ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 ANS Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Latest Magazine Issues
Apr 2026
Jan 2026
Latest Journal Issues
Nuclear Science and Engineering
May 2026
Nuclear Technology
February 2026
Fusion Science and Technology
Latest News
NRC proposed rule for licensing reactors authorized by DOE, DOD
Nuclear reactor designs approved by the Department of Energy or Department of Defense could get streamlined pathways through the Nuclear Regulatory Commission’s commercial licensing process should applicants wish to push the technology into the civilian sector.
A proposed rule introduced April 2 by the NRC would “improve NRC licensing review efficiency, where applicable, by explicitly establishing by regulation an additional means for reactor applicants to demonstrate the safety functions of their reactor designs, and thus, would contribute to the safe and secure use and deployment of civilian nuclear energy technologies.”
Michael T. Rowland, Lee T. Maccarone, Andrew J. Clark
Nuclear Technology | Volume 209 | Number 3 | March 2023 | Pages 471-487
Technical Paper—Instrumentation and Controls | doi.org/10.1080/00295450.2022.2087841
Articles are hosted by Taylor and Francis Online.
The Information Harm Triangle (IHT) is a novel approach that aims to adapt intuitive engineering concepts to simplify defense in depth for instrumentation and control (I&C) systems at nuclear power plants. This approach combines digital harm, real-world harm, and unsafe control actions (UCAs) into a single graph named “Information Harm Triangle.” The IHT is based on the postulation that the consequences of cyberattacks targeting I&C systems can be expressed in terms of two orthogonal components: a component representing the magnitude of data harm (DH) (i.e., digital information harm) and a component representing physical information harm (PIH) (i.e., real-world harm, e.g., an inadvertent plant trip). The magnitude of the severity of the physical consequence is the aspect of risk that is of concern. The sum of these two components represents the total information harm.
The IHT intuitively informs risk-informed cybersecurity strategies that employ independent measures that either act to prevent, reduce, or mitigate DH or PIH. Another aspect of the IHT is that the DH can result in cyber-initiated UCAs that result in severe physical consequences. The orthogonality of DH and PIH provides insights into designing effective defense in depth. The IHT can also represent cyberattacks that have the potential to impede, evade, or compromise countermeasures from taking appropriate action to reduce, stop, or mitigate the harm caused by such UCAs. Cyber-initiated UCAs transform DH to PIH.