Nuclear infrastructure protection and homeland security / Frank R. Spellman and Melissa L. Stoudt.
- Title
- Nuclear infrastructure protection and homeland security / Frank R. Spellman and Melissa L. Stoudt.
- Published by
- Lanham [Md.] : Government Institutes, 2011.
- Author
Items in the library and off-site
Displaying 1 item
Status | Format | Access | Call number | Item location |
---|---|---|---|---|
Status Not available - Please for assistance. | FormatText | AccessRequest in advance | Call numberTK9152.1645 .S64 2011 | Item locationOff-site |
Details
- Additional authors
- Description
- x, 283 p. : ill.; 26 cm.
- Summary
- The possibility of nuclear energy infrastructure terrorism-that is, the use of weapons to cause damage to the nuclear energy industrial sector, which would have widespread, devastating effects-is very real. Frank R. Spellman and Melissa L. Stoudt present all the information needed for nuclear infrastructure employers and employees to handle security threats they must be prepared to meet. --from publisher description.
- Subject
- Contents
- 1. Introduction -- U.S. nuclear infrastructure: a tough nut to crack -- Nuclear event metrics -- Wake-up calls -- The ultimate wake-up call -- Case study 1.1 Glowin' in the dark -- What is terrorism? -- Vocabulary of hate.
- 2. Critical infrastructure -- What is critical infrastructure? -- Nuclear power infrastructure -- The bottom line.
- 3. U.S. nuclear power sector -- Introduction -- Key terms: nuclear power -- Basics -- U.S. nuclear power: an overview (EIA 2009b) -- Nuclear power sector: a regulated environment -- The bottom line.
- 4. Nuclear power sector security -- Introduction -- NRC security measures -- Layers of defense.
- 5. Vulnerability assessment (VA) -- Introduction -- Vulnerability assessment (VA) -- General sector vulnerability assessment process -- General sector vulnerability assessment methodology (U.S. DOE 2002) -- Vulnerability assessment procedures -- Nuclear power plant vulnerability assessment process.
- 6. Preparation: security assessment -- Introduction -- Threats and incidents -- Overview of reactor security -- Design basis threat (DBT) -- Large aircraft crashes -- Force-on-force exercises -- Spent fuel storage -- Security personnel and other issues.
- 7. Cyber security -- Planning a computer attack -- Corrective actions -- NRC physical security regulations (10 CFR Part 73) -- Waterfall life cycle security model -- Networks and standalones -- Portable computing -- The human-error factor -- Computer security auditing -- Data protection -- Automated tools for data security systems -- computer security ... cradle to grave ... -- In-house or outsourced security? -- Cyber security: the bottom line.
- 8. SCADA -- Nuclear power and cyberspace -- What is SCADA? -- SCADA vulnerabilities -- Steps to improve SCADA security.
- 9. Security techniques and hardware -- Bottled water security versus nuclear power security -- Physical protection -- Threat assessment -- Physical protection areas -- Intrusion detection -- Assessment -- Armed response -- Security hardware devices -- Monitoring devices -- Communication integration -- Cyber protection devices.
- 10. Emergency response -- Nuclear power plant contingency planning -- Federal oversight -- Emergency planning zones -- Emergency classification -- Protective actions -- Evacuation, sheltering, and the use of potassium iodide -- Terrorism and emergency preparedness.
- Epilogue: The paradigm shift -- Fourteen features of active and effective security.
- Owning institution
- Harvard Library
- Bibliography (note)
- Includes bibliographical references and index.
- Processing action (note)
- committed to retain