; 9 Kim, Jeon, Kim, Kang, Lee, Seo (bib49) 2024; 80 Korea Atomic Energy Research Institute, Advanced Compact Nuclear Simulator Textbook, Nuclear Training Center in Korea Atomic, Energy Research Institute. (bib31) 2024 (bib34) 2020 (bib41) 2023 (bib10) 2018 Nyre-Yu (bib33) 2021 Lee (bib45) 2024; 14 (bib7) 2019 (bib48) 2003 (bib38) 2024 Bracho, Saygin, Wan, Lee, Zarreh (bib44) 2018; 26 (bib32) 2017 (bib21) December 23, 2014 Mohan, Glantz, Landine, Kishan Motkuri (bib40) 2024 Ho Chae, Lee, Han, Hyun Seong (bib46) 2022; 54 Mases, Maennel, Toussaint, Rosa (bib22) 2021; 2021 (bib27) 2010 Fakhrul Safitra, Lubis, Fakhrurroja (bib23) 2023; 15 (bib42) 2012; SP Mudassar Yamin, Katt (bib15) 2022; 116 (bib35) 2023 (bib24) 2016 Staves, Anderson, Balderstone, Green, Gouglidis, Hutchison (bib18) 2022; 37 Gulay, Maglaras (bib19) 2024 Kral (bib29) 2012 (bib25) 2018 Kim, Heo, Zio, Shin, Song (bib12) 2020; 52 (bib11) 2009 (bib4) 2017 Kim, Hee University (bib5) 2022 White, Dietrich, Goles (bib17) 2004; 37 British Standards Institution (BSI), Determining the Effectiveness of an Incident Response Plan Study Based on Lessons Learned from a Real Life Incident A Whitepaper. (bib39) 2021 Ayodeji, Mohamed, Li, Buono, Pierce, Ahmed (bib1) 2023; 161 O'Neil, Ahmad, Sean (bib16) 2021 Shin, Kwon, Jeong, Shin (bib14) 2024; 13 Parsons (bib8) 2025 (bib37) 2018 (bib9) 2017 (bib2) 2021 (bib3) 2011 Kleinhuis, Young (bib20) 2017; 8 (bib30) 2023 O'Neil (10.1016/j.net.2025.103772_bib16) 2021 10.1016/j.net.2025.103772_bib47 Kleinhuis (10.1016/j.net.2025.103772_bib20) 2017; 8 (10.1016/j.net.2025.103772_bib9) 2017 (10.1016/j.net.2025.103772_bib32) 2017 Lee (10.1016/j.net.2025.103772_bib45) 2024; 14 (10.1016/j.net.2025.103772_bib42) 2012; SP (10.1016/j.net.2025.103772_bib11) 2009 Kim (10.1016/j.net.2025.103772_bib12) 2020; 52 (10.1016/j.net.2025.103772_bib25) 2018 Gulay (10.1016/j.net.2025.103772_bib19) 2024 (10.1016/j.net.2025.103772_bib48) 2003 (10.1016/j.net.2025.103772_bib3) 2011 Fakhrul Safitra (10.1016/j.net.2025.103772_bib23) 2023; 15 (10.1016/j.net.2025.103772_bib30) 2023 Mudassar Yamin (10.1016/j.net.2025.103772_bib15) 2022; 116 (10.1016/j.net.2025.103772_bib2) 2021 Kral (10.1016/j.net.2025.103772_bib29) 2012 (10.1016/j.net.2025.103772_bib43) 2012 Kim (10.1016/j.net.2025.103772_bib49) 2024; 80 Ho Chae (10.1016/j.net.2025.103772_bib46) 2022; 54 Parsons (10.1016/j.net.2025.103772_bib8) 2025 (10.1016/j.net.2025.103772_bib34) 2020 (10.1016/j.net.2025.103772_bib4) 2017 (10.1016/j.net.2025.103772_bib37) 2018 (10.1016/j.net.2025.103772_bib36) 2006 10.1016/j.net.2025.103772_bib28 Mohan (10.1016/j.net.2025.103772_bib40) 2024 (10.1016/j.net.2025.103772_bib10) 2018 Langner (10.1016/j.net.2025.103772_bib50) 2011; 9 (10.1016/j.net.2025.103772_bib27) 2010 (10.1016/j.net.2025.103772_bib31) 2024 (10.1016/j.net.2025.103772_bib41) 2023 Greiman (10.1016/j.net.2025.103772_bib6) 2023 Mases (10.1016/j.net.2025.103772_bib22) 2021; 2021 (10.1016/j.net.2025.103772_bib24) 2016 Ayodeji (10.1016/j.net.2025.103772_bib1) 2023; 161 (10.1016/j.net.2025.103772_bib26) 2009 (10.1016/j.net.2025.103772_bib38) 2024 White (10.1016/j.net.2025.103772_bib17) 2004; 37 (10.1016/j.net.2025.103772_bib35) 2023 Staves (10.1016/j.net.2025.103772_bib18) 2022; 37 Shin (10.1016/j.net.2025.103772_bib14) 2024; 13 Nyre-Yu (10.1016/j.net.2025.103772_bib33) 2021 (10.1016/j.net.2025.103772_bib21) 2014 Kim (10.1016/j.net.2025.103772_bib5) 2022 (10.1016/j.net.2025.103772_bib7) 2019 (10.1016/j.net.2025.103772_bib39) 2021 Chen (10.1016/j.net.2025.103772_bib13) 2014; 2014 Bracho (10.1016/j.net.2025.103772_bib44) 2018; 26 |
| References_xml | – year: 2025 ident: bib8 article-title: National Law Review, Cybersecurity in the Nuclear Industry: US and UK Regulation and the Sellafield Case – year: 2024 ident: bib19 article-title: Alignment of Cybersecurity Incident Prioritisation with Incident Response Management Maturity Capabilities – year: December 23, 2014 ident: bib21 article-title: Regulations on Physical Protection Education and Training – volume: 14 year: 2024 ident: bib45 article-title: A study on a scenario-based security incident prediction system for cybersecurity publication-title: Appl. Sci. – volume: 15 year: 2023 ident: bib23 article-title: Counterattacking cyber threats: a framework for the future of cybersecurity publication-title: Sustain. Times – volume: 2021 start-page: 259 year: 2021 end-page: 268 ident: bib22 article-title: Success factors for designing a cybersecurity exercise on the example of incident response publication-title: Proc. 2021 IEEE Eur. Symp. Secur. Priv. Workshops – reference: British Standards Institution (BSI), Determining the Effectiveness of an Incident Response Plan Study Based on Lessons Learned from a Real Life Incident A Whitepaper. – year: 2006 ident: bib36 article-title: Guide to Integrating Forensic Techniques into Incident Response, NIST SP 800-886, Gaithersburg, MD – year: 2010 ident: bib27 article-title: Cyber security plan for nuclear power reactors publication-title: NEI 08-09 Rev. 6, Washington D.C – year: 2017 ident: bib32 article-title: Framework for Performance Evaluation of Computer Security Incident Response Capabilities – year: 2017 ident: bib4 article-title: Hotspot Analysis: Stuxnet, CSS Cyber Defense Project – volume: 8 year: 2017 ident: bib20 article-title: Computer security incident response team effectiveness: a needs assessment publication-title: Front. Psychol. – year: 2022 ident: bib5 article-title: North Korea's Cyber Capabilities and their Implications for International Security – volume: 116 year: 2022 ident: bib15 article-title: Modeling and executing cyber security exercise scenarios in cyber ranges publication-title: Comput. Secur. – year: 2009 ident: bib26 article-title: Recommended Practice: Developing an Industrial Control Systems Cybersecurity Incident Response Capability – reference: Korea Atomic Energy Research Institute, Advanced Compact Nuclear Simulator Textbook, Nuclear Training Center in Korea Atomic, Energy Research Institute. – year: 2024 ident: bib31 article-title: The Landscape of Performance-based Assessments in Cybersecurity, Gaithersburg, MD – volume: 80 start-page: 21642 year: 2024 end-page: 21675 ident: bib49 article-title: Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment publication-title: J. Supercomput. – year: 2021 ident: bib33 article-title: Identifying Expertise Gaps in Cyber Incident Response: Cyber Defender Needs Vs. Technological Development – year: 2021 ident: bib2 article-title: DIS-21-03, Cyber Security and the Protection of Digital Information – volume: 9 start-page: 49 year: 2011 end-page: 51 ident: bib50 article-title: Stuxnet: dissecting a cyberwarfare weapon publication-title: IEEE Secur. Priv. – year: 2018 ident: bib37 article-title: Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, Gaithersburg, MD – year: 2017 ident: bib9 article-title: Utility Dive, Reports: Cyberattacks Breached at Least a Dozen Power Plants, Including Nukes – year: 2016 ident: bib24 article-title: Computer Security Incident Response Planning at Nuclear Facilities – year: 2020 ident: bib34 article-title: Homeland Security Exercise and Evaluation Program (HSEEP) – volume: 37 year: 2022 ident: bib18 article-title: A cyber incident response and recovery framework to support operators of industrial control systems publication-title: Int. J. Crit. Infrastruct. Prot. – year: 2012 ident: bib29 article-title: Incident Handler's Handbook – year: 2023 ident: bib30 publication-title: Cyber Incident Response Plan Guidance – year: 2021 ident: bib16 article-title: Maynard, cybersecurity incident response in organisations: a meta-level framework for scenario-based training publication-title: ACIS 2022 - Australas – year: 2019 ident: bib7 article-title: Cyber Attack on Kudankulam Nuclear Power Plant – volume: 26 start-page: 1116 year: 2018 end-page: 1127 ident: bib44 article-title: A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems publication-title: Procedia Manuf. – year: 2003 ident: bib48 article-title: Study on Environmental Optimization of CNS Simulation Code – volume: 37 start-page: 2635 year: 2004 end-page: 2644 ident: bib17 article-title: Cyber security exercises: testing an organization's ability to prevent, detect, and respond to cyber security events publication-title: Proc. Hawaii Int. Conf. Syst. Sci. – year: 2012 ident: bib43 article-title: Information Technology — Security Techniques — Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence, ISO/IEC 27037:2012 – volume: 2014 start-page: 22 year: 2014 end-page: 28 ident: bib13 article-title: I-Hsin chou, unified security and safety risk assessment - a case study on nuclear power plant publication-title: Proc. 1st Int. Conf. Trustworthy Syst. Their Appl., TSA – year: 2018 ident: bib25 article-title: Preparation, Conduct and Evaluation of Exercises to Test Security Contingency Plans at Nuclear Facilities – year: 2011 ident: bib3 article-title: Nuclear security recommendations on physical protection of nuclear material and nuclear facilities (INFCIRC/225/Rev. 5) publication-title: IAEA Nuclear Security Series No. 13, Vienna – volume: 13 start-page: 3867 year: 2024 ident: bib14 article-title: A study on designing cyber training and cyber range to effectively respond to cyber threats publication-title: Electron – volume: 54 start-page: 2859 year: 2022 end-page: 2870 ident: bib46 article-title: Graph neural network based multiple accident diagnosis in nuclear power plants: data optimization to represent the system configuration publication-title: Nucl. Eng. Technol. – year: 2024 ident: bib38 article-title: CIS Critical Security Controls Version 8.1 – volume: 161 year: 2023 ident: bib1 article-title: Cyber security in the nuclear industry: a closer look at digital control systems, networks and human factors publication-title: Prog. Nucl. Energy – volume: SP start-page: 800 year: 2012 end-page: 861 ident: bib42 publication-title: Computer Security Incident Handling Guide – volume: 52 start-page: 995 year: 2020 end-page: 1001 ident: bib12 article-title: Cyber attack taxonomy for digital environment in nuclear power plants publication-title: Nucl. Eng. Technol. – year: 2023 ident: bib35 article-title: Nuclear regulatory commission (NRC), cybersecurity programs for nuclear power reactors publication-title: Regulatory Guide 5.71, Washington, D.C. – year: 2023 ident: bib41 article-title: Regulatory Guide 5.83, Revision 1, Washington, D.C – year: 2023 ident: bib6 article-title: Nuclear cyber attacks: a study of sabotage and regulation of critical infrastructure publication-title: International Conference on Cyber Warfare and Security – year: 2009 ident: bib11 article-title: Protection of Digital Computer and Communication Systems and Networks, Washington, D.C – start-page: 245 year: 2024 end-page: 290 ident: bib40 article-title: Cybersecurity and Nuclear Facilities – year: 2018 ident: bib10 article-title: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors – year: 2021 ident: bib39 article-title: Computer Security Techniques for Nuclear Facilities, IAEA Nuclear Security Series No. 17-T – year: 2021 ident: 10.1016/j.net.2025.103772_bib39 – year: 2009 ident: 10.1016/j.net.2025.103772_bib11 – year: 2012 ident: 10.1016/j.net.2025.103772_bib43 – year: 2016 ident: 10.1016/j.net.2025.103772_bib24 – volume: 37 year: 2022 ident: 10.1016/j.net.2025.103772_bib18 article-title: A cyber incident response and recovery framework to support operators of industrial control systems publication-title: Int. J. Crit. Infrastruct. Prot. doi: 10.1016/j.ijcip.2021.100505 – year: 2006 ident: 10.1016/j.net.2025.103772_bib36 – year: 2010 ident: 10.1016/j.net.2025.103772_bib27 article-title: Cyber security plan for nuclear power reactors – volume: 26 start-page: 1116 year: 2018 ident: 10.1016/j.net.2025.103772_bib44 article-title: A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems publication-title: Procedia Manuf. doi: 10.1016/j.promfg.2018.07.148 – volume: 37 start-page: 2635 year: 2004 ident: 10.1016/j.net.2025.103772_bib17 article-title: Cyber security exercises: testing an organization's ability to prevent, detect, and respond to cyber security events publication-title: Proc. Hawaii Int. Conf. Syst. Sci. – year: 2018 ident: 10.1016/j.net.2025.103772_bib37 – volume: 52 start-page: 995 year: 2020 ident: 10.1016/j.net.2025.103772_bib12 article-title: Cyber attack taxonomy for digital environment in nuclear power plants publication-title: Nucl. Eng. Technol. doi: 10.1016/j.net.2019.11.001 – volume: 2021 start-page: 259 year: 2021 ident: 10.1016/j.net.2025.103772_bib22 article-title: Success factors for designing a cybersecurity exercise on the example of incident response – ident: 10.1016/j.net.2025.103772_bib28 – volume: 80 start-page: 21642 year: 2024 ident: 10.1016/j.net.2025.103772_bib49 article-title: Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment publication-title: J. Supercomput. doi: 10.1007/s11227-024-06273-9 – year: 2014 ident: 10.1016/j.net.2025.103772_bib21 – year: 2003 ident: 10.1016/j.net.2025.103772_bib48 – volume: 116 year: 2022 ident: 10.1016/j.net.2025.103772_bib15 article-title: Modeling and executing cyber security exercise scenarios in cyber ranges publication-title: Comput. Secur. – year: 2022 ident: 10.1016/j.net.2025.103772_bib5 – year: 2017 ident: 10.1016/j.net.2025.103772_bib9 – year: 2023 ident: 10.1016/j.net.2025.103772_bib30 – year: 2023 ident: 10.1016/j.net.2025.103772_bib35 article-title: Nuclear regulatory commission (NRC), cybersecurity programs for nuclear power reactors – year: 2018 ident: 10.1016/j.net.2025.103772_bib10 – year: 2025 ident: 10.1016/j.net.2025.103772_bib8 – volume: SP start-page: 800 year: 2012 ident: 10.1016/j.net.2025.103772_bib42 – year: 2021 ident: 10.1016/j.net.2025.103772_bib2 – year: 2024 ident: 10.1016/j.net.2025.103772_bib31 – year: 2019 ident: 10.1016/j.net.2025.103772_bib7 – year: 2011 ident: 10.1016/j.net.2025.103772_bib3 article-title: Nuclear security recommendations on physical protection of nuclear material and nuclear facilities (INFCIRC/225/Rev. 5) – year: 2024 ident: 10.1016/j.net.2025.103772_bib38 – year: 2009 ident: 10.1016/j.net.2025.103772_bib26 – volume: 14 year: 2024 ident: 10.1016/j.net.2025.103772_bib45 article-title: A study on a scenario-based security incident prediction system for cybersecurity publication-title: Appl. Sci. doi: 10.3390/app142411836 – year: 2023 ident: 10.1016/j.net.2025.103772_bib41 – volume: 8 year: 2017 ident: 10.1016/j.net.2025.103772_bib20 article-title: Computer security incident response team effectiveness: a needs assessment publication-title: Front. Psychol. – year: 2020 ident: 10.1016/j.net.2025.103772_bib34 – volume: 161 year: 2023 ident: 10.1016/j.net.2025.103772_bib1 article-title: Cyber security in the nuclear industry: a closer look at digital control systems, networks and human factors publication-title: Prog. Nucl. Energy doi: 10.1016/j.pnucene.2023.104738 – year: 2021 ident: 10.1016/j.net.2025.103772_bib33 – ident: 10.1016/j.net.2025.103772_bib47 – year: 2024 ident: 10.1016/j.net.2025.103772_bib19 – year: 2018 ident: 10.1016/j.net.2025.103772_bib25 – year: 2012 ident: 10.1016/j.net.2025.103772_bib29 – year: 2017 ident: 10.1016/j.net.2025.103772_bib32 – volume: 13 start-page: 3867 year: 2024 ident: 10.1016/j.net.2025.103772_bib14 article-title: A study on designing cyber training and cyber range to effectively respond to cyber threats publication-title: Electron doi: 10.3390/electronics13193867 – year: 2021 ident: 10.1016/j.net.2025.103772_bib16 article-title: Maynard, cybersecurity incident response in organisations: a meta-level framework for scenario-based training – volume: 54 start-page: 2859 year: 2022 ident: 10.1016/j.net.2025.103772_bib46 article-title: Graph neural network based multiple accident diagnosis in nuclear power plants: data optimization to represent the system configuration publication-title: Nucl. Eng. Technol. doi: 10.1016/j.net.2022.02.024 – volume: 9 start-page: 49 year: 2011 ident: 10.1016/j.net.2025.103772_bib50 article-title: Stuxnet: dissecting a cyberwarfare weapon publication-title: IEEE Secur. Priv. doi: 10.1109/MSP.2011.67 – volume: 15 year: 2023 ident: 10.1016/j.net.2025.103772_bib23 article-title: Counterattacking cyber threats: a framework for the future of cybersecurity publication-title: Sustain. Times – year: 2023 ident: 10.1016/j.net.2025.103772_bib6 article-title: Nuclear cyber attacks: a study of sabotage and regulation of critical infrastructure – start-page: 245 year: 2024 ident: 10.1016/j.net.2025.103772_bib40 – year: 2017 ident: 10.1016/j.net.2025.103772_bib4 – volume: 2014 start-page: 22 year: 2014 ident: 10.1016/j.net.2025.103772_bib13 article-title: I-Hsin chou, unified security and safety risk assessment - a case study on nuclear power plant publication-title: Proc. 1st Int. Conf. Trustworthy Syst. Their Appl., TSA |
| SSID | ssj0064470 |
| Score | 2.3583548 |
| Snippet | Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident... |
| SourceID | nrf doaj unpaywall crossref elsevier |
| SourceType | Open Website Open Access Repository Index Database Publisher |
| StartPage | 103772 |
| SubjectTerms | Cyber incident response Cyber-attack Cybersecurity Evaluation Exercise Response capability 원자력공학 |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NSxwxFA_Vi3ooViuutiVQT5bBbJKZJMdaXGyhPSl4C_kUP5hdZldkD_3ffUlmZL3oxdNACMkk701-703e-z2EjqJUjQDVqWggruI--gpcMFFRmsk-lLAxOYp__zXnl_zPVX21UuorxYQVeuCycSfEA2YGwDHjGbeeyOAoC4pZXquEVun0JVINzlQ5gwHkRUmFhM85Mf4N95k5sgt8fnAMaZ0TzgV9gUiZuP8FMK21HbRvPLQzs3w09_cr8DPZRh97uxH_LO_7CX0I7Q7aWmET3EX_J0OgFQZLFA883u01dksbOpz-qqe0XNyVuNiAHSBlDo4FdxlPI24TubHpcDQutS7xdBbyNfwc9_V8-hYQZpXwz-OhZNP8M7qcnF38Oq_66gqVY6peVBwsN8aJ55FEFUU9BmE6KxpHDPdgpNgwdhIcZBq4cNIJzgG6amaDaAzYgTXbQ-vttA37CEsaueHBKc8it5JaLhlTxFgyjtaSeoSOhx3Ws0KioYfoslsN4tBJHLqIY4ROkwyeOyb-69wAWqF7rdBvacUI8UGCujcliokAQ928Nvd3kLa-czd52vS8nuq7ToNz8Rv6CKbkuBmhH8_a8PZ6Dt5jPYdoMw1ZkiC_oPVF9xC-gjW0sN-y4j8BQgUFAQ priority: 102 providerName: Directory of Open Access Journals |
| Title | Framework for evaluating cyber incident response capabilities of nuclear facility operators through operation-based exercises |
| URI | https://dx.doi.org/10.1016/j.net.2025.103772 https://doi.org/10.1016/j.net.2025.103772 https://doaj.org/article/0d643e782ad34bd08ec23e93b4591512 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART003229464 |
| UnpaywallVersion | publishedVersion |
| Volume | 57 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | Nuclear Engineering and Technology, 2025, 57(11) |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2234-358X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064470 issn: 1738-5733 databaseCode: KQ8 dateStart: 20130201 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2234-358X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064470 issn: 1738-5733 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 2234-358X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064470 issn: 1738-5733 databaseCode: AKRWK dateStart: 20130201 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dixMxEA_aexAf_BYregT0ScmRbpJN8niK5VQ8FCzUp5DP4-yxLdsWqeD_7iS7e1xF_HjZhSEkbDLZ-U0y8xuEnielawmqQ6pIPeEhBQIumCRVVcg-tHQpO4ofTuuTGX83F_OeLDrnwuzd35c4LPDQwY2rREkPl_C3PagFwO4ROpidfjz-UhIeYdNmXr9cSK5inDCh5sMN5u_62LNBhap_zxRdb1qQ39g2K7v7Zi8urhic6e0uVGtdeApznMniaLtxR_77LyyO__Qtd9CtHnbi405P7qJrsbmHbl4hI7yPfkyHOC0MQBYPNODNGfY7F1ucD-VzVi9uu7DaiD0Y2hJbC942XibcZG5k2-JkfZbu8HIVyy3-GvflgHoJ6ALJ5jPgoeLT-gGaTd98fn1C-uIMxDMtNoQD8GOcBp5o0kmKCeiCd7L21PIAGMfFiVfgX1eRS6-85Bwsn2AuytoCjBTsIRo1yyY-QlhViVsevQ4scacqxxVjmlpHJ8k5KsboxbBcZtVxcJghOO2rgTk1eU5NN6dj9Cov6GXDTJ9dBLASpt-NhgYAYhHAkQ2Mu0BV9BWLmjkudIZAY8QHdTA9EukQBnR1_qexn4HqmIU_L8Pm99nSLFoDvslbaCOZVpN6jF5eqtbfv-fxf7V-gkabdhufAlDauMNywADP95_UYb9dfgJOYw-q |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dixMxEA_aexAf_JbroRLQJyVHukk2yeMpllPw8MFCfQr5PM4e27JtkR74vzvJ7h5XET-eFoaQkGSS-c1m5jcIvUpK1xJUh1SResJDCgRcMEmqqpB9aOlSdhQ_ndWnM_5xLuY9WXTOhdl7vy9xWOChgxtXiZIeLuG2PagFwO4ROpidfT75WhIe4dBmXr9cSK5inDCh5sML5u_62LNBhap_zxTdblqQ39k2K7v7bi8vbxic6f0uVGtdeApznMnieLtxx_7qFxbHf5rLA3Svh534pNOTh-hWbB6huzfICB-jH9MhTgsDkMUDDXhzjv3OxRbnn_I5qxe3XVhtxB4MbYmtBW8bLxNuMjeybXGyPkt3eLmK5RV_jftyQL0EdIFk8xnwUPFp_QTNpu-_vDslfXEG4pkWG8IB-DFOA0806STFBHTBO1l7ankAjOPixCvwr6vIpVdecg6WTzAXZW0BRgr2FI2aZRMPEVZV4pZHrwNL3KnKccWYptbRSXKOijF6PWyXWXUcHGYITvtmYE1NXlPTrekYvc0bet0w02cXAeyE6U-joQGAWARwZAPjLlAVfcWiZo4LnSHQGPFBHUyPRDqEAV1d_Gnsl6A6ZuEvyrD5e740i9aAb_IB2kim1aQeozfXqvX3-Rz9V-tnaLRpt_E5AKWNe9EfkZ-joA3A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Framework+for+evaluating+cyber+incident+response+capabilities+of+nuclear+facility+operators+through+operation-based+exercises&rft.jtitle=Nuclear+engineering+and+technology&rft.au=%EC%B5%9C%ED%9D%AC%EC%9B%90&rft.au=%EB%B0%95%EC%B2%9C%ED%98%B8&rft.au=%EC%9D%B4%EC%A3%BC%ED%98%84&rft.au=%EC%A0%84%EC%8A%B9%ED%98%B8&rft.date=2025-11-01&rft.pub=%ED%95%9C%EA%B5%AD%EC%9B%90%EC%9E%90%EB%A0%A5%ED%95%99%ED%9A%8C&rft.issn=1738-5733&rft.eissn=2234-358X&rft_id=info:doi/10.1016%2Fj.net.2025.103772&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_10739816 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-5733&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-5733&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-5733&client=summon |