International Safeguards in the Design of Nuclear Reactors


Book Description

This publication is the second in the IAEA Nuclear Energy Series to provide guidance on the inclusion of safeguards in nuclear facility design and construction. It is principally intended for designers and operators of nuclear reactor facilities; however, vendors, national authorities and financial backers can also benefit from the information provided. It is introductory rather than comprehensive in nature, complementing the Guidance for States Implementing Comprehensive Safeguards Agreements and Additional Protocols, IAEA Services Series No. 21, and other publications in that series. The publication complements the general considerations addressed in International Safeguards in Nuclear Facility Design and Construction, IAEA Nuclear Energy Series No. NP-T-2.8.




International Safeguards in the Design of Enrichment Plants


Book Description

This publication is part of a series that aims to inform nuclear facility designers, vendors, operators and State governments, about IAEA safeguards and how associated requirements can be considered early in the design phase of a new nuclear facility. This particular publication is applicable to the design and construction of commercial uranium enrichment plants. Safeguards by design dialogue undertaken early in the design and construction of enrichments plants facilitates the implementation of safeguards throughout all the lifecycle stages of the facility. The potential to reduce costs, avoid retrofits and achieve efficiencies both for the operator and for IAEA Member States, are important drivers for the early consideration of safeguards in a nuclear facility design project.




Safeguards Techniques and Equipment


Book Description

The 1990s saw significant developments in the global non-proliferation landscape, resulting in a new period of safeguards development. The current publication, which is the second revision and update of IAEA/NVS/1, is intended to give a full and balanced description of the safeguards techniques and equipment used for nuclear material accountancy, containment and surveillance measures, environmental sampling, and data security. New features include a section on new and novel technologies. As new verification measures continue to be developed, the material in this book will be reviewed periodically and updated versions issued.




Hardware Security


Book Description

Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Presenting state-of-the-art research and strategies for the design of very large scale integrated circuits and symmetric cryptosystems, the text discusses hardware intellectual property protection, obfuscation and physically unclonable functions, Trojan threats, and algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis. Gain a comprehensive understanding of hardware security from fundamentals to practical applications.







Managing Strategic Design


Book Description

This core textbook emphasizes the power of design management to drive corporate strategic goals, showing how design strategies can be thoughtfully formulated and managed to improve the performance of organizations. Taking an engaging and accessible approach, this book will help design students and graduates to apply new concepts of design management in their works and to use design strategically to achieve organizational visions and targets. Throughout the book's tripartite structure – comprising an introduction to the topic, followed by sections on how strategic design can be used to support key businesses functions and how it can be used to push organisations forward – a strong link is made between design and marketing and the delivery of design-led branding. This textbook is essential for upper level undergraduate and postgraduate students studying design management on art and design degrees. It also caters for practitioners and specialist elective modules offered on business and management, and marketing and entrepreneurship courses in business schools.




Countering Cyber Sabotage


Book Description

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.




Safeguarding Intangible Assets


Book Description

Safeguarding Intangible Assets provides strategies for preserving and enhancing a company's intangible assets to increase its profitability, competitiveness, and sustainability. Intangible assets such as patents, trademarks, copyrights, methodologies, and brand typically account for 80 percent of an organization's value and revenue. There are many forces making it more and more difficult to protect these assets, and securing them is a complex issue often overlooked by security and risk managers. Many security managers do not have adequate policies or procedures in place to protect these assets from compromise, infringement, and theft. Safeguarding Intangible Assets provides managers with the tools necessary for protecting these assets through effective and consistent oversight designed to preserve their control, use, and ownership. The book offers strategies for various types of business transactions, such as mergers and acquisitions, corporate-university R&D alliances, new product launches, early stage firms, and university-based spin-offs. - Offers step-by-step guidelines and best practices for establishing and maintaining an intangible asset protection program - Provides intangible asset risk management strategies that preserve the company's value, revenue, and competitive advantages - Shows how to collaboratively build a company culture that anticipates and recognizes intangible asset risks in everyday transactions and operations - Strengthens the interface with other departments' security practices, including IT, management, legal, accounting, finance, and risk management




Nuclear Law


Book Description

This open access book traces the journey of nuclear law: its origins, how it has developed, where it is now, and where it is headed. As a discipline, this highly specialized body of law makes it possible for us to benefit from the life-saving applications of nuclear science and technology, including diagnosing cancer as well as avoiding and mitigating the effects of climate change. This book seeks to give readers a glimpse into the future of nuclear law, science and technology. It intends to provoke thought and discussion about how we can maximize the benefits and minimize the risks inherent in nuclear science and technology. This compilation of essays presents a global view in discipline as well as in geography. The book is aimed at representatives of governments -- including regulators, policymakers and lawmakers -- as well representatives of international organizations and the legal and insurance sectors. It will be of interest to all those keen to better understand the role of law in enabling the safe, secure, and peaceful use of nuclear technology around the world. The contributions in this book are written by leading experts, including the IAEA's Director General, and discuss the four branches of nuclear law -- safety, security, safeguards and nuclear liability -- and the interaction of nuclear law with other fields of national and international law.




Information Security Management


Book Description

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that