Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities

Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities

Author: International Atomic Energy Agency

Publisher: IAEA Nuclear Security

Published: 2015

Total Pages: 0

ISBN-13: 9789201019158

DOWNLOAD EBOOK

Nuclear material accounting and control (NMAC) works in a complementary fashion with the international safeguards programme and physical protection systems to help prevent, deter or detect the unauthorized acquisition and use of nuclear materials. These three methodologies are employed by Member States to defend against external threats, internal threats and both State actors and non-State actors. This publication offers guidance for implementing NMAC measures for nuclear security at the nuclear facility level. It focuses on measures to mitigate the risk posed by insider threats and describes elements of a programme that can be implemented at a nuclear facility in coordination with the physical protection system for the purpose of deterring and detecting unauthorized removal of nuclear material.


Nuclear Safeguards, Security, and Nonproliferation

Nuclear Safeguards, Security, and Nonproliferation

Author: James Doyle

Publisher: Butterworth-Heinemann

Published: 2019-02-18

Total Pages: 480

ISBN-13: 0128032715

DOWNLOAD EBOOK

Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy, Second Edition is a comprehensive reference covering the cutting-edge technologies used to trace, track and safeguard nuclear material. Sections cover security, the illicit trafficking of nuclear materials, improvised nuclear devices, and how to prevent nuclear terrorism. International case studies of security at nuclear facilities and illegal nuclear trade activities provide specific examples of the complex issues surrounding the technology and policy for nuclear material protection, control and accountability. New case studies include analyses of nuclear programs of important countries, such as North Korea, Iran, and Kazakhstan, among others. This is a thoroughly updated, must-have volume for private and public organizations involved in driving national security, domestic and international policy issues relating to nuclear material security, non-proliferation, and nuclear transparency.


International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation

International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation

Author: Luciano Maiani

Publisher: Springer Nature

Published: 2020-04-07

Total Pages: 238

ISBN-13: 303042913X

DOWNLOAD EBOOK

This open access book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and nonproliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. Current challenges are discussed and attempts made to identify possible solutions and future improvements, considering scientific developments that have the potential to increase the effectiveness of implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities.


Countering Cyber Sabotage

Countering Cyber Sabotage

Author: Andrew A. Bochman

Publisher: CRC Press

Published: 2021-01-20

Total Pages: 232

ISBN-13: 1000292975

DOWNLOAD EBOOK

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.


Energy Meetings

Energy Meetings

Author: United States. Department of Energy. Technical Information Center

Publisher:

Published: 1986

Total Pages: 702

ISBN-13:

DOWNLOAD EBOOK

A listing of forthcoming meetings, conventions, etc.