ORPP logo
Image from Google Jackets

National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements : Implementing Guide.

By: Material type: TextTextSeries: IAEA Nuclear Security SeriesPublisher: Havertown : International Atomic Energy Agency, 2021Copyright date: ©2021Edition: 1st edDescription: 1 online resource (46 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789201312204
Subject(s): Genre/Form: Additional physical formats: Print version:: National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat StatementsLOC classification:
  • TK9152 .I584 2021
Online resources:
Contents:
Intro -- 1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND THE USE OF A RISK INFORMED APPROACH -- Risk informed approach and threat statements -- Potential adversaries and their attributes and characteristics -- Information security considerations -- 3. OVERVIEW OF THE PROCESS OF DEVELOPMENT, USE AND MAINTENANCE OF THE VALIDITY OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION, DESIGN BASIS THREATS, AND REPRESENTATIVE THREAT STATEMENTS -- 4. ROLES AND RESPONSIBILITIES -- State -- Competent authorities -- Operators -- 5. CONDUCT OF A NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT -- Input: Collection of relevant threat information -- Analysis of relevant threat information -- Output: National nuclear security threat assessment documentation -- 6. DEVELOPMENT OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Regulatory approaches and threat statements -- Developing a design basis threat -- Screening the national nuclear security threat assessment documentation -- Collating adversary attributes and characteristics -- Adjusting collated adversary attributes and characteristics to take account of policy factors -- Tailoring adversary attributes and characteristics to specific facilities and activities -- Finalizing and establishing the design basis threat -- Developing a representative threat statement -- Threats within and beyond the design basis threat -- 7. USE OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Performance based regulatory approach -- Prescriptive regulatory approach -- Combined approach -- Developing attack scenarios -- 8. MAINTENANCE OF THE VALIDITY AND REVIEW OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION AND OF THREAT STATEMENTS -- Responding to new and emerging threats.
AppendixA MODEL DESIGN BASIS THREAT -- REFERENCES -- GLOSSARY.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- 1. INTRODUCTION -- Background -- Objective -- Scope -- Structure -- 2. NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND THE USE OF A RISK INFORMED APPROACH -- Risk informed approach and threat statements -- Potential adversaries and their attributes and characteristics -- Information security considerations -- 3. OVERVIEW OF THE PROCESS OF DEVELOPMENT, USE AND MAINTENANCE OF THE VALIDITY OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION, DESIGN BASIS THREATS, AND REPRESENTATIVE THREAT STATEMENTS -- 4. ROLES AND RESPONSIBILITIES -- State -- Competent authorities -- Operators -- 5. CONDUCT OF A NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT -- Input: Collection of relevant threat information -- Analysis of relevant threat information -- Output: National nuclear security threat assessment documentation -- 6. DEVELOPMENT OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Regulatory approaches and threat statements -- Developing a design basis threat -- Screening the national nuclear security threat assessment documentation -- Collating adversary attributes and characteristics -- Adjusting collated adversary attributes and characteristics to take account of policy factors -- Tailoring adversary attributes and characteristics to specific facilities and activities -- Finalizing and establishing the design basis threat -- Developing a representative threat statement -- Threats within and beyond the design basis threat -- 7. USE OF DESIGN BASIS THREATS AND REPRESENTATIVE THREAT STATEMENTS -- Performance based regulatory approach -- Prescriptive regulatory approach -- Combined approach -- Developing attack scenarios -- 8. MAINTENANCE OF THE VALIDITY AND REVIEW OF THE NATIONAL NUCLEAR SECURITY THREAT ASSESSMENT AND ITS DOCUMENTATION AND OF THREAT STATEMENTS -- Responding to new and emerging threats.

AppendixA MODEL DESIGN BASIS THREAT -- REFERENCES -- GLOSSARY.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.