Nuclear Cyber Security Frameworks and Controls

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

Vocabulary terms covering regulatory standards and specific cyber security control categories for nuclear power reactors.

Last updated 2:43 AM on 4/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

NEI 08-09

Cyber Security Plan for Nuclear Power Reactors

2
New cards

10 CFR 73.54

Protection of Digitial Computer and Communication Systems and Networks

3
New cards

10 CFR 73.55

Requirements for physical protection of licensed activities in nuclear power reactors against radiological sabotage

4
New cards

NEI 10-04

Identifying Systems and Assets Subject to the Cyber Security Rule

5
New cards

NEI 13-10

Cyber Security Control Assessments Controls

6
New cards

Evaluate and Manage Cyber Risk

Ensures risks to computer control systems are properly calculated and handled

7
New cards

Audit and Accountability

Establishes the events that are necessary to record, audit, and defines storage and retention requirements

8
New cards

System and Services Acquisition

Focuses on maintaining the integrity of a CDA during the procurement and manufacturing processes

9
New cards

System and Communication Protection

Manages the communications between CDAs.

10
New cards

Physical and Operational Environment Protection

Is related to physical security and access to CDAs and their communication pathways

11
New cards

Cyber Security Contingency Plan

Control describes activities such as data backups, storage, and recovery actions

12
New cards

Configuration Management

Ensures that hardware and software changes are documented and assessed to confirm that CDAs remain secure from cyber threats

13
New cards

Media Protection

Provides details for protecting security information stored on CDA media or Digital Test Equipment

14
New cards

Attack Mitigation and Response

Deals with the actions required to identify and respond to a cyber-attack or threat

15
New cards

Identification and Authentication

Used to positively identify users, hosts, and Applications

16
New cards

Personnel Security

Provides requirements for granting access to the individuals who require access to CDAs.