Nuclear infrastructure protection and homeland security / Frank R. Spellman and Melissa L. Stoudt.

Title
  1. Nuclear infrastructure protection and homeland security / Frank R. Spellman and Melissa L. Stoudt.
Published by
  1. Lanham [Md.] : Government Institutes, 2011.
Author
  1. Spellman, Frank R.

Items in the library and off-site

Filter by

Displaying 1 item

StatusFormatAccessCall numberItem location
Status

Not available - Please for assistance.

FormatTextAccessRequest in advanceCall numberTK9152.1645 .S64 2011Item locationOff-site

Details

Additional authors
  1. Stoudt, Melissa L.
Description
  1. x, 283 p. : ill.; 26 cm.
Summary
  1. The possibility of nuclear energy infrastructure terrorism-that is, the use of weapons to cause damage to the nuclear energy industrial sector, which would have widespread, devastating effects-is very real. Frank R. Spellman and Melissa L. Stoudt present all the information needed for nuclear infrastructure employers and employees to handle security threats they must be prepared to meet. --from publisher description.
Subject
  1. Nuclear facilities > Security measures > United States
Contents
  1. 1. Introduction -- U.S. nuclear infrastructure: a tough nut to crack -- Nuclear event metrics -- Wake-up calls -- The ultimate wake-up call -- Case study 1.1 Glowin' in the dark -- What is terrorism? -- Vocabulary of hate.
  2. 2. Critical infrastructure -- What is critical infrastructure? -- Nuclear power infrastructure -- The bottom line.
  3. 3. U.S. nuclear power sector -- Introduction -- Key terms: nuclear power -- Basics -- U.S. nuclear power: an overview (EIA 2009b) -- Nuclear power sector: a regulated environment -- The bottom line.
  4. 4. Nuclear power sector security -- Introduction -- NRC security measures -- Layers of defense.
  5. 5. Vulnerability assessment (VA) -- Introduction -- Vulnerability assessment (VA) -- General sector vulnerability assessment process -- General sector vulnerability assessment methodology (U.S. DOE 2002) -- Vulnerability assessment procedures -- Nuclear power plant vulnerability assessment process.
  6. 6. Preparation: security assessment -- Introduction -- Threats and incidents -- Overview of reactor security -- Design basis threat (DBT) -- Large aircraft crashes -- Force-on-force exercises -- Spent fuel storage -- Security personnel and other issues.
  7. 7. Cyber security -- Planning a computer attack -- Corrective actions -- NRC physical security regulations (10 CFR Part 73) -- Waterfall life cycle security model -- Networks and standalones -- Portable computing -- The human-error factor -- Computer security auditing -- Data protection -- Automated tools for data security systems -- computer security ... cradle to grave ... -- In-house or outsourced security? -- Cyber security: the bottom line.
  8. 8. SCADA -- Nuclear power and cyberspace -- What is SCADA? -- SCADA vulnerabilities -- Steps to improve SCADA security.
  9. 9. Security techniques and hardware -- Bottled water security versus nuclear power security -- Physical protection -- Threat assessment -- Physical protection areas -- Intrusion detection -- Assessment -- Armed response -- Security hardware devices -- Monitoring devices -- Communication integration -- Cyber protection devices.
  10. 10. Emergency response -- Nuclear power plant contingency planning -- Federal oversight -- Emergency planning zones -- Emergency classification -- Protective actions -- Evacuation, sheltering, and the use of potassium iodide -- Terrorism and emergency preparedness.
  11. Epilogue: The paradigm shift -- Fourteen features of active and effective security.
Owning institution
  1. Harvard Library
Bibliography (note)
  1. Includes bibliographical references and index.
Processing action (note)
  1. committed to retain