Powered by Deep Web Technologies
Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Contacts for Acquisition | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

for Acquisition CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

2

of Western Area Power Administration's Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

3

Contacts for Administrative Functions | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Functions CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

4

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

Science Conference Proceedings (OSTI)

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

5

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

6

Cyber Tips Book Mark (2009 NCSA Month) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sites Power Marketing Administration Other Agencies You are here Home Cyber Tips Book Mark (2009 NCSA Month) Cyber Tips Book Mark (2009 NCSA Month) Training and Awareness...

7

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

8

An agent-based legal knowledge acquisition methodology for agile public administration  

Science Conference Proceedings (OSTI)

This paper proposes a knowledge elicitation method based on serious gaming for theory construction about the effects of the law on the behaviours of agents. These games provide input to simulations of business process and product design alternatives. ... Keywords: knowledge acquisition, legal knowledge engineering, public administration

Alexander Boer; Tom van Engers

2011-06-01T23:59:59.000Z

9

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

10

Cyber Infrastructure Group Home Page  

Science Conference Proceedings (OSTI)

Cyber Infrastructure Group. Welcome. The Cyber Infrastructure Group (775.04) addresses the integration and interoperability ...

2012-07-17T23:59:59.000Z

11

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

12

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

13

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

14

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

15

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

16

Cyber Incidents Involving Control Systems  

Science Conference Proceedings (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

17

Understanding cyber threats and vulnerabilities  

Science Conference Proceedings (OSTI)

This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was ... Keywords: actor, critical infrastructure, cyber crime, cyber terrorism, cyber threat, cyber vulnerabilities

Eric Luiijf

2012-01-01T23:59:59.000Z

18

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

19

Cyber sleuths face off  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber sleuths face off Cyber sleuths face off Computer specialists will meet for a grueling week that combines state-of-the-art training with opportunities to team up, solve...

20

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Cyber Effects Analysis Using VCSE Promoting Control System Reliability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual Control System Environment (VCSE) technology- developed at Sandia National Laboratories-to investigate Supervisory Control And Data Acquisition (SCADA) vulnerabilities associated with energy systems; and it describes a set of experiments with findings from using that environment. The report explains how VCSE can be used to analyze and develop an understanding of cyber attacks. Specific analyses in this report focus on unencrypted, unsecured data channels on Internet protocol (IP)-routed computer networks within electric power systems. Cyber Effects Analysis Using VCSE Promoting Control System Reliability

22

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

23

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

24

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

25

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

26

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

27

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyberincident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable...

28

January 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyberincident that occurred in mid-January 2013 which targeted the Headquarters'network and resulted in the unauthorized disclosure of...

29

Organized Cyber Defense Competitions  

Science Conference Proceedings (OSTI)

The Cyber Defense Exercise (CDX), an annual competition between students at the five U.S. Service Academies has developed into an extraordinary educational experience for the participants. During the exercise students will design and implement a realistic ...

Ronald C. Dodge JR; Daniel J. Ragsdale

2004-08-01T23:59:59.000Z

30

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information ...

31

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

32

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

33

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

34

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

35

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

36

Cyber threat metrics.  

SciTech Connect

Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

2012-03-01T23:59:59.000Z

37

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

38

Cyber Friendly Fire  

Science Conference Proceedings (OSTI)

Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2011-09-01T23:59:59.000Z

39

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energys (DOEs) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEs Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

40

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Cyber Security Management Memorandum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Management Memorandum Cyber Security Management Memorandum On December 7, 2009, the Deputy Secretary of Energy released this memorandum directing the creation of a...

42

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002, IG-0569 THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002,...

43

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

44

Building the Next Generation of Cyber Defenders  

Science Conference Proceedings (OSTI)

Page 1. Building the Next Generation of Cyber Defenders ... 19th Century 20th Century The Cyber Security Problem Space ? Historic Background ...

2013-03-28T23:59:59.000Z

45

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

46

Technical Options to Address Cyber Security, Interoperability...  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Options to Address Cyber Security, Interoperability and Other Issues with ZigBee SEP Title Technical Options to Address Cyber Security, Interoperability and Other Issues...

47

Protecting Intelligent Distributed Power Grids Against Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a...

48

RFI Comments - Advanced Cyber Security Center  

Science Conference Proceedings (OSTI)

Page 1. Page 1 of 3 Advanced Cyber Security Center Rollout ... The Need The advanced cyber threat is real and growing. ...

2013-04-09T23:59:59.000Z

49

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

50

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

51

INL Cyber Security Research | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Research Cyber security research at INL will help protect critical infrastructure control system computers against worms and other viruses. INL Cyber Security Research More...

52

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

53

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

54

Protecting users of the cyber commons  

Science Conference Proceedings (OSTI)

Establish a global cyber "neighborhood watch" enabling users to take defensive action to protect their operations.

Stephen J. Lukasik

2011-09-01T23:59:59.000Z

55

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

56

The Department's Unclassified Cyber Security Program 2002, IG...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002,...

57

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

NLE Websites -- All DOE Office Websites (Extended Search)

CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

58

Acquisition Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3.2 (November 2009) 3.2 (November 2009) PURCHASE ORDERS GUIDING PRINCIPLES J Purchase Orders should normally be issued on a fixed-price basis. J Modifications of Purchase Orders may be used for unpriced orders and for administrative matters on priced orders. J Purchase orders cannot exceed the simplified acquisition threshold. This section discusses the Department of Energy's (DOE) use of purchase orders as described in Federal Acquisition Regulation (FAR) 13.302 and the Department of Energy's Acquisition Regulation (DEAR) Section 91 3.304. Only contracting officers acting within the scope of their authority are empowered to execute purchase orders on behalf of DOE. Authority A. Federal Acquisition Regulation (FAR) Subpart 13.302. B. DEAR 913.307 Background When shouldpurchase orders be used? Due to the administrative cost of preparing and handling

59

Cyber and physical infrastructure interdependencies.  

Science Conference Proceedings (OSTI)

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

60

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

62

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

63

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

64

Strengthening Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

65

A nexus of Cyber-Geography and Cyber-Psychology: Topos/"Notopia" and identity in hacking  

Science Conference Proceedings (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as ''Notopia'') and psychological ... Keywords: Cyber-Geography, Cyber-Identity, Cyber-Psychology, Hacking, Identity, Notopia

Fivos Papadimitriou

2009-11-01T23:59:59.000Z

66

Cyber-physical systems: imminent challenges  

Science Conference Proceedings (OSTI)

A German project is presented which was initiated in order to analyse the potential and risks associated with Cyber-Physical Systems. These have been recognised as the next wave of innovation in information and communication technology. Cyber-Physical ...

Manfred Broy; Mara Victoria Cengarle; Eva Geisberger

2012-03-01T23:59:59.000Z

67

Administration  

E-Print Network (OSTI)

This document has been funded by the United States Environmental Protection Agency under Contract 68-W6-0014. It has been subject to administrative review by all agencies participating in the Federal Remediation Technologies Roundtable, and has been approved for publication. Any mention of trade names or commercial products does not constitute endorsement or recommendation for use. TABLE OF CONTENTS

Technologies Roundtable

1998-01-01T23:59:59.000Z

68

Smart Manufacturing, Construction, and Cyber-Physical ...  

Science Conference Proceedings (OSTI)

Strategic Goal:Smart Manufacturing, Construction, and Cyber-Physical Systems. Enable the next generation of innovative ...

2013-01-03T23:59:59.000Z

69

Booz Allen Hamilton Cyber Assurance Testing Laboratory  

Science Conference Proceedings (OSTI)

Booz Allen Hamilton Cyber Assurance Testing Laboratory. NVLAP Lab Code: 200423-0. Address and Contact Information: ...

2013-08-16T23:59:59.000Z

70

CIKR Cyber Information Sharing and Collaboration Program ...  

Science Conference Proceedings (OSTI)

Page 1. CIKR Cyber Information Sharing and Collaboration Program (CISCP) In order to meet the Department of Homeland ...

2013-07-16T23:59:59.000Z

71

DRAFT Outline - Preliminary Framework to Reduce Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. 1 DRAFT Outline - Preliminary Framework to Reduce Cyber Risks to Critical Infrastructure, July 1, 2013 NOTES ...

2013-07-02T23:59:59.000Z

72

Comprehensive National Cyber Security: Leap-Ahead ...  

Science Conference Proceedings (OSTI)

Comprehensive National Cyber Security: Leap-Ahead Security for Interconnected Systems (+10 FTE, +$5,500,000). Challenge. image: ...

2010-10-05T23:59:59.000Z

73

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

74

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

75

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

76

The economic impact of cyber terrorism  

Science Conference Proceedings (OSTI)

What is the economic impact of cyber terrorism? Can organizations achieve strategic advantage in the cyber terrorism game? A general game theoretical model is proposed to study the optimal information systems (ISs) security investment and then applied ... Keywords: Cyber terrorism, Game theory, Information systems security, Security investment

Jian Hua, Sanjay Bapna

2013-06-01T23:59:59.000Z

77

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

78

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

79

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

80

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

NNSA Policies | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

About Us > Our Operations > Management and Budget > NNSA Policy About Us > Our Operations > Management and Budget > NNSA Policy System > NNSA Policies NNSA Policies NNSA Policies (NAPs) impart policy and requirements unique to the Administration or provide short-term notices until more formal direction can be provided. NAP-4B Corporate Performance Process for M&O Contractors June 30, 2008 NAP-5 Standards Management October 16, 2002 NAP-6 FEOSH Program for NNSA Headquarters Employees December 19, 2002 NAP-7 NNSA's Acquisition and Assistance Policy Guidance December 9, 2002 NAP-14.1D Baseline Cyber Security Program December 14, 2012 NAP-21 Signed Governance and Oversight March 2, 2011 NAP-23 Transformational Governance and Oversight February 28, 2011 NAP-24 Weapons Quality Policy June 20, 2013 NAP-25 Management and Operating Contractor Business Meals and Light Refreshment

82

Acquisition Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Acquisition Letters DOE Acquisition Regulations (DEAR) DOE Directives Federal Acquisition Regulations (FAR) Federal Register Financial Assistance Guide Headquarters Office...

83

Department of Energy's July 2013 Cyber Security Breach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

84

Cyber Fit Pyramid for the home user. | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pyramid for the home user. Cyber Fit Pyramid for the home user. Cyber Fit Pyramid for the home user. Developed for Security Awareness materials for the Department Cyber Fit Pyramid...

85

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

86

NNSA Seeking Comments on Consolidated IT and Cyber Security Support...  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013...

87

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 Protecting unclassified information systems continues to...

88

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY...

89

INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 The Office of Inspector...

90

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

91

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strategy for Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Computational Advances in Applied...

92

CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES, IG-0545 CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES, IG-0545 In...

93

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

94

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise...

95

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

96

Report of the Cyber Security Research Needs for Open Science...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while maintaining...

97

Evaluation Report on The Department's Unclassified Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 As...

98

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

99

Office of Cyber Security Evaluations - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Evaluations Reports to the Independent Oversight Program Mission and Functions Mission The Office of Cyber Security Evaluations is responsible for the independent...

100

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Mobile Device Security Checklist Open...

102

Cyber Effects Analysis Using VCSE Promoting Control System Reliability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual...

103

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

104

Smart Grid Investment Grant Program (SGIG): Cyber Security Issues...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(SGIG): Cyber Security Issues and Requirements, November 19, 2009 Smart Grid Investment Grant Program (SGIG): Cyber Security Issues and Requirements, November 19, 2009 Presentation...

105

Cyber Security Procurement Methodology, Rev. 1  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-17T23:59:59.000Z

106

Cyber Security Metrics and Measures abstract  

Science Conference Proceedings (OSTI)

Paul E. Black, Karen Scarfone, and Murugiah Souppaya, Cyber Security Metrics and Measures, in Wiley Handbook of Science and Technology for ...

2013-05-07T23:59:59.000Z

107

Computer Use Agreement, BNL Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Be aware of, knowledgeable about, and comply with the requirements of the BNL Cyber Security Program as described in SBMS. Follow BNL policy regarding the use and...

108

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan....

109

Hiring and Managing a Cyber Security Workforce:  

Science Conference Proceedings (OSTI)

... DHS cyber security workers and others from outside of ... Sell the mission! Protecting the US nuclear arsenal or the New York City water supply is a ...

2013-09-19T23:59:59.000Z

110

Cybersecurity for Cyber-Physical Systems  

Science Conference Proceedings (OSTI)

... The second day will focus on cyber security needs of CPSs in the electric Smart Grid. ... NIST - Smart Grid http://www.nist.gov/smartgrid/. ...

2013-01-11T23:59:59.000Z

111

Graph anomalies in cyber communications  

Science Conference Proceedings (OSTI)

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

112

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

113

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

114

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

115

Proposed Comprehensive Cyber Security Legislation, May 2011  

Science Conference Proceedings (OSTI)

The role of cyber security in the critical infrastructures of the United States has been recognized by the President and by members of Congress. To address potential cyber security threats and vulnerabilities, the Senate has proposed revisions to specific laws and regulations. This white paper includes a technical assessment of some of the key proposed revisions.

2011-10-26T23:59:59.000Z

116

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

117

NIST Improves Tool for Hardening Software Against Cyber ...  

Science Conference Proceedings (OSTI)

NIST Improves Tool for Hardening Software Against Cyber Attack. From NIST Tech Beat: November 22, 2011. ...

2011-11-22T23:59:59.000Z

118

Cyber Innovation Technology Summit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

119

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

120

Security and Cyber Evaluations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

122

Definition: Critical Cyber Assets | Open Energy Information  

Open Energy Info (EERE)

Related Terms Cyber Assets References Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline...

123

Cyber-Physical Challenges for Space Systems  

Science Conference Proceedings (OSTI)

Modern space systems necessarily have a tight coupling between onboard cyber (processing, communication) and physical (sensing, actuation) elements to survive the harsh extraterrestrial environment and successfully complete ambitious missions. This article ... Keywords: attitude control, communication, robotics, space systems

Andrew T. Klesh; James W. Cutler; Ella M. Atkins

2012-04-01T23:59:59.000Z

124

Review of Supervisory Control and Data Acquisition (SCADA) Systems  

SciTech Connect

A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

Reva Nickelson; Briam Johnson; Ken Barnes

2004-01-01T23:59:59.000Z

125

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

126

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

127

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

128

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

129

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

130

Cyber security exercises and competitions as a platform for cyber security experiments  

Science Conference Proceedings (OSTI)

This paper discusses the use of cyber security exercises and competitions to produce data valuable for security research. Cyber security exercises and competitions are primarily arranged to train participants and/or to offer competence contests for those ... Keywords: data collection, research method, security competitions, security exercises

Teodor Sommestad; Jonas Hallberg

2012-10-01T23:59:59.000Z

131

Development of the PowerCyber SCADA security testbed  

Science Conference Proceedings (OSTI)

Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software. ...

Adam Hahn; Ben Kregel; Manimaran Govindarasu; Justin Fitzpatrick; Rafi Adnan; Siddharth Sridhar; Michael Higdon

2010-04-01T23:59:59.000Z

132

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Boot Camps The Cyber Boot Camp Program was developed to help make science and technology more exciting by treating students to hands-on experience and interaction with...

133

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid...

134

Optimizing investments in cyber-security for critical infrastructure  

Science Conference Proceedings (OSTI)

Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making ...

Ike Patterson; James Nutaro; Glenn Allgood; Teja Kuruganti; David Fugate

2013-01-01T23:59:59.000Z

135

Submission to NIST RFI for Critical Infrastructure Cyber ...  

Science Conference Proceedings (OSTI)

... Page 2 of 3 3. The forces that govern cyber security implementation, innovation and transformation are diffuse and widely distributed. ...

2013-04-10T23:59:59.000Z

136

CyberDesign & Infrastructure for Multiscale Modeling and Simulations  

Science Conference Proceedings (OSTI)

Multiscale cyber design methodology, which usually disparate entities such as material characterization, mechanical experimentation, material design, and...

137

Small Business Cyber Security Workshop for Portland, Oregon ...  

Science Conference Proceedings (OSTI)

Page 1. Portland District Office Small Business Cyber Security Workshop Portland District Office 601 SW Second Ave. Suite ...

2013-07-24T23:59:59.000Z

138

NISTIR 7628 Volume 3, Guidelines for Smart Grid Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References The Smart ...

2012-03-01T23:59:59.000Z

139

Security Issues and Challenges for Cyber Physical System  

Science Conference Proceedings (OSTI)

In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set ... Keywords: Cyber-Physical System, Security, actuation, context-aware

Eric Ke Wang; Yunming Ye; Xiaofei Xu; S. M. Yiu; L. C. K. Hui; K. P. Chow

2010-12-01T23:59:59.000Z

140

Contacts for Enterprise Architecture | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Architecture CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Contacts for Information Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Management CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

142

Contacts for Geospatial Science Program | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Science Program CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

143

Contacts for Records Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Records Management CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

144

Contacts for Cybersecurity | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

for Cybersecurity CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

145

Los Alamos director echoes cyber concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

146

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Securitys Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPs current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

147

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 - Cost Accounting Standards Administration OPAM Policy Acquisition Guides GAO-04-539 Department of Energy: Certain Postretirement Benefits for Contractor Employees Are Unfunded...

148

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

149

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

150

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

151

Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8-5954 8-5954 Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis H. Cassidy Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

152

Simplifying cyber foraging for mobile devices  

Science Conference Proceedings (OSTI)

Cyber foraging is the transient and opportunistic use of compute servers bymobile devices. The short market life of such devices makes rapid modification of applications for remote execution an important problem. We describe a solution that combines ... Keywords: mobile computing, programmer productivity, rapid prototyping, retargeting applications, software engineering, user study

Rajesh Krishna Balan; Darren Gergle; Mahadev Satyanarayanan; James Herbsleb

2007-06-01T23:59:59.000Z

153

What are we teaching in cyber competitions?  

Science Conference Proceedings (OSTI)

Student competitions are widespread across all academic disciplines, and are often touted as a means to motivate and educate students. Competitions may be internal within a single class or course, or vie school against school as regional, national, or ... Keywords: Educational institutions,Computer security,Robots,Computers,Organizations,Programming,Security Education,Cyber,Competitions

Steven Fulton, Dino Schweitzer, Judson Dressler

2012-10-01T23:59:59.000Z

154

ACQUISITION LETTER  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy No. 2001-03 Department of Energy No. 2001-03 Acquisition Regulation Date May 25, 2001 ACQUISITION LETTER This Acquisition Letter is issued under the authority of the Procurement Executives of DOE and NNSA. Subject: COSTS ASSOCIATED WITH WHISTLEBLOWER ACTIONS References: DEAR 931.205-47(h) DEAR 952.216-7, Alt II DEAR 970.3102-05-47(h) DEAR 970.5232-2, Payments and Advances When Does this Acquisition Letter Expire? This Acquisition Letter will expire when this guidance is distributed as an Acquisition Guide section or otherwise superseded. Whom Do You Contact for More Information? Contact Terry Sheppard of the Office of Procurement and Assistance Policy at (202) 586-8193 or terry.sheppard@hq.doe.gov Visit our website at www.pr.doe.gov for information on Acquisition Letters and other policy

155

Summary Statistics - Energy Information Administration  

U.S. Energy Information Administration (EIA)

See Glossary. b Values reflect the month of acquisition, ... U.S. Energy Information Administration/Petroleum Marketing Monthly February 2012 38 Table 17.

156

Data Diodes in Support of a Power Grid Trustworthy Cyber Infrastructure  

SciTech Connect

Industrial Control Systems (ICS) are an integral part of the industrial infrastructure providing for the national good. While sharing basic constructs with Information Technology (IT) business systems, ICSs are technically, administratively, and functionally more complex and unique than business IT systems. Critical infrastructure protection focuses on protecting and maintaining a safe and reliable supply of electric power, oil, water, gasoline, chemicals, food, etc. Cyber vul-nerabilities are important if they can affect the safe, functional performance of these systems and processes. The majority of ICS exhibit vulnerable devices with unsecured physical access and/or subject to insider attack. In this whitepaper, we advocate trusted process control networks as a way to address the serious cyber security flaws which combines both white/black listing into a design philosophy that addresses information warfare scenarios, software process monitoring and an attack recognition and management architecture.

Sheldon, Frederick T [ORNL; MacIntyre, Lawrence Paul [ORNL; Okhravi, Hamed [ORNL; Munson, Dr. John C. [Computer Measurement Laboratory, Inc.

2009-12-01T23:59:59.000Z

157

MEMORANDUM FOR CHIEF ACQUISITION OFFICERS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 28, 2007 November 28, 2007 MEMORANDUM FOR CHIEF ACQUISITION OFFICERS SENIOR PROCUREMENT EXECUTIVES FROM: Paul A. Denett Administrator SUBJECT: Appropriate Use of Brand Name or Equal Purchase Descriptions The Office of Management and Budget (OMB) issued policy memorandums in April 2005 and April 2006, implementing brand name posting requirements for acquisitions (including simplified acquisitions and sole source procurements) over $25,000. The Federal Acquisition Regulation (FAR) was revised in September 2006 to incorporate this new policy. However, we are concerned that agencies are not preparing and posting the brand name justification or documentation in accordance with the new FAR requirements. Complaints have also been

158

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

159

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

160

Cyber Framework NIST In Support of CIS 4-12-13  

Science Conference Proceedings (OSTI)

... April 12, 2013 Cyber Framework NIST ... Our state and local governments are on the front lines of the cyber battle every day. ...

2013-04-13T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Cyber Security Procurement Methodology for Power Delivery Systems  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new power delivery systems requires cyber security experts, power system engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfit to meet requirements.The Electric Power Research ...

2012-12-31T23:59:59.000Z

162

Training Module for Cyber Security in Nuclear Plant Digital Modifications  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This Electric Power Research Institute (EPRI) computer-based training mod...

2011-04-28T23:59:59.000Z

163

Enhancing NASA Cyber Security Awareness From the C-Suite ...  

Science Conference Proceedings (OSTI)

... Leadership concerns with IT security impacts ? Cyber Security Summit Full day of workshops / panel sessions on transformation of IT / IT security ...

2013-03-28T23:59:59.000Z

164

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE to Provide Nearly 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for...

165

Cyber-Enabled Materials Simulations via NanoHUB.org  

Science Conference Proceedings (OSTI)

Symposium, Integrating and Leveraging Collaborative Efforts for ICME Education . Presentation Title, Cyber-Enabled Materials Simulations via NanoHUB.org.

166

The NIAC Convergence of Physical and Cyber Technbologies and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical...

167

The Department of Energy Launches Cyber Security Initiative ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

launching an initiative to enhance cyber security on the electric grid. The initiative, led by the Department's Office of Electricity Delivery and Energy Reliability (OE), the...

168

DOE P 205.1, Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security ...

2001-05-08T23:59:59.000Z

169

Lab hosts multi-lab cyber security games  

NLE Websites -- All DOE Office Websites (Extended Search)

Joint Cyber Coordination Center, or JC3. The JC3 is focused on improving the national response to threats, leveraging complex resources, and sharing information to meet...

170

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications IM-31, Policy, Guidance, and Planning Division Course Catalogue Cyber Tips Book Mark (2009 NCSA Month) Protect Your Family Brochure (Training and Awareness Materail)...

171

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

network segments. Table 1. Network Comparison: NERSC vs.Large Corporation NERSC External Network Traffic patternsLBNL-62284 NERSC Cyber Security Challenges That Require DOE

Draney, Brent; Campbell, Scott; Walter, Howard

2008-01-01T23:59:59.000Z

172

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

173

Proceedings of the Cybersecurity in Cyber-Physical Workshop ...  

Science Conference Proceedings (OSTI)

... modes of operation (such as home health setting ... temperature, pressure, and cooling/heating rates. ... other cyber-physical domains (ie oil/ natural gas ...

2013-02-14T23:59:59.000Z

174

Obama's Call for Public-Private Cyber Security Collaboration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the...

175

NISTIR 7628 Volume 2, Guidelines for Smart Grid Cyber ...  

Science Conference Proceedings (OSTI)

... Volume 1 Smart Grid Cyber Security Strategy, Architecture, and High-Level ... Appendix F Logical Architecture and Interfaces of the Smart Grid ...

2012-03-01T23:59:59.000Z

176

NIST Finalizes Initial Set of Smart Grid Cyber Security ...  

Science Conference Proceedings (OSTI)

... guidelines is intended to facilitate organization-specific Smart Grid cyber security ... the nation's electric infrastructure to make it smarter, more efficient ...

2010-09-29T23:59:59.000Z

177

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

178

Office of Security and Cyber Evaluations  

NLE Websites -- All DOE Office Websites (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

179

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

180

Acquisition Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

_____Chapter 15.4-4 (July 2010) _____Chapter 15.4-4 (July 2010) GENERAL GUIDE FOR TECHNICAL ANALYSIS OF COST PROPOSALS FOR ACQUISITION CONTRACTS Acquisition Guide _____________________________________________________________ _______________________________________________________Chapter 15.4-4 (July 2010) TABLE OF CONTENT CHAPTER 1 - INTRODUCTION KEY CONCEPTS ........................................................................................1 LIST OF ACRONYMS...............................................................................1 RELATIONSHIP OF TECHNICAL ANALYSIS TO COST ANALYSIS ..................................2 RESPONSIBILITIES IN EVALUATING CONTRACTOR PROPOSALS ..................................2

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Advanced Metering Infrastructure Cyber Security Risks  

Science Conference Proceedings (OSTI)

The deployment of advanced metering infrastructure (AMI) systems is introducing millions of components to the electric grid that support two-way communication for next-generation grid applications. Although these systems can increase operational efficiencies and enable new capabilities such as demand-response, they also increase the attack surface for potential adversaries. Utilities must address these new cyber security risks as part of their overall enterprise risk management strategy. These ...

2013-12-23T23:59:59.000Z

182

ACQUISITION LETTER  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

No. 2009-04 No. 2009-04 Acquisition Regulation Date 02/12/09 ACQUISITION LETTER This Acquisition Letter is issued under the authority of the DOE and NNSA Procurement Executives. Subject: Management of Excess Weapons Inventories and Selective Sensitive Equipment. References: 41 Code of Federal Regulations (CFR) 109-1, Department of Energy (DOE) Federal Property Management Regulations 48 CFR 52.245-1, Government Property DOE Guide 580.1-1, DOE Personal Property Management Guide DOE Order 580.1-1, DOE Personal Property Management, Contractor Requirements Document (CRD), Attachment 2, as set forth in the DOE O 580.1 Department of Energy Acquisition Regulation 970.5245-1, Property Federal Acquisition Regulation Part 45, Government Property

183

ACQUISITION PLANNING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 7.1 (May 2012 second revision) Chapter 7.1 (May 2012 second revision) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR 17.5 Interagency Acquisitions 11. FAR Subpart 17.6 Management and Operating Contracts 12. FAR Part 19 Small Business Programs Guiding Principles  Sound acquisition planning ensures that the contracting process is

184

ACQUISITION PLANNING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-Chapter 7.1 (May 2012) -Chapter 7.1 (May 2012) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR 17.5 Interagency Acquisitions 11. FAR Subpart 17.6 Management and Operating Contracts 12. FAR Part 19 Small Business Programs Guiding Principles  Sound acquisition planning ensures that the contracting process is

185

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

186

Theorem-based, data-driven, cyber event detection  

Science Conference Proceedings (OSTI)

Nonlinear dynamics and graph theory may provide a theorem-based path to improve design security and aid detection of anomalous events in cyber applications. Using side-channel information such as power taken from underlying computer components and analyzing ... Keywords: cyber anomaly detection, graph theory, nonlinear dynamics, phasespace analysis, power measurement

Lee M. Hively; J. Todd McDonald

2013-01-01T23:59:59.000Z

187

Time-based intrusion detection in cyber-physical systems  

Science Conference Proceedings (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

188

Cyber-physical energy systems: focus on smart buildings  

Science Conference Proceedings (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

189

Review: From wireless sensor networks towards cyber physical systems  

Science Conference Proceedings (OSTI)

In the past two decades, a lot of research activities have been dedicated to the fields of mobile ad hoc network (MANET) and wireless sensor networks (WSN). More recently, the cyber physical system (CPS) has emerged as a promising direction to enrich ... Keywords: Cyber physical system, Internet technology, Mobile ad hoc network, Pervasive computing, Sensing and actuation, Wireless sensor network

Fang-Jing Wu; Yu-Fen Kao; Yu-Chee Tseng

2011-08-01T23:59:59.000Z

190

Cyber-Terrorism and Ethical Journalism: A Need for Rationalism  

Science Conference Proceedings (OSTI)

Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist ... Keywords: Computer Security, Cyber-Terrorism, Decision-Making, Ethics, Game Theory, Journalism, Rationality

Mahmoud Eid

2010-10-01T23:59:59.000Z

191

Embedded Cyber-Physical Anomaly Detection in Smart Meters  

E-Print Network (OSTI)

Embedded Cyber-Physical Anomaly Detection in Smart Meters Massimiliano Raciti, Simin Nadjm vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location at destabilisation. In this paper we study a smart metering device that uses a trusted platform for storage

192

Deception used for Cyber Defense of Control Systems  

Science Conference Proceedings (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

193

ACQUISITION PLANNING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 2011) January 2011) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR Subpart 17.6 Management and Operating Contracts 11. FAR Part 19 Small Business Programs 12. FAR 25.802(a)(2) Other International Agreements and Coordination Guiding Principles  Sound acquisition planning ensures that the contracting process is

194

ACQUISITION PLANNING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCTOBER 2010) OCTOBER 2010) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR Subpart 17.6 Management and Operating Contracts 11. FAR Part 19 Small Business Programs 12. FAR 25.802(a)(2) Other International Agreements and Coordination Guiding Principles  Sound acquisition planning ensures that the contracting process is

195

ACQUISITION PLANNING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7.1 (May 2010) 7.1 (May 2010) 1 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR Subpart 17.6 Management and Operating Contracts 11. FAR Part 19 Small Business Programs 12. FAR 25.802(a)(2) Other International Agreements and Coordination 13. FAR 34.004 Acquisition Strategy Guiding Principles

196

ACQUISITION LETTER  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ACQUISITION LETTER ACQUISITION LETTER AUTHORITY This Acquisition Letter (AL) is issued by the Procurement Executive pursuant to a delegation from the Secretary and under the authority of the Department of Energy Acquisition Regulation (DEAR) subsection 901.301-70. CONTENTS CITATION TITLE DEAR Part 933 Protests, Disputes, and Appeals I. Purpose. This AL establishes policy and provides guidance for the use of alternative dispute resolution techniques in connection with disputes that arise under the Contract Disputes Act (CDA) of 1978, 41 U.S.C. sections 601-613. This AL revision deletes references to "district court" which were incorrectly cited in paragraph four of the Policy section. II. Background. Alternative Dispute Resolution (ADR) refers to a range of procedures

197

Acquisition Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 15.4-4 (December 2010) Chapter 15.4-4 (December 2010) GENERAL GUIDE FOR TECHNICAL ANALYSIS OF COST PROPOSALS FOR ACQUISITION CONTRACTS Acquisition Guide _____________________________________________________________ __________________________________________________Chapter 15.4-4 (November 2010) TABLE OF CONTENT CHAPTER 1 - INTRODUCTION KEY CONCEPTS ........................................................................................1 LIST OF ACRONYMS...............................................................................1 RELATIONSHIP OF TECHNICAL ANALYSIS TO COST ANALYSIS ..................................2 RESPONSIBILITIES IN EVALUATING CONTRACTOR PROPOSALS ..................................2 CHAPTER 2 - PREPARING TO EVALUATE A PROPOSAL

198

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

199

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

200

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for, among other things, regulating interstate transmission of the Nation's electricity, natural gas and oil. In addition, the Commission licenses and inspects private, municipal and state hydroelectric projects. To achieve its mission, the Commission relies

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

NCSec: a national cyber security referential for the development of a code of practice in national cyber security management  

Science Conference Proceedings (OSTI)

Governments worldwide have faced computer security challenges. These challenges are serious in a context where there is an absence of appropriate organizational and institutional structures to deal with incidents. But more important which agency or agencies ... Keywords: ISO27002, cyber criminality, cyber security, organizational structure, referential

Mohamed Dafir Ech-cherif el Kettani; Taieb Debbagh

2008-12-01T23:59:59.000Z

202

Acquisition Guide Chapter 42.5  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 42.5 Chapter 42.5 (February 2012) 1 CONTRACT MANAGEMENT PLANNING Applicability: This section is applicable to the contracting activities of the Department of Energy (DOE). References:  FAR 46.4, "Government Contract Quality Assurance"  FAR 42, Contract Administration and Auditing Services  FAR 43, Contract Modifications  DEAR 970.1100-1, "Performance-based Contracting"  DOE Acquisition Guide, Chapter 7.1, "Acquisition Planning"  DOE Acquisition Guide, Chapter 37, "Service Contracting"  DOE Acquisition Guide Chapter 43.2, "Change Order Template"  DOE O 413.3B, "Program and Project Management for the Acquisition of Capital Assets"

203

ACQUISITION PLANNING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

--Chapter 7.1 (JUNE 2010) --Chapter 7.1 (JUNE 2010) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR Subpart 17.6 Management and Operating Contracts 11. FAR Part 19 Small Business Programs 12. FAR 25.802(a)(2) Other International Agreements and Coordination Guiding Principles

204

ACQUISITION PLANNING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PLANNING PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 6 Competition Requirements 4. FAR Part 7 Acquisition Planning 5. FAR Part 8 Required Sources of Supply 6. FAR Part 9 Contractor Qualifications 7. FAR Part 10 Market Research 8. FAR Part 11 Describing Agency Needs 9. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 10. FAR Subpart 16.1 Selecting Contract Types 11. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 12. FAR 17 Special Contracting Methods 13. FAR Part 19 Small Business Programs 14. FAR 25.802(a)(2) Other International Agreements and Coordination 15. FAR 34.004 Acquisition Strategy

205

CyberGIS software: a synthetic review and integration roadmap  

Science Conference Proceedings (OSTI)

CyberGIS defined as cyberinfrastructure-based geographic information systems (GIS) has emerged as a new generation of GIS representing an important research direction for both cyberinfrastructure and geographic information science. This study introduces a 5-year effort funded by the US National Science Foundation to advance the science and applications of CyberGIS, particularly for enabling the analysis of big spatial data, computationally intensive spatial analysis and modeling (SAM), and collaborative geospatial problem-solving and decision-making, simultaneously conducted by a large number of users. Several fundamental research questions are raised and addressed while a set of CyberGIS challenges and opportunities are identified from scientific perspectives. The study reviews several key CyberGIS software tools that are used to elucidate a vision and roadmap for CyberGIS software research. The roadmap focuses on software integration and synthesis of cyberinfrastructure, GIS, and SAM by defining several key integration dimensions and strategies. CyberGIS, based on this holistic integration roadmap, exhibits the following key characteristics: high-performance and scalable, open and distributed, collaborative, service-oriented, user-centric, and community-driven. As a major result of the roadmap, two key CyberGIS modalities gateway and toolkit combined with a community-driven and participatory approach have laid a solid foundation to achieve scientific breakthroughs across many geospatial communities that would be otherwise impossible.

Wang, Shaowen [University of Illinois, Urbana-Champaign; Anselin, Luc [Arizona State University; Bhaduri, Budhendra L [ORNL; Cosby, Christopher [University Navstar Consortium, Boulder, CO; Goodchild, Michael [University of California, Santa Barbara; Liu, Yan [University of Illinois, Urbana-Champaign; Nygers, Timothy L. [University of Washington, Seattle

2013-01-01T23:59:59.000Z

206

Acquisition News  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

acquisition-news Office of Environmental Management acquisition-news Office of Environmental Management 1000 Independence Ave., SW Washington, DC 20585 202-586-7709 en Contract Awarded for Environmental Technical Services http://energy.gov/em/articles/contract-awarded-environmental-technical-services Contract Awarded for Environmental Technical Services

207

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards implemented in smart grids. The created overview is based on semi-structured interviews with 13 experts originating from eight different European countries. These participants are employed at electricity producers, grid operators, technology consultants and technology providers in the utilities sector. Their expertise ranges from information security to electricity grids, specifically smart grid security. Some of them are members of smart grid security related standard committees. The key results of the state of practice are the following: 1. The interconnectivity of the smart grid with multiple stakeholders and European colleagues is indicated as the biggest threat to the security of the smart grid. 2. Another often mentioned threat is awareness. The experts generally indicate that awareness within top management is high. However, personnel on lower levels are reluctant to incorporate security in their processes. 3. All organizations are in a certain stage of implementing standards, the ISO27000 series

Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper; Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper

2012-01-01T23:59:59.000Z

208

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

209

Green Lease Policies and Procedures for Lease Acquisition | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Centers Field Sites Power Marketing Administration Other Agencies You are here Home Green Lease Policies and Procedures for Lease Acquisition Green Lease Policies and...

210

EIA-856 MONTHLY FOREIGN CRUDE OIL ACQUISITION REPORT INSTRUCTIONS  

U.S. Energy Information Administration (EIA)

EIA-856, Monthly Foreign Crude Oil Acquisition Report Page 1 U. S. DEPARTMENT OF ENERGY ENERGY INFORMATION ADMINISTRATION Washington, D. C. 20585

211

Energy Information Administration/Petroleum Marketing Annual  

Annual Energy Outlook 2012 (EIA)

Sources: Energy Information Administration, Form EIA-182, "Domestic Crude Oil First Purchase Report"; Form EIA-856, "Monthly Foreign Crude Oil Acquisition Report"; and Form...

212

Office of Acquisition Management (OAM) | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

of Acquisition Management (OAM) | National Nuclear Security of Acquisition Management (OAM) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Acquisition Management (OAM) Home > About Us > Our Operations > Acquisition and Project Management > Office of Acquisition Management (OAM) Office of Acquisition Management (OAM) Office of Acquisition Management (OAM)

213

Office of Acquisition Management (OAM) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

of Acquisition Management (OAM) | National Nuclear Security of Acquisition Management (OAM) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Acquisition Management (OAM) Home > About Us > Our Operations > Acquisition and Project Management > Office of Acquisition Management (OAM) Office of Acquisition Management (OAM) Office of Acquisition Management (OAM)

214

Memorandum for Chief Acquisition Officers, Senior Procurement Executives  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 6, 2008 June 6, 2008 MEMORANDUM FOR CHIEF ACQUISITION OFFICERS SENIOR PROCUREMENT EXECUTIVES FROM: Paul A. Denett Administrator SUBJECT: Improving the Management and Use of Interagency Acquisitions Interagency acquisitions offer important benefits to federal agencies, including economies and efficiencies and the ability to leverage resources. The attached guidance is intended to help agencies achieve the greatest value possible from interagency acquisitions. Effective management and use of interagency acquisitions is a shared responsibility, especially for assisted acquisitions. Lack of clear lines of responsibility between agencies with requirements (requesting agencies) and the agencies which provide acquisition support and

215

Administrator - Energy Information Administration  

U.S. Energy Information Administration (EIA)

www.eia.gov Adam Sieminski Administrator Biography Adam Sieminski was sworn in on June 4, 2012, as the eighth administrator of the U.S. Energy Information ...

216

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

217

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

218

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

219

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

220

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

with the CCD have created a reputation on college campuses of Sandia as leader in cyber security. Interactions between the diverse group of students in the CCD has cultivated...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Us Screen reader users: click here for plain HTML Go to Google Maps Home The Center for Cyber Defenders Loading... Still loading... Slow? Use the troubleshooting guide or basic...

222

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

III. Theme The theme for the 2009 Summer Takin' It to the Streets awareness event is "Shape Up...Get Cyber Fit." 3 7222009 Last update: 5312011 IV. Audience The intended...

223

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

224

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the...

225

UPBOT: a testbed for cyber-physical systems  

Science Conference Proceedings (OSTI)

Developing software for cyber-physical systems presents a unique challenge. These systems are not simply software; they are composed of software running on a collection of machines that present a risk to human safety if anything goes wrong. Researchers ...

Tanya L. Crenshaw; Steven Beyer

2010-08-01T23:59:59.000Z

226

Microsoft Word - Cyber Security Strat Plan final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

R R A A T T E E G G I I C C P P L L A A N N FEBRUARY 12, 2007 CYBER SECURITY STRATEGIC PLAN VERSION 1.0 2 Table of Contents INTRODUCTION ......

227

Loosely time-triggered architectures for cyber-physical systems  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems require distributed architectures to support safety critical real-time control. Kopetz' Time-Triggered Architectures (TTA) have been proposed as both an architecture and a comprehensive paradigm for systems architecture, for such ...

Albert Benveniste

2010-03-01T23:59:59.000Z

228

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

229

Towards A Network-of-Networks Framework for Cyber Security  

Science Conference Proceedings (OSTI)

Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

2013-06-07T23:59:59.000Z

230

Cyber Security Solutions for Instrumentation and Control Systems  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection standards requirements of the North American Electric Reliability Corporation and related requirements in the international community. Compliance with ...

2012-12-12T23:59:59.000Z

231

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

232

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

233

Cyber Security Strategy Guidance for the Electric Sector  

Science Conference Proceedings (OSTI)

Smart grid technologies are introducing millions of new intelligent components to the electric grid that communicate in much more advanced ways (two-way communication, dynamic optimization, and wired and wireless communications) than in the past. Cyber security is important because the bi-directional flow of two-way communication and the control capabilities in the smart grid will enable an array of new functionalities and applications. Two areas of critical importance for the smart grid are cyber securi...

2012-05-30T23:59:59.000Z

234

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

235

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing discl

2009-10-01T23:59:59.000Z

236

Experiences and Challenges with Using Cert Data to Analyze International Cyber Security  

E-Print Network (OSTI)

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...

Madnick, Stuart

237

Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry  

SciTech Connect

This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

Akyol, Bora A.

2012-09-01T23:59:59.000Z

238

Cyber Security ProcurementApplication of the Methodology, Third Example: Digital Feedwater Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements to new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can result in costly retrofits to meet the ...

2013-12-19T23:59:59.000Z

239

Cyber Security Procurement - Application of the Methodology, Second Example: Feedpump Turbine Speed Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls owing to a lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-20T23:59:59.000Z

240

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. It is necessary to have analytical tools to help analysts identify anomalies that span seconds, days, and weeks. Unfortunately, providing analytical tools effective access to the volumes of underlying data requires novel architectures, which is often overlooked in operational deployments. Our work is focused on a summary record of communication, called a flow. Flow records are intended to summarize a communication session between a source and a destination, providing a level of aggregation from the base data. Despite this aggregation, many enterprise network perimeter sensors store millions of network flow records per day. The volume of data makes analytics difficult, requiring the development of new techniques to efficiently identify temporal patterns and potential threats. The massive volume makes analytics difficult, but there are other characteristics in the data which compound the problem. Within the billions of records of communication that transact, there are millions of distinct IP addresses involved. Characterizing patterns of entity behavior is very difficult with the vast number of entities that exist in the data. Research has struggled to validate a model for typical network behavior with hopes it will enable the identification of atypical behavior. Complicating matters more, typically analysts are only able to visualize and interact with fractions of data and have the potential to miss long term trends and behaviors. Our analysis approach focuses on aggregate views and visualization techniques to enable flexible and efficient data exploration as well as the capability to view trends over long periods of time. Realizing that interactively exploring summary data allowed analysts to effectively identify events, we utilized multidimensional OLAP data cubes. The data cube structure supports interactive analysis of summary data across multiple dimensions, such as location, time, and protocol. Cube technology also allows the analyst to drill-down into the underlying data set, when events of interest are identified and detailed analysis is required. Unfortunately, when creating these cubes, we ran into significant performance issues with our initial architecture, caused by a combination of the data volume and attribute characteristics. Overcoming, these issues required us to develop a novel, data intensive computing infrastructure. In particular, we ended up combining a Netezza Twin Fin data warehouse appliance, a solid state Fusion IO ioDrive, and the Tableau Desktop business intelligence analytic software. Using this architecture, we were able to analyze a month's worth of flow records comprising 4.9B records, totaling approximately 600GB of data. This paper describes our architecture, the challenges that we encountered, and the work that remains to deploy a fully generalized cyber analytical infrastructure.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

ADMINISTRATIVE RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: 3: PROCUREMENT, SUPPLY, AND GRANT RECORDS July 2008 Revision 2 Procurement and supply records document the acquisition of goods and non-personal services, controlling the volume of stock on hand, reporting procurement needs, and related supply matters which are part of daily procurement operations. The basic procurement files reflect a considerable range of procedure, from simple, small purchases to complicated prime contractor and subcontractor operations. Any records created prior to 1895 must first be offered to the National Archives and Records Administration (NARA) for appraisal before applying the disposal instructions. Frequently copies of procurement papers become integral parts of other files, such as project files of various types or general subject files pertaining to program operations;

242

Cumulative strategic capability and performance of early movers and followers in the cyber market  

Science Conference Proceedings (OSTI)

Today, the cyber market is evolving rapidly in the networked age. In the cyber market, the traditional competitive strategy appears to no longer be effective. This study investigates the strategic choice differences of online firms based on their strategic ... Keywords: Cyber market, Early mover, Follower, Porter's generic strategies, Sand Cone model

Sang-Gun Lee; Chulmo Koo; Kichan Nam

2010-06-01T23:59:59.000Z

243

On the impact of physical-cyber world interactions during unexpected events  

Science Conference Proceedings (OSTI)

Physical world events have a strong and direct impact on the communication activity seen in the cyber world. In this paper, we present three physical world events where we conducted passive network traffic measurements to study the interaction between ... Keywords: cyber world behavior, cyber-physical world interactions, emergency response, high network traffic deviation, non-invasive network measurement, unexpected events, wireless mesh networks

B. S. Manoj; Bheemarjuna Reddy Tamma; Ramesh R. Rao

2011-12-01T23:59:59.000Z

244

or are "Cyberspace " and "Cyber Space " the same?  

E-Print Network (OSTI)

This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining " whereby hundreds of thousands of documents (such as journal articles) are scanned and relationships amongst words and phrases are established and (2) applying these tools in support of the Explorations in Cyber International Relations (ECIR) research effort. In international relations, it is important that all the parties understand each other. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. As an example, when we started, we assumed that "cyberspace " and "cyber space " were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between "cyber " and "space") and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the taxonomies that would be constructed by our algorithms using "cyberspace " and "cyber space " as seed terms would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cyber international relations is so new, understanding the field and how people think about (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal as part of the overall ECIR project. 1.

Steven Camia; Stuart Madnick; Nazli Choucri; Wei Lee Woon; Steven Camia; Wei Lee Woon

2011-01-01T23:59:59.000Z

245

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

246

A Cyber-Physical Experimentation Environment for the Security Analysis  

E-Print Network (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICS), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these systems. This paper presents an innovative framework for an experimentation environment that can reproduce concurrently physical and cyber systems. The proposed approach uses an emulation testbed based on Emulab to recreate cyber components and a real-time simulator, based on Simulink, to recreate physical processes. The main novelty of the proposed framework is that it provides a set of experimental capabilities that are missing from other approaches, e.g. safe experimentation with real malware, flexibility to use different physical processes. The feasibility of the approach is confirmed by the development of a fully functional prototype, while its applicability is proven through two case studies of industrial systems from the electrical and chemical domain.

Bla Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-01-01T23:59:59.000Z

247

Evaluation Report on The Department's Unclassified Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

248

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

249

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

250

Human dimensions in cyber operations research and development priorities.  

SciTech Connect

Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey [Institute for Human and Machine Cognition] Institute for Human and Machine Cognition

2012-11-01T23:59:59.000Z

251

Acquisition Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

.4 (February 20 10) .4 (February 20 10) Source Evaluation Board (SEB) Secretariat and Knowledge Manager Guiding Principles P Establishment of a SEB Secretariat and Knowledge Management position will improve both the Department's procurement system and its management of knowledge attained by the Department's procurement personnel. REFERENCES Department of Energy (DOE) report on "Report on Reengineering the Business Clearance Process" issued November 2007 National Academy of Public Administration report on "Managing at the Speed of Light - Improving Mission Support Performance" issued July 2009 Government Accountability Office (GAO) report on "Better Performance Measures and Management Needed to Address Delays in Awarding Contracts (GAO-06-722)" issued June

252

ADMINISTRATIVE RECORDS SCHEDULE 11:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ADMINISTRATIVE RECORDS SCHEDULE 11: ADMINISTRATIVE RECORDS SCHEDULE 11: SPACE AND MAINTENANCE RECORDS June 2007 Revision 1 This schedule provides for the disposal of all copies, wherever located in the Department, of records relating to space and maintenance, except as indicated below. Records documenting these functions pertain to the acquisition, allocation, utilization, and release of space and include related correspondence and reports submitted to the General Services Administration (or equivalent agency with similar Government-wide responsibilities) as directed by law and regulation (41 CFR 101-17); correspondence and forms relating to the compilation of directory service listings; identification credentials and related accountable records; requests for building and equipment services;

253

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

254

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

255

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

256

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

257

Acquisition Certifications Program Handbook  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) Acquisition Career Management Program (ACMP) was established to provide a formal, structured approach to certification of DOEs acquisition workforce.

258

Contacts for E-Gov | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts for E-Gov CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

259

Contacts for IT Project Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

IT Project Management CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

260

Contacts for IT Planning | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

for IT Planning CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Contact Us | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Us Contact Us CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

262

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

263

Acquisition Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 71.1 (June 2010) Chapter 71.1 (June 2010) 1 HEADQUARTERS BUSINESS CLEARANCE PROCESS Overview This guide chapter provides guidance regarding the policies and procedures governing the Headquarters Business Clearance Review (BCR) process, the process by which certain procurement actions (solicitations, contracts, major contract changes, etc.) are reviewed and approved by the DOE Senior Procurement Executive (SPE) as a condition precedent to executing them. This section does not apply to the National Nuclear Security Administration (NNSA). Separate NNSA coverage is in BOP-003 and BOP-304. Background A. The Flow of Procurement Authority within the Department of Energy (DOE) The Secretary of Energy designated the Director, Office of Procurement and Assistance

264

The development of cyber security warning, advice and report points  

Science Conference Proceedings (OSTI)

The threat to electronic information systems increasingly has origins in organised crime or nation-state sponsored or supported activity. Any successful cyber security programme relies upon the sharing of information. How this is achieved is a question ... Keywords: information sharing, security information, warning advice and reporting points

Tony Proctor

2012-10-01T23:59:59.000Z

265

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

266

Cyber-sustainability: leaving a lasting legacy of human wellbeing  

Science Conference Proceedings (OSTI)

This paper presents a case for the importance of sustainability in HCI as it relates to the Web. So far, the discussion about sustainability in HCI has focused on environmental aspects. However, our belief is that cyber-sustainability is much greater ... Keywords: cyberspace, design, environment, sustainability, wellbeing, worldview

Bran Richards; Stuart Walker; Lynne Blair

2011-07-01T23:59:59.000Z

267

Survey Cyber security in the Smart Grid: Survey and challenges  

Science Conference Proceedings (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, ... Keywords: Attacks and countermeasures, Cryptography, Cyber security, Security protocols, Smart Grid

Wenye Wang; Zhuo Lu

2013-04-01T23:59:59.000Z

268

Overcoming performance collapse for 100Gbps cyber security  

Science Conference Proceedings (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

269

The Cyber Threat to National Critical Infrastructures: Beyond Theory  

Science Conference Proceedings (OSTI)

Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now include peacetime attacks from anonymous computer hackers. Current events, including examples from Israel and Estonia, prove that a certain ... Keywords: Estonia, business continuity and disaster recover planning, critical, cyber, infrastructure, security architecture and design, telecommunications and network security threat

Kenneth Geers

2009-01-01T23:59:59.000Z

270

Ideal based cyber security technical metrics for control systems  

Science Conference Proceedings (OSTI)

Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the ... Keywords: control system security, cyber security metrics

Wayne Boyer; Miles McQueen

2007-10-01T23:59:59.000Z

271

Cyber-physical systems for next generation intelligent buildings  

Science Conference Proceedings (OSTI)

The proliferation of the smart grid creates new opportunities for large buildings to act as smart end-points that provide mutually beneficial services for building occupants and the grid. In this article we describe how Cyber-Physical systems that provide ...

Andreas Savvides; Ioannis Paschalidis; Michael Caramanis

2011-06-01T23:59:59.000Z

272

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy, mitigation, and resilience ­ is among the most important R&D needs for the emerging smart grid. One

273

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy important R&D needs for the emerging smart grid. One of the overarching goals of the future research

274

Federal Acquisition Circular 2005-36  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Acquisition Circular 2005-36 Federal Acquisition Circular 2005-36 Item Subject FAR case I.............. Federal Technical Data Solution (FedTeDS) 2008-038 II............. Fair Labor Standards Act and Service Contract 2007-021 Act Price Adjustment Clauses. III............ New Designated Country-Taiwan 2009-014 IV............. Prohibition on Restricted Business Operations 2008-004 in Sudan and Imports from Burma. V.............. List of Approved Attorneys, Abstractors, and 2006-013 Title Companies. VI............. Cost Accounting Standards (CAS) 2007-002 Administration and Associated Federal Acquisition Regulation Clauses. VII............ Technical Amendments

275

Cyber Criminals on the Internet Super Highways: A Technical Investigation of Different Shades and Colours within the Nigerian Cyber Space  

Science Conference Proceedings (OSTI)

The internet has impacted the lives of individuals, organisations, and governments all over the world. However, it is now viewed and adopted with caution due mainly to the criminal tendencies of some misguided elements within the society. The internet ... Keywords: Cyber Crimes, E-Mails, Internet, Nigeria, Stakeholders

Edwin Agwu

2013-04-01T23:59:59.000Z

276

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

277

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

278

Sustainable Acquisition Coding System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents & Publications Policy...

279

Cyber Security Procurement - Application of the Methodology, First Example: Single Loop  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfits to meet the requirements.The ...

2013-07-29T23:59:59.000Z

280

Technical Guideline for Cyber Security Requirements and Life Cycle Implementation Guidelines for Nuclear Plant Digital Systems  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This EPRI guideline document provides technical guidance for addressing c...

2010-10-29T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Aspects of Holly Corporation's Acquisition of Sunoco Inc.'s Tulsa, Oklahoma Refinery  

Reports and Publications (EIA)

The Energy Information Administration has produced a review of aspects of the Holly's acquisition of Sunoco's 85,000-barrels-per-day Tulsa refinery

Neal Davis

2009-04-22T23:59:59.000Z

282

EOTA Support Services Contract Acquisition  

NLE Websites -- All DOE Office Websites (Extended Search)

Emergency Operations Training Academy (EOTA) Support Services Contract Emergency Operations Training Academy (EOTA) Support Services Contract Acquisition Welcome to the EOTA Support Services Contract Acquisition page. The U.S. Department of Energy National Nuclear Security Administration, EOTA requires support services to implement a comprehensive professional training development program to NNSA HQs and site office personnel. EOTA's training center located in Albuquerque, NM develop, coordinates, delivers, and certifies related emergency operations/management training at other NNSA site Offices located through out the country. EOTA ensures the effective and efficient training of emergency operations personnel throughout the DOE who are or may become involved in the planning, preparedness, and response of vital national resources. The EOTA provides

283

Cyber-Enabled Ab Initio Simulations in Nanohub.org: Simulation ...  

Science Conference Proceedings (OSTI)

This presentation describes recent progress in cyber-enabling ab initio codes and in the development and deployment of supporting material and learning...

284

Agenda for the Designed-in Cybersecurity for Cyber-Physical ...  

Science Conference Proceedings (OSTI)

Page 1. Designed-in Cybersecurity for Cyber-Physical Systems Workshop Thursday, April 4, 2013 8:00 Breakfast 9:00 Plenary ...

2013-04-03T23:59:59.000Z

285

DOE O 205.1B Chg 2, Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. ...

2011-05-16T23:59:59.000Z

286

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

287

Data Diodes in Support of Trustworthy Cyber Infrastructure  

SciTech Connect

Interconnections between process control networks and en- terprise networks has resulted in the proliferation of stan- dard communication protocols in industrial control systems which exposes instrumentation, control systems, and the critical infrastructure components they operate to a variety of cyber attacks. Various standards and technologies have been proposed to protect industrial control systems against cyber attacks and to provide them with confidentiality, in- tegrity, and availability. Among these technologies, data diodes provide protection of critical systems by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to un- derstand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we briefly review the security challenges in an industrial control system, study data diodes, their functionalities and limitations, and pro- pose a scheme for their effective deployment in trusted pro- cess control networks (TPCNs.)

Sheldon, Frederick T [ORNL; Okhravi, Hamed [ORNL

2010-01-01T23:59:59.000Z

288

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

289

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

290

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

291

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

292

A Comparison of Cross-Sector Cyber Security Standards  

Science Conference Proceedings (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

293

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

294

Framework for Evaluating Cyber Security Posture for Power Delivery Systems  

Science Conference Proceedings (OSTI)

While many asset owners and operators are performing self-assessments of their control systems, the methods used vary widely across the electric sector. This lack of consistent criteria and metrics makes it difficult to benchmark and compare the cyber security posture of power delivery systems.The objective of this technical update is to develop an evaluation framework that uses both the Department of Energy (DOE) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) ...

2013-11-28T23:59:59.000Z

295

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

296

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

297

Acquisition Management Division  

Science Conference Proceedings (OSTI)

... Welcome to the NIST Acquisitions information page. MISSION. The ... 6335. Information Technology Team Leader (301) 975-6324. ...

2012-07-06T23:59:59.000Z

298

Acquisition of Real Property | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition of Real Property Acquisition of Real Property Acquisition of Real Property Acquisition of Real Property Memorandum of Understanding Between the U.S. Department of Energy and the U.S. Department of Army Amendment to the Memorandum of Understanding Between the U.S. Department of Energy and the U.S. Department of Army Standard Form 118 and 118A Report of Excess Real Property Forms Requirements: Document Title P.L. 106-580 Federal Property and Administrative Services Act of 1949, As Amended P.L. 95-91, Section 647 U.S. Department of Energy Organization Act P.L. 83-703 (68 Stat. 919), Section 161g Grants Special Authority as Required in the Act to Acquire, Sell, Dispose, etc., of Real Property in Furtherance of the Department's Mission (Under the Atomic Energy Act of 1954)

299

Reasons for ERP Acquisition  

E-Print Network (OSTI)

Abstract: Numerous reasons for Enterprise Resource Planning (ERP) system acquisitions in organizations have been proposed in the prior research. In this paper these different reasons for ERP system acquisitions are synthesized and categorized into technological and business reasons. Further, the prevalence of the different reasons is explored with an empirical data concerning the ERP acquisition in 41 Finnish companies. 1.

Petri Hallikainen; Sanna Laukkanen; Sami Sarpola

2004-01-01T23:59:59.000Z

300

Data Acquisition Interpretation  

E-Print Network (OSTI)

Data Acquisition Inversion Interpretation Discussion Virgin River DCIP Report Justin Granek1 1 Report #12;Data Acquisition Inversion Interpretation Discussion Outline 1 Data Acquisition Location Survey Specications 2 Inversion Data Errors DCIP2D DCIP3D 3 Interpretation Correlations Snowbird Tectonic

Oldenburg, Douglas W.

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

GridStat Cyber Security and Regional Deployment Project Report  

Science Conference Proceedings (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

302

A Novel Cyber-Insurance for Internet Security  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

Pal, Ranjan; Psounis, Konstantinos

2011-01-01T23:59:59.000Z

303

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OPAM Policy Acquisition Guides OPAM Policy Acquisition Guides Acquisition Guides OPAM Policy Acquisition Guides More Documents & Publications Acquisition, Use, and Disposal of Real...

304

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OPAM Policy Acquisition Guides OPAM Policy Acquisition Guides Acquisition Guides OPAM Policy Acquisition Guides More Documents & Publications Chapter 1 - Acquisition Regulations...

305

DEPARTMENT OF DEFENSE GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14 Federal Register / Vol. 75, No. 130 /Thursday, July 8, 2010 /Rules and Regulations 14 Federal Register / Vol. 75, No. 130 /Thursday, July 8, 2010 /Rules and Regulations DEPARTMENT OF DEFENSE GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 48 CFR Chapter 1 [Docket FAR-20104076, Sequence 61 Federal Acquisition Regulation; Federal Acquisition Circular 2005-44; Introduction AGENCY: Department of Defense (DoD), General Services Administration (GSA), and National Aeronautics and Space DATES:, For effective date, see separate Administration INASAI. document, which follows. ACTION: Summary presentation of an interim rule. SUMMARY: This document summarizes the Federal Acquisition Regulation (FAR) rule agreed to by the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council in this Federal Acquisition

306

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

307

Virtual Queue Based Distributed Data Traffic Scheduling for Cyber Physical Systems with Application in Smart Grid  

Science Conference Proceedings (OSTI)

Communication is needed in cyber physical system (CPS) to convey information from sensors to controllers. In this paper, a wireless network is considered to serve as the communication infrastructure in CPS. The data traffic scheduling problem is studied ... Keywords: Kalman filtering, cyber physical system, scheduling

Husheng Li

2012-06-01T23:59:59.000Z

308

Toward a cyber-physical topology language: applications to NERC CIP audit  

Science Conference Proceedings (OSTI)

Our Cyber-Physical Topology Language (CPTL) provides a language that utilities can use to programmatically analyze current and future cyber-physical architectures. The motivation for our research emerged from the importance and limitations of several ... Keywords: NERC CIP, audit, graph theory

Gabriel A. Weaver, Carmen Cheh, Edmond J. Rogers, William H. Sanders, Dennis Gammel

2013-11-01T23:59:59.000Z

309

Modeling Effects of Physical Factors on Controller Area Network in Cyber-physical Systems  

Science Conference Proceedings (OSTI)

Cyber-physical systems (CPS) are becoming a promising research field to integrate the computing components, the physical processes, and the communication networks. A primary challenge in designing CPS is to understand the effect of physical factors on ... Keywords: Cyber-physical systems (CPS), Controller Area Network (CAN), performance analysis, temperature, electromagnetic interference

Bo Shen, Xingshe Zhou, Ru Wang

2013-08-01T23:59:59.000Z

310

Routing in Cyber Physical Systems with Application for Voltage Control in Microgrids: A Hybrid System Approach  

Science Conference Proceedings (OSTI)

A key challenge of cyber physical system is how to design the communication system. In this paper, the framework of hybrid system which consists of both continuous and discrete system states is adopted for the communication system design, particularly ... Keywords: cyber physical system, hybrid systems, routing

Husheng Li; Robert C. Qiu; Zhiqiang Wu

2012-06-01T23:59:59.000Z

311

Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems  

Science Conference Proceedings (OSTI)

This volume contains the papers presented at the Fourth IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS 2013), which was held with the Cyber- Physical Systems Week in Philadelphia, USA, on 8-11 April 2013. ICCPS has been the flagship ...

Chenyang Lu, P. R. Kumar, R. Stoleru

2013-04-01T23:59:59.000Z

312

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations  

Science Conference Proceedings (OSTI)

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization ... Keywords: China, Cyber-security, Cyber-security related alliances, Cybercrime, International relations, International trade, Intrinsic and extrinsic motivations

Nir Kshetri

2013-03-01T23:59:59.000Z

313

Integrating CyberGIS gateway with Windows Azure: a case study on MODFLOW groundwater simulation  

Science Conference Proceedings (OSTI)

The CyberGIS Gateway represents a cutting-edge cyberin-frastructure-based geographic information system that facilitates computationally intensive and collaborative spatial analysis and modeling. As more and more geospatial problems are becoming increasingly ... Keywords: CyberGIS, MODFLOW, Windows Azure, cloud computing, science gateway

Babak Behzad; Anand Padmanabhan; Yong Liu; Yan Liu; Shaowen Wang

2011-11-01T23:59:59.000Z

314

Survey Paper Cyber security in the Smart Grid: Survey and challenges q  

E-Print Network (OSTI)

Survey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu Accepted 29 December 2012 Available online 17 January 2013 Keywords: Smart Grid Cyber security Attacks and countermeasures Cryptography Security protocols a b s t r a c t The Smart Grid, generally referred to as the next

Wang, Wenye

315

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

316

Cyber Science and Security - An R&D Partnership at LLNL  

Science Conference Proceedings (OSTI)

Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

Brase, J; Henson, V

2011-03-11T23:59:59.000Z

317

Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse  

SciTech Connect

The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

Czejdo, Bogdan [ORNL; Ferragut, Erik M [ORNL; Goodall, John R [ORNL; Laska, Jason A [ORNL

2012-01-01T23:59:59.000Z

318

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

319

Smart Grid Cyber Security Strategy and Requirements  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 305 pages (February 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

The Smart; Grid Interoperability

2010-01-01T23:59:59.000Z

320

Acquisition Conflict Resolution  

Acquisition Conflict Resolution At the option of the Supplier, a concern may be brought to the Ombuds Office or may be taken to the Internal Conflict Resolution Process

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Announcements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Announcements | National Nuclear Security Administration Announcements | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Announcements Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Announcements

322

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

323

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

324

Alternative Financing - New Acquisition Guide Subchapter | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Alternative Financing - New Acquisition Guide Subchapter Alternative Financing - New Acquisition Guide Subchapter policy flash Alternative Financing - New Acquisition Guide...

325

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

326

Federal Acquisition Regulations Federal Acquisition Circular 2005-51 Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Regulations Regulations Federal Acquisition Circular 2005-51 Summary Federal Register April 1, 2011 76FR 18304 I Women-Owned Small Business (WOSB) Program (Interim Rule). II Clarification of Standard Form 26--Award/Contract. Item I--Women-Owned Small Business (WOSB) Program (FAR Case 2010-015) (Interim) This interim rule amends the FAR to add subpart 19.15, Women-Owned Small Business Program, which will assist Federal agencies in achieving the 5 percent statutory goal for contracting with women-owned small business (WOSB) concerns. Agencies may restrict competition to economically disadvantaged women-owned small business (EDWOSB) concerns for contracts assigned a North American Industry Classification Systems (NAICS) code in an industry in which the Small Business Administration has

327

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OPAM Policy Acquisition Guides OPAM Policy Acquisition Guides Acquisition Guides OPAM Policy Acquisition Guides More Documents & Publications Chapter 31 - Contract Cost Principles...

328

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OPAM Policy Acquisition Guides OPAM Policy Acquisition Guides Acquisition Guides OPAM Policy Acquisition Guides More Documents & Publications Chapter 26 - Other Socioeconomic...

329

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OPAM Policy Acquisition Guides OPAM Policy Acquisition Guides Acquisition Guides OPAM Policy Acquisition Guides More Documents & Publications PolFlash10-31attach2.pdf OPAM Policy...

330

Policy Flash 2013-30 Acquisition Letter on Acquisition Planning  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 Acquisition Letter on Acquisition Planning 0 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Attached is Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Questions concerning this policy flash should be directed to Jason Taylor of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at (202) 287-1560 or at jason.taylor@hq.doe.gov. Policy Flash_MO Acq Planning AL.pdf AL_ 2013-03 Acq Planning_MO.pdf More Documents & Publications Attachment FY2011-09(3) Policy Flash 2013-78 Acquisition Guide Chapter 7.3 Acquisition Planning in

331

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

332

A cyber-physical experimentation environment for the security analysis of networked industrial control systems  

Science Conference Proceedings (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these ...

BLa Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-09-01T23:59:59.000Z

333

Effective real-world project collaboration: Strategies from a cyber security degree program  

Science Conference Proceedings (OSTI)

The undergraduate degree of computer and cyber security has been offered at the School of Information Technology, Phetchaburi Rajabhat University, Thailand since 2005. Our program requires direct field experience when students are taking upper-level ...

Wajee Chookittikul; Peter E. Maher

2011-05-01T23:59:59.000Z

334

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of sustainable energy systems. The second webinar, Cyber-Physical Systems Security for the Smart Grid, will be held on Fecruary 7, 2012 by Manimaran Govindarasu, Professor if Electrical and Computer Engineering at Iowa State University. Govindarasu_PSERC_Webinar_Feb_2012.pdf More Documents & Publications April 2012 PSERC Webinars on Issues in Designing the Future Grid

335

Multimodal Gumdo Game: The Whole Body Interaction with an Intelligent Cyber Fencer  

Science Conference Proceedings (OSTI)

This paper presents an immersive multimodal Gumdo simulation game that allows a user to experience the whole body interaction with an intelligent cyber fencer. The proposed system consists of three modules: (i) a nondistracting multimodal interface with ...

Jungwon Yoon; Sehwan Kim; Jeha Ryu; Woontack Woo

2002-12-01T23:59:59.000Z

336

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network (OSTI)

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

337

Researchers develop new search tool to help fight child porn, catch cyber  

E-Print Network (OSTI)

Researchers develop new search tool to help fight child porn, catch cyber thieves Canada Standard a comment... Post to Facebook 0 0 New #12;Researchers develop new search tool to help fight child porn

Fung, Benjamin C. M.

338

Pricing and Investments in Internet Security: A Cyber-Insurance Perspective  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important research problem is the analysis of optimal user self-defense investments and cyber-insurance contracts under the Internet environment. In this paper, we investigate two problems and their relationship: 1) analyzing optimal self-defense investments in the Internet, under optimal cyber-insurance coverage, where optimality is an insurer objective and 2) designing optimal cyber-insurance contracts for Internet users, where a contract is a (premium, coverage) pair.

Pal, Ranjan

2011-01-01T23:59:59.000Z

339

SU?FF?T?388: Secondary Radiation Doses From CyberKnife SRS/RT  

Science Conference Proceedings (OSTI)

Purpose: Because of extensive use of conventional x?rays in CyberKnife SRS/RT for treatment tracking and large number of monitor units (MU) in beam delivery

C Yu

2006-01-01T23:59:59.000Z

340

CyberShake 3.0: Physics-based Probabilistic Seismic Hazard Analysis...  

NLE Websites -- All DOE Office Websites (Extended Search)

CyberShake 3.0: Physics-based Probabilistic Seismic Hazard Analysis PI Name: Thomas Jordan PI Email: tjordan@usc.edu Institution: University of Southern California Allocation...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

CyberShake3.0: Physics-Based Probabilistic Seismic Hazard Analysis...  

NLE Websites -- All DOE Office Websites (Extended Search)

CyberShake3.0: Physics-Based Probabilistic Seismic Hazard Analysis PI Name: Thomas Jordan PI Email: tjordan@usc.edu Institution: University of Southern California Allocation...

342

Analyzing resiliency of the smart grid communication architectures under cyber attack  

Science Conference Proceedings (OSTI)

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an ...

Anas AlMajali; Arun Viswanathan; Clifford Neuman

2012-08-01T23:59:59.000Z

343

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

344

Stability of a cyber-physical smart grid system using cooperating invariants  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPS) consist of computational components interconnected by computer networks that monitor and control switched physical entities interconnected by physical infrastructures. Ensuring stability and correctness (both logical and ...

Ashish Choudhari, Harini Ramaprasad, Tamal Paul, Jonathan W. Kimball, Maciej Zawodniok, Bruce McMillin, Sriram Chellappan

2013-04-01T23:59:59.000Z

345

Acquisition and the Environment  

Energy.gov (U.S. Department of Energy (DOE))

The information provide on these pages are meant to be resource and tool for the DOE acquisition community. Please share suggestions for its further development and improvement. Provide your...

346

OPAM Policy Acquisition Guides  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

17.3 (February 2004) 17.3 (February 2004) Acquisition, Use, and Disposal of Real Estate [Reference: DEAR 917.74, 970.5244-1] Overview This section provides internal Departmental information and a DOE point of contact for issues dealing with real estate acquisition, use, and disposal. Background DEAR 917.74 provides the policy and procedures to be followed in the acquisition, use, and disposal of real estate. In accordance with DEAR clause 970.5244-1, Management and Operating contractors also follow the DEAR 917.74 coverage when they acquire real property. Occasionally in the performance of cost type contracts, the performer will be required to acquire an interest in real estate. Real estate interests include purchases, leases, easements, permits, and licenses. In accordance with the current Secretarial delegation of authority for acquisition,

347

Data acquisition system  

DOE Patents (OSTI)

A data acquisition circuit for a particle detection system that allows for time tagging of particles detected by the system. The particle detection system screens out background noise and discriminate between hits from scattered and unscattered particles. The detection system can also be adapted to detect a wide variety of particle types. The detection system utilizes a particle detection pixel array, each pixel containing a back-biased PIN diode, and a data acquisition pixel array. Each pixel in the particle detection pixel array is in electrical contact with a pixel in the data acquisition pixel array. In response to a particle hit, the affected PIN diodes generate a current, which is detected by the corresponding data acquisition pixels. This current is integrated to produce a voltage across a capacitor, the voltage being related to the amount of energy deposited in the pixel by the particle. The current is also used to trigger a read of the pixel hit by the particle.

Shapiro, Stephen L. (14228 Amherst Ct., Los Altos Hills, CA 94022); Mani, Sudhindra (1618 17th St., Sacramento, CA 95814); Atlas, Eugene L. (440 De Anza Ct., Oceanside, CA 92057); Cords, Dieter H. W. (526 Cuesta Real, La Honda, CA 94020); Holbrook, Britt (4540 Varsity Ct., Sacramento, CA 95841)

1997-01-01T23:59:59.000Z

348

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

349

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

350

Cyber Security Solutions for Instrumentation and Control Systems, Topic 2: Patch Management and Automated Change Management  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, have undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection (CIP) standards requirements of the North American Electric Reliability Corporation (NERC) and related requirements in the international ...

2013-04-18T23:59:59.000Z

351

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporations Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

352

Categorical Exclusion Determinations: Southwestern Power Administration |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Southwestern Power Southwestern Power Administration Categorical Exclusion Determinations: Southwestern Power Administration Categorical Exclusion Determinations issued by Southwestern Power Administration. DOCUMENTS AVAILABLE FOR DOWNLOAD August 6, 2013 CX-010879: Categorical Exclusion Determination Transmission Line 3005, Structure 290 Replacement CX(s) Applied: B4.6 Date: 08/06/2013 Location(s): Oklahoma Offices(s): Southwestern Power Administration July 25, 2013 CX-010880: Categorical Exclusion Determination Transmission Line 3016, Access Road Acquisition Project CX(s) Applied: B1.24 Date: 07/25/2013 Location(s): Oklahoma Offices(s): Southwestern Power Administration July 22, 2013 CX-010716: Categorical Exclusion Determination Short Mountain Access Road Easement Acquisition CX(s) Applied: B1.24

353

Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor  

SciTech Connect

Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-08-01T23:59:59.000Z

354

Cyber-Security Considerations for the Smart Grid  

Science Conference Proceedings (OSTI)

The electrical power grid is evolving into the smart grid. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

Clements, Samuel L.; Kirkham, Harold

2010-07-26T23:59:59.000Z

355

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33 - Protests, Disputes and Appeals Chapter 1 - Acquisition Regulations System OPAM Policy Acquisition Guides...

356

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26 - Other Socioeconomic Programs OPAM Policy Acquisition Guides Chapter 34 - Major Systems Acquisition...

357

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

SciTech Connect

The Annual Cyber Security and Information Intelligence Research Workshop [CSIIRW] was be held at Oak Ridge National Laboratory in Oak Ridge, TN on April 21 - 23, 2010. The aim of this workshop is to introduce and discuss novel theoretical and empirical research focused on (the many) different aspects of software security/dependability, because as we know, the heart of the cyber infrastructure is software. As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value (wiki). The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. Cyber crime is a very serious and growing problem which now has an annual global turnover in the criminal world of more than 1000 BUSD [recent numbers from an FBI white paper] with the hardest hit industries being the banks and the insurance companies. A recent EU study of the banking world showed that more than 60% of cyber crime in banks was carried out by insiders of which ~65% by senior managers. Moreover, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require a transformation in computing and communication systems architecture and new capabilities that do not merely solve today s plethora of security enigmas, but enable comprehensive game-changing strategies [A Scientific R&D Approach to Cyber Security, C. Catlett, et al., Community-driven report submitted to the DOE, Dec. 2008]. The aim of this workshop is to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. We encourage the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the ever evolving context of cyberspace.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2010-01-01T23:59:59.000Z

358

JM to Make Admin Chg to DOE O 205.1B, Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint ...

2012-12-06T23:59:59.000Z

359

Procurement | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement | National Nuclear Security Administration Procurement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Procurement Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Procurement Procurement NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

360

Major Contract Solicitation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Solicitation | National Nuclear Security Administration Solicitation | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Major Contract Solicitation Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitation Major Contract Solicitation Pantex Plant Wind Farm Acquisition Y-12 National Security Complex, Pantex Plant, with Option for

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Acquisition | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Acquisition Acquisition In 2009, DOE competitively awarded Ameresco Federal Solutions, Inc. a fixed-price renewable Energy Savings Performance Contract (ESPC) to finance, design, construct, operate, maintain and fuel a new biomass facility at SRS for 20-years. Under ESPCs, private companies finance, install, and maintain new energy and water-efficient equipment in federal facilities, with no up-front funding or extra costs incurred by the government or taxpayers. In 2009, DOE competitively awarded Ameresco Federal Solutions, Inc. a fixed-price renewable Energy Savings Performance Contract (ESPC) to finance, design, construct, operate, maintain and fuel a new biomass facility at SRS for 20-years. Under ESPCs, private companies finance, install, and maintain new energy and water-efficient equipment in federal

362

Acquisition Guide P  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

P P h a p t e r 5.1 (September 2004) Release of Information: Congressional Notification and Long-range Acquisition Estimates [Reference: FAR 5.41 Overview This section discusses the procedures for providing Congressional notice of certain contract and financial assistance actions, and the release of long-range acquisition estimates. Background The Headquarters Office of Congressional and Intergovernmental Affairs notifies members of Congress of DOE activities likely to have an effect on their constituents. These activities include certain contract and financial assistance actions. FAR 5.404-1 identifies the requirements for the release of long-range acquisition planning estimates. Congressional Notification Contracting activities complete and submit form DOE F 4220.10, Congressional GrantIContract

363

Acquisition Strategy RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Strategy Review Module Acquisition Strategy Review Module March 2010 CD-0 O 0 OFFICE OF C CD-1 F ENVIRO Standard R Acquisi Rev Critical Decis CD-2 M ONMENTAL Review Plan ition Stra view Module sion (CD) Ap CD March 2010 L MANAGE n (SRP) ategy e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets,

364

VERITAS Data Acquisition  

E-Print Network (OSTI)

VERITAS employs a multi-stage data acquisition chain that extends from the VME readout of custom 500 MS/s flash ADC electronics to the construction of telescope events and ultimately the compilation of information from each telescope into array level data. These systems provide access to the programming of the channel level triggers and the FADCs. They also ensure the proper synchronization of event information across the array and provide the first level of data quality monitoring. Additionally, the data acquisition includes features to handle the readout of special trigger types and to monitor channel scaler rates. In this paper we describe the software and hardware components of the systems and the protocols used to communicate between the VME, telescope, and array levels. We also discuss the performance of the data acquisition for array operations.

VERITAS Collaboration; E. Hays

2007-10-11T23:59:59.000Z

365

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

366

Smart Grid Cyber Security Strategy and Requirements The Cyber Security Coordination Task Group  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 236 pages (September 2009) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

Annabelle Lee Lead; Tanya Brewer; Annabelle Lee Lead; Tanya Brewer

2009-01-01T23:59:59.000Z

367

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

Science Conference Proceedings (OSTI)

Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Sheldon, Frederick T [ORNL; Peterson, Greg D [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2009-01-01T23:59:59.000Z

368

Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies To Meet The Cyber Security And Information Intelligence Challenges Ahead  

Science Conference Proceedings (OSTI)

As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of the workshop was to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlined a strategy for cyber security and information intelligence that is founded on sound principles and technologies. We aimed to discuss novel theoretical and applied research focused on different aspects of software security/dependability, as software is at the heart of the cyber infrastructure.

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2008-01-01T23:59:59.000Z

369

Convergence for the Smart Grid -On the technology opportunities for Future Cyber-Physical Energy Systems, invited paper at New Research Directions for Future Cyber-Physical Energy  

E-Print Network (OSTI)

Convergence for the Smart Grid - On the technology opportunities for Future Cyber-Physical Energy Angeles, CA. 90095 http://winmec.ucla.edu Email:smartgrid@winmec.ucla.edu Convergence for the Smart Grid into what the Future / Smart Electric Grid should look like. For example the DOE has a vision for the Modern

California at Los Angeles, University of

370

Policy Flash 2013-42 Acquisition Guide Chapter 19.1- Summary of Small  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Acquisition Guide Chapter 19.1- Summary of 2 Acquisition Guide Chapter 19.1- Summary of Small Business Administration and Department of Energy Partnership Policy Flash 2013-42 Acquisition Guide Chapter 19.1- Summary of Small Business Administration and Department of Energy Partnership Attached is Policy Flash 2013-42 Acquisition Guide Chapter 19.1 - Summary of Small Business Administration and Department of Energy Partnership Agreement Questions concerning this policy flash should be directed to Jason Taylor of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at (202) 287-1560 or at jason.taylor@hq.doe.gov. Policy Flash 2013-42.pdf Department of Energy Partnership Agreement.pdf AG19 1.pdf More Documents & Publications Attachment FY2011-55 OPAM

371

Federal Acquisition Regulation; Federal Acquisition Circular  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Federal Acquisition Circular (FAC) 2005-40 Federal Register /Vol. 75, No. 55 /Tuesday, March 23, 2010 /page 14059 A summary for the FAR rule follows. Federal Awardee Performance and Integrity Information System (FAPIIS) (FAR case 2008-027) Effective Date: April 22, 2010. This final rule amends the FAR to implement section 872 of the Duncan Hunter National Defense Authorization Act for Fiscal Year 2009. Section 872 requires the establishment of a data system, Federal Awardee Performance and Integrity Information System (FAPIIS), containing specific information on the integrity and performance of covered Federal agency contractors and grantees. FAPIIS is available for use in award decisions at www.ppirs.gov. Government input to FAPIIS is accomplished at www.cpars.csd.disa.mil.

372

Federal Acquisition Regulation; Federal Acquisition Circular  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2005-37; Introduction Federal Acquisition Circular (FAC) 2005-37 List of Rules in FAC 2005-37 Item Subject I. Registry of Disaster Response Contractors II. Limiting Length of Noncompetitive Contracts in "Unusual and Compelling Urgency" Circumstances III. GAO Access to Contractor Employees IV. Use of Commercial Services Item Authority V. Limitations on Pass-Through Charges VI. Award Fee Language Revision VII. National Response Framework VIII. Technical Amendments SUPPLEMENTARY INFORMATION: Summaries for each FAR rule follow. Item I-Registry of Disaster Response Contractors (FAR Case 2008-035) This interim rule amends the FAR at parts 2, 4, 7, 10, 13, 18, 26, and 52 to implement the Registry of Disaster Response Contractors provision, section 697 of the Department of

373

Federal Acquisition Regulation; Federal Acquisition Circular 2005-47; Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7; Summary 7; Summary This document summarizes the Federal Acquisition Regulation (FAR) rules agreed to by the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council (Councils) in this Federal Acquisition Circular (FAC) 2005-47. All were effective December 13, 2010 except Items II, HUB Zone, and VI, Pass Through, which will be effective January 12, 2011. List of Rules in FAC 2005-47 Item Subject FAR case Analyst ------------------------------------------------------------------------------------------------------------ ---- I..................................... Notification of Employee 2010-006 McFadden.

374

Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.  

SciTech Connect

This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

375

Aspects of Apache's Acquisition of Mariner Energy and Selected Devon Energy Assets  

Reports and Publications (EIA)

The Energy Information Administration reviews mergers, acquisitions, and alliances by companies that are respondents to Form EIA-28 (Financial Reporting System (FRS)), or that result in a company that meets the FRS reporting criteria.

Neal Davis

2010-04-15T23:59:59.000Z

376

Fast track article: Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence  

Science Conference Proceedings (OSTI)

The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. ... Keywords: Cyber-physical convergence, Cyber-world security, Data storage, Opportunistic networking and computing, Pervasive computing, Quality of Information, Self-*, Social networks, Wearable computing

Marco Conti; Sajal K. Das; Chatschik Bisdikian; Mohan Kumar; Lionel M. Ni; Andrea Passarella; George Roussos; Gerhard Trster; Gene Tsudik; Franco Zambonelli

2012-02-01T23:59:59.000Z

377

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for the Smart Grid Adam Hahn, Student Member, IEEE, and Manimaran Govindarasu, Senior Member, IEEE Abstract--The smart grid's heavy reliance on cyber resources introduces numerous security concerns

Manimaran, Govindarasu

378

Chapter 18 - Emergency Acquisitions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 - Emergency Acquisitions Chapter 18 - Emergency Acquisitions 18.0EmergencyAcquisitions0.pdf More Documents & Publications Acqguide18pt0 March 2011 final Microsoft Word -...

379

Acquisition Guide | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

12 - Acquisition of Commercial Items (RESERVED) Chapter 13 - Simplified Acquisition Procedures 13.1 -DOE Policy and Operating Procedures for the Use of the GSA SmartPay2 Purchase...

380

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

Science Conference Proceedings (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

382

Department of Energy Acquisition System - A Guide for Executives |  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy Acquisition System - A Guide for Executives Department of Energy Acquisition System - A Guide for Executives Department of Energy Acquisition System - A Guide for Executives The principal purposes of the Department's acquisition system are to: Deliver on a timely basis the best value product or service to the customer by, for example, Maximizing the use of commercial products and services. Using contractors who have a track record of successful past performance or who demonstrate a current superior ability to perform. Promoting competition. Maintain the public's trust by conducting business with integrity, fairness, openness, and compliance with statutory and regulatory requirements. Minimize administrative operating costs Fulfill public policy objectsives, such as Providing opportunities for small and small disadvantaged business.

383

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the  

NLE Websites -- All DOE Office Websites (Extended Search)

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web of Things, and Social Media Speaker(s): Edward Curry Date: April 24, 2013 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: James O'Donnell Philip Haves Cyber-Physical Energy Systems (CPES) exploit the potential of information technology to boost energy efficiency while minimising environmental impacts. CPES can help manage energy more efficiently by providing a functional view of the entire energy system so that energy activities can be understood, changed, and reinvented to better support sustainable practices. CPES can be applied at different scales from Smart Grids and Smart Cities to Smart Enterprises and Smart Buildings. Significant technical challenges exist in terms of information management, leveraging

384

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

385

Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor  

Science Conference Proceedings (OSTI)

Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

2011-04-01T23:59:59.000Z

386

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

387

Research Administration Index of Commonly Used Acronyms  

E-Print Network (OSTI)

of Bimolecular Resource Facilities ACM Association of American Medical Colleges ACO Administrative Contracting Officer ADA Americans with Disabilities Act of 1990 AFAA Air Force Audit Agency AFARS Army Federal Acquisition Regulation Supplement AFOSR Air Force Office of Scientific Research AFRL Air Force Research

Salama, Khaled

388

Southeastern Power Administration | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Southeastern Power Administration Southeastern Power Administration Search Search form Search Southeastern Power Administration Southeastern Power Administration Services Services Home Rate Schedules Acquisition Program Competitive Resource Strategies Annual Reports SEPA FOIA Power Operations Power Operations Home How it Works Generation Quick Facts Mission About Us About Us Home News News Home Press Releases Career Opportunities SEPA History SEPA Video Offices Southeastern Power Administration Southeastern Power Administration Power Operations Click to view a map of SEPA power operations. Latest Rate Schedules October 1, 2012 ALA-1-N Wholesale Power Rate Schedule Area: PowerSouth Energy Cooperative System: Georgia-Alabama-South Carolina October 1, 2012 Duke-1-E Wholesale Power Rate Schedule Area: Duke On-System System: Georgia-Alabama-South Carolina

389

Data acquisition for PLT  

SciTech Connect

DA/PLT, the data acquisition system for the Princeton Large Torus (PLT) fusion research device, consists of a PDP-10 host computer, five satellite PDP- 11s connected to the host by a special high-speed interface, miscellaneous other minicomputers and commercially supplied instruments, and much PPPL produced hardware. The software consists of the standard PDP-10 monitor with local modifications and the special systems and applications programs to customize the DA/PLT for the specific job of supporting data acquisition, analysis, display, and archiving, with concurrent off-line analysis, program development, and, in the background, general batch and timesharing. Some details of the over-all architecture are presented, along with a status report of the different PLT experiments being supported. (auth)

Thompson, P.A.

1975-01-01T23:59:59.000Z

390

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

Science Conference Proceedings (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

391

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

392

Sustainable Acquisition | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Acquisition Sustainable Acquisition Mission The team establishes a national approach to expand purchases of environmentally sound goods and services, including biobased products in accordance with Executive Order (EO) 13423, Strengthening Federal Environmental, Energy, and Transportation Management, and (EO) 13514, Federal Leadership in Environmental, Energy, and Economic Performance, and DOE Order 436.1, Departmental Sustainability, as approved by LM. The team advocates the implementation of a "green" procurement process. Scope The team has established a process to evaluate the procurement of goods and services for LM using the acquisition of environmentally preferable products and services, including the acquisition of biobased, environmentally preferable, energy-efficient, water-efficient, and

393

Performance Based Service Acquisition Toolkit | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services Performance Based Service Acquisition Toolkit Performance Based Service Acquisition Toolkit Aviation Management Green Leases Executive Secretariat Energy Reduction at...

394

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 1 - Acquisition Regulations System Microsoft Word - AcqGuide7pt1.doc Chapter 18 - Emergency Acquisitions...

395

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ACQUISITION LETTER DEAR Part 933 Microsoft Word - ACQUISITION LETTER.doc Chapter 33 - Protests, Disputes and Appeals...

396

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 1 - Acquisition Regulations System OPAM Policy Acquisition Guides Microsoft Word - FedComplianceCritChecklist.doc...

397

Subscribe / Unsubscribe | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Subscribe / Unsubscribe | National Nuclear Security Administration Subscribe / Unsubscribe | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Subscribe / Unsubscribe Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

398

Sources Sought | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sources Sought | National Nuclear Security Administration Sources Sought | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Sources Sought Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Sources Sought

399

Questions and Answers | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Questions and Answers | National Nuclear Security Administration Questions and Answers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Questions and Answers Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

400

Request for Proposal | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Request for Proposal | National Nuclear Security Administration Request for Proposal | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Request for Proposal Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Reading Room | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reading Room | National Nuclear Security Administration Reading Room | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Reading Room Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Reading Room

402

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and information intelligence challenges and strategies  

SciTech Connect

As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2010-01-01T23:59:59.000Z

403

Simulating non-stationary congestion systems using splitting with applications to cyber security  

Science Conference Proceedings (OSTI)

According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. ...

Martin J. Fischer; Denise M. B. Masi; John F. Shortle; Chun-Hung Chen

2010-12-01T23:59:59.000Z

404

Effects of applying STR for group learning activities on learning performance in a synchronous cyber classroom  

Science Conference Proceedings (OSTI)

This study aimed to apply Speech to Text Recognition (STR) for individual oral presentations and group discussions of students in a synchronous cyber classroom. An experiment was conducted to analyze the effectiveness of applying STR on learning performance. ... Keywords: Computer-mediated communication, Distance education and telelearning, Improving classroom teaching, Pedagogical issues, cooperative/collaborative learning

Tony C. T. Kuo; Rustam Shadiev; Wu-Yuin Hwang; Nian-Shing Chen

2012-01-01T23:59:59.000Z

405

Optimal and Adaptive Battery Discharge Strategies for Cyber-Physical Fumin Zhang and Zhenwu Shi  

E-Print Network (OSTI)

Optimal and Adaptive Battery Discharge Strategies for Cyber-Physical Systems Fumin Zhang and Zhenwu Shi Abstract-- We introduce a dynamic battery model that de- scribes the variations of the capacity of a battery under time varying discharge current. This model is input-output equivalent to the Rakhmatov

Zhang, Fumin

406

Security aspects of cyber-physical device safety in assistive environments  

Science Conference Proceedings (OSTI)

As more devices that affect their environment come into use, their proper functioning to protect the welfare of their charges is a concern. Examples include assistive transport devices, robotics, drug delivery systems, etc. Here privacy is not the primary ... Keywords: assistive-environments, cyber-physical systems, pervasive computing, safety, security, standards

Steven J. Templeton

2011-05-01T23:59:59.000Z

407

Self-aware cyber-physical systems and applications in smart buildings and cities  

Science Conference Proceedings (OSTI)

The world is facing several challenges that must be dealt within the coming years such as efficient energy management, need for economic growth, security and quality of life of its habitants. The increasing concentration of the world population into ... Keywords: autonomic computing, cyber-physical systems, self-aware systems, smart city

Levent Gurgen; Ozan Gunalp; Yazid Benazzouz; Mathieu Gallissot

2013-03-01T23:59:59.000Z

408

Reducing the Peak Power through Real-Time Scheduling Techniques in Cyber-Physical Energy Systems  

E-Print Network (OSTI)

], large networks of electric cars [4], and automated energy supply and distribution for town and city of electric loads in cyber-physical energy systems. The aim of the proposed approach is to achieve predictability of the activation of electric loads to guarantee an upper bound on the peak electric power

Lipari, Giuseppe

409

Frameworks and data initiatives for smart grid and other cyber-physical systems (invited keynote)  

Science Conference Proceedings (OSTI)

I describe the NIST smart grid framework and its applicability as a model for organizational efforts to advance cyber-physical systems, and provide an overview of smart grid data initiatives. Keywords: cybersecurity, data analytics, data initiatives, frameworks, green button, interoperability, smart grid, testing and certification

David A. Wollman

2013-06-01T23:59:59.000Z

410

CT-Guided Fiducial Placement for CyberKnife Stereotactic Radiosurgery: An Initial Experience  

Science Conference Proceedings (OSTI)

CyberKnife frameless image-guided radiosurgery has become a widely used system for parenchymal extracranial lesions. Gold fiducials are required for the planning and aiming of CyberKnife therapy. We report our initial experience and describe the technique of positioning tumor markers, under CT guidance. We conducted a retrospective review of 105 patients who were referred for CyberKnife stereotactic radiosurgery at Iatropolis CyberKnife Center in Athens. All patients underwent percutaneous fiducial placement via CT guidance. At the desired location, the 18-G needle was advanced into or near the tumor. Data collected included number and locations of fiducials placed and complications experienced to date. One hundred five patients underwent fiducial placement under CT guidance and a total number of 319 gold seeds were implanted. We experienced one episode of pneumothorax that required drainage, one mild pneumothorax, and three episodes of perifocal pulmonary hemorrhage. In conclusion, fiducial implantation under CT guidance appears to be a safe and efficient procedure, as long as it is performed by an experienced interventional radiologist.

Sotiropoulou, Evangelia ['Sotiria' General Hospital of Chest Diseases (Greece); Stathochristopoulou, Irene [Iatropolis CyberKnife Center (Greece); Stathopoulos, Konstantinos ['Sotiria' General Hospital of Chest Diseases (Greece); Verigos, Kosmas; Salvaras, Nikolaos [Iatropolis CyberKnife Center (Greece); Thanos, Loukas, E-mail: loutharad@yahoo.co ['Sotiria' General Hospital of Chest Diseases (Greece)

2010-06-15T23:59:59.000Z

411

The institute for cyber-enabled research: regional organization to promote computation in science  

Science Conference Proceedings (OSTI)

The Institute for Cyber-Enabled Research (iCER) at Michigan State University (MSU) was established in 2009 to coordinate and support multidisciplinary resources for computation and computational sciences. iCER is the home of MSU's centralized High Performance ...

Dirk Colbry, Bill Punch, Wolfgang Bauer

2013-07-01T23:59:59.000Z

412

Portable Storage Support for Cyber Foraging YaYunn Su and Jason Flinn  

E-Print Network (OSTI)

stateful services such as remote desktops be handled efficiently? . How much can portable storage reduce focused considerable attention on enabling resource­poor mobile computers such as cell­phones and hand solution, cyber foraging, uses remote comput­ ers located at wireless hotspots to execute applica­ tion

Flinn, Jason

413

Portable Storage Support for Cyber Foraging Ya-Yunn Su and Jason Flinn  

E-Print Network (OSTI)

stateful services such as remote desktops be handled efficiently? · How much can portable storage reduce focused considerable attention on enabling resource-poor mobile computers such as cell-phones and hand solution, cyber foraging, uses remote comput- ers located at wireless hotspots to execute applica- tion

Chu, Hao-hua

414

Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge  

Science Conference Proceedings (OSTI)

The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

Ondrej Linda; Todd Vollmer; Milos Manic

2012-08-01T23:59:59.000Z

415

Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems  

Science Conference Proceedings (OSTI)

The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Melin, Alexander M [ORNL; Czejdo, Bogdan [ORNL

2013-01-01T23:59:59.000Z

416

Revised Acquisition Guide Chapter 42.5, Contract Management Planning  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-24 2-24 Date: February 21, 2012 To: Procurement Directors From: Director Contract and Financial Assistance Policy Division Office of Policy Office of Procurement and Assistance Management Subject: Revised Acquisition Guide Chapter 42.5, Contract Management Planning Summary: The Department of Energy (DOE) has been on GAO's High Risk List for the past several years as a result of inadequate contract and project management. Accordingly, the improvement of contract administration is a critical issue for DOE. The Acquisition Guide chapter on Contract Management Planning has been completely revised to address this matter.

417

Policy Flash 2013-68 Acquisition Guide 42.101 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Acquisition Guide 42.101 8 Acquisition Guide 42.101 Policy Flash 2013-68 Acquisition Guide 42.101 Questions concerning this policy flash should be directed to Michael Righi of the Contract and Financial Assistance Policy Division, Office of Policy, Office Acquisition and Project Management at (202) 287-1337 or at Michael.Righi@hq.doe.gov POLICY_FLASH_for Acquisition Guiide Chapter on Audit Requirements for non MO contracts.pdf ninth version of Audit Guide Chapter of April 2013--incorporating field comments -FINAL.pdf More Documents & Publications Chapter 42 - Contract Administration 2014-02 Acquistion Letter 2014-01: Management and Operating Contractors' Audit Coverage of Cost-Reimbursement Subcontracts Attached is Policy Flash 2013-44 Acquisition Guide- Allowability of Incurred Costs

418

Policy Flash 2013-68 Acquisition Guide 42.101 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2013-68 Acquisition Guide 42.101 Policy Flash 2013-68 Acquisition Guide 42.101 Policy Flash 2013-68 Acquisition Guide 42.101 Questions concerning this policy flash should be directed to Michael Righi of the Contract and Financial Assistance Policy Division, Office of Policy, Office Acquisition and Project Management at (202) 287-1337 or at Michael.Righi@hq.doe.gov POLICY_FLASH_for Acquisition Guiide Chapter on Audit Requirements for non MO contracts.pdf ninth version of Audit Guide Chapter of April 2013--incorporating field comments -FINAL.pdf More Documents & Publications Chapter 42 - Contract Administration Attached is Policy Flash 2013-44 Acquisition Guide- Allowability of Incurred Costs 2014-02 Acquistion Letter 2014-01: Management and Operating Contractors' Audit Coverage of Cost-Reimbursement Subcontracts

419

Explorations in Cyber International Relations (ECIR) Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System  

E-Print Network (OSTI)

Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative ...

Madnick, Stuart

2009-08-10T23:59:59.000Z

420

Resource management algorithms for real-time wireless sensor networks with applications in cyber-physical systems  

Science Conference Proceedings (OSTI)

Wireless Sensor Networks (WSN) are playing a key role in the efficient operation of Cyber Physical Systems (CPS). They provide cost efficient solutions to current and future CPS requirements such as real-time structural awareness, faster event localization, ...

Benazir Fateh / Manimaran Govindarasu

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

OPAM Policy Acquisition Guides  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 15.4-2 (January 2007) Chapter 15.4-2 (January 2007) 1 Weighted Guidelines [References: FAR 15.4, DEAR 915.4] Overview This section provides guidance for applying the Department's structured approach in determining profit/fee. Background The FAR requires consideration of certain factors (described in 15.404-4 as "profit- analysis factors" or "common factors") in developing a structured profit/fee approach. DOE's structured approach for determining profit/fee objectives is used in those acquisitions when the contracting officer is required to perform a cost analysis. This system provides a comprehensive approach for determining a fair profit or fee. It ensures consistent consideration of the relative value of the factors and provides a basis for

422

7.0 - Integrated Acquisition Planning Process  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 (August 2006) 0 (August 2006) 1 INTEGRATING ACQUISITION PLANNING PROCESSES - AN OVERVIEW REFERENCES 1. FAR Part 7 Acquisition Planning 2. FAR Part 34 Major System Acquisition 3. Acquisition Letter 2005-08R, Small Business Programs 4. Acquisition Guide Chapter 7.1, Acquisition Planning 5. Acquisition Guide Chapter 42.5, Contract Management Planning 6. DOE O 580.1 Department of Energy Property Management Program 7. DOE O 413.3 Program and Project Management for the Acquisition of Capital Assets Guiding Principles n Acquisition planning benefits from integrating independent planning processes and a team approach that includes appropriate representation

423

Coordinated Cyber-Physical Attacks, High-Impact Low-Frequency (HILF) Events, and Risk Management in the Electric Sector  

Science Conference Proceedings (OSTI)

Although the North American electricity grid is one of the most reliable power systems in the world, the high-impact low-frequency (HILF) class of rare but potentially catastrophically damaging events is of growing concern in the industry. This white paper summarizes key activities under two EPRI initiatives that address a HILF cyber-physical attack as well as risk assessment approaches and management tools relevant to a HILF event.EPRIs Cyber Security and Privacy Program ...

2012-12-12T23:59:59.000Z

424

Acquisition Resources | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition » Acquisition Acquisition » Acquisition Resources Acquisition Resources Doing Business with DOE/EM Doing Business with DOE/EM EM Procurement Offices Doing Business with EM Consolidated Business Center Guide for Submission of Unsolicated Proposals Federal Business Opportunities Small Business Opportunities EM Major Procurements as of 10/01/13 EM Utility Contracts EM Partnering Initiative: Journey to Excellence Metric No. 3.5 Project Management Resources DOE Office of Environmental Management Project & Contract Management Improvement Timeline Project Management Approach Using Earned Value Management Root Cause Analysis and Corrective Actions Plan DOE Order 413.3B DOE Directives OMB Capital Programming Guide OECM Project Management Career Development Program OECM Project Management Policy and Guidance per Office of Management

425

Management and Administration | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Management and Administration | National Nuclear Security Administration Management and Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Management and Administration Home > About Us > Our Programs > Powering the Nuclear Navy > Management and Administration Management and Administration NNSA's Naval Reactors is committed to excellence and dedicated to meeting

426

TECHNOLOGY ADMINISTRATION  

E-Print Network (OSTI)

This report originated in the authors participation in a multi-country study of national innovation systems and their impact on new technology development, sponsored by the Organization for Economic Cooperation and Development (OECD). Our task was to look at the U.S. national innovation systems impact on the commercial development of Proton Exchange Membrane (PEM) fuel cells for residential power applications. Early drivers of PEM fuel cell innovation were the aerospace and defense programs, in particular the National Aeronautics and Space Administration (NASA), which used fuel cells on its spacecraft. In the early 1990s, deregulation hit the electric utility industry, which made utilities and entrepreneurs see the potential in generating electricity from distributed power. Throughout the 1990s, the Department of Energy funded a significant portion of civilian fuel cell research, while the Department of Defense and NASA funded more esoteric military and space applications. In 1998, the Department of Commerces Advanced Technology Program (ATP) awarded the first of 25 fuel cell projects, as prospects for adoption and commercialization of fuel cell technologies improved.

John M. Nail; Gary Anderson; Gerald Ceasar; Christopher J. Hansen; John M. Nail; Gerald Ceasar; Christopher J. Hansen; Carlos M. Gutierrez; Hratch G. Samerjian; Acting Director; Marc G. Stanley; Director Abstract

2005-01-01T23:59:59.000Z

427

Trigger and data acquisition  

E-Print Network (OSTI)

Past LEP experiments generate data at 0.5 MByte/s from particle detectors with over a quarter of a million readout channels. The process of reading out the electronic channels, treating them, and storing the date produced by each collision for further analysis by the physicists is called "Data Acquisition". Not all beam crossings produce interesting physics "events", picking the interesting ones is the task of the "Trigger" system. In order to make sure that the data is collected in good conditions the experiment's operation has to be constantly verified. In all, at LEP experiments over 100 000 parameters were monitored, controlled, and synchronized by the "Monotoring and control" system. In the future, LHC experiments will produce as much data in a single day as a LEP detector did in a full year's running with a raw data rate of 10 - 100 MBytes/s and will have to cope with some 800 million proton-proton collisions a second of these collisions only one in 100 million million is interesting for new particle se...

CERN. Geneva

2001-01-01T23:59:59.000Z

428

Categorical Exclusion Determinations: Bonneville Power Administration |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 4, 2013 June 4, 2013 CX-010433: Categorical Exclusion Determination Memaloose Meadows Land Acquisition CX(s) Applied: B1.25 Date: 06/04/2013 Location(s): Oregon Offices(s): Bonneville Power Administration June 3, 2013 CX-010436: Categorical Exclusion Determination Tri-Cities Maintenance Headquarters Project CX(s) Applied: B1.15 Date: 06/03/2013 Location(s): Washington, Washington Offices(s): Bonneville Power Administration June 3, 2013 CX-010435: Categorical Exclusion Determination De Moss Substation Expansion CX(s) Applied: B4.6 Date: 06/03/2013 Location(s): Oregon Offices(s): Bonneville Power Administration June 3, 2013 CX-010434: Categorical Exclusion Determination LaPine Substation Shunt Reactor Addition CX(s) Applied: B4.6 Date: 06/03/2013 Location(s): Oregon, Oregon Offices(s): Bonneville Power Administration

429

Microsoft Word - Similkameen_Acquisition_CX .docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Dave Roberts Dave Roberts Project Manager - KEWU-4 Proposed Action: Provision of funds to the Washington Department of Fish and Wildlife (WDFW) to purchase two parcels of land from the Trust for Public Land in Okanogan County, Washington. Fish and Wildlife Project No.: 2007-232-00 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.25 Transfer of land/habitat preservation wildlife management. Location: The two parcels are located in Township 40 North, Range 25 East, Sections 17 and 21 of the Nighthawk 7.5' USGS quadrangle map, in Okanogan County, Washington (northwest of the town of Oroville). Proposed by: Bonneville Power Administration (BPA). Description of the Proposed Action: BPA proposes to fund the acquisition of two parcels of

430

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

431

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

432

Microsoft Word - ACQUISITION LETTER.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IV. Effective Date. This Acquisition Letter is effective 30 days from the date of issue. V. Expiration Date. This Acquisition Letter remains in effect until canceled or...

433

Report: EM Acquisition and Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ACQUISITION AND PROJECT MANAGEMENT September 25, 2008 Submitted by the EMAB Acquisition and Project Management Subcommittee Background: In Fiscal Year (FY) 2008, EMAB was tasked to...

434

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - AL2006-07.doc Policy Flash 2013-54 Acquisition Certification Program Handbook 4th Edition Acquisition Certifications Program Handbook...

435

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

17 - Special Contracting Methods Acquisition Letter 2009-03 Acquisition Planning-Extending A Management and Operating Contract Without Full and Open Competition and Site and...

436

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 34 - Major Systems Acquisition Policy Flash 2013-40 Acquisition Guide Chapter 43.3 - Maintaining Alignment of Project Management with Contract Management of Non-Management...

437

Acquisition Workforce Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Acquisition Career Management Program (ACMP) Acquisition Career Management Program Handbook Applications for ACMP Certification FAC-C, Purchasing, CFA and Property...

438

Contractor Human Resources | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Contractor Human Resources | National Nuclear Security Administration Contractor Human Resources | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contractor Human Resources Home > About Us > Our Operations > Acquisition and Project Management > Contractor Human Resources Contractor Human Resources Welcome The Contractor Human Resources mission is to provide expert advice and

439

Small Business | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Home > About Us > Our Operations > Acquisition and Project Management > Small Business Small Business NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

440

Small Business Toolbox | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Toolbox | National Nuclear Security Administration Toolbox | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Toolbox Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Small Business Toolbox Small Business Toolbox NNSA's Small Business program serves as the Info-structure through which

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

442

Grid Strategy 2012: Cyber and Physical Strategy for Substation and Field Equipment (Greenfield and Legacy)  

Science Conference Proceedings (OSTI)

This technical update addresses cyber security for deployed field equipment. Although focused on remote equipment, it provides guidelines that are adaptable for use across a wide range of deployment scenarios and organizational structures. In view of the many-to-many relationship between available equipment and deployment scenarios, it cannot be presumed that vendor-supplied equipment or particular organizational structures will ensure secure and resilient equipment operation.To ensure ...

2012-11-28T23:59:59.000Z

443

SuperIdentity: Fusion of Identity across Real and Cyber Domains  

Science Conference Proceedings (OSTI)

Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.

Black, Sue; Creese, Sadie; Guest, Richard; Pike, William A.; Saxby, Steven; Stanton Fraser, Danae; Stevenage, Sarah; Whitty, Monica

2012-04-23T23:59:59.000Z

444

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

445

A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems  

Science Conference Proceedings (OSTI)

The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Fugate, David L [ORNL; Kisner, Roger [ORNL

2013-01-01T23:59:59.000Z

446

Acquisition Letters | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Acquisition Letters Acquisition Letters Acquisition Letters The following is a list of active Department of Energy Acquisition Letters. These files are in PDF (Portable Document Files), MS Excel, or htm (hypertext markup) format. To read PDF files you must have Adobe Acrobat Reader which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. NOTE: Copies of rescinded or cancelled AL's are available by calling the Office of Procurement and Assistance Policy at (202) 287-1330. ASSISTANCE ON USING THESE FILES: You may: (1) download these files to your local machine by clicking on the file name and choosing SAVE TO DISK, OR (2) you can configure Adobe Acrobat Reader to automatically open, which

447

Computational models of language acquisition  

Science Conference Proceedings (OSTI)

Child language acquisition, one of Nature's most fascinating phenomena, is to a large extent still a puzzle. Experimental evidence seems to support the view that early language is highly formulaic, consisting for the most part of frozen items with ...

Shuly Wintner

2010-03-01T23:59:59.000Z

448

Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Acquisition Letter 09 - Revision of Department 2 Acquisition Letter 09 - Revision of Department of Energy (DOE) Order 350.1 and Special H Clause Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department of Energy (DOE) Order 350.1 and Special H Clause Questions concerning this policy flash should be directed to Robert M. Myers, Director, Contractor Human Resources Policy Division (MA-612) at (202) 287-1584 or robert.myers@hq.doe.gov. Policy Flash - DOE O 350 1.pdf Consolidated Model H-Clause 06-27-13.pdf Acquisition Letter - DOE O 350 1 6-27-13.pdf More Documents & Publications Chapter 30 - Cost Accounting Standards Administration OPAM Policy Acquisition Guides GAO-04-539 Department of Energy: Certain Postretirement Benefits for Contractor Employees Are Unfunded and Program Oversight Could Be Improved

449

,"Ohio Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Ohio Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16soh_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16soh_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:39 PM"

450

,"Kentucky Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Kentucky Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sky_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sky_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:36 PM"

451

,"California Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","California Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sca_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sca_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:35 PM"

452

,"Louisiana Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Louisiana Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sla_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sla_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:36 PM"

453

,"Oklahoma Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Oklahoma Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sok_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sok_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:39 PM"

454

,"Utah Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Utah Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sut_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sut_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:40 PM"

455

,"Wyoming Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Wyoming Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16swy_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16swy_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:41 PM"

456

,"Virginia Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Virginia Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sva_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sva_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:40 PM"

457

,"Montana Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Montana Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16smt_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16smt_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:37 PM"

458

,"Texas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Texas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16stx_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16stx_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:39 PM"

459

,"Pennsylvania Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Pennsylvania Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16spa_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16spa_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:39 PM"

460

,"Alabama Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Alabama Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sal_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sal_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:34 PM"

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

,"Arkansas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Arkansas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sar_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sar_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:35 PM"

462

,"Kansas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Kansas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sks_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sks_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:36 PM"

463

,"Florida Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Florida Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sfl_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sfl_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:35 PM"

464

,"Alaska Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Alaska Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sak_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sak_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:34 PM"

465

,"Mississippi Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Mississippi Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sms_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sms_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:37 PM"

466

Time-to-Compromise Model for Cyber Risk Reduction Estimation  

SciTech Connect

We propose a new model for estimating the time to compromise a system component that is visible to an attacker. The model provides an estimate of the expected value of the time-to-compromise as a function of known and visible vulnerabilities, and attacker skill level. The time-to-compromise random process model is a composite of three subprocesses associated with attacker actions aimed at the exploitation of vulnerabilities. In a case study, the model was used to aid in a risk reduction estimate between a baseline Supervisory Control and Data Acquisition (SCADA) system and the baseline system enhanced through a specific set of control system security remedial actions. For our case study, the total number of system vulnerabilities was reduced by 86% but the dominant attack path was through a component where the number of vulnerabilities was reduced by only 42% and the time-to-compromise of that component was increased by only 13% to 30% depending on attacker skill level.

Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

2005-09-01T23:59:59.000Z

467

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 - Acquisition Regulations System SEBMonthlyStatusReportingRequirement.pdf Chapter 15 - Contracting by Negotiation...

468

M.: On the impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems  

E-Print Network (OSTI)

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we identify the communication and control logic implementation parameters that influence the outcome of attacks against NICS and that could be used as effective measures for increasing the resilience of industrial installations. The implemented scenario involves a powerful attacker that is able to send legitimate Modbus packets/commands to control hardware in order to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. The analysis uses a Boiling Water Power Plant to show that the outcome of cyber attacks is influenced by network delays, packet losses, background traffic and control logic scheduling time. The main goal of this paper is to start an exploration of cyber-physical effects in particular scenarios. This study is the first of its kind to analyze cyber-physical systems and provides insight to the way that the cyber realm affects the physical realm.

B. Genge; C. Siaterlis; M. Hohenadel; Bla Genge; Christos Siaterlis; Marc Hohenadel

2012-01-01T23:59:59.000Z

469

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

470

Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011.  

SciTech Connect

This report documents our first year efforts to address the use of many-core processors for high performance cyber protection. As the demands grow for higher bandwidth (beyond 1 Gbits/sec) on network connections, the need to provide faster and more efficient solution to cyber security grows. Fortunately, in recent years, the development of many-core network processors have seen increased interest. Prior working experiences with many-core processors have led us to investigate its effectiveness for cyber protection tools, with particular emphasis on high performance firewalls. Although advanced algorithms for smarter cyber protection of high-speed network traffic are being developed, these advanced analysis techniques require significantly more computational capabilities than static techniques. Moreover, many locations where cyber protections are deployed have limited power, space and cooling resources. This makes the use of traditionally large computing systems impractical for the front-end systems that process large network streams; hence, the drive for this study which could potentially yield a highly reconfigurable and rapidly scalable solution.

Wheeler, Kyle Bruce; Naegle, John Hunt; Wright, Brian J.; Benner, Robert E., Jr.; Shelburg, Jeffrey Scott; Pearson, David Benjamin; Johnson, Joshua Alan; Onunkwo, Uzoma A.; Zage, David John; Patel, Jay S.

2011-09-01T23:59:59.000Z

471

Southwestern Power Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Business USA FedBizOpps FedConnect Federal Acquisition Regulation (FAR) System for Award Management (SAM) Becoming a Vendor Southwestern is dedicated to supporting small business,...

472

Photon Sciences | User Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Administration Postal Address User Administration Office Brookhaven National Laboratory 75 Brookhaven Avenue, Bldg. 725B Upton, NY 11973-5000 USA Office Hours Monday through...

473

Acquisition Savings Reporting Process Template  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Savings Reporting Process Savings Reporting Process Reporting Template 083112 FINAL 1 of 7 As of August 28, 2012 ` Process 1 STEP 1 - Select Savings Type You must first determine if the savings is through a Strategic Sourcing process or an Other Acquisition Savings process. If it is Strategic Sourcing, it must satisfy the 8 step definition. If it does not satisfy the eight steps, then it is an Other Acquisition Savings process. 2 STEP 2 - Select Savings Methodology (In Order of Preference) Regardless if it is Strategic Sourcing or an Other Acquisition Savings process, the next step is to determine the savings methodology that will be used to calculate the savings. You must select only one methodology. a. Transactions are not reported as savings in multiple categories.

474

Acquisition News | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition News Acquisition News Acquisition News RSS July 12, 2013 Contract Awarded for Environmental Technical Services Cincinnati - The U.S. Department of Energy (DOE) awarded a contract for Environmental Technical Services to Restoration Services Inc. of Oak Ridge, Tennessee, for support services at the Portsmouth Gaseous Diffusion Plant located near Piketon, OH. March 7, 2013 Department of Justice: CH2M Hill Hanford Group Inc. Admits Criminal Conduct, Parent Company Agrees to Cooperate in Ongoing Investigation and Pay $18.5 Million to Resolve Civil and Criminal Allegations The Justice Department, in conjunction with the U.S. Attorney's Office for the Eastern District of Washington, announced today that Colorado-based CH2M Hill Hanford Group Inc. (CHG) and its parent company, CH2M Hill

475

Acquisition News | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition News Acquisition News Acquisition News RSS April 29, 2011 DOE Awards Contract for Decontamination & Decommissioning Project for the East Tennessee Technology Park Oak Ridge, Tenn. - As part of its ongoing commitment to cleaning up the legacy of the Cold War at sites across the weapons complex, the U.S. Department of Energy has awarded a contract for the remaining environmental cleanup at the East Tennessee Technology Park (ETTP) to URS | CH2M Oak Ridge, LLC. previous 1 2 next Waste Management Nuclear Materials & Waste Tank Waste and Waste Processing Waste Disposition Packaging and Transportation Site & Facility Restoration Deactivation & Decommissioning (D&D) Facility Engineering Soil & Groundwater Sustainability Program Management Safety Security Quality Assurance

476

Acquisition Plan Strategy and Guidance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 3 01 ACQUISITION PLAN STRATEGY AND GUIDANCE NOTE: The process provided below is not intended to replace an agency's acquisition planning requirements. INSTRUCTIONS 1. Work with your DOE Federal Finance Specialist to determine whether a "pay from savings" project is feasible. a. Determine if appropriated dollars are available to offset some of the costs. b. Consider alternative finance options: Energy Savings Performance Contract (ESPC), Utility Energy Service Contract (UESC), Power Purchase Agreement (PPA), or Enhanced Use Lease (EUL) Scott Wolf 6848 Cooper Point Road NW Olympia, WA 98502 Phone: 360-866-9163 Fax: 360-866-9683 scott.wolf@ee.doe.gov Serving Montana, Wyoming, Utah, Colorado, Nebraska, New Mexico,

477

SunShot Initiative: Customer Acquisition  

NLE Websites -- All DOE Office Websites (Extended Search)

Customer Acquisition to someone Customer Acquisition to someone by E-mail Share SunShot Initiative: Customer Acquisition on Facebook Tweet about SunShot Initiative: Customer Acquisition on Twitter Bookmark SunShot Initiative: Customer Acquisition on Google Bookmark SunShot Initiative: Customer Acquisition on Delicious Rank SunShot Initiative: Customer Acquisition on Digg Find More places to share SunShot Initiative: Customer Acquisition on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Reducing Non-Hardware Costs Lowering Barriers Fostering Growth Customer Acquisition Photo of a woman, man, and child looking at a silver box on the outside of a home. The cost of acquiring customers and designing systems to fit their homes represents approximately 45% of all balance of systems costs in the U.S.

478

U.S. Department of Energy Southwestern Power Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Short Mountain Transmission Line Access Road Easement Acquisition Short Mountain Transmission Line Access Road Easement Acquisition Program or Field Office: Southwestern Power Administration Location(s) (City/County/State): Short Mountain, Leflore County, Oklahoma Proposed Action Description: Southwestern Power Administration proposes to obtain an easement to access a portion of transmission line located on Short Mountain in Leflore County, Oklahoma. Categorical Exclusion(s) Applied: l 0 CFR 102 l, Appendix B to Subpart D, Part B 1.24- Transfer, lease, disposition, or acquisition of interests in personal property or real property. For the complete DOE National Environmental Policy Act regulations regarding categorical exclusions, including the full text of each categorical exclusion, see Subpart D of 10 CFR Part 1021

479

U.S. Department of Energy Southwestern Power Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission Line 3016 Access Road Acquisition Project Transmission Line 3016 Access Road Acquisition Project Program or Field Office: Southwestern Power Administration Location(s) (City/County/State): Porum, Muskogee County, Oklahoma Proposed Action Description: Southwestern Power Administration proposes to aquire an access road easement. This access road will enable vehicles and equipment to maintain and operate portion of transmission line 3016 near the structure 3 I area. Categorical Exclusion(s) Applied: 10 CFR l 021 , Appendix B to Subpart D, Part B 1.24- Transfer, lease, disposition, or acquisition of interests in personal property or real property. For the complete DOE National Environmental Policy Act regulations regarding categorical exclusions, including the full text of each categorical exclusion, see Subpart D of I 0 CFR Part 1021

480

U.S. Department of Energy Southwestern Power Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transmission Line 3016 Access Road Acquisition Project Transmission Line 3016 Access Road Acquisition Project Program or Field Office: Southwestern Power Administration Location(s) (City/County/State): Porum, Muskogee County, Oklahoma Proposed Action Description: Southwestern Power Administration proposes to aquire an access road easement. This access road will enable vehicles and equipment to maintain and operate portion of transmission line 3016 near the structure 3 I area. Categorical Exclusion(s) Applied: 10 CFR l 021 , Appendix B to Subpart D, Part B 1.24- Transfer, lease, disposition, or acquisition of interests in personal property or real property. For the complete DOE National Environmental Policy Act regulations regarding categorical exclusions, including the full text of each categorical exclusion, see Subpart D of I 0 CFR Part 1021

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

U.S. Department of Energy Southwestern Power Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Short Mountain Transmission Line Access Road Easement Acquisition Short Mountain Transmission Line Access Road Easement Acquisition Program or Field Office: Southwestern Power Administration Location(s) (City/County/State): Short Mountain, Leflore County, Oklahoma Proposed Action Description: Southwestern Power Administration proposes to obtain an easement to access a portion of transmission line located on Short Mountain in Leflore County, Oklahoma. Categorical Exclusion(s) Applied: l 0 CFR 102 l, Appendix B to Subpart D, Part B 1.24- Transfer, lease, disposition, or acquisition of interests in personal property or real property. For the complete DOE National Environmental Policy Act regulations regarding categorical exclusions, including the full text of each categorical exclusion, see Subpart D of 10 CFR Part 1021

482

Acquisition Workforce Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Certifications and Professional Certifications and Professional Development » Acquisition Workforce Information Acquisition Workforce Information The Department of Energy (DOE) Acquisition Workforce consists of a broad range of professional and technical personnel including: Contract Specialists/Contracting Officers, Contracting Officer's Technical Representatives, Financial Assistance Personnel, Technical Project Officers, Personal Property Managers, Real Estate Contracting Officers, Federal Project Directors/Program Managers, as well as personnel who perform acquisition-related activities and functions within DOE. DOE's goal is to continue to develop and maintain a highly professional, well-trained Acquisition Workforce. DOE requires Acquisition Workforce members to meet a variety of Federal and DOE established certifications

483

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 OAS-M-12-01 November 2011 Department of Energy Washington, DC 20585 November 15, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011" INTRODUCTION AND OBJECTIVE The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for regulating the Nation's oil pipeline, natural gas, hydroelectric and wholesale electric industries. The Commission relies on a wide range of information technology (IT) resources in achieving its mission of assisting consumers in

484

Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing  

E-Print Network (OSTI)

Phishing (password + fishing) is a form of cyber crime based on social engineering and site spoofing techniques. The name of 'phishing' is a conscious misspelling of the word 'fishing' and involves stealing confidential data from a user's computer and subsequently using the data to steal the user's money. In this paper, we study, discuss and propose the phishing attack stages and types, technologies for detection of phishing web pages, and conclude our paper with some important recommendations for preventing phishing for both consumer and company.

Gharibi, Wajeb

2012-01-01T23:59:59.000Z

485

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements  

SciTech Connect

AbstractThis paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

Ondrej Linda; Milos Manic; Miles McQueen

2012-09-01T23:59:59.000Z

486

Shopping For Danger: E-commerce techniques applied to collaboration in cyber security  

SciTech Connect

Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

Bruce, Joseph R.; Fink, Glenn A.

2012-05-24T23:59:59.000Z

487

Microsoft Word - MissionCreek_Kingston_Acquisition_CX_final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

purchase purchase of the Mission Creek Property. Fish and Wildlife Project No.: 2002-003-00, Contract # BPA-44646 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.25 Transfer, lease, disposition or acquisition of interests in uncontaminated land for habitat preservation or wildlife management, and only associated buildings that support these purposes. Uncontaminated means that there would be no potential for release of substances at a level, or in a form, that would pose a threat to public health or the environment. Location: Township 19 North, Range 21 West, Section 33 of the Dixon Quad, in Lake County, Montana Proposed by: Bonneville Power Administration (BPA) and CSKT Description of the Proposed Action: BPA proposes to fund the acquisition of 12 acres of property

488

Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements  

E-Print Network (OSTI)

Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology (IT). ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. This National Institute of Standards and Technology Interagency Report (NISTIR) discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628, vol. 1 289 pages (August 2010) Certain commercial entities, equipment, or materials may be identified in this report in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply

The Smart; Grid Interoperability

2010-01-01T23:59:59.000Z

489

NNSA Points of Contact | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Points of Contact | National Nuclear Security Administration Points of Contact | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration NNSA Points of Contact Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

490

Policy Flash 2013-54 Acquisition Certification Program Handbook...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy Flash 2013-54 Acquisition Certification Program Handbook 4th Edition Policy Flash 2013-54 Acquisition Certification Program Handbook 4th Edition Acquisition Certifications...

491

Federal Acquisition Circulars 17, 18 and 20 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Circulars 17, 18 and 20 Federal Acquisition Circulars 17, 18 and 20 Policy Flash 2007-61 Federal Acquisition Circulars 17, 18 and 20 More Documents & Publications...

492

Microsoft Word - ACQUISITION LETTER.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - ACQUISITION LETTER.doc More Documents & Publications ACQUISITION LETTER DEAR Part 933 OPAM Policy Acquisition Guides Chapter 33 - Protests, Disputes and Appeals...

493

Test Acquisition Guide | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Test Acquisition Guide Test Acquisition Guide Test Acquisition Guide Regulatory requirements for the acquisition process are set forth in the Federal Acquisition Regulation (FAR) and are supplemented in the Department of Energy Acquisition Regulation (DEAR). FAR 1.301 provides for the issuance of additional internal agency guidance, including designations and delegations of authority, assignments of responsibilities, work-flow procedures, and internal reporting requirements. The DOE Acquisition Guide serves this purpose by identifying relevant internal standard operating procedures to be followed by both procurement and program personnel who are involved in various aspects of the acquisition process. The Guide also is intended to be a repository of best practices found throughout the agency

494

ADMINISTRATIVE RECORDS SCHEDULE 16:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 ADMINISTRATIVE RECORDS SCHEDULE 16: ADMINISTRATIVE MANAGEMENT RECORDS June 2007 Revision 1 This schedule covers those administrative management activities not covered by other Administrative Schedules. Included are disposable records created in the course of organizational planning, development, and simplification of procedures; records management activities; and administration of management improvement programs. See ADM 1 (items 12 and 13) for the disposition of case files on individuals involved in incentive award and similar types of management improvement programs. The organizational locations and titles of administrative management units vary. They may be scattered at numerous levels or locations, or may be centralized. For the purposes

495

Acquisition Career Management Program Handbook, Partial Revision...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Procurement and Assistance Management SUBJECT: Acquisition Career Management Program Handbook, Partial Revision of Chapter 11, Contracting Officer's Representative SUMMARY: The...

496

Securing Supervisory Control and Data Acquisition (SCADA) ...  

Science Conference Proceedings (OSTI)

... Acquisition (SCADA) and Industrial Control Systems (ICS) Linkage of Security and Safety in SCADA and Industrial Control Systems ...

2013-04-09T23:59:59.000Z

497

OPAM Policy Acquisition Guides | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 1 - Acquisition Regulations System Policy Flash 2012-8 BSCProgramDescriptionDocumentJan2005.doc&0;...

498

Development of Electronic Acquisition Model for Project ...  

Science Conference Proceedings (OSTI)

... have independent decision support models to ... An agent-based communication environment called Electronic Acquisition Model for Project ...

2003-03-14T23:59:59.000Z

499

Let Your CyberAlter Ego Share Information and Manage Spam  

E-Print Network (OSTI)

Almost all of us have multiple cyberspace identities, and these {\\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to possess many of the same complex features that characterize its real counterparts, including scale-free degree distributions, low diameter, and extensive connectivity. We show that these topological features make the latent networks particularly suitable for explorations and management via local-only messaging protocols. {\\em Cyber}alter egos can communicate via their direct links (i.e., using only their own address books) and set up a highly decentralized and scalable message passing network that can allow large-scale sharing of information and data. As one particular example of such collaborative systems, we provide a...

Kong, J S; Rezaei, B A; Sarshar, N; Roychowdhury, V P; Kong, Joseph S.; Rezaei, Behnam A.; Sarshar, Nima; Roychowdhury, Vwani P.

2005-01-01T23:59:59.000Z

500

FRIEND: A CYBER-PHYSICAL SYSTEM FOR TRAFFIC FLOW RELATED INFORMATION AGGREGATION AND DISSEMINATION  

E-Print Network (OSTI)

The major contribution of this thesis is to lay the theoretical foundations of FRIEND A cyber-physical system for traffic Flow-Related Information aggrEgatioN and Dissemination. By integrating resources and capabilities at the nexus between the cyber and physical worlds, FRIEND will contribute to aggregating traffic flow data collected by the huge fleet of vehicles on our roads into a comprehensive, near real-time synopsis of traffic flow conditions. We anticipate providing drivers with a meaningful, color-coded, at-a-glance view of flow conditions ahead, alerting them to congested traffic. FRIEND can be used to provide accurate information about traffic flow and can be used to propagate this information. The workhorse of FRIEND is the ubiquitous lane delimiters (a.k.a. cats eyes) on our roadways that, at the moment, are used simply as dumb reflectors. Our main vision is that by endowing cats eyes with a modest power source, detection and communication capabilities they will play an important role in collecting, aggregating and disseminating traffic flow conditions to the driving public. We envision the cats eyes system to be supplemented by road-side units (RSU) deployed at regular intervals (e.g. every kilometer or so). The RSUs placed on opposite sides of the roadway constitute a logical

Samy S. El-tawab; Stephan Olariu (director; Hussein Abdel-wahab (member; Michele C. Weigle (member; Samy S. El-tawab; Director Dr. Stephan Olariu

2012-01-01T23:59:59.000Z