<dd id="rw0xn"></dd>

  • <label id="rw0xn"></label>

  • <sup id="rw0xn"><strike id="rw0xn"></strike></sup><label id="rw0xn"></label>
      <th id="rw0xn"></th>
    1. <var id="rw0xn"></var>
        1. <table id="rw0xn"></table>

          <sub id="rw0xn"><meter id="rw0xn"></meter></sub>

          You are here

          National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements

          Implementing Guide

          IAEA Nuclear Security Series No. 10-G (Rev. 1)
          Implementing Guide

          English STI/PUB/1926 | 978-92-0-131020-0

          39 pages | 1 figure | € 31.00 | Date published: 2021

          Download PDF (1.43 MB)

          EPUB format available (7.56 MB)

          Description

          The identification and assessment of threats provides an essential basis for the selection, design, and implementation of nuclear security measures. For nuclear material and other radioactive material that is under regulatory control, and associated facilities and activities, the results of this identification and assessment are expressed as a design basis threat or representative threat statement describing the intentions and capabilities of potential adversaries against which the materials and associated facilities and activities are to be protected. An Implementing Guide was issued in 2009 under the title of Development, Use and Maintenance of the Design Basis Threat which was updated and revised. The result of this revision is the current publication. It provides a step-by-step methodology for conducting a national nuclear security threat assessment including both physical and computer security aspects, and for the development, use and maintenance of design basis threats and representative threat statements.

          More Information on reusing IAEA copyright material.

          Keywords

          Nuclear Security Series, Threat Assessment, Design Basis Threat, Representative Threat, Threat, Assessment, Design Basis, Representative, Threat Statement, Security, Selection, Design, Implementation, Nuclear Security, Nuclear Material, Radioactive Material, Regulatory Control, Implementing Guide, Methodology, Physical Security, Computer Security, Development, Maintenance, Risk Informed Approach, Documentation, National Nuclear Security, Role, Responsibility, Performance Based, Regulatory Approach

          Related publications

          Stay in touch

          Newsletter

          <dd id="rw0xn"></dd>

        2. <label id="rw0xn"></label>

        3. <sup id="rw0xn"><strike id="rw0xn"></strike></sup><label id="rw0xn"></label>
            <th id="rw0xn"></th>
          1. <var id="rw0xn"></var>
              1. <table id="rw0xn"></table>

                <sub id="rw0xn"><meter id="rw0xn"></meter></sub>
                97碰成人国产免费公开视频