B2.   Cybersecurity guidance for security controls at other types of nuclear facilities

B3.   Cybersecurity guidance for equipment acquisition

B4.   Guidance for cybersecurity self-assessments

B5.   Guidance for administrating and monitoring the performance of firewalls and intrusion detection/protection systems

B6.   Investigate tools, technologies, and approaches for electronic testing of control systems for potential cyber vulnerabilities

B7.   Guidance for deploying and maintaining defensive architectures

B8.   Sharing/Exporting cybersecurity technologies

B9.   Sharing threat and vulnerability information

B10.   Guidance on cybersecurity inspection procedures

B11.   Guidance on separation of duties for key information system insiders

B12.   Guidance on how to integrate physical and cybersecurity programs

C. Nuclear Forensics

C1.   Detection of uranium and plutonium in environmental matrices

C2.   Age-dating of uranium-rich materials

C3.   Round robin sample exchange

C4.   National nuclear forensic libraries

D. Modeling and Simulations (Vulnerability Assessments)

D1.   Methodology Tool Types: applications, strengths and weaknesses

D2.   Training

D3.   A path forward for possible joint cooperation

E. Physical Security

E1.   Guard Forces: Composition, Training, Testing, Rotation, etc.

E2.   Technologies for Physical Protection

E3.   Integration of Technologies and Methodologies to Physical Protection

E4.   Physical Protection as part of a systems approach to facility security (including personnel reliability programs, vulnerability assessments, etc.)

F. Material Measurements and Characterizations

F1.   Material measurements and characterizations

F2.   How they fit into materials characterization and accounting methodologies



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement