Cyber Terror Threats Against Nuclear Power Plants
After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the in...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
JOLTIDA
2023-07-01
|
Series: | Journal of Learning and Teaching in Digital Age |
Subjects: | |
Online Access: | https://dergipark.org.tr/tr/pub/joltida/issue/78765/1198872 |
_version_ | 1797783841035780096 |
---|---|
author | Hüseyin KURU |
author_facet | Hüseyin KURU |
author_sort | Hüseyin KURU |
collection | DOAJ |
description | After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has become almost impossible for individuals, state institutions and private companies to continue their activities independently of cyberspace, which is described as the fifth operational area. This situation has made it a critical priority to ensure the physical and cyber security of nuclear power plants, which carry the energy burden of the societies and at the same time pose great security risks. In this period, states, state-sponsored and radical terrorist groups that wanted to close the power deficit against military and economically strong states, started to develop asymmetric methods of struggle. In the end new threat vectors such as cyber terrorism have emerged and states that have moved many institutions and services to cyberspace have become more vulnerable to malicious attacks and terrorist activities. In this study, the concept of terrorism and cyber terrorism have been examined and focused on the SCADA systems of nuclear power plants and in the last section cyber security of these systems have been evaluated. This Implementation of this model aims to simplify the process for all organizations in the Nuclear Sector—regardless of their size, cybersecurity risk, or current level of cybersecurity sophistication—to apply the principles and best practices of risk management. Ultimately, the framework and this implementation model are focused on helping individual organizations reduce and better manage their cybersecurity risks, contributing to a more secure and resilient sector overall. |
first_indexed | 2024-03-13T00:31:36Z |
format | Article |
id | doaj.art-109ef80cca9c4d1393ea7a00f4343749 |
institution | Directory Open Access Journal |
issn | 2458-8350 |
language | English |
last_indexed | 2024-03-13T00:31:36Z |
publishDate | 2023-07-01 |
publisher | JOLTIDA |
record_format | Article |
series | Journal of Learning and Teaching in Digital Age |
spelling | doaj.art-109ef80cca9c4d1393ea7a00f43437492023-07-10T11:28:27ZengJOLTIDAJournal of Learning and Teaching in Digital Age2458-83502023-07-0182237244https://doi.org/10.53850/joltida.1198872Cyber Terror Threats Against Nuclear Power PlantsHüseyin KURU0https://orcid.org/0000-0002-7464-9860GAZI UNIVERSITYAfter the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has become almost impossible for individuals, state institutions and private companies to continue their activities independently of cyberspace, which is described as the fifth operational area. This situation has made it a critical priority to ensure the physical and cyber security of nuclear power plants, which carry the energy burden of the societies and at the same time pose great security risks. In this period, states, state-sponsored and radical terrorist groups that wanted to close the power deficit against military and economically strong states, started to develop asymmetric methods of struggle. In the end new threat vectors such as cyber terrorism have emerged and states that have moved many institutions and services to cyberspace have become more vulnerable to malicious attacks and terrorist activities. In this study, the concept of terrorism and cyber terrorism have been examined and focused on the SCADA systems of nuclear power plants and in the last section cyber security of these systems have been evaluated. This Implementation of this model aims to simplify the process for all organizations in the Nuclear Sector—regardless of their size, cybersecurity risk, or current level of cybersecurity sophistication—to apply the principles and best practices of risk management. Ultimately, the framework and this implementation model are focused on helping individual organizations reduce and better manage their cybersecurity risks, contributing to a more secure and resilient sector overall.https://dergipark.org.tr/tr/pub/joltida/issue/78765/1198872terrorismcyber terrornuclear power plantsscada systemscyber security |
spellingShingle | Hüseyin KURU Cyber Terror Threats Against Nuclear Power Plants Journal of Learning and Teaching in Digital Age terrorism cyber terror nuclear power plants scada systems cyber security |
title | Cyber Terror Threats Against Nuclear Power Plants |
title_full | Cyber Terror Threats Against Nuclear Power Plants |
title_fullStr | Cyber Terror Threats Against Nuclear Power Plants |
title_full_unstemmed | Cyber Terror Threats Against Nuclear Power Plants |
title_short | Cyber Terror Threats Against Nuclear Power Plants |
title_sort | cyber terror threats against nuclear power plants |
topic | terrorism cyber terror nuclear power plants scada systems cyber security |
url | https://dergipark.org.tr/tr/pub/joltida/issue/78765/1198872 |
work_keys_str_mv | AT huseyinkuru cyberterrorthreatsagainstnuclearpowerplants |