IEEE 692 2010
$71.50
IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations
Published By | Publication Date | Number of Pages |
IEEE | 2010 | 49 |
Revision Standard – Inactive – Superseded. The standard provides criteria for the design, testing, and maintenance of security system equipment for nuclear power generating stations. Such equipment includes permanently or temporarily installed systems, subsystems, and components used by the security force for physical protection of the station against security threats. It includes equipment for security-related detection, assessment, surveillance, access control, communication, and data acquisition.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 692-2010 Front Cover |
3 | Title Page |
6 | Introduction |
8 | Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata Interpretations Patents |
9 | Participants |
11 | Contents |
13 | Important Notice 1. Overview 1.1 Scope 1.2 Purpose 2. Normative references |
14 | 3. Definitions |
16 | 4. Integrated security system 4.1 Design basis 4.2 List of security system subsystems and equipment |
17 | 4.3 General performance requirements |
21 | 5. Perimeter intrusion alarm system 5.1 Design basis 5.2 Types of perimeter intrusion alarm system sensors |
22 | 5.3 Site evaluation, system selection, and location |
23 | 5.4 Location 5.5 Probability of detection 5.6 Required alarm conditions 5.7 Tamper protection 6. Security lighting 6.1 Design basis |
24 | 6.2 Outdoor security lighting |
25 | 6.3 Primary portal security lighting |
26 | 6.4 Interior security lighting 6.5 Establishing and maintaining required illumination levels |
27 | 7. Video surveillance 7.1 Design basis 7.2 Performance requirements |
30 | 7.3 Minimum equipment standards |
31 | 7.4 Documentation 8. Access control 8.1 Design basis 8.2 Access control barriers |
32 | 8.3 Types of hardware |
33 | 9. Interior intrusion detection 9.1 Design basis 9.2 Description |
34 | 9.3 Site evaluation 9.4 Performance requirements |
35 | 9.5 Tamper protection 10. Data acquisition, processing, and display 10.1 Design basis 10.2 Data acquisition |
36 | 10.3 Signal processing |
37 | 10.4 Data display |
38 | 10.5 Alarm reporting |
39 | 10.6 Integration of access control system with other security functions |
40 | 11. Voice communications 11.1 Design basis 11.2 Telephone 11.3 Radio 11.4 Communications coverage |
41 | 11.5 Communication protection 11.6 Antenna protection 11.7 Intelligence protection 11.8 Radio interference protection 11.9 Loss of communication 12. Line supervision 12.1 Design basis 12.2 Continuous detection 12.3 Timely detection 12.4 Protection-in-depth |
42 | 12.5 Balanced protection 12.6 Specific approaches to line supervision 13. Duress alarms 13.1 Design basis 13.2 Duress alarm devices |
43 | 13.3 Operation 13.4 Multiplexing considerations 13.5 Annunciation exclusion 13.6 Wireless considerations 13.7 Hand-held transceiver considerations 14. Power supplies 14.1 Design basis |
45 | 14.2 Emergency security system power |
46 | 15. Maintenance and testing 15.1 Design basis 15.2 Acceptance testing 15.3 Equipment identification 15.4 Procedures |
47 | 15.5 Intervals 15.6 Records 15.7 Spare parts 15.8 Technical information 15.9 Training and qualifications |
48 | Annex A (informative) Bibliography |