National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements: Implementing Guide. (Record no. 81149)

MARC details
000 -LEADER
fixed length control field 04538cam a2200421 i 4500
001 - CONTROL NUMBER
control field on1317842419
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240726104852.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220518s2021 au a ob 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency NT
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency NT
Modifying agency EBLCP
-- NT
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789201312204
Qualifying information
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9201312202
Qualifying information
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TD195
Item number .N385 2021
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
245 10 - TITLE STATEMENT
Title National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements: Implementing Guide.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
490 0# - SERIES STATEMENT
Series statement IAEA nuclear security series ;
Volume # no. 10-G (Rev. 1)
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Intro --
Title 1. INTRODUCTION --
-- Background --
-- Objective --
-- Scope --
-- Structure --
-- 2. NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND THE USE OF A RISK INFORMED APPROACH --
-- Risk informed approach and threat statements --
-- Potential adversaries and their attributes and characteristics --
-- Information security considerations --
-- 3. OVERVIEW OF THE PROCESS OF DEVELOPMENT, USE AND MAINTENANCE OF THE VALIDITY OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION, DESIGN BASIS THREATS, AND REPRESENTATIVE THREAT STATEMENTS --
-- 4. ROLES AND RESPONSIBILITIES --
-- State --
-- Competent authorities
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Operators --
Title 5. CONDUCT OF A NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT --
-- Input: Collection of relevant threat information --
-- Analysis of relevant threat information --
-- Output: National nuclear security threat assessment documentation --
-- 6. DEVELOPMENT OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS --
-- Regulatory approaches and threat statements --
-- Developing a design basis threat --
-- Screening the national nuclear security threat assessment documentation --
-- Collating adversary attributes and characteristics
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Adjusting collated adversary attributes and characteristics to take account of policy factors --
Title Tailoring adversary attributes and characteristics to specific facilities and activities --
-- Finalizing and establishing the design basis threat --
-- Developing a representative threat statement --
-- Threats within and beyond the design basis threat --
-- 7. USE OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS --
-- Performance based regulatory approach --
-- Prescriptive regulatory approach --
-- Combined approach --
-- Developing attack scenarios
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note 8. MAINTENANCE OF THE VALIDITY AND REVIEW OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION AND OF THREAT STATEMENTS --
Title Responding to new and emerging threats --
-- AppendixA MODEL DESIGN BASIS THREAT --
-- REFERENCES --
-- GLOSSARY
520 0# - SUMMARY, ETC.
Summary, etc. "The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear material and other radioactive material that is under regulatory control, and associated facilities and activities, the results of this identification and assessment are expressed as a design basis threat or representative threat statement describing the intentions and capabilities of potential adversaries against which the materials and associated facilities and activities are to be protected. An Implementing Guide was issued in 2009 under the title of Development, Use and Maintenance of the Design Basis Threat which was updated and revised. The result of this revision is the current publication. It provides a step-by-step methodology for conducting a national nuclear security threat assessment including both physical and computer security aspects, and for the development, use and maintenance of design basis threats and representative threat statements."--Publisher's description.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk assessment.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Nuclear facilities
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Radioactive substances
General subdivision Security measures.
655 #1 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic Books.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element International Atomic Energy Agency,
Relator term issuing body.
856 40 - ELECTRONIC LOCATION AND ACCESS
-- Click to access digital title | log in using your CIU ID number and my.ciu.edu password.
Uniform Resource Identifier <a href="httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3282323&site=eds-live&custid=s3260518">httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3282323&site=eds-live&custid=s3260518</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
DONATED BY:
VENDOR EBSCO
Classification part TD.
PUBLICATION YEAR 2021
LOCATION ONLINE
REQUESTED BY:
--
-- NFIC
Source of classification or shelving scheme
994 ## -
-- 92
-- NT
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 1
b Cynthia Snell
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library ONLINE 07/07/2023 EBSCO   TD195.83 on1317842419 07/07/2023 httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3282323&site=eds-live&custid=s3260518 07/07/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)