accessibility

Nuclear Security

Nuclear Security Directorate

The Nuclear Security Directorate at the Jordan Research and Training Reactor (JRTR) is responsible for protecting the facility, its personnel, and its assets against deliberate threats, including physical, cyber, and insider (human) threats. The Directorate implements internationally recognized nuclear security standards in accordance with national legislation and in line with the recommendations and guidance of the International Atomic Energy Agency (IAEA).

The Directorate consists of three main units that work together to form an integrated and comprehensive security system, as follows:
• Physical Protection Section
• Reliability Section
• Cybersecurity Section

 

83

 

The Nuclear Security Directorate ensures a safe and stable operating environment through the integrated coordination of its three sections, while continually enhancing its capabilities in response to emerging threats and evolving technologies.

 Physical Protection Section

left-arrowsManagement of monitoring and control systems (such as cameras, intrusion detectors, and early warning systems).

left-arrowsCoordination with national security agencies to secure the facility’s perimeter.

left-arrowsDevelopment of emergency response plans in cooperation with internal and external teams.

left-arrowsConducting regular tests and simulation drills to ensure the readiness of the physical protection system.

 Reliability Section

left-arrowsImplementing a personnel reliability program in accordance with national and international requirements.

left-arrowsConducting criminal, security, and psychological background checks for staff.

left-arrowsRegularly updating and maintaining personnel reliability records.

left-arrowsPromoting continuous awareness of nuclear security and the role of staff in maintaining it.

 Cybersecurity Section

left-arrowsApplying cybersecurity controls to protect industrial control systems and computer networks.

left-arrowsMonitoring network traffic, detecting cybersecurity incidents, and responding to them.

left-arrowsDeveloping cybersecurity policies and procedures based on internationally recognized best practices.

left-arrowsTraining technical and administrative personnel on secure cybersecurity practices.

left-arrowsConducting periodic penetration testing and vulnerability assessments.

How do you rate the content of the page?