Subscribe to be notified for updates: RSS Feed

Majed Ali Al Breiki

Senior Instrumentation & Control Manager, Instrumentation & Control Department , Emirates Nuclear Energy Cooperation

Mr. Al Braik is Senior Instrumentation & Control Manager within the Engineering Department in Emirates Nuclear Energy Cooperation with over 14 years’ experience in Instrumentation and Control Design. He holds Master of Science and Bachelors of Science in Control System. Also, he holds TÜV Rheinland certified Functional Safety Engineer since 2011 and Green Belt Six Sigma from Institute Quality Federation. His interests are cyber security, wireless system, fieldbus, advanced control systems, and Integrated Control System design. He already had published articles in journals such as “wireless control in offshore facilities” in Oil & Gas journal, and “Can Virtualization is adopted in control system?” in the control engineering magazine.

Cyber Security Design Methodology for the Nuclear Power Control & Protection Systems.

Industrial Control System Cyber Security

Abstract: In today’s world, cyber security is one of the foundational design attributes that are necessary in any industrial Integrated Control System (ICS) design process. A standard design approach is to identify significant cyber security risks in the ICS Architecture and implement cyber security protection layers to mitigate these risks in the ICS Architecture in accordance to known international standards or guidelines (i.e. ISA 99, INPO 10-008, NIST standards, and US NRC 5.71 as example). A majority of these standards consider embedding the DID (Defense in Depth) approach in the ICS architecture design as a reasonable approach to protect the ICS from cyber security attacks. For an ICS in a Nuclear Power application, the DID approach is a key aspect adopted to augment the cyber security protection layers within the Nuclear ICS Architecture. The design requires multiple analysis to be performed on the nuclear power plant (i.e. such as target set analysis, Critical Digital System/Asset Analysis, and Digital Control Assets Analysis) before the system designer can adopt the DID approach when defining the Nuclear Power ICS Architecture. The design and implementation process is carried out under a Cyber Security Life Cycle Program and may vary between control and protection systems. In this paper (Talk), the Author (Speaker) presents the design process related to Cyber Security Design and its implementation in the Nuclear Power ICS Architecture. Complete cyber security life cycle program will be explained and where does the DID approach fits in this life cycle.

Copyright 2013 DMS Global - Design by DMS Cybernation