NPP I&C Systems

Author(s):  
Michael A. Yastrebenetsky ◽  
Yuri Rozen ◽  
Oleksandr Klevtsov

The first chapter contains definitions of the main concepts in this book: instrumentation and control (I&C) system, individual and overall I&C system, central part of the I&C system and peripheral equipment, software-hardware complex (SHC), commercial of the shelf products (COTS), platforms (equipment family), functional safety. Differences between the SHC and I&C systems are explained. General information about I&C systems, based on the use facilities for obtaining, transfer, processing, and display of data, is provided. The main peculiarities of I&C systems, which are described in more detail in further chapters of this book, are considered. Information about functional safety of NPP I&C systems is described. A brief description of general aspects of cyber security of NPP I&C systems is given.

Author(s):  
Michael A. Yastrebenetsky ◽  
Yuri Rozen

This chapter contains definitions of the main terms in this book—Instrumentation and Control (I&C) system, individual and overall I&C system, central part of the I&C system and peripheral equipment, Software-Hardware Complex (SHC), Commercial Of The Shelf (COTS) products, and equipment family (platforms). Differences between the SHC and I&C system are explained. General information about I&C systems, based on the use of up-to-date digital methods and facilities of obtaining, transferring, processing, and displaying of data, is provided. The main peculiarities of such systems, which are described in more detail in further chapters of this book and illustrated by the given examples of implementation of specific systems, are considered.


Author(s):  
Z.-M. Zadorozhnyy ◽  
V. Muravskyi ◽  
S. Yatsyshyn ◽  
O. Shevchuk

Abstract. Modern conditions of growing cyber threats caused by the hybrid conflicts around the world and looming biological threat of the COVID-19 pandemic necessitate the introduction of biometric authentication of employees, leading to the transformation in the methodology and organization of accounting at enterprises. The procedure for accounting and control of time worked and wages of the employees is the first to undergo changes due to the forcibly limited access of employees to the enterprise data and premises, which determines the topicality and aims of this research. The aim of the article is to investigate the prospects for monitoring the working time and movement of employees on the premises (facilities) of the enterprise with the use of biometric technology in order to develop the methodology of automation of the accounting of payments made to employees and to ensure the cybersecurity of economic entities. The prospects of using an automated employee checkpoint system based on biometrics for the purposes of accounting and control are explored. The paper improves the methodology of accounting and control over the working time and wages of employees based on the automated employee authentication system using data on the time spent on premises and performance of job functions. Recommendations are made on ensuring biological and cyber security of enterprises in terms of categorizing the enterprise premises and equipment according to their functions and level of access to information and material flows. The research examines the prospects of accounting for the employee costs, as well as accurate distribution of overhead and other costs based on data of the biometric employee authentication system. It is advised to conduct further research into the peculiarities of methodology and organization of accounting under conditions of distance and isolated job performance by accounting employees, as it raises the requirements to cybersecurity of enterprises. Keywords: accounting, working time, wages (salary), biometrics, employee authentication, automation of accounting and control, cybersecurity, COVID-19. JEL Classification M41, M49 Formulas: 0; fig.: 2; tabl.: 1; bibl.: 18.


Author(s):  
Calin Ciufudean

Cyber Security Model of Artificial Social System Man-Machine takes advantage of an important chapter of artificial intelligence, discrete event systems applied for modelling and simulation of control, logistic supply, chart positioning, and optimum trajectory planning of artificial social systems. “An artificial social system is a set of restrictions on agents` behaviours in a multi-agent environment. Its role is to allow agents to coexist in a shared environment and pursue their respective goals in the presence of other agents” (Moses & Tennenholtz, n.d.). Despite conventional approaches, Cyber Security Model of Artificial Social System Man-Machine is not guided by rigid control algorithms but by flexible, event-adaptable ones that makes them more lively and available. All these allow a new design of artificial social systems dotted with intelligence, autonomous decision-making capabilities, and self-diagnosing properties. Heuristics techniques, data mining planning activities, scheduling algorithms, automatic data identification, processing, and control represent as many trumps for these new systems analyzing formalism. The authors challenge these frameworks to model and simulate the interaction of man-machine in order to have a better look at the human, social, and organizational privacy and information protection.


Author(s):  
Oleksandr Klevtsov ◽  
Artem Symonov ◽  
Serhii Trubchaninov

The chapter is devoted to the consideration of the issues concerning the cyber security assurance of NPP instrumentation and control systems. A brief overview of the international regulatory framework in the field of cyber security for nuclear facilities is given. The different approaches to the categorization of NPP instrumentation and control systems by cyber security are expressed. The basic principles of cyber security assurance of NPP instrumentation and control systems are considered. The specific measures of cyber security assurance (i.e., graded according to the cyber security levels) on the stages of development, implementation, and operation of NPP instrumentation and control systems are presented.


Author(s):  
Oleksandr Klevtsov ◽  
Artem Symonov ◽  
Serhii Trubchaninov

The chapter is devoted to the issues of cyber security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPP). The authors examined the main types of potential cyber threats at the stages of development and operation of NPP I&C systems. Examples of real incidents at various nuclear facilities caused by intentional cyber-attacks or unintentional computer errors during the maintenance of the software of NPP I&C systems are given. The approaches to vulnerabilities assessment of NPP I&C systems are described. The scope and content of the assessment and periodic reassessment of cyber security of NPP I&C systems are considered. An approach of assessment to cyber security risks is described.


Author(s):  
Ievgen Babeshko ◽  
Kostiantyn Leontiiev

Safety assessment of nuclear power plant instrumentation and control systems (NPP I&Cs) is a complicated and resource-consuming process that is required to be done so as to ensure the required safety level and comply to normative regulations. A lot of work has been performed in the field of application of different assessment methods and techniques, modifying them, and using their combinations so as to provide a unified approach in comprehensive safety assessment. Performed research has shown that there are still challenges to overcome, including rationale and choice of the safety assessment method, verification of assessment results, choosing and applying techniques that support safety assessment process, especially in the nuclear field. This chapter presents a developed framework that aggregates the most appropriate safety assessment methods typically used for NPP I&Cs.


2018 ◽  
Vol 7 (3.19) ◽  
pp. 39 ◽  
Author(s):  
Moses Adah Agana ◽  
Ruth Wario

This research work was designed to utilize multi-level cyber crime detection and control system to provide enhanced real-time evidence to cyber crime investigators to aid them in prosecuting cyber criminals. The design was based on a robust system combining user-identity, device identity, geographical location and user activities to provide evidences to uniquely identify a cyber user and detect crimes committed. The system captures the user’s facial image and biometric finger print as mandatory login parameters in addition to username and password before granting access. The system was tested and implemented in a real time cyber security website www.ganamos.org.  The results showed that it is possible to divulge the identity of cyber users and associate their activities with the devices they use, the date, time and location of operation. These can provide real-time evidences to law enforcement agencies to track down and prosecute cyber criminals. 


2020 ◽  
Vol 6 (2) ◽  
pp. 183-210
Author(s):  
Bianca Vitalaru ◽  
Carmen Valero-Garcés

Abstract In this article we present the results of the implementation of a MOOC providing an introduction in Public Service Interpreting and Translation (PSIT) for a variety of backgrounds and profiles, from people working with foreign population, to people who have no formal training and are ad-hoc interpreters, as well as people interested in learning about PSIT. The ultimate goal of the MOOC is to provide general information and to raise awareness about the complexity of the field, as well as to offer the possibility of learning and practicing some of the principles and strategies presented so that those interested in deepening their knowledge and skills may do so with more formal training. It is in this context that the article presents some of the findings obtained since its implementation given the variety of personal profiles and student backgrounds registered in the course as well as the evaluation of aspects related to its design such as duration, access to information, difficulties and, in general, aspects that enabled us to identify students’ perceptions on the usefulness, effectiveness and applicability of the course.


Sign in / Sign up

Export Citation Format

Share Document