Cyber Terror Threats Against Nuclear Power Plants

After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the in...

Full description

Bibliographic Details
Main Author: Hüseyin KURU
Format: Article
Language:English
Published: JOLTIDA 2023-07-01
Series:Journal of Learning and Teaching in Digital Age
Subjects:
Online Access:https://dergipark.org.tr/tr/pub/joltida/issue/78765/1198872
_version_ 1797783841035780096
author Hüseyin KURU
author_facet Hüseyin KURU
author_sort Hüseyin KURU
collection DOAJ
description After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has become almost impossible for individuals, state institutions and private companies to continue their activities independently of cyberspace, which is described as the fifth operational area. This situation has made it a critical priority to ensure the physical and cyber security of nuclear power plants, which carry the energy burden of the societies and at the same time pose great security risks. In this period, states, state-sponsored and radical terrorist groups that wanted to close the power deficit against military and economically strong states, started to develop asymmetric methods of struggle. In the end new threat vectors such as cyber terrorism have emerged and states that have moved many institutions and services to cyberspace have become more vulnerable to malicious attacks and terrorist activities. In this study, the concept of terrorism and cyber terrorism have been examined and focused on the SCADA systems of nuclear power plants and in the last section cyber security of these systems have been evaluated. This Implementation of this model aims to simplify the process for all organizations in the Nuclear Sector—regardless of their size, cybersecurity risk, or current level of cybersecurity sophistication—to apply the principles and best practices of risk management. Ultimately, the framework and this implementation model are focused on helping individual organizations reduce and better manage their cybersecurity risks, contributing to a more secure and resilient sector overall.
first_indexed 2024-03-13T00:31:36Z
format Article
id doaj.art-109ef80cca9c4d1393ea7a00f4343749
institution Directory Open Access Journal
issn 2458-8350
language English
last_indexed 2024-03-13T00:31:36Z
publishDate 2023-07-01
publisher JOLTIDA
record_format Article
series Journal of Learning and Teaching in Digital Age
spelling doaj.art-109ef80cca9c4d1393ea7a00f43437492023-07-10T11:28:27ZengJOLTIDAJournal of Learning and Teaching in Digital Age2458-83502023-07-0182237244https://doi.org/10.53850/joltida.1198872Cyber Terror Threats Against Nuclear Power PlantsHüseyin KURU0https://orcid.org/0000-0002-7464-9860GAZI UNIVERSITYAfter the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has become almost impossible for individuals, state institutions and private companies to continue their activities independently of cyberspace, which is described as the fifth operational area. This situation has made it a critical priority to ensure the physical and cyber security of nuclear power plants, which carry the energy burden of the societies and at the same time pose great security risks. In this period, states, state-sponsored and radical terrorist groups that wanted to close the power deficit against military and economically strong states, started to develop asymmetric methods of struggle. In the end new threat vectors such as cyber terrorism have emerged and states that have moved many institutions and services to cyberspace have become more vulnerable to malicious attacks and terrorist activities. In this study, the concept of terrorism and cyber terrorism have been examined and focused on the SCADA systems of nuclear power plants and in the last section cyber security of these systems have been evaluated. This Implementation of this model aims to simplify the process for all organizations in the Nuclear Sector—regardless of their size, cybersecurity risk, or current level of cybersecurity sophistication—to apply the principles and best practices of risk management. Ultimately, the framework and this implementation model are focused on helping individual organizations reduce and better manage their cybersecurity risks, contributing to a more secure and resilient sector overall.https://dergipark.org.tr/tr/pub/joltida/issue/78765/1198872terrorismcyber terrornuclear power plantsscada systemscyber security
spellingShingle Hüseyin KURU
Cyber Terror Threats Against Nuclear Power Plants
Journal of Learning and Teaching in Digital Age
terrorism
cyber terror
nuclear power plants
scada systems
cyber security
title Cyber Terror Threats Against Nuclear Power Plants
title_full Cyber Terror Threats Against Nuclear Power Plants
title_fullStr Cyber Terror Threats Against Nuclear Power Plants
title_full_unstemmed Cyber Terror Threats Against Nuclear Power Plants
title_short Cyber Terror Threats Against Nuclear Power Plants
title_sort cyber terror threats against nuclear power plants
topic terrorism
cyber terror
nuclear power plants
scada systems
cyber security
url https://dergipark.org.tr/tr/pub/joltida/issue/78765/1198872
work_keys_str_mv AT huseyinkuru cyberterrorthreatsagainstnuclearpowerplants