Protection of Nuclear Facilities
Physical protection (also called physical security) consists of a variety of measures to protect nuclear facilities and material against sabotage, theft, diversion, and other malicious acts. The U.S. Nuclear Regulatory Commission (NRC) and its licensees use a graded approach for physical protection, consistent with the significance of the facilities or material to be protected. In so doing, the NRC establishes the regulatory requirements and assesses compliance, and licensees are responsible for providing the protection.
Continue Reading
A Unique Challenge
Providing security in a mining environment is tough. Remote sites, a reliance on hazardous materials, limited local infrastructure and geopolitical instability are common risk factors that can make installations susceptible to malicious attack. Any security breach has the potential to endanger staff, damage the local environment and disrupt production.
Continue Reading
Protection of Nuclear Facilities
Physical protection (also called physical security) consists of a variety of measures to protect nuclear facilities and material against sabotage, theft, diversion, and other malicious acts. The U.S. Nuclear Regulatory Commission (NRC) and its licensees use a graded approach for physical protection, consistent with the significance of the facilities or material to be protected. In so doing, the NRC establishes the regulatory requirements and assesses compliance, and licensees are responsible for providing the protection.
Continue Reading
The Plan
The first step to determining if your perimeter security plan fulfills your needs is to conduct a risk assessment and take a long, hard look at the mission of your facility and the security measures you already have in place. According to Terry Wood, PE, CPP, director of Engineering and Security Applications for Wackenhut Corp; a risk assessment is a tool for measuring the compliance of a facility with security requirements. The assessment is used to analyze a system or facility to identify vulnerabilities that could potentially result in losses of life, products or technology. The methodology behind the risk assessment is based on the interrelationships of four key factors:
Continue Reading