Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Protection in depth

Security layers of protection Also known as concentric rings of protection, a concept of providing multiple independent and overlapping layers of protection in depth. For security purposes, this may include various layers of protection such as countersurveillance, counterintelligence, physical security, and cyber security. [Pg.105]

Ideally, in a perfect world, all chemical facilities would be secured in a layered fashion (aka the barrier approach). Layered security systems are vital. Using the protection in-depth principle, requiring that an adversary defeat several protective barriers or security layers to accomplish its goal, chemical industry infrastructure can be made more secure. Protection in depth is a term commonly used by the military to describe security measures that reinforce one another, masking the defense mechanisms from the view of intruders, and allowing the defender time to respond to intrusion or attack. [Pg.154]

In chemical industry infrastructure security, protection in depth is used to describe a layered security approach. A protection-in-depth strategy uses several forms of security techniques and/or devices against an intruder and does not rely on one single defensive mechanism to protect infrastructure. By implementing multiple layers of security, a hole or flaw in one layer is covered by the other layers. An intruder will have to intrude through each layer without being detected in the process—the layered approach implies that no matter how an intruder attempts to accomplish his goal, he will encounter effective elements of the physical protection system. [Pg.155]

For example, as depicted in figure 9.1, an effective security layering approach requires that an adversary penetrate multiple, separate barriers to gain entry to a critical target at a chemical industry facility. As shown in figure 9.1, protection in depth (multiple layers of security) helps to ensure that the security system remains effective in the event of a failure or an intruder bypassing a single layer of security. [Pg.155]

Eig. 1. The relation between physical barriers and levels of protection in defense-in-depth design of a nuclear faciUty (12). Courtesy of IAEA. [Pg.235]

In-Depth Studies on Health and Environmental Impacts of Selected Water Pollutants, report on contract number 68-01-4646, U.S. Environmental Protection Agency, Washington, D.C., 1978. [Pg.399]

Defence in depth. The design process should ensure that multiple levels of protection are provided and the necessity of human intervention is minimized. [Pg.1032]

Defense in Depth - Barriers Providing Public Protection... [Pg.309]

An important principle is that security must be built in depth - otherwise known as defense in depth. In this context, it may be helpful to think of security as a set of concentric rings, where the target is located at the center. Each ring represents a level of physical protection (perimeter fence, building shell, security case) but the number of rings and security resistance will vary relative to the risk. The spaces between the rings may represent other defensive measures such as closed-circuit television (CCTV), security lighting, intruder alarm systems, etc. [Pg.166]

A 1993 review by La Vecchia73 concluded that there were many inconsistencies in the results of the association between coffee and colorectal cancers. For tea, in 1997 Kohlmeier and associates74 after an in-depth review of tea studies concluded that there appeared to be some protective effect of green tea on colon cancer, while they found that the data for black tea was not clear since some studies showed no association and others found increased risk with regular use. [Pg.337]

Waste reduction should be geared towards increasing production efficiency in existing industrial plants that is, one must know what is going on inside the factory walls. In-depth knowledge about the production is essential for the implementation of a preventive approach to environmental protection that... [Pg.8]

The current text attempts to address the combustion features of fire engineering in depth. That statement may appear as an oxymoron since fire and combustion are the same, and one might expect them to be fully covered. However, fire protection engineering education has formerly emphasized more the protection aspect than the fire component. Figure 1.7 shows a flow chart that represents how the prerequisite... [Pg.13]

A new area of research concerns exposure assessment for beryllium in the production of nuclear weapons at nuclear defense industries. A safe level of exposure to beryllium is still unknown. Potential explanations include (1) the current exposure standard may not be protective enough to prevent sensitization, or (2) past exposure surveillance may have underestimated the actual exposure level because of a lack of understanding of the complexity of beryllium exposures. Task-based exposure assessment provides information not directly available through conventional sampling. It directly links exposure to specific activity associated with contaminant generation and provides in-depth evaluation of the worker s role in a specific task. In-depth task analysis is being used to examine physical, postural, and cognitive demands of various tasks. [Pg.267]

A complete security design includes these four concepts in layers of protection or a defense in depth arrangement. The most critical assets should be placed in the center of conceptual concentric levels of increasingly more stringent security measures. In the concept of rings of protection, the spatial relationship between the location ofthe target asset and the location ofthe physical countermeasures is important. [Pg.108]

Sometimes it is easiest to prepare a general flowchart that identifies events which may occur at a facility during an incident. This flowchart can identify possible avenues the event may lead to and the protection measures available to mitigate and protect the facility. It will also highlight deficiencies. The use of a flowchart helps the understanding of events by personal unfamiliar with petroleum risk and safety measures. It portrays a step by step scenarios that is easy to follow or explain. Preparation of in-depth risk probability analysis can also use the flowchart as the basis of the event trees or failure modes and effects. Figure 3 provides a generic example of a typical hydrocarbon process facility Safety Flowchart. API Recommended Practice RP 14C provides an example of a Safety Flowchart for an offshore production facility. [Pg.87]

This book in not intended to provide in-depth guidance on basic risk assessment principles nor on fire and explosion protection engineering foundations or design practices. Several other excellent books are available on these subjects and some references to these are provided at the end of each chapter. [Pg.297]

Establish a network protection strategy based on the principle of defense-in-depth. [Pg.133]

It is not the intent of this Guideline to deal in depth with facility security issues. However, effective fire prevention in a processing facility depends on people in addition to systems to detect developing fires and other incidents and to detect unauthorized intrusion into the facility. Intruder-caused vandalism, damage, spills, releases, or fires are not common, but are a credible threat. The potential fire prevention and protection requirements to manage the risk of security events from terrorism need to be considered in the overall fire protection system design. [Pg.49]

Some carbonation tests have been reported on plain and air-entrained concretes using two aggregate types, where the depth of carbonation on indoor and atmospheric exposure for 5 years have been measured [40]. The results are given in Table 3.24. In all cases, the air-entrained mixes have shown less carbonation than similar controls, suggesting that air-entrained concrete should provide a better reinforcement protection in the long term. [Pg.220]

The metabolism and bioavailability of isoflavonoids is likely to be of crucial importance to their ability to help protect human health against disease. Many studies have been published on the metabolism and bioavailability of isoflavones in adults. The metabolism of isoflavones is of particular interest because the potency of isoflavone metabolites differs from that of the parent compounds. The daidzein metabolite equol is three times as potent as is daidzein in an endometrial tumor line. Equol is also a more potent antioxidant in vitro (see Sections 7.3.5 and 7.4.2) ° and the clinical significance of the ability to form equol has been considered in depth. ... [Pg.374]


See other pages where Protection in depth is mentioned: [Pg.49]    [Pg.78]    [Pg.49]    [Pg.78]    [Pg.235]    [Pg.236]    [Pg.236]    [Pg.283]    [Pg.304]    [Pg.202]    [Pg.781]    [Pg.1081]    [Pg.592]    [Pg.867]    [Pg.124]    [Pg.13]    [Pg.69]    [Pg.358]    [Pg.147]    [Pg.212]    [Pg.38]    [Pg.239]    [Pg.225]    [Pg.66]    [Pg.132]    [Pg.133]    [Pg.578]    [Pg.16]    [Pg.686]   
See also in sourсe #XX -- [ Pg.46 , Pg.145 ]




SEARCH



© 2024 chempedia.info