Premium Essay

Nuclear Code of Business

In:

Submitted By huaixiaore
Words 698
Pages 3
CSR PROGRAM: CODE OF BUSINESS CONDUCT
Nuclear projects will be analysis according 4 dimensions: 1. The technology used and the technical characteristics of the project 2. The capability of the host country to monitor a nuclear project, especially through its national safety authority 3. The capability of the operator to operate the nuclear project 4. The environmental and social impacts
Governments:
Nuclear power needs greater transparency and it needs supports from government which can help to make up a part of our energy future. In order to apply a best unclear safety, we will need to make good plan by employees together and good engineering by stakeholders effort. However, it is not only about these thing, it also need to concern about sort of society. We need to create and also influence other partnership companies to produce accountability and transparency. We believe that it is the way of building institutions that deserve and receive trust.
Suppliers:
Our suppliers are committed to designing, building and servicing nuclear reactors to make that happen. But reliable, affordable, safe, low-carbon energy is just a start. Energy industry has a social responsibility as well – to engage with support organizations whose mission is to make stronger communities, whether close to home, or around the world.
Employees : All employees and partners are working on safe and healthy environments. Working on different strategies to positively impact and continuously improve all aspects of health and safety.
We will comply to applicable health and safety laws, requirements, and recognized standards and guidelines appropriate of our activities to protect our employees, contractors, visitors, physical assets and the public.
We are trying to delivery democracy idea for all stakeholders and inside with outside company. Democracy policy can make it much

Similar Documents

Premium Essay

Code N941 Research Paper

...Code N94: This department is also known as the nuclear reactor supply chain management directorate, they provide support for the naval reactor program this program includes submarines, surface ships, prototype sites, & moored training ships and systems as well as equipment. Sub Code N941: Code N941 is the resource management department; they provide the following support for NAVSUP (naval support). Information technology & Application software support, application improvement &analysis, production system support, software application training, website support &maintenance, & core business process support. Sub Code N942: Code N942 is known as the support management department; they perform a long list of supports tasks which include...

Words: 274 - Pages: 2

Premium Essay

Csec 620 Ia

...Mitigation: Nuclear Power Facility Khamara Harris University of Maryland University College CSEC 620 Table of Contents Abstract Page 3 Introduction Page 4 Threat Actors Page 4 Motives Page 5 Methods of Preventing/Discouraging Hackers Page 7 Conclusion Page 8 References Page 9 Abstract "All states possess an inherent right to self-defense, and we recognize that certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners," says the report. "We reserve the right to use all necessary means—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law." Anderson, 2012 Hacker Culture and Mitigation: Nuclear Power Facility Introduction In the past few years cyber warfare has been at an all-time high. War is no longer just bombs and weapons, but targeting a nation’s critical infrastructure as a means to benefit the other. Lately the most valuable target has been Nuclear power facilities. The largest attack on a nuclear power facility started in 2006 when President Bush was in office. President Bush and the NSA named the attack code name: Olympic Games but was later named STUXNET after that bug had been found in 2010. At this point in time STUXNET has been the most powerful cyber-attack launched by the United States. For many years STUXNET was so sophisticated that it was able to target Iran’s nuclear power facility...

Words: 2306 - Pages: 10

Premium Essay

Bus 560 Business Ethics

...department do you think faces the greatest number of ethical challenges? Why? It would seem that the finance or bookkeeping department of any company faces the greatest number of ethical challenges because the opportunity to manipulate the accounting and misrepresent or otherwise take money from the company is ‘ever-present.’ However, there are opportunities for unethical behavior in all areas of a business – and in all businesses in the economy. 2. Provide three examples of unethical behavior that you have observed at the company you work or (or worked for in the past). What were the outcomes of this behavior? While small businesses may be the backbone of the American economy – they can also be places where unethical behavior occurs without oversight or consequence. Limited resources sometimes make it appear to be standard or unavoidable to engage in unethical practices. The following unethical behaviors in small businesses are cancerous and they encourage ethical breaches in various (perhaps unintended) areas of any business. The first week I was employed for a small business that was a contractor for a project with another company, my fellow workers encouraged me to ‘fudge’ my timesheet – indicating that it was a common practice among employees. It was indicated to me that the boss was a tightwad with money and underpaid employees so the timesheet fudges were standard and it was even suggested that ‘in order to get along I needed to go along.’ I was very uncomfortable when...

Words: 1887 - Pages: 8

Premium Essay

Stuxnet Worm

...exploit a of four zero-day flaw of Windows operating system. Stuxnet was a targeted attack by intelligence agencies to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010. Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14 Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How STUXNET Spreads (New York Times, 2011). 7 Figure 6: Infection By Country (Symantec, 2010). 9 Figure 7: WinCC Software (Symantec, 2010). 11 Introduction Discovered in June of 2010, a computer worm called Stuxnet, was designed to attack Power programmable-logic controllers or PLC’s used in control industrial controls such as used in nuclear power plants that operate a specific type of on...

Words: 2136 - Pages: 9

Premium Essay

Stuxnet Virus

...Stuxnet Virus According to counterterrorism czar Richard Clarke, Stuxnet was a weaponized malware computer worm. Stuxnet was launched in mid-2009, it did major damage to Iran’s nuclear program in 2010 and then spread to computers all over the world (Clarke, 2012). Type of Breach The Stuxnet is a computer worm, “it is a digital ghost with countless lines of code… it was able to worm its way into Iran’s nuclear fuel enrichment facility in Natanz, Iran” (Clarke, 2012). A worm is a program that spreads copies of itself through a network and a worm can also spread copies of itself as a stand-alone program (Pfleeger & Pfleeger, 2007). How the Breach Occurred On June 17, 2010, Sergey Ulasen, head of a small computer security firm called VirusBlokAda, was going his through e-mail when a report caught his attention. A computer belonging to an Iranian customer was caught in a reboot loop; it was “shutting down and restarting repeatedly despite efforts by operators to take control of it. It appeared the machine was infected with a virus” (Zetter, 2011). Ulasen’s research team got hold of the virus infecting their client’s computers. They realized it was using a “zero-day” exploit to spread (Zetter, 2011). Zero-days are the hacking world’s most potent weapons: The virus exploits vulnerabilities in software that are not yet known to the software maker or antivirus vendors. They’re also exceedingly rare; it takes considerable skill and persistence to find such vulnerabilities and...

Words: 1195 - Pages: 5

Free Essay

Diabetes

...Undergraduate Application for Admission Thank you for your interest in Excelsior College. Complete this application if this is your first time applying to Excelsior College or if you were enrolled in the School of Nursing within the last five years and have since earned additional collegelevel credit. If you have withdrawn from a business, health sciences, liberal arts, or technology degree program within the last five years, please contact your Academic Advising Office as you may not be required to submit an application. If you are a graduate of a business, health sciences, liberal arts, technology, or nursing degree program, please contact your Academic Advising Office as you may not be required to submit an application. Licensed practical/vocational nurse Licensed massage therapist Certified pharmacy technician School of Nursing Candidates In addition to official transcripts, nursing candidates must submit a copy of a current license or certification to verify professional status in an appropriate health care profession. This license should be mailed with your application or faxed to the Undergraduate Application for Admission Team at 518-464-8833. Bachelor of Science in nursing (BRN) and RN to Master of Science in nursing (MRN) applicants must submit an official transcript showing the completion of associate degree nursing education or RN diploma education. Nursing courses completed at institutions other than Excelsior College are only evaluated upon enrollment. International...

Words: 4543 - Pages: 19

Premium Essay

Ronald Reagan's Accomplishments To Achieve Success

...Greatness is a complex philosophy that has a wide variety of meanings to different people. It is measured in a multitude of different ways, and usually is associated with being distinguished or eminent at something. To most people in present day, greatness means to be wealthy or famous or have a great amount of power. What greatness is really measured in is one’s accomplishments. These accomplishments embody everything previously mentioned and more. This could be achievements at war, rewarded by a medal of honor, all the way to an extremely successful business deal that makes millions. To achieve greatness we must be ready to sacrifice anything. Sometimes to achieve greatness we must A prime example of this is president Ronald Reagan. Ronald Reagan gave everything invested in him to help America in a time where it almost...

Words: 422 - Pages: 2

Free Essay

Term Paper on Stuxnet

...Israeli Test on Worm Called Crucial in Iran Nuclear Delay By WILLIAM J. BROAD, JOHN MARKOFF and DAVID E. SANGER Ralph Langner, an independent computer security expert, solved Stuxnet. The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal. Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own. Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms. “To check out the worm, you have to know the machines,” said an American expert on nuclear intelligence. “The reason the worm has been effective is that the Israelis tried it out.” Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting...

Words: 2875 - Pages: 12

Free Essay

Vanity Fair in Cyberwar

...A Declaration of Cyber-War | Vanity Fair April 2011 Stuxnet Worm Last summer, the world’s top software-security experts were panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and who was behind it. As the world now knows, the Stuxnet worm appears to have attacked Iran’s nuclear program. And, as Michael Joseph Gross reports, while its source remains something of a mystery, Stuxnet is the new face of 21st-century warfare: invisible, anonymous, and devastating. By Michael Joseph GrossPhotograph by Jonas Fredwall Karlsson EMail GAME OF SHADOWS Eugene Kaspersky, co-founder and C.E.O. of Kaspersky Lab—a Moscow-based computer-security company and an early investigator of Stuxnet—photographed on the Bolshoy Moskvoretsky Bridge, near the Kremlin. All over Europe, smartphones rang in the middle of the night. Rolling over in bed, blinking open their eyes, civilians reached for the little devices and, in the moment of answering, were effectively drafted as soldiers. They shook themselves awake as they listened to hushed descriptions of a looming threat. Over the next few days and nights, in mid-July of last year, the ranks of these sudden draftees grew, as software analysts and experts in industrial-control systems gathered in makeshift war rooms in 3 of 14 6/21/2014 10:02 PM A Declaration of Cyber-War | Vanity Fair file:///C:/Users/malbun/Desktop/A...

Words: 7873 - Pages: 32

Premium Essay

Ethical Principles and Organizational Issues

...ethics relates to the corporate world, such as, privacy, technological trends, and liability, as well as several other significant areas. Close to four million consumers and close to 46k megawatts of producing ability, Atlanta’s Southern Company is the primary energy provider attending the Southeastern region of the U.S. on behalf of its affiliates (southerncompany.com, 2015). One of the leading producers of uncontaminated, safe, dependable and reasonable energy in the U.S., Southern Company is the owner of electric services in the following states and areas: Alabama, Georgia, Gulf Coast of Florida, and Mississippi. Also, an increasing economical group company, Southern Power, as well as a certified operative of several nuclear producing plants: Southern Nuclear, Southern Telecom, and lastly SouthernLINC Wireless, individually (southerncompany.com, 2015). Southern Company is recognized for energy...

Words: 812 - Pages: 4

Premium Essay

Footnote to Youth

...UNC would be very different. For example, taking this class without a computer would be nearly impossible. Today, computers have opened up a door in the military. Computers help our military train and educate members in ways that were not possible before. In short, computers help to simplify the complexities that our military faces and allow our military to more easily assess these problems in an efficient manner. This cuts down on risks associated with training new members of the military. Also, the introduction of computers allows for a much faster training speed. * Computer Simulations There are many reasons why simulations were a perfect fit for the military, the most obvious of which is training. Training for war is a dangerous business. It is also expensive, seeing as many people need to be trained to operate many millions of dollars worth of machinery. Simulations of real life situations, and real machinery, offers the military a safer and more cost effective way to train their soldiers. Now, mistakes in training that would have previously resulted in death, injury, or huge monetary costs only result in a failure of the simulation. Therefore, it is easy to see the enormous impact computer simulations have had in the military, and the lives of the soldiers that comprise the military. * Communications Learning and communicating successfully in large groups is key to surviving on the front line in the military. Everyone in the group must be on the same page. This is...

Words: 2543 - Pages: 11

Free Essay

High and Low Context Cultures

...much you have to know before you can communicate effectively. When workers from high-context and low-context cultures have to work together problems often occur as a result of the type of information exchanged as well as how that information is exchanged. These problems can be categorized as differences in “direction”, “quantity” and “quality”. At differences in direction employees from high-context cultures like China and France adapt to their good friends, families and also to close colleagues (in-group members). They communicate with them intensively (quantity difference) and exchange specific/detailed information about many different topics. The result is that every group member is constantly up-to-date with the facts around the business. Edward T. Hall, a respected anthropologist and cross-cultural researcher, identified classic dimensions of culture in his books The Silent Language and The Hidden Dimension. Understanding and applying this concept can help today’s leaders improve their communication skills across cultures. A key factor in his theory is context. This relates to the framework, background, and surrounding circumstances in which communication or an event takes place. In comparison to high-context cultures, low-context cultures like the USA and Australia orientate on many people of their daily life because they don’t differentiate as much as high-context cultures between in-groups and out-groups. The direction...

Words: 2097 - Pages: 9

Free Essay

Administrative Regulation

...telephone at (301) 415–4737 or (800) 397–4209, by fax at (301) 415–3548, and by email to pdr@nrc.gov. Regulatory guides are not copyrighted, and NRC approval is not required to reproduce them. For the Nuclear Regulatory Commission. Dated at Rockville, Maryland, this 25th day of May 2012. Edward O’Donnell, Acting Chief, Regulatory Guide Development Branch, Division of Engineering, Office of Nuclear Regulatory Research. [FR Doc. 2012–13622 Filed 6–4–12; 8:45 am] BILLING CODE 7590–01–P FOR FURTHER INFORMATION CONTACT: Gregory Chapman, Uranium Enrichment Branch, Division of Fuel Cycle Safety and Safeguards, Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission, Washington, DC 20555–0001; telephone: 301–492–3106 or email to: Gregory. Chapman@nrc.gov. SUPPLEMENTARY INFORMATION: I. Introduction Revision 2 of Regulatory Guide 8.24, ‘‘Health Physics Surveys During Enriched Uranium-235 Processing and Fuel Fabrication’’ was issued with a temporary identification as Draft Regulatory Guide, DG–8040 on March 22, 2010 (75 FR 13599). This guide specifies the types and frequencies of surveys that are acceptable to the NRC’s staff for the protection of workers in plants licensed by the NRC to process enriched uranium and fabricate uranium fuel. Title 10 of the Code of Federal Regulations (10 CFR) 20.1501(a), requires each licensee to make or cause to be made such surveys that may...

Words: 2084 - Pages: 9

Premium Essay

Weapons of Mass Destruction

...the Wright Brother creating the first airplane, and the ever so popular television. Not all inventions were used for the advancement of the human species. A weapon with immense power was developed called the atomic bomb. In October 1939, just after the outbreak of World War II in Europe, the President of the United States Franklin D. Roosevelt received a letter from physicist Albert Einstein and his partner Leo Szilard. This letter spoke of an unheard of power by using the forces of nuclear fission or splitting the atom. Thankfully the two scientists fled Nazi German to escape Hitler’s rule. If Adolf Hitler had have gain the power of a nuclear weapon, he most likely would have destroyed his enemies and rule the world and achieved his twisted dream. To avoid this nightmare, Einstein and Szilard urged the government of the United States to join the race for the atomic bomb. The president took them up on this offer and the next four years was devoted to secretly develop a super weapon. Code-named "The Manhattan Project," the effort eventually employed more than 200,000 workers and several thousands scientists and engineers, ironically most of European background. By the time the first bomb was tested the Nazis had already surrendered meaning that a threat of a German counter nuke was gone. The war in Japan was still at hand, so President Truman authorized the use of the bombs in order to force Japanese leadership into submission. On August 6 an atomic bomb with an explosive...

Words: 1506 - Pages: 7

Premium Essay

Assignment

...(511) Submitted To :: MR. Anisur Rahman. Assistant Professor, IBA-JU. Submitted By :: Ishrat Reza. (201103025) WMBA, 1st Batch. Date :: 11.07.2012. Institute of Business Administration, Jahangirnagar University. Flame Virus Introduction : Flame virus is a more sophisticated weapon to get behind the enemies line than sending arms, ammunitions, soldiers. It’s a silent agent which kills the security of any computer, enter into it & steal valuable information from that. The virus is doing cyber espionage in Middle Eastern Countries. History : Flame was discovered first in May 2012 by MAHER Center of Iranian National CERT, Kaspersky Lab and CrySyS Lab (Laboratory of Cryptography and System Security) of the Budapest University of Technology and Economics. (Wikipedia, 2012) It has discovered that a module from the early 2009-version of Stuxnet, known as “Resource 207,” was actually a Flame plugin.This means that when the Stuxnet worm was created in the beginning of 2009, the Flame platform already existed, and that in 2009, the source code of at least one module of Flame was used in Stuxnet. (About Us: Kaspersky, 2012) Key Features: 1. Size—20MB, which is huge for a malware program. 2. The malware uses five different encryption methods and a SQlite database to store structured information. 3. It attacks the computers which are using...

Words: 1029 - Pages: 5