National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements: Implementing Guide.
Material type: TextSeries: IAEA nuclear security series ; no. 10-G (Rev. 1)Description: 1 online resource : illustrationsContent type:- text
- computer
- online resource
- 9789201312204
- 9201312202
- TD195 .N385 2021
- COPYRIGHT NOT covered - Click this link to request copyright permission: https://lib.ciu.edu/copyright-request-form
Item type | Current library | Collection | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | Non-fiction | TD195.83 (Browse shelf(Opens below)) | Link to resource | Available | on1317842419 |
Includes bibliographical references.
Intro -- 1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND THE USE OF A RISK INFORMED APPROACH -- Risk informed approach and threat statements -- Potential adversaries and their attributes and characteristics -- Information security considerations -- 3. OVERVIEW OF THE PROCESS OF DEVELOPMENT, USE AND MAINTENANCE OF THE VALIDITY OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION, DESIGN BASIS THREATS, AND REPRESENTATIVE THREAT STATEMENTS -- 4. ROLES AND RESPONSIBILITIES -- State -- Competent authorities
Operators -- 5. CONDUCT OF A NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT -- Input: Collection of relevant threat information -- Analysis of relevant threat information -- Output: National nuclear security threat assessment documentation -- 6. DEVELOPMENT OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Regulatory approaches and threat statements -- Developing a design basis threat -- Screening the national nuclear security threat assessment documentation -- Collating adversary attributes and characteristics
Adjusting collated adversary attributes and characteristics to take account of policy factors -- Tailoring adversary attributes and characteristics to specific facilities and activities -- Finalizing and establishing the design basis threat -- Developing a representative threat statement -- Threats within and beyond the design basis threat -- 7. USE OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Performance based regulatory approach -- Prescriptive regulatory approach -- Combined approach -- Developing attack scenarios
8. MAINTENANCE OF THE VALIDITY AND REVIEW OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION AND OF THREAT STATEMENTS -- Responding to new and emerging threats -- AppendixA MODEL DESIGN BASIS THREAT -- REFERENCES -- GLOSSARY
"The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear material and other radioactive material that is under regulatory control, and associated facilities and activities, the results of this identification and assessment are expressed as a design basis threat or representative threat statement describing the intentions and capabilities of potential adversaries against which the materials and associated facilities and activities are to be protected. An Implementing Guide was issued in 2009 under the title of Development, Use and Maintenance of the Design Basis Threat which was updated and revised. The result of this revision is the current publication. It provides a step-by-step methodology for conducting a national nuclear security threat assessment including both physical and computer security aspects, and for the development, use and maintenance of design basis threats and representative threat statements."--Publisher's description.
COPYRIGHT NOT covered - Click this link to request copyright permission:
There are no comments on this title.