Shopping Cart

No products in the cart.

IEEE 692 2010

$71.50

IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations

Published By Publication Date Number of Pages
IEEE 2010 49
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

Revision Standard – Inactive – Superseded. The standard provides criteria for the design, testing, and maintenance of security system equipment for nuclear power generating stations. Such equipment includes permanently or temporarily installed systems, subsystems, and components used by the security force for physical protection of the station against security threats. It includes equipment for security-related detection, assessment, surveillance, access control, communication, and data acquisition.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 692-2010 Front Cover
3 Title Page
6 Introduction
8 Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata
Interpretations
Patents
9 Participants
11 Contents
13 Important Notice
1. Overview
1.1 Scope
1.2 Purpose
2. Normative references
14 3. Definitions
16 4. Integrated security system
4.1 Design basis
4.2 List of security system subsystems and equipment
17 4.3 General performance requirements
21 5. Perimeter intrusion alarm system
5.1 Design basis
5.2 Types of perimeter intrusion alarm system sensors
22 5.3 Site evaluation, system selection, and location
23 5.4 Location
5.5 Probability of detection
5.6 Required alarm conditions
5.7 Tamper protection
6. Security lighting
6.1 Design basis
24 6.2 Outdoor security lighting
25 6.3 Primary portal security lighting
26 6.4 Interior security lighting
6.5 Establishing and maintaining required illumination levels
27 7. Video surveillance
7.1 Design basis
7.2 Performance requirements
30 7.3 Minimum equipment standards
31 7.4 Documentation
8. Access control
8.1 Design basis
8.2 Access control barriers
32 8.3 Types of hardware
33 9. Interior intrusion detection
9.1 Design basis
9.2 Description
34 9.3 Site evaluation
9.4 Performance requirements
35 9.5 Tamper protection
10. Data acquisition, processing, and display
10.1 Design basis
10.2 Data acquisition
36 10.3 Signal processing
37 10.4 Data display
38 10.5 Alarm reporting
39 10.6 Integration of access control system with other security functions
40 11. Voice communications
11.1 Design basis
11.2 Telephone
11.3 Radio
11.4 Communications coverage
41 11.5 Communication protection
11.6 Antenna protection
11.7 Intelligence protection
11.8 Radio interference protection
11.9 Loss of communication
12. Line supervision
12.1 Design basis
12.2 Continuous detection
12.3 Timely detection
12.4 Protection-in-depth
42 12.5 Balanced protection
12.6 Specific approaches to line supervision
13. Duress alarms
13.1 Design basis
13.2 Duress alarm devices
43 13.3 Operation
13.4 Multiplexing considerations
13.5 Annunciation exclusion
13.6 Wireless considerations
13.7 Hand-held transceiver considerations
14. Power supplies
14.1 Design basis
45 14.2 Emergency security system power
46 15. Maintenance and testing
15.1 Design basis
15.2 Acceptance testing
15.3 Equipment identification
15.4 Procedures
47 15.5 Intervals
15.6 Records
15.7 Spare parts
15.8 Technical information
15.9 Training and qualifications
48 Annex A (informative) Bibliography
IEEE 692 2010
$71.50