ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
Nuclear Energy Conference & Expo (NECX)
September 8–11, 2025
Atlanta, GA|Atlanta Marriott Marquis
Standards Program
The Standards Committee is responsible for the development and maintenance of voluntary consensus standards that address the design, analysis, and operation of components, systems, and facilities related to the application of nuclear science and technology. Find out What’s New, check out the Standards Store, or Get Involved today!
Latest Magazine Issues
Aug 2025
Jan 2025
Latest Journal Issues
Nuclear Science and Engineering
September 2025
Nuclear Technology
Fusion Science and Technology
August 2025
Latest News
The newest era of workforce development at ANS
As most attendees of this year’s ANS Annual Conference left breakfast in the Grand Ballroom of the Chicago Downtown Marriott to sit in on presentations covering everything from career pathways in fusion to recently digitized archival nuclear films, 40 of them made their way to the hotel’s fifth floor to take part in the second offering of Nuclear 101, a newly designed certification course that seeks to give professionals who are in or adjacent to the industry an in-depth understanding of the essentials of nuclear energy and engineering from some of the field’s leading experts.
Michael T. Rowland, Lee T. Maccarone, Andrew J. Clark
Nuclear Technology | Volume 209 | Number 3 | March 2023 | Pages 471-487
Technical Paper—Instrumentation and Controls | doi.org/10.1080/00295450.2022.2087841
Articles are hosted by Taylor and Francis Online.
The Information Harm Triangle (IHT) is a novel approach that aims to adapt intuitive engineering concepts to simplify defense in depth for instrumentation and control (I&C) systems at nuclear power plants. This approach combines digital harm, real-world harm, and unsafe control actions (UCAs) into a single graph named “Information Harm Triangle.” The IHT is based on the postulation that the consequences of cyberattacks targeting I&C systems can be expressed in terms of two orthogonal components: a component representing the magnitude of data harm (DH) (i.e., digital information harm) and a component representing physical information harm (PIH) (i.e., real-world harm, e.g., an inadvertent plant trip). The magnitude of the severity of the physical consequence is the aspect of risk that is of concern. The sum of these two components represents the total information harm.
The IHT intuitively informs risk-informed cybersecurity strategies that employ independent measures that either act to prevent, reduce, or mitigate DH or PIH. Another aspect of the IHT is that the DH can result in cyber-initiated UCAs that result in severe physical consequences. The orthogonality of DH and PIH provides insights into designing effective defense in depth. The IHT can also represent cyberattacks that have the potential to impede, evade, or compromise countermeasures from taking appropriate action to reduce, stop, or mitigate the harm caused by such UCAs. Cyber-initiated UCAs transform DH to PIH.