ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 ANS Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Latest Magazine Issues
Mar 2026
Jan 2026
Latest Journal Issues
Nuclear Science and Engineering
April 2026
Nuclear Technology
February 2026
Fusion Science and Technology
Latest News
U.K. releases new plans to speed nuclear deployment
In an effort to revamp its nuclear sector and enable the buildout of new projects, the U.K. has unveiled a sweeping set of changes to project deployment. These changes, which are set to come into effect by the end of next year, will restructure the country’s regulatory and environmental approval framework and directly support new growth through various workforce efforts.
Michael T. Rowland, Lee T. Maccarone, Andrew J. Clark
Nuclear Technology | Volume 209 | Number 3 | March 2023 | Pages 471-487
Technical Paper—Instrumentation and Controls | doi.org/10.1080/00295450.2022.2087841
Articles are hosted by Taylor and Francis Online.
The Information Harm Triangle (IHT) is a novel approach that aims to adapt intuitive engineering concepts to simplify defense in depth for instrumentation and control (I&C) systems at nuclear power plants. This approach combines digital harm, real-world harm, and unsafe control actions (UCAs) into a single graph named “Information Harm Triangle.” The IHT is based on the postulation that the consequences of cyberattacks targeting I&C systems can be expressed in terms of two orthogonal components: a component representing the magnitude of data harm (DH) (i.e., digital information harm) and a component representing physical information harm (PIH) (i.e., real-world harm, e.g., an inadvertent plant trip). The magnitude of the severity of the physical consequence is the aspect of risk that is of concern. The sum of these two components represents the total information harm.
The IHT intuitively informs risk-informed cybersecurity strategies that employ independent measures that either act to prevent, reduce, or mitigate DH or PIH. Another aspect of the IHT is that the DH can result in cyber-initiated UCAs that result in severe physical consequences. The orthogonality of DH and PIH provides insights into designing effective defense in depth. The IHT can also represent cyberattacks that have the potential to impede, evade, or compromise countermeasures from taking appropriate action to reduce, stop, or mitigate the harm caused by such UCAs. Cyber-initiated UCAs transform DH to PIH.