Sie wollen auch ein ePaper? Erhöhen Sie die Reichweite Ihrer Titel.
YUMPU macht aus Druck-PDFs automatisch weboptimierte ePaper, die Google liebt.
<strong>atw</strong> Vol. 63 (<strong>2018</strong>) | Issue 1 ı January<br />
ENVIRONMENT AND SAFETY 22<br />
| | Fig. 1.<br />
Schematic showing the general ranges of applicability of the 3 methods of Fault Analysis 2,3 .<br />
attitudes in organizations and individuals<br />
which establishes that, as an<br />
overriding priority, protection and<br />
safety issues receive the attention<br />
warranted by their significance”<br />
[9]. The development of a good<br />
safety culture requires a transparent<br />
approach to information sharing and<br />
dissemination. This helps ensure that<br />
incident reoccurrences can be prevented,<br />
and others who may be using<br />
the same or similar equipment,<br />
techniques or procedures can review<br />
their arrangements to prevent a<br />
similar incident.<br />
“The existence of a good safety<br />
culture is a prerequisite for the<br />
implementation of a good safety case.<br />
The converse is also true” [10]. This<br />
enables a good safety case to be<br />
translated into beneficial changes<br />
in behaviour associated with the<br />
existing safety culture and arrangements<br />
for the management of safety.<br />
Practicing a graded approach<br />
to safety ensures that the effort<br />
expanded is proportionate to the<br />
possible consequences. Figure 1 is<br />
from the Office for Nuclear Regulation<br />
Safety Assessment Principles [11]<br />
and shows the applicability for<br />
the methods of fault analysis; PSA,<br />
DBA and SAA. Thus more assessment<br />
effort is expended on those higher<br />
consequence and higher frequency<br />
events.<br />
2) Office for Nuclear<br />
Regulation [11].<br />
3) Target 4 (BSL):<br />
‘ Target 4 is<br />
intended to provide<br />
a broad indication<br />
of where DBA might<br />
be expected to be<br />
applied’ [11]. BSL –<br />
Basic Safety Level<br />
4) Based upon a<br />
Sandia National<br />
Laboratories<br />
diagram<br />
| | Fig. 2.<br />
Design and Evaluation Process Outline 4 .<br />
techniques to demonstrate the<br />
effectiveness of defence in depth,<br />
such as:<br />
• Design Basis Analysis (DBA): to<br />
ensure that the design is robust,<br />
fault tolerant and has effective<br />
safety measures;<br />
• Probabilistic Safety Analysis (PSA):<br />
to ensure risks are acceptable,<br />
understand inter-dependencies<br />
and to evaluate failures; and<br />
• Severe Accident Analysis (SAA): to<br />
determine further practicable<br />
measures to improve defence in<br />
depth.<br />
The hierarchical view deviations,<br />
incidents and accidents for nuclear<br />
facilities is compared against five<br />
levels of defence in depth [7] for<br />
safety:<br />
• Preventing deviations from normal<br />
operations;<br />
• Controlling deviations from operational<br />
states;<br />
• Controlling accidents within the<br />
design basis;<br />
• Mitigating accidents and ensuring<br />
confinement of radioactive materials;<br />
and<br />
• Mitigating the radiological consequences<br />
of radioactive releases.<br />
This hierarchical view allows<br />
designers, operators and others to<br />
identify where they can most effectively<br />
contribute to maintaining safety.<br />
The Safety Case is a well-documented<br />
approach normally used by<br />
regulators for proportionally assessing<br />
the safety submissions against<br />
the radiological hazards presented.<br />
Safety cases are typically defined as a<br />
“ structured argument, supported by a<br />
body of evidence that provides a<br />
compelling, comprehensible and valid<br />
case that a system is safe for a given<br />
application in a given operating<br />
environment” [8].<br />
For the safe operation of a nuclear<br />
site, facility or activity an effective<br />
safety culture needs to be in-place and<br />
fostered. Safety culture is defined as<br />
“The assembly of characteristics and<br />
4.2 Security<br />
A number of methodologies are used<br />
in security to increase the likelihood<br />
of creating and maintaining secure<br />
operations. An example holistic<br />
approach is the Design and Evaluation<br />
Process Outline (DEPO) (Figure 2)<br />
[12]. The physical protection system<br />
(PPS) is developed from determining<br />
the targets to be protected from the<br />
postulated malicious capabilities, and<br />
then designing for delay, detection,<br />
assessment and response. Vulnerability<br />
assessment is undertaken to<br />
ensure that the PPS is likely to be<br />
effective and depending on the outcome<br />
the design will be refined or<br />
implemented.<br />
However, a number of assessment<br />
techniques need to be deployed<br />
and the associated performance<br />
measures calculated and considered<br />
for operational acceptance. For<br />
example, a sensitive detector with a<br />
high probability of detection may<br />
detect all intrusions but have a high<br />
false alarm rate such that responders<br />
ignore the alarms being received.<br />
Defence in depth for security<br />
[7] comprise layers of physical and<br />
Environment and Safety<br />
Nuclear Safety, Security and Safeguards: An Application of an Integrated Approach ı Howard Chapman, Jeremy Edwards, Joshua Fitzpatrick, Colette Grundy, Robert Rodger and Jonathan Scott