Cargando…

National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements Implementing Guide.

The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear material and other radioactive material that is under regulatory control, and associated facilities and activities, the results of this ide...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: IAEA
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Havertown : International Atomic Energy Agency, 2021.
Colección:IAEA Nuclear Security Ser.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Intro
  • 1. INTRODUCTION
  • Background
  • Objective
  • Scope
  • Structure
  • 2. NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND THE USE OF A RISK INFORMED APPROACH
  • Risk informed approach and threat statements
  • Potential adversaries and their attributes and characteristics
  • Information security considerations
  • 3. OVERVIEW OF THE PROCESS OF DEVELOPMENT, USE AND MAINTENANCE OF THE VALIDITY OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION, DESIGN BASIS THREATS, AND REPRESENTATIVE THREAT STATEMENTS
  • 4. ROLES AND RESPONSIBILITIES
  • State
  • Competent authorities
  • Operators
  • 5. CONDUCT OF A NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT
  • Input: Collection of relevant threat information
  • Analysis of relevant threat information
  • Output: National nuclear security threat assessment documentation
  • 6. DEVELOPMENT OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS
  • Regulatory approaches and threat statements
  • Developing a design basis threat
  • Screening the national nuclear security threat assessment documentation
  • Collating adversary attributes and characteristics
  • Adjusting collated adversary attributes and characteristics to take account of policy factors
  • Tailoring adversary attributes and characteristics to specific facilities and activities
  • Finalizing and establishing the design basis threat
  • Developing a representative threat statement
  • Threats within and beyond the design basis threat
  • 7. USE OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS
  • Performance based regulatory approach
  • Prescriptive regulatory approach
  • Combined approach
  • Developing attack scenarios
  • 8. MAINTENANCE OF THE VALIDITY AND REVIEW OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION AND OF THREAT STATEMENTS
  • Responding to new and emerging threats
  • AppendixA MODEL DESIGN BASIS THREAT
  • REFERENCES
  • GLOSSARY