51,870 research outputs found
Recommended from our members
Nuclear power plant security assessment technical manual.
This report (Nuclear Power Plant Security Assessment Technical Manual) is a revision to NUREG/CR-1345 (Nuclear Power Plant Design Concepts for Sabotage Protection) that was published in January 1981. It provides conceptual and specific technical guidance for U.S. Nuclear Regulatory Commission nuclear power plant design certification and combined operating license applicants as they: (1) develop the layout of a facility (i.e., how buildings are arranged on the site property and how they are arranged internally) to enhance protection against sabotage and facilitate the use of physical security features; (2) design the physical protection system to be used at the facility; and (3) analyze the effectiveness of the PPS against the design basis threat. It should be used as a technical manual in conjunction with the 'Nuclear Power Plant Security Assessment Format and Content Guide'. The opportunity to optimize physical protection in the design of a nuclear power plant is obtained when an applicant utilizes both documents when performing a security assessment. This document provides a set of best practices that incorporates knowledge gained from more than 30 years of physical protection system design and evaluation activities at Sandia National Laboratories and insights derived from U.S. Nuclear Regulatory Commission technical staff into a manual that describes a development and analysis process of physical protection systems suitable for future nuclear power plants. In addition, selected security system technologies that may be used in a physical protection system are discussed. The scope of this document is limited to the identification of a set of best practices associated with the design and evaluation of physical security at future nuclear power plants in general. As such, it does not provide specific recommendations for the design and evaluation of physical security for any specific reactor design. These best practices should be applicable to the design and evaluation of physical security for all future plants. Note that the original NUREG/CR-1345 remains valid for many light water reactor designs. While the focus of this document is on new plants, existing nuclear power plants and nuclear material facilities may be able to apply these best practices and security system technologies when upgrading or modifying their physical protection systems
Governance of Dual-Use Technologies: Theory and Practice
The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid
The smart grid is a large-scale complex system that integrates communication
technologies with the physical layer operation of the energy systems. Security
and resilience mechanisms by design are important to provide guarantee
operations for the system. This chapter provides a layered perspective of the
smart grid security and discusses game and decision theory as a tool to model
the interactions among system components and the interaction between attackers
and the system. We discuss game-theoretic applications and challenges in the
design of cross-layer robust and resilient controller, secure network routing
protocol at the data communication and networking layers, and the challenges of
the information security at the management layer of the grid. The chapter will
discuss the future directions of using game-theoretic tools in addressing
multi-layer security issues in the smart grid.Comment: 16 page
Recommended from our members
Nuclear Energy in the UK: Safety Culture and Industrial Organisation
In this paper we seek to explore the relationship between professionalism and nuclear safety in the UK. We consider the history of civil nuclear energy in Britain and the near complete shift in emphasis from state owned enterprises to the private sector. We show how in recent years government has acknowledged that a truly liberalised electricity industry is unable to deliver the construction of new nuclear power stations as part of a future low carbon electricity system. Throughout, however, the intention has been for policy merely to incentivise the private sector rather than to steer industry strategy directly. Having said that, the line between strong incentives and weak control can be hard to see. We present illustrative examples, real and fictional, that give insight into the UK nuclear safety culture and we discuss the wider nature of UK society with respect to corruption. We conclude that the unique basis of safety regulation in the UK, essentially permissive rather than prescriptive, has a key role to play in promoting and maintaining nuclear professionalism
Security risk assessment and protection in the chemical and process industry
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical safety. That approach is beneficial for workers in the chemical industry because they recognize the steps in this model from familiar safety models .The model combines the rings-of-protection approach with generic security practices including: management and procedures, security technology (e.g. CCTV, fences, and access control), and human interactions (pro-active as well as re-active). The method is illustrated in a case-study where a practical protection plan was developed for an existing chemical company. This chapter demonstrates that the method is useful for similar chemical- and process industrial activities far beyond the Belgian borders, as well as for cross-industrial security protection. This chapter offers an insight into how the chemical sector protects itself on the one hand, and an insight into how security risk management can be practiced on the other hand
Recommended from our members
Recent blackouts in US and continental Europe: is liberalisation to blame?
The paper starts with a detailed technical overview of recent blackouts in the US, Sweden/Denmark and Italy in order to analyse common threads and lessons to be learnt. The blackouts have exposed a number of challenges facing utilities worldwide. Increased liberalisation of electricity supply industry has resulted in a significant increase in inter-area (or cross-border) trades which often are not properly accounted for when assessing system security. The traditional decentralised way of operating systems by TSOs, with each TSO looking after its own control area and little information exchange, resulted in inadequate and slow response to contingencies. A new mode of coordinated operation for real-time security assessment and control is needed in order to maintain system security. This new mode of operation requires overcoming a number of organisational, psychological, legal and technical challenges but the alternative is either to risk another blackout or run the interconnected system very conservatively, maintaining large security margin at a high cost to everyone. The paper also includes technical appendices explaining engineering power system concepts to non-engineering audience
Great East Japan Earthquake, JR East Mitigation Successes, and Lessons for California High-Speed Rail, MTI Report 12-37
California and Japan both experience frequent seismic activity, which is often damaging to infrastructure. Seismologists have developed systems for detecting and analyzing earthquakes in real-time. JR East has developed systems to mitigate the damage to their facilities and personnel, including an early earthquake detection system, retrofitting of existing facilities for seismic safety, development of more seismically resistant designs for new facilities, and earthquake response training and exercises for staff members. These systems demonstrated their value in the Great East Japan Earthquake of 2011 and have been further developed based on that experience. Researchers in California are developing an earthquake early warning system for the state, and the private sector has seismic sensors in place. These technologies could contribute to the safety of the California High-Speed Rail Authority’s developing system, which could emulate the best practices demonstrated in Japan in the construction of the Los Angeles-to-San Jose segment
- …