A Systematic Method for Identifying Vital Areas at Complex Nuclear Facilities

A Systematic Method for Identifying Vital Areas at Complex Nuclear Facilities

Author:

Publisher:

Published: 2005

Total Pages: 99

ISBN-13:

DOWNLOAD EBOOK

Identifying the areas to be protected is an important part of the development of measures for physical protection against sabotage at complex nuclear facilities. In June 1999, the International Atomic Energy Agency published INFCIRC/225/Rev. 4, 'The Physical Protection of Nuclear Material and Nuclear Facilities.' This guidance recommends that 'Safety specialists, in close cooperation with physical protection specialists, should evaluate the consequences of malevolent acts, considered in the context of the State's design basis threat, to identify nuclear material, or the minimum complement of equipment, systems or devices to be protected against sabotage.' This report presents a structured, transparent approach for identifying the areas that contain this minimum complement of equipment, systems, and devices to be protected against sabotage that is applicable to complex nuclear facilities. The method builds upon safety analyses to develop sabotage fault trees that reflect sabotage scenarios that could cause unacceptable radiological consequences. The sabotage actions represented in the fault trees are linked to the areas from which they can be accomplished. The fault tree is then transformed (by negation) into its dual, the protection location tree, which reflects the sabotage actions that must be prevented in order to prevent unacceptable radiological consequences. The minimum path sets of this fault tree dual yield, through the area linkage, sets of areas, each of which contains nuclear material, or a minimum complement of equipment, systems or devices that, if protected, will prevent sabotage. This method also provides guidance for the selection of the minimum path set that permits optimization of the trade-offs among physical protection effectiveness, safety impact, cost and operational impact.


Identification of Vital Areas at Nuclear Facilities

Identification of Vital Areas at Nuclear Facilities

Author: International Atomic Energy Agency

Publisher:

Published: 2012

Total Pages: 52

ISBN-13: 9789201144102

DOWNLOAD EBOOK

This publication provides detailed guidance with regard to the identification of vital areas at nuclear facilities. It presents a structured approach to identifying those areas that contain equipment, systems and components to be protected against sabotage. The process for selection of a specific set of vital areas to be protected is based on consideration of the potential radiological consequences of sabotage, and on the design, operational and safety features of a nuclear facility. The method builds upon safety analysis to develop logic models for sabotage scenarios that could cause unacceptable radiological consequences. The sabotage actions represented in the logic models are linked to the areas from which they can be accomplished. The logic models are then analysed to determine areas that should be protected to prevent these unacceptable radiological consequences. The publication is part of a set of supporting publications in the IAEA Nuclear Security Series with the aim of assisting States in the design, implementation and evaluation of their physical protection systems for nuclear material and nuclear facilities.


Vital Areas at Nuclear Power Plants

Vital Areas at Nuclear Power Plants

Author:

Publisher:

Published: 1985

Total Pages:

ISBN-13:

DOWNLOAD EBOOK

Vital area analysis of nuclear power plants has been performed for the Nuclear Regulatory Commission by the Los Alamos National Laboratory from the late 1970's through the present. The Los Alamos Vital Area Study uses a fault-tree modeling technique to identify vital areas and equipment at nuclear power plants to determine their vulnerability. This technique has been applied to all operating plants and approximately one-half of those under construction in the US. All saboteur-induced loss-of-coolant accidents and transients and the systems needed to mitigate them are considered. As a result of this effort, security programs at nuclear power plants now include vulnerability studies that identify targets in a systematic manner, and thus unnecessary protection has been minimized. 1 ref., 8 figs., 1 tab.


Computer Security Techniques for Nuclear Facilities

Computer Security Techniques for Nuclear Facilities

Author: IAEA

Publisher: International Atomic Energy Agency

Published: 2021-10-06

Total Pages: 152

ISBN-13: 9201237200

DOWNLOAD EBOOK

This revision provides guidance on how to establish or improve, develop, implement, maintain, and sustain computer security within nuclear facilities. This publication addresses the use of risk informed approaches to establish and enhance computer security policies, programmes; it describes the integration of computer security into the management system of a facility; establishes a systematic approach to identifying facility functions and appropriate computer security measures that protect sensitive digital assets and the facility from the consequence of cyber-attacks consistent with the threat assessment or design basis threat.


Identification of Vital Areas at Nuclear Facilities

Identification of Vital Areas at Nuclear Facilities

Author: International Atomic Energy Agency

Publisher:

Published: 2012

Total Pages: 0

ISBN-13: 9789201144102

DOWNLOAD EBOOK

This publication provides detailed guidance with regard to the identification of vital areas at nuclear facilities. It presents a structured approach to identifying those areas that contain equipment, systems and components to be protected against sabotage. The process for selection of a specific set of vital areas to be protected is based on consideration of the potential radiological consequences of sabotage, and on the design, operational and safety features of a nuclear facility. The method builds upon safety analysis to develop logic models for sabotage scenarios that could cause unacceptable radiological consequences. The sabotage actions represented in the logic models are linked to the areas from which they can be accomplished. The logic models are then analysed to determine areas that should be protected to prevent these unacceptable radiological consequences. The publication is part of a set of supporting publications in the IAEA Nuclear Security Series with the aim of assisting States in the design, implementation and evaluation of their physical protection systems for nuclear material and nuclear facilities.


Energy Research Abstracts

Energy Research Abstracts

Author:

Publisher:

Published: 1993

Total Pages: 762

ISBN-13:

DOWNLOAD EBOOK

Semiannual, with semiannual and annual indexes. References to all scientific and technical literature coming from DOE, its laboratories, energy centers, and contractors. Includes all works deriving from DOE, other related government-sponsored information, and foreign nonnuclear information. Arranged under 39 categories, e.g., Biomedical sciences, basic studies; Biomedical sciences, applied studies; Health and safety; and Fusion energy. Entry gives bibliographical information and abstract. Corporate, author, subject, report number indexes.


NUREG/CR.

NUREG/CR.

Author: U.S. Nuclear Regulatory Commission

Publisher:

Published: 1977

Total Pages: 48

ISBN-13:

DOWNLOAD EBOOK