Amazon cover image
Image from Amazon.com

National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements: Implementing Guide.

Contributor(s): Material type: TextTextSeries: IAEA nuclear security series ; no. 10-G (Rev. 1)Description: 1 online resource : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789201312204
  • 9201312202
Subject(s): Genre/Form: LOC classification:
  • TD195 .N385 2021
Online resources: Available additional physical forms:
Contents:
1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND THE USE OF A RISK INFORMED APPROACH -- Risk informed approach and threat statements -- Potential adversaries and their attributes and characteristics -- Information security considerations -- 3. OVERVIEW OF THE PROCESS OF DEVELOPMENT, USE AND MAINTENANCE OF THE VALIDITY OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION, DESIGN BASIS THREATS, AND REPRESENTATIVE THREAT STATEMENTS -- 4. ROLES AND RESPONSIBILITIES -- State -- Competent authorities
5. CONDUCT OF A NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT -- Input: Collection of relevant threat information -- Analysis of relevant threat information -- Output: National nuclear security threat assessment documentation -- 6. DEVELOPMENT OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Regulatory approaches and threat statements -- Developing a design basis threat -- Screening the national nuclear security threat assessment documentation -- Collating adversary attributes and characteristics
Tailoring adversary attributes and characteristics to specific facilities and activities -- Finalizing and establishing the design basis threat -- Developing a representative threat statement -- Threats within and beyond the design basis threat -- 7. USE OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Performance based regulatory approach -- Prescriptive regulatory approach -- Combined approach -- Developing attack scenarios
Responding to new and emerging threats -- AppendixA MODEL DESIGN BASIS THREAT -- REFERENCES -- GLOSSARY
Subject: "The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear material and other radioactive material that is under regulatory control, and associated facilities and activities, the results of this identification and assessment are expressed as a design basis threat or representative threat statement describing the intentions and capabilities of potential adversaries against which the materials and associated facilities and activities are to be protected. An Implementing Guide was issued in 2009 under the title of Development, Use and Maintenance of the Design Basis Threat which was updated and revised. The result of this revision is the current publication. It provides a step-by-step methodology for conducting a national nuclear security threat assessment including both physical and computer security aspects, and for the development, use and maintenance of design basis threats and representative threat statements."--Publisher's description.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Includes bibliographical references.

Intro -- 1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND THE USE OF A RISK INFORMED APPROACH -- Risk informed approach and threat statements -- Potential adversaries and their attributes and characteristics -- Information security considerations -- 3. OVERVIEW OF THE PROCESS OF DEVELOPMENT, USE AND MAINTENANCE OF THE VALIDITY OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION, DESIGN BASIS THREATS, AND REPRESENTATIVE THREAT STATEMENTS -- 4. ROLES AND RESPONSIBILITIES -- State -- Competent authorities

Operators -- 5. CONDUCT OF A NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT -- Input: Collection of relevant threat information -- Analysis of relevant threat information -- Output: National nuclear security threat assessment documentation -- 6. DEVELOPMENT OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Regulatory approaches and threat statements -- Developing a design basis threat -- Screening the national nuclear security threat assessment documentation -- Collating adversary attributes and characteristics

Adjusting collated adversary attributes and characteristics to take account of policy factors -- Tailoring adversary attributes and characteristics to specific facilities and activities -- Finalizing and establishing the design basis threat -- Developing a representative threat statement -- Threats within and beyond the design basis threat -- 7. USE OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Performance based regulatory approach -- Prescriptive regulatory approach -- Combined approach -- Developing attack scenarios

8. MAINTENANCE OF THE VALIDITY AND REVIEW OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION AND OF THREAT STATEMENTS -- Responding to new and emerging threats -- AppendixA MODEL DESIGN BASIS THREAT -- REFERENCES -- GLOSSARY

"The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear material and other radioactive material that is under regulatory control, and associated facilities and activities, the results of this identification and assessment are expressed as a design basis threat or representative threat statement describing the intentions and capabilities of potential adversaries against which the materials and associated facilities and activities are to be protected. An Implementing Guide was issued in 2009 under the title of Development, Use and Maintenance of the Design Basis Threat which was updated and revised. The result of this revision is the current publication. It provides a step-by-step methodology for conducting a national nuclear security threat assessment including both physical and computer security aspects, and for the development, use and maintenance of design basis threats and representative threat statements."--Publisher's description.

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

There are no comments on this title.

to post a comment.