An Analysis on Threat-Security Interfacing and National Preparedness on Effective Security System for Nuclear Materials and Facilities in Bangladesh

2018 ◽  
Vol 13 (2) ◽  
pp. 199-208
Author(s):  
A. Z. M. Salahuddin ◽  
Altab Hossain ◽  
Shawkat Akbar
2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Arafat. H. Hamadah ◽  
Mohamed S. Nagy ◽  
Hanaa Abou-Gabal ◽  
Sayed. A. El Mongy

Physical security system, which is also called physical protection system, is very crucial in the nuclear industry for protecting staff, visitors, buildings, assets, and nuclear materials against theft, sabotage, and harmful activities. Theft of nuclear materials has a major impact on the essence of nuclear safeguards. Sabotage of a nuclear facility could endanger the public at large. Reviewing the published literature, it is found that there are no complete physical security system designs based on an integrated network of electronic devices that are devoted to commercial NPPs. And there is no definite evaluation factor that was set to approve such a system. This paper is an evolving solution to this deficiency by proposing an unpreceded integrated security system design applicable to a commonly structured physical layout of any commercial NPP. This proposal provides comprehensive security coverage for the NPP boundaries employing a high level of integration for all subsystems communicated via an IP data network controlled by central management software. This paper is proposing also testing procedures to be followed to evaluate the proposed design. The security system effectiveness will be calculated using mathematical codes by assuming external intrusion attack scenarios. Attributes of each attack scenario will be numerically introduced to the evaluation software EASI and ASSESS codes developed by Sandia Labs, USA. This paper also proposes a threshold value of such security system effectiveness which should be achieved by the commercial NPP security system to achieve the so-called security license.


1987 ◽  
Vol 48 (C9) ◽  
pp. C9-367-C9-370
Author(s):  
C. B. COLLINS ◽  
F. DAVANLOO ◽  
T. S. BOWEN ◽  
J. J. COOGAN
Keyword(s):  

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document