ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2025 ANS Winter Conference & Expo
November 9–12, 2025
Washington, DC|Washington Hilton
Standards Program
The Standards Committee is responsible for the development and maintenance of voluntary consensus standards that address the design, analysis, and operation of components, systems, and facilities related to the application of nuclear science and technology. Find out What’s New, check out the Standards Store, or Get Involved today!
Latest Magazine Issues
Sep 2025
Jan 2025
Latest Journal Issues
Nuclear Science and Engineering
September 2025
Nuclear Technology
Fusion Science and Technology
October 2025
Latest News
Empowering the next generation: ANS’s newest book focuses on careers in nuclear energy
A new career guide for the nuclear energy industry is now available: The Nuclear Empowered Workforce by Earnestine Johnson. Drawing on more than 30 years of experience across 16 nuclear facilities, Johnson offers a practical, insightful look into some of the many career paths available in commercial nuclear power. To mark the release, Johnson sat down with Nuclear News for a wide-ranging conversation about her career, her motivation for writing the book, and her advice for the next generation of nuclear professionals.
When Johnson began her career at engineering services company Stone & Webster, she entered a field still reeling from the effects of the Three Mile Island incident in 1979, nearly 15 years earlier. Her hiring cohort was the first group of new engineering graduates the company had brought on since TMI, a reflection of the industry-wide pause in nuclear construction. Her first long-term assignment—at the Millstone site in Waterford, Conn., helping resolve design issues stemming from TMI—marked the beginning of a long and varied career that spanned positions across the country.
Michael T. Rowland, Raja Abdul Raja Adnan, J. Scott Purvis, (IAEA)
Proceedings | Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technolgies (NPIC&HMIT 2019) | Orlando, FL, February 9-14, 2019 | Pages 1649-1658
Computer security (or Cyber Security) of I&C systems (i.e. sensitive digital assets) at nuclear facilities is of increasing importance based upon the adoption of cyber-attacks as a key component of a potential adversary’s Tactics, Techniques and Procedures (TTPs). This new capability (i.e. to launch cyber-attacks) demands that operators of nuclear facilities put in place a programme and measures ensure protection of I&C systems. However, given that resources and time are limited, operators need to apply their limited resources in a manner that maximizes the security benefit. The International Atomic Energy Agency (IAEA) recognizes the need for efficient and effective approaches to security. IAEA Nuclear Security Series (NSS) Fundamentals NSS 20 [1], Essential Element 9: Use of Risk Informed Approaches states “A nuclear security regime uses risk informed approaches, including in the allocation of resources for nuclear security systems and nuclear security measures and in the conduct of nuclear security related activities that are based on a graded approach and defence in depth.” For computer security, the IAEA defines the concepts of computer security levels and computer security zones in NSS 17 [2]. Computer security levels exist as a requirements specification that details the constraints and conditions imposed that must be met to ensure that appropriate protection is provided to sensitive digital assets. Each individual computer security level will require a graded level of effort (i.e. allocated resources), level of confidence in measures, and a level of adherence to requirements (or procedures) when conducting activities that may affect computer security. Computer security zones have logical and/or physical boundaries for which a common set of requirements (i.e. computer security level) are imposed or applied. Computer security zones exist and consists of boundaries, devices and measures that are observable and/or measurable. The arrangement of computer security zones within a defensive computer security architecture ensure that defence-in-depth is achieved. The purpose of this paper is to provide an overview of IAEA guidance on the application of a graded approach and defence in depth to computer security at nuclear facilities. The paper will also discuss the concepts of computer security levels and zones as found in IAEA Nuclear Security Series (NSS) publications on computer security.