scholarly journals Assessment of the state of physical protection of nuclear facilities as a basis for the continued maintenance of the nuclear safety regime

2018 ◽  
pp. 55-58
Author(s):  
І. Kuzmiak ◽  
G. Vagin ◽  
V. Kravtsov

The objective of this paper is examination of procedure of evaluation of status of physical protection systems of nuclear facilities, its normative regulation, interface with measures of nuclear and radiation safety evaluation and influence on integral status of nuclear security in Ukraine. For comparison was provided the short analysis of representation of physical protection requirements in regulatory acts for safety evaluation of nuclear facilities and in IAEA documents. The review of up-to-date status of legislation framework of physical protection, which implements the requirements on procedure of establishment and functioning of physical protection system and its elements and application of these requirements as basic criteria for evaluation of physical protection system is provided. Basing on results of review the possible ways of activation and enhancement of efficiency of evaluation of status of physical protection systems of nuclear facilities in Ukraine are determined. Particularly on of such ways is development of document containing the requirements for yearly reports on evaluation of status of physical protection system as well as for materials submitted with safety reports correspondingly to stages of life-cycles of nuclear facility.

Author(s):  
Anton Oboimov ◽  
Oleg Zolotarev ◽  
Ivan Cheremisenov ◽  
E. Fedoseeva ◽  
A. Tokarev ◽  
...  

Terrorism today is one of the main threats to human civilization. In recent years, international terror has proved its extreme cruelty, its readiness to stop at nothing in order to achieve its goals. As a result of committing terrorist acts, innocent people, children, women and old people suffer. For a terrorist, human life has no value. With the modern variety of potentially dangerous objects and their functional orientation, it is impossible to ensure safety with standard solutions, using uniform strategies, tactical schemes and techniques, and the same type of equipment. If we simply follow the path of ensuring the maximum level of safety, it may turn out that at most facilities the cost of the applied technological means will be many times greater than the cost of the technological equipment of the facility and even the facility itself. Hence, it follows that in order to create effective physical protection systems or to effectively modernize existing physical protection systems, it is necessary to analyze these systems, to identify the weakest and most protected places that need strengthening. At the same time, an important difference must be taken into account between physical protection systems and other safety systems used to protect against natural disasters (such as earthquakes, floods, tornadoes, hurricanes, etc.) and against abnormal operating conditions (such as fire, malfunctions in electrical equipment, etc.). Unlike human violators, security breaches are subject to strict laws and do not happen without reason. For example, the fire of a fire can only burn while there is fuel and oxygen. If one of these elements is removed, the fire will go out. Also, a fire cannot decide where and when it will occur, and how it will progress. Conversely, the human adversary (intruder) has the ability to decide whether to attack, when and how to attack, can adjust to the measures of the physical protection system to counter it, and possibly even outwit and defeat them. All this introduces a significant element of uncertainty into the process of analyzing and evaluating the effectiveness of the physical protection system. Taking into account the above, the task of developing a methodological approach to risk assessment when committing a terrorist attack using physical protection systems, taking into account the optimization of calculations of cost-intensive algorithms in real time, becomes more and more urgent. In this article, the authors attempt to create this approach.


2020 ◽  
Vol 20 (2) ◽  
pp. 169-181
Author(s):  
Tamás Horváth

The best practices and knowledge of different guidelines would be absolutely useful for professionals in the field of security technology. It is essential for the design and implementation of the data centres which are not really common facilities due to security reasons. Their location, proper activities, even the circumstances of their operation, all this should not be public knowledge. The design and implementation of the data centres depend on their security risk level. This may be fairly known for professionals, but a summary of the essential requirements would be useful for all people involved. In my practice, our company has got a chance to make a complex security plan for a Data Centre, so I would like to present the architectural and security aspects which may be important in the given case. Since a certain level of security is required in a given case, and different levels belong to different physical protection systems (PPS), I have created a facility security matrix to serve as a guideline and to help to decide what kind of PPS should be installed in different cases.


2021 ◽  
Vol 2072 (1) ◽  
pp. 012010
Author(s):  
D Andiwijayakusuma ◽  
A Mardhi ◽  
T Asmoro ◽  
T Setiadipura ◽  
A Purqon ◽  
...  

Abstract Every nuclear facility must pay attention to the 3S aspect (Safety-Security-Safeguard) to prevent nuclear accidents. One element in the nuclear security aspects includes a reliable Physical Protection System (PPS), which aims to ward off security disturbances and other illegal acts, i.e., sabotage, theft, Etc. This study evaluates the PPS performance by adversary-path analysis approach using the EASI code for hypothetical nuclear reactor facility to anticipate sabotage attacks as the highest consequences scenario. We perform the probability of interruption (PI) calculation as represented by the effectiveness of the PPS. The study results show that in the PPS design, calculating the PI value using the EASI code confirms the need to pay attention in determining the MVP. The results provide feedback for the PPS designer to accept the current design or strengthen it to obtain a reliable PPS.


Sign in / Sign up

Export Citation Format

Share Document