Design basis threat pdf download

The threat against which an asset must be protected and upon which the protective systems design is based. It can be hard to not overuse a word thats become popular thanks to public awareness, but cyber is now. A good example of why threat modeling is needed is located at ma tte rs. Consequence study of a beyonddesignbasis earthquake affecting the spent fuel pool for a u. A design basis event dbe is a postulated event used to establish the acceptable performance requirements of the structures, systems, and components, such that a nuclear power plant can withstand the event and not endanger the health or safety of the plant operators or the wider public. Questionable as the threat was to our customers, it was treated with extreme importance. Doe is also remarkable in its rigor, and among the few in and out of government that reject a scenario based threat definition.

The concept of the design basis threat dbt is often used to. Sep 11, 2001 frequently asked questions about nrcs design basis threat final rule on this page. Risk management series risk assessment a howto guide to mitigate potential terrorist attacks against buildings. The design basis threat includes the tactics aggressors will use against the asset and the tools, weapons, and explosives employed in these tactics. The dbt report is a standalone threat analysis to be used with the physical security criteria for federal facilities. A key component of an effective program is the design basis threat dbt, a classified document that identifies, among other things, the potential size and capabilities of terrorist forces. Designbasis threat dbt a profile of the type, composition, and capabilities of an adversary. The nti index asks whether domestic laws, regulations, or licensing rules require nuclear facilities to have protections in place, protect critical digital assets, include cyber threats in the design basis. Net analyst report and newsletter welcome to our analyst report and newsletter the design basis threat this term of art poorly describes that there is a threat set identified as the basis for design. Design and evaluation of physical protection systems. Primarily this focus is aimed towards three common categories.

It is instructive to consider one of the best practitioners of the design base threat and vulnerability assessment process, the department of energy doe. This order supplemented the design basis threat dbt for nuclear power plants as specified in 10 cfr 73. What does this revision of the dbt rule accomplish. The nuclear regulatory commission nrc is proposing to amend its regulations that govern the requirements pertaining to design basis threat dbt. The nrc issued a subsequent order, ea03086, design basis threat for radiological sabotage, in april 2003 ref. Design basis threat dbt is the security protocol put into place to protect an individual or company from physical and digital attack. This validation period will allow user input to inform the final report. Interagency security committee policies, standards, best.

What are the 12 factors in the energy policy act of 2005 considered by the commission. The nuclear regulatory commission nrc is amending its regulations that govern the requirements pertaining to the design basis threats. Fema risk management series risk assessment a howto guide to mitigate potential terrorist attacks against buildings fema 452 january 2005 u. The nrc and its licensees use the dbt as a basis for designing safeguards systems to protect against acts of radiological sabotage and to prevent the theft of special nuclear material. It lists and ranks potential threats, and it lists countermeasures and mitigation. Handbook on good building, design and construction in the. Information and translations of design basis threat in the most comprehensive dictionary definitions resource on the web. Cyber security at nuclear facilities nuclear threat initiative. Nuclear regulatory commission federal register volume 70, number 214 monday, november 7, 2005 proposed rules pages 6738067388 from the federal register online via the government printing office. Development, use and maintenance of the design basis threat international atomic energy agency vienna isbn 9789201025098 issn 18169317 this publication provides guidance on.

The heart pumps blood through the arteries, veins, and capillaries to supply oxygen to all part of the body. Threat risk assessment tra to develop the design basis threat dbt in order to effectively apply canadian standard s85012 design and assessment of buildings subjected to blast loads. A design basis event dbe is a postulated event used to establish the acceptable performance requirements of the structures, systems, and components, such that a nuclear power plant can. Design basis threats dbts are summarised statements derived from a threat assessment for which a physical protection system pps is planned and designed. This is one of a series of publications that address security issues in highpopu lation, private sector buildings. The regulatory body should use the results of the threat assessment as a common basis for determining security requirements for radioactive. The standoff is the distance measured from the center of gravity of the charge to the component of interest. Blast designbasis threat uncertainty and its effects on. A water supply system is analogous to the human circulatory system. All questions or comments about this course should be directed to the following email. A key component of an effective program is the design basis threat dbt, a classified document that identifies the potential. Risk analysis plays a vital role in every individual, business, or any entitys risk plan examples.

Mark i boiling water reactor nureg2161 on this page. In this way you have a reduction in exposure to the terrorist threat and also the costs of implementation. Basic concepts of statistical inference using samples to understand populations confidence intervals hypothesis tests, pvalues, statistical power the pvalue statistical power basic methods ttests chi. Threat assessment is a method used by mental health and law enforcement professionals to assess the risk of intended violence toward a specific target, such as attacks and assassinations of. Development, use and maintenance of the design basis threat. Design basis threat how is design basis threat abbreviated. While each of these has been important, doe must press forward with additional actions to ensure that it is fully prepared to provide a timely and cost effective defense. North korea nuclear threat initiativenuclear threat.

It is intended for decision makers from organizations with roles and responsibilities for the development, use and maintenance of the dbt. Cyber defenses insufficient nuclear threat initiativenuclear threat. The purpose of this document is to describe approaches and methods for estimation of the designbasis flood at nuclear power plant sites. Mar 21, 2019 designbasis threat dbt a profile of the type, composition, and capabilities of an adversary. International handbook of threat assessment download. Pdf design basis threat dbt approach for the first npp. Threat modeling as a basis for security requirements. Anything can be subjected to assessment for as long as it is steered to produce relevant results, hence varied processes of conducting an assessment. It is the baseline type and size of threat that buildings or other structures are designed to withstand. Frequently asked questions about nrcs design basis threat. Development, use and maintenance of the design basis threat iaea. The purpose of the series is to provide federal facility security professionals, engineers, building owners, construction contractors, architects, and the general public with basic information pertaining. The s850 standard is intended for use by engineers and architects in the design of new buildings. Definition of design basis threat in the definitions.

Defenses against the cyber threat remain insufficient. Threat modeling as a basis for security requirements suvda myagmar adam j. Threat assessment is a method used by mental health and law enforcement professionals to assess the risk of intended violence toward a specific target, such as attacks and assassinations of public figures. Threat capabilities that are being protected against. The dbt is described in detail in title 10, section 73. And this is an important design document for discussions with the business around how you are going to spend basically to prevent these threats from occurring. This publication provides guidance on how to develop, use and maintain a design basis threat dbt. Doe needs to resolve significant issues before it fully meets the new design basis threat doe took a series of actions in response to the terrorist attacks of september 11, 2001. Levels of protection lop and application of the designbasis. Design basis threats dbt s are summarised statements derived from a threat assessment for which a physical protection system pps is planned and designed. Generic elements and process of a design basis threat dbt. Balancing design and active shooter threats 20150401.

International atomic energy agency, development, use and maintenance of the design basis threat, iaea nuclear security series no. The analytical assumptions are chosen by the licensee. The swedish nuclear power inspectorate ski is the regulatory authority for nuclear activities in sweden. Sep 29, 2004 pdf design basis threat dbt is one of the main factors to be taken into account in the design of physical protection system of nuclear facility. It is responsible for the development of a design basis threat 1 dbt, as a basis for regulations on physical protection of nuclear material and nuclear facilities. Threat definition a threat is a potential force that could degrade the confidentiality compromise, accuracy integrity, or availability denial of service of the system or network. It is responsible for the development of a design basis threat 1 dbt, as a basis for regulations on. All tracker software clients are urged to update to our latest, free pdf. Insiders, outsiders and outsiders with connections to insiders. Is156buildingdesignforhomelandsecurityforcontinuityofoperations. Both the south africa and the us use the design basis threat dbt.

It also provides the basis for the fema fivestep risk assessment process described in. Dbt establishes the threat tactics that architects and engineers use in designing mitigations for a new structure or renovation. Ufc 402001 11 september 2008 foreword the unified facilities criteria ufc system is prescribed by milstd 3007 and provides planning, design, construction, sustainment, restoration, and modernization criteria, and applies. Protection against sabotage of nuclear facilities swedish. Even in small business, having a risk analysis as basis for business decisions and investments helps avoid any. Selectiongroups selected may actually be disparate prior to any treatment mortalitythe differences between o 1 and o 2 may be because of the dropout rate of subjects from a. North korea ranks last in the theft ranking, with its score decreasing by 4 points from 2014 due to increases in its stocks of nuclear material and a worsened risk environment. Doe needs to resolve significant issues before it fully meets the new design basis threat showing 14 of 36 pages in this report. To keep pace with the changing nature of threats to federal facilities, updates to the designbasis threat report are made annually. Integrating security metrics and design basis threat to overcome scenario spinning and fear mongering gordon housworth 5172007 21. Aug 18, 2017 levels of protection lop and application of the design basis threat dbt report is the fourth course in the isc webbased training series. May 25, 2007 use of design basis threat at department of energy. Because of these risks, doe needs an effective safeguards and security program.

This chapter elaborates various aspects of threat definition used in designing physical protection systems pps. Gao was asked to examine 1 the extent to which ese protective forces are meeting does existing readiness requirements and 2 the actions doe and ese will need to take to successfully defend. Nuclear proliferation prevention project lbj school of public affairs university of texas at austin. For some who had just encountered this saying today, this is quite common among banks, insurance firms, and. Kirk some basic design concepts sir ronald fisher, the statistician, eugenicist, evolutionary biologist, geneticist, and father of modern experimental design, observed that. August 15, 20 1 this working paper was researched and written primarily by lara kirkham, a. To keep pace with the changing nature of threats to federal facilities, updates to the design basis threat report are made annually. Endtoend arguments in system design 2 venture, or perhaps redundantly, each doing its own version.

This course has been developed by the interagency security committee isc and is being hosted by emi. Design considerations 23 at the outset of a project, or a full scale fema type risk analysis is undertaken. Nstastgd034 transient analysis for dbas in nuclear reactors. Chapter 1 defines the designbasis flood and lists the u. I think everyone here is familiar of the most common term, your security is of utmost priority. Ufc 402001 dod security engineering facilities planning manual. Pdf design basis threats dbts are summarised statements derived from a threat assessment for which a physical protection. Morphological analysis in revising the design basis threat. The design basis threat includes the tactics aggressors will use against the asset and the tools, weapons. This handbook on good building design and construction in the philippines does exactly that, capturing the potential of increased. Design basis threat dbt is one of the main factors to be taken into account in the design of physical. What is a threat developing the threat assessment c determining probability design basis threat what is a hazard 5 step four know your environment conducting a security assessment assessment. So a threat model is a written document that shows the parts and pieces of your application. A major distinction is then drawn between design basis analysis and best estimate analysis.

Within 24 hours tracker software issued a new release with protection against this potential, if unlikely, risk. Fema emergency management institute emi course is1173. At present, the deterministic approach to blastresistant design appears to be the prevalent philosophy in practice, as suggested by the notion of designbasis threat dbt outlined by the ascesei 5911. Levels of protection lop and application of the designbasis threat dbt report. The proposed rule would amend the commissions regulations to, among other things, make generically applicable the security requirements previously. It is intended for decision makers from organizations with roles and responsibilities for the development.

Nuclear proliferation prevention project nppp working paper. Reassessing the current design basis threat approach by lara kirkham1 with alan j. In other words, in order to defend, we must model what it is we are defending against. Buildings do not merely provide shelter for and enable the performance of their occupants. Consequence study of a beyonddesignbasis earthquake. Antiterrorism consulting offers consulting during the design of new infrastructure on the new engineering concept dbt design basis threat. One of the requirements that has always been of particular concern to me. Blast mitigation, security and the designbasis threat a. In reasoning about this choice, the requirements of the application provide the basis. The charges are determined on the basis of a longterm technical and. The concept of the design basis threat dbt is often used to establish the expected threat to a facility and it is used as a management and design tool that helps facilitate informed decisionmaking by executives and establishes technical requirements for designers. Development, use and maintenance of the design basis threat international atomic energy agency vienna isbn 9789201025098 issn 18169317 this publication provides guidance on how to develop, use and maintain a design basis threat dbt.

1316 852 534 1542 1282 590 1566 169 526 648 622 1425 58 280 526 1554 585 876 1214 1498 1418 261 904 1358 165 967 1158 507 1302 1068 320 215 785 676 72 640 515 1288