Powered by Deep Web Technologies
Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

of Western Area Power Administration's Cyber Security Program  

Broader source: Energy.gov (indexed) [DOE]

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

2

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

SciTech Connect (OSTI)

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

3

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

4

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

5

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

6

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

7

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

8

Cyber Security Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

9

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Broader source: Energy.gov (indexed) [DOE]

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

10

Cyber Incidents Involving Control Systems  

SciTech Connect (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

11

Cyber Train Videos | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Train Videos 1. Cyber Train Overview 2. Cyber Train Opt-Out Process 3. Cyber Train Complete Training 4. Submitting Course Completion Materials...

12

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

13

Acquisition of cocaine and heroin self-administration in rats developmentally exposed to lead  

E-Print Network [OSTI]

, female rats were gavaged daily with 0 or 16 mg lead for 30 days prior to breeding with nonexposed males. Metal administration continued through pregnancy and lactation and was discontinued at weaning (postnatal day [PND] 21). Animals born to control...

Rocha, Angelica

2005-08-29T23:59:59.000Z

14

Cyber Effects Analysis Using VCSE Promoting Control System Reliability |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Effects Analysis Using VCSE Promoting Control System Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual Control System Environment (VCSE) technology- developed at Sandia National Laboratories-to investigate Supervisory Control And Data Acquisition (SCADA) vulnerabilities associated with energy systems; and it describes a set of experiments with findings from using that environment. The report explains how VCSE can be used to analyze and develop an understanding of cyber attacks. Specific analyses in this report focus on unencrypted, unsecured data channels on Internet protocol (IP)-routed computer networks within electric power systems. Cyber Effects Analysis Using VCSE Promoting Control System Reliability

15

Cyber Assessment Methods for SCADA Security  

Broader source: Energy.gov (indexed) [DOE]

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

16

Acquisition Letter Notice 2015-10 Announcing Award of General Services Administration Federal  

Broader source: Energy.gov [DOE]

The General Services Administration (GSA) recently awarded Office Supplies 3, the third generation of Federal Strategic Sourcing Initiative (FSSI) contracts for office supplies. The Deputy Secretarys Memorandum signed July 25, 2013 requiring the use of the GSAs FSSI for office supplies remains in effect. This mandate does NOT require the termination of existing orders for office supplies, nor does it preclude the use of DOEs AbilityOne Supply Stores, Paperclips, Etc., (Forrestal Building and Germantown).

17

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

18

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

19

Acquisition Guide  

Broader source: Energy.gov (indexed) [DOE]

3.2 (November 2009) 3.2 (November 2009) PURCHASE ORDERS GUIDING PRINCIPLES J Purchase Orders should normally be issued on a fixed-price basis. J Modifications of Purchase Orders may be used for unpriced orders and for administrative matters on priced orders. J Purchase orders cannot exceed the simplified acquisition threshold. This section discusses the Department of Energy's (DOE) use of purchase orders as described in Federal Acquisition Regulation (FAR) 13.302 and the Department of Energy's Acquisition Regulation (DEAR) Section 91 3.304. Only contracting officers acting within the scope of their authority are empowered to execute purchase orders on behalf of DOE. Authority A. Federal Acquisition Regulation (FAR) Subpart 13.302. B. DEAR 913.307 Background When shouldpurchase orders be used? Due to the administrative cost of preparing and handling

20

Cyber sleuths face off  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to plasma physics and new materials. Contact Communications Office (505) 667-7000 Hacking skills put to the test in week of hands-on cyber warfare training LOS ALAMOS, New...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

22

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

23

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Broader source: Energy.gov (indexed) [DOE]

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

24

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Broader source: Energy.gov (indexed) [DOE]

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

25

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

26

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice  

Science Journals Connector (OSTI)

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and ...

Steve Winterfeld; Jason Andress

2012-12-01T23:59:59.000Z

27

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

28

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

29

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect (OSTI)

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energys (DOEs) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEs Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

30

CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS .  

E-Print Network [OSTI]

??Cyber intrusions into substations of a power grid are a source of vulnerability since most substations are unmanned and with limited protection of the cyber (more)

[No author

2014-01-01T23:59:59.000Z

31

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

32

Acquisition Guide --------------------?  

Broader source: Energy.gov (indexed) [DOE]

Acquisition Procedures 1. Introduction Simplified Acquisition Procedures (SAP) are contracting methods designed to streamline the acquisition process and facilitate the...

33

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

34

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

35

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Broader source: Energy.gov (indexed) [DOE]

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

36

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Broader source: Energy.gov (indexed) [DOE]

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

37

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network [OSTI]

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security in Engineering, ACE-CS immerses students in the cyber-security discipline through a combination of intense in Engineering on Cyber Security (ACE-CS) [1] is to develop the next generation of cyber-security leaders

Older, Susan

38

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

39

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

40

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Office of Environmental Management (EM)

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

42

NNSA Policies | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

About Us > Our Operations > Management and Budget > NNSA Policy About Us > Our Operations > Management and Budget > NNSA Policy System > NNSA Policies NNSA Policies NNSA Policies (NAPs) impart policy and requirements unique to the Administration or provide short-term notices until more formal direction can be provided. NAP-4B Corporate Performance Process for M&O Contractors June 30, 2008 NAP-5 Standards Management October 16, 2002 NAP-6 FEOSH Program for NNSA Headquarters Employees December 19, 2002 NAP-7 NNSA's Acquisition and Assistance Policy Guidance December 9, 2002 NAP-14.1D Baseline Cyber Security Program December 14, 2012 NAP-21 Signed Governance and Oversight March 2, 2011 NAP-23 Transformational Governance and Oversight February 28, 2011 NAP-24 Weapons Quality Policy June 20, 2013 NAP-25 Management and Operating Contractor Business Meals and Light Refreshment

43

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

44

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Broader source: Energy.gov (indexed) [DOE]

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

45

Cyber and physical infrastructure interdependencies.  

SciTech Connect (OSTI)

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

46

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

47

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

48

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

49

Chapter 20 - Cyber Security Countermeasures to Combat Cyber Terrorism  

Science Journals Connector (OSTI)

Abstracts: In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

Lachlan MacKinnon; Liz Bacon; Diane Gan; Georgios Loukas; David Chadwick; Dimitrios Frangiskatos

2013-01-01T23:59:59.000Z

50

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

51

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

52

Energy Cyber Other Degree Program  

E-Print Network [OSTI]

Rev. Energy Cyber Other Yes No Degree Program States National Security Implications of Energy & Environmental Stress New Theories of Cross-Advisor: Graduation Date: Curric Num: Power and Energy New Approaches to Understanding Dimensions of National Security

53

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

54

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

55

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

56

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

57

Strengthening Cyber Security  

Broader source: Energy.gov (indexed) [DOE]

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

58

Wireless Policy, Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

59

Convergence Approach to Model Physical World and Cyber World of Aviation Cyber Physical System  

Science Journals Connector (OSTI)

Aviation Cyber-Physical Systems are the integration of cyber systems and physical systems. Recent concentration to Aviation Cyber Physical Systems (ACPS) is driven by the demand for deeper Convergence of design disciplines that integrate physical and ... Keywords: Aviation Cyber Physical System CPS, Modelica, AADL, SysML, Spatial-Temporal Features, Dynamic Continuous Features

Lichen Zhang

2014-08-01T23:59:59.000Z

60

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network [OSTI]

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security Advanced Course in Engineering, ACE-CS immerses students in the cyber-security discipline through for the program. Key words: Cyber-security education, technical leadership, learning community. 1. INTRODUCTION

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems  

Science Journals Connector (OSTI)

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack ... Keywords: cyber-physical, cyber-security, experimental research, overlay network, smart grid, testbed

Ryan Goodfellow; Robert Braden; Terry Benzel; David E. Bakken

2013-01-01T23:59:59.000Z

62

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

63

Cyber Security Standards.PDF  

Broader source: Energy.gov (indexed) [DOE]

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

64

DOE Issues Energy Sector Cyber Organization NOI  

Broader source: Energy.gov (indexed) [DOE]

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

65

Cyber Incident Information | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

66

Department of Energy's July 2013 Cyber Security Breach  

Broader source: Energy.gov (indexed) [DOE]

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

67

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network [OSTI]

7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked

Johansson, Karl Henrik

68

Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security  

Science Journals Connector (OSTI)

The cyber attack risks are threatening the smart grid security. Malicious worm could spread from meter to ... ) has thus developed several iterations of cyber security standards. According to the NERC cyber stand...

Yong Wang; Da Ruan; Jianping Xu; Mi Wen; Liwen Deng

2010-01-01T23:59:59.000Z

69

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

70

The Technology of Cyber Operations Symposium on Cyber Operations and National  

E-Print Network [OSTI]

operations can be conducted with plausible deniability But adversaries make mistakes too, and allThe Technology of Cyber Operations Herb Lin Symposium on Cyber Operations and National Security not acknowledge role of offensive operations. · Offensive cyber operations can also have non-defensive purposes

71

OCIO Technology Summit: Cyber Innovation | Department of Energy  

Energy Savers [EERE]

Articles OCIO Technology Summit: Cyber Innovation OCIO Technology Summit: Data Analytics OCIO Technology Summit: Cyber Innovation OCIO Technology Summit: High Performance Computing...

72

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

73

INL Cyber Security Research (2008) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

INL Cyber Security Research (2008) INL Cyber Security Research (2008) Cybersecurity research at INL will help protect critical infrastructure control system computers against worms...

74

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA Cybersecurity Program Manager (CSPM...

75

Report of the Cyber Security Research Needs for Open Science...  

Energy Savers [EERE]

Report of the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while...

76

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

77

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

78

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

79

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

80

Review of Supervisory Control and Data Acquisition (SCADA) Systems  

SciTech Connect (OSTI)

A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

Reva Nickelson; Briam Johnson; Ken Barnes

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Cognitive Cyber Weapon Selection Tool Empirical Evaluation.  

E-Print Network [OSTI]

??Keeping in pace with the latest technological innovations in the cyber world, the misuse of this powerful infrastructure has also increased proportionally. Although a lot (more)

Ponangi, Preethi Vinayak

2011-01-01T23:59:59.000Z

82

Cyber - Protection for utilities ... | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber - Protection for utilities ... Hackers hoping to disrupt the power grid, water or natural gas service may be foiled by an intrusion detection system developed by researchers...

83

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)...

84

Sandia National Laboratories: Sandia Cyber Engineering Research...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyberdefenders * CERL * computer security * Cyber Engineering Research Laboratory * cybersecurity * SAND2013-2827P * Sandia computing expertise * Sandia Science & Technology Park...

85

Security and Cyber Guidance | Department of Energy  

Office of Environmental Management (EM)

April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Performance Testing Guidance & Information Composite Adversary Team Brochure - April 9, 2008...

86

Graph anomalies in cyber communications  

SciTech Connect (OSTI)

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

87

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Broader source: Energy.gov (indexed) [DOE]

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

88

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

89

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

90

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

91

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

92

Cyber-Physical System Verification Embedded Systems Group  

E-Print Network [OSTI]

(Felipe Bichued) 21 Introducing Simulation of Hybrid Systems with the Modelica Tool 32 #12;Cyber Physical

Berns, Karsten

93

A Two-Constraint Approach to Risky CyberSecurity  

E-Print Network [OSTI]

A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab #12;Risky CyberSecurity Research CyberSecurity systems becoming more;Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity

Faber, Ted

94

The Science, Engineering, and Business of Cyber Security  

E-Print Network [OSTI]

's nuclear football © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Cyber Security Goal ManyThe Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas at San

Sandhu, Ravi

95

Gamification for Measuring Cyber Security Situational Awareness  

SciTech Connect (OSTI)

Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

2013-03-01T23:59:59.000Z

96

Cyber Innovation Technology Summit | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

97

ACQUISITION LETTER  

Broader source: Energy.gov (indexed) [DOE]

Department of Energy No. 2001-03 Department of Energy No. 2001-03 Acquisition Regulation Date May 25, 2001 ACQUISITION LETTER This Acquisition Letter is issued under the authority of the Procurement Executives of DOE and NNSA. Subject: COSTS ASSOCIATED WITH WHISTLEBLOWER ACTIONS References: DEAR 931.205-47(h) DEAR 952.216-7, Alt II DEAR 970.3102-05-47(h) DEAR 970.5232-2, Payments and Advances When Does this Acquisition Letter Expire? This Acquisition Letter will expire when this guidance is distributed as an Acquisition Guide section or otherwise superseded. Whom Do You Contact for More Information? Contact Terry Sheppard of the Office of Procurement and Assistance Policy at (202) 586-8193 or terry.sheppard@hq.doe.gov Visit our website at www.pr.doe.gov for information on Acquisition Letters and other policy

98

MEMORANDUM FOR CHIEF ACQUISITION OFFICERS  

Broader source: Energy.gov (indexed) [DOE]

November 28, 2007 November 28, 2007 MEMORANDUM FOR CHIEF ACQUISITION OFFICERS SENIOR PROCUREMENT EXECUTIVES FROM: Paul A. Denett Administrator SUBJECT: Appropriate Use of Brand Name or Equal Purchase Descriptions The Office of Management and Budget (OMB) issued policy memorandums in April 2005 and April 2006, implementing brand name posting requirements for acquisitions (including simplified acquisitions and sole source procurements) over $25,000. The Federal Acquisition Regulation (FAR) was revised in September 2006 to incorporate this new policy. However, we are concerned that agencies are not preparing and posting the brand name justification or documentation in accordance with the new FAR requirements. Complaints have also been

99

ACQUISITION PLANNING  

Office of Environmental Management (EM)

PLANNING Guiding Principles Sound acquisition planning ensures that the contracting process is conducted in a timely manner, in accordance with statutory, regulatory,...

100

Cyber Assessment Methods for SCADA Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

102

Acquisition Guide  

Broader source: Energy.gov (indexed) [DOE]

_____Chapter 15.4-4 (July 2010) _____Chapter 15.4-4 (July 2010) GENERAL GUIDE FOR TECHNICAL ANALYSIS OF COST PROPOSALS FOR ACQUISITION CONTRACTS Acquisition Guide _____________________________________________________________ _______________________________________________________Chapter 15.4-4 (July 2010) TABLE OF CONTENT CHAPTER 1 - INTRODUCTION KEY CONCEPTS ........................................................................................1 LIST OF ACRONYMS...............................................................................1 RELATIONSHIP OF TECHNICAL ANALYSIS TO COST ANALYSIS ..................................2 RESPONSIBILITIES IN EVALUATING CONTRACTOR PROPOSALS ..................................2

103

ACQUISITION PLANNING  

Broader source: Energy.gov (indexed) [DOE]

Chapter 7.1 (May 2012 second revision) Chapter 7.1 (May 2012 second revision) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR 17.5 Interagency Acquisitions 11. FAR Subpart 17.6 Management and Operating Contracts 12. FAR Part 19 Small Business Programs Guiding Principles  Sound acquisition planning ensures that the contracting process is

104

ACQUISITION PLANNING  

Broader source: Energy.gov (indexed) [DOE]

-Chapter 7.1 (May 2012) -Chapter 7.1 (May 2012) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR 17.5 Interagency Acquisitions 11. FAR Subpart 17.6 Management and Operating Contracts 12. FAR Part 19 Small Business Programs Guiding Principles  Sound acquisition planning ensures that the contracting process is

105

ACQUISITION LETTER  

Broader source: Energy.gov (indexed) [DOE]

No. 2009-04 No. 2009-04 Acquisition Regulation Date 02/12/09 ACQUISITION LETTER This Acquisition Letter is issued under the authority of the DOE and NNSA Procurement Executives. Subject: Management of Excess Weapons Inventories and Selective Sensitive Equipment. References: 41 Code of Federal Regulations (CFR) 109-1, Department of Energy (DOE) Federal Property Management Regulations 48 CFR 52.245-1, Government Property DOE Guide 580.1-1, DOE Personal Property Management Guide DOE Order 580.1-1, DOE Personal Property Management, Contractor Requirements Document (CRD), Attachment 2, as set forth in the DOE O 580.1 Department of Energy Acquisition Regulation 970.5245-1, Property Federal Acquisition Regulation Part 45, Government Property

106

Security and Cyber Evaluations | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

107

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

108

Chapter 2 - Definitions of Cyber Terrorism  

Science Journals Connector (OSTI)

Abstract The term cyber terror appeared for the first time in the mid-eighties. Since then the notion has been misused a number of times by journalists and politicians. It does not help that cyber terror does not have a clear, agreed definition. This chapter first analyses the background of the confusion. Secondly, the chapter provides a definition of cyber terrorism which aligns with national definitions of terrorism. From this, it becomes clear that no act of cyber terror has yet occurred. We need to be prepared however as the increasing societal critical reliance on ICT will make ICT systems and services as well as embedded ICT an interesting target for future terrorists.

Eric Luiijf

2014-01-01T23:59:59.000Z

109

A rational jurisdiction for cyber terrorism  

Science Journals Connector (OSTI)

Abstract Cyberspace is a cross-national world that transcends geopolitical national borders. Jurisdiction is the focal point for any dispute arising in the international arena, because it determines which state court has the authority to settle a dispute. The objective of this paper is to analyse territorial and universal jurisdiction principles which can be specifically related to cyberspace to determine which of them is best suited to providing the appropriate jurisdiction in combating cyber terrorism and how conflicts arising between them can be settled. The transnational nature of cyber terrorism offences leads to jurisdictional complexity, thereby investigation and prosecution is difficult. Lack of harmonisation in legislating among countries leads to difficulty in investigation and prosecution of cyber terrorism offences. This paper notes that universal jurisdiction is the most feasible and effective method to deter cyber terrorism.

Pardis Moslemzadeh Tehrani; Nazura Abdul Manap

2013-01-01T23:59:59.000Z

110

Model Transformation for Cyber Physical Systems  

Science Journals Connector (OSTI)

Cyber Physical Systems(CPS) are composed with discrete and continuous dynamics. Traditional modeling techniques cant implement the requirement of modeling CPS. One way of solving this is to model CPS parts wi...

Shuguang Feng; Lichen Zhang

2014-01-01T23:59:59.000Z

111

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Broader source: Energy.gov (indexed) [DOE]

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

112

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Broader source: Energy.gov (indexed) [DOE]

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

113

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

114

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect (OSTI)

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a months worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a months worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-12-19T23:59:59.000Z

115

A nexus of Cyber-Geography and Cyber-Psychology: Topos/Notopia and identity in hacking  

Science Journals Connector (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as Notopia) and psychological aspects of hacking, from which emerges a central question of how humans perceive and manipulate their cyber-identities. Concealing (real and cyber) identities is typical in hacking. With our progressive acculturation with identity-less and place-less modes of existence, our cyber-identities through time may be studied from within John Lockes criterion of memory and the spatial-geographical criterion of identity.

Fivos Papadimitriou

2009-01-01T23:59:59.000Z

116

cyber  

National Nuclear Security Administration (NNSA)

and the review of information prior to public release or posting to publicly available web sites to assure it does not contain data that would assist an adversary.

117

ACQUISITION PLANNING  

Broader source: Energy.gov (indexed) [DOE]

7.1 (May 2010) 7.1 (May 2010) 1 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR Subpart 17.6 Management and Operating Contracts 11. FAR Part 19 Small Business Programs 12. FAR 25.802(a)(2) Other International Agreements and Coordination 13. FAR 34.004 Acquisition Strategy Guiding Principles

118

ACQUISITION PLANNING  

Broader source: Energy.gov (indexed) [DOE]

January 2011) January 2011) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR Subpart 17.6 Management and Operating Contracts 11. FAR Part 19 Small Business Programs 12. FAR 25.802(a)(2) Other International Agreements and Coordination Guiding Principles  Sound acquisition planning ensures that the contracting process is

119

ACQUISITION PLANNING  

Broader source: Energy.gov (indexed) [DOE]

OCTOBER 2010) OCTOBER 2010) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR Subpart 17.6 Management and Operating Contracts 11. FAR Part 19 Small Business Programs 12. FAR 25.802(a)(2) Other International Agreements and Coordination Guiding Principles  Sound acquisition planning ensures that the contracting process is

120

Acquisition Regulation  

Energy Savers [EERE]

the Government Paperwork Elimination Act FAR Subpart 4.5 Electronic Commerce in Contracting FAR Subpart 4.8 Government Contract Files FAR Subpart 7.1 Acquisition Plans DOE 0...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

ACQUISITION LETTER  

Broader source: Energy.gov (indexed) [DOE]

ACQUISITION LETTER ACQUISITION LETTER AUTHORITY This Acquisition Letter (AL) is issued by the Procurement Executive pursuant to a delegation from the Secretary and under the authority of the Department of Energy Acquisition Regulation (DEAR) subsection 901.301-70. CONTENTS CITATION TITLE DEAR Part 933 Protests, Disputes, and Appeals I. Purpose. This AL establishes policy and provides guidance for the use of alternative dispute resolution techniques in connection with disputes that arise under the Contract Disputes Act (CDA) of 1978, 41 U.S.C. sections 601-613. This AL revision deletes references to "district court" which were incorrectly cited in paragraph four of the Policy section. II. Background. Alternative Dispute Resolution (ADR) refers to a range of procedures

122

Acquisition Guide  

Broader source: Energy.gov (indexed) [DOE]

Chapter 15.4-4 (December 2010) Chapter 15.4-4 (December 2010) GENERAL GUIDE FOR TECHNICAL ANALYSIS OF COST PROPOSALS FOR ACQUISITION CONTRACTS Acquisition Guide _____________________________________________________________ __________________________________________________Chapter 15.4-4 (November 2010) TABLE OF CONTENT CHAPTER 1 - INTRODUCTION KEY CONCEPTS ........................................................................................1 LIST OF ACRONYMS...............................................................................1 RELATIONSHIP OF TECHNICAL ANALYSIS TO COST ANALYSIS ..................................2 RESPONSIBILITIES IN EVALUATING CONTRACTOR PROPOSALS ..................................2 CHAPTER 2 - PREPARING TO EVALUATE A PROPOSAL

123

Cyber Friendly Fire: Research Challenges for Security Informatics  

SciTech Connect (OSTI)

This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a systems topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approachesare discussed.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2013-06-06T23:59:59.000Z

124

Cyber-security Research Ethics Dialogue & Strategy Erin Kenneally  

E-Print Network [OSTI]

Cyber-security Research Ethics Dialogue & Strategy Workshop Erin Kenneally CAIDA/UC, San Diego La The inaugural Cyber-security Research Ethics Dialogue & Strat- egy Workshop was held on May 23, 2013

California at San Diego, University of

125

NISTIR 7916 Proceedings of the Cybersecurity in Cyber-  

E-Print Network [OSTI]

NISTIR 7916 Proceedings of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24 of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24, 2012 Editor: Tanya Brewer Computer Security

126

Reducing Cyber Risk to Critical Infrastructure: NIST Framework...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

The Vulnerability Analysis of Energy Delivery Control Systems Report Guidelines for Smart Grid Cyber Security (3.4 MB PDF) A Guide to Developing a Cyber Security and Risk...

127

Acquisition Guide Chapter 42.5  

Broader source: Energy.gov (indexed) [DOE]

Chapter 42.5 Chapter 42.5 (February 2012) 1 CONTRACT MANAGEMENT PLANNING Applicability: This section is applicable to the contracting activities of the Department of Energy (DOE). References:  FAR 46.4, "Government Contract Quality Assurance"  FAR 42, Contract Administration and Auditing Services  FAR 43, Contract Modifications  DEAR 970.1100-1, "Performance-based Contracting"  DOE Acquisition Guide, Chapter 7.1, "Acquisition Planning"  DOE Acquisition Guide, Chapter 37, "Service Contracting"  DOE Acquisition Guide Chapter 43.2, "Change Order Template"  DOE O 413.3B, "Program and Project Management for the Acquisition of Capital Assets"

128

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems Kyriakos G. Vamvoudakis, Jo~ao P. Mission-centric cyber-security analysts require a complete overview and understanding of the state. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion, iCTF 1 Introduction Guaranteeing

Hespanha, João Pedro

129

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

130

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

131

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems? Kyriakos G. Vamvoudakis1 , Jo~ao P,vigna}@cs.ucsb.edu Abstract. Mission-centric cyber-security analysts require a complete overview and understanding The Flag (iCTF) hacking competition. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion

Vigna, Giovanni

132

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

133

Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc  

Broader source: Energy.gov (indexed) [DOE]

8-5954 8-5954 Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis H. Cassidy Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

134

ACQUISITION PLANNING  

Broader source: Energy.gov (indexed) [DOE]

--Chapter 7.1 (JUNE 2010) --Chapter 7.1 (JUNE 2010) 2 ACQUISITION PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 7 Acquisition Planning 4. FAR Part 8 Required Sources of Supply 5. FAR Part 10 Market Research 6. FAR 11.402 Factors to Consider in Establishing Schedules 7. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 8. FAR Subpart 16.1 Selecting Contract Types 9. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 10. FAR Subpart 17.6 Management and Operating Contracts 11. FAR Part 19 Small Business Programs 12. FAR 25.802(a)(2) Other International Agreements and Coordination Guiding Principles

135

ACQUISITION PLANNING  

Broader source: Energy.gov (indexed) [DOE]

PLANNING PLANNING REFERENCES 1. FAR 4.803(a)(1) Contents of Contract Files 2. FAR 5.405(a) Exchange of Acquisition Information 3. FAR Part 6 Competition Requirements 4. FAR Part 7 Acquisition Planning 5. FAR Part 8 Required Sources of Supply 6. FAR Part 9 Contractor Qualifications 7. FAR Part 10 Market Research 8. FAR Part 11 Describing Agency Needs 9. FAR 15.201(c) Exchanges with Industry Before Receipt of Proposals 10. FAR Subpart 16.1 Selecting Contract Types 11. FAR 16.504(c) Indefinite-Quantity Contracts - Multiple Award Preference 12. FAR 17 Special Contracting Methods 13. FAR Part 19 Small Business Programs 14. FAR 25.802(a)(2) Other International Agreements and Coordination 15. FAR 34.004 Acquisition Strategy

136

Los Alamos director echoes cyber concerns  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

137

Acquisition News  

Broader source: Energy.gov (indexed) [DOE]

acquisition-news Office of Environmental Management acquisition-news Office of Environmental Management 1000 Independence Ave., SW Washington, DC 20585 202-586-7709 en Contract Awarded for Environmental Technical Services http://energy.gov/em/articles/contract-awarded-environmental-technical-services Contract Awarded for Environmental Technical Services

138

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

139

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Broader source: Energy.gov (indexed) [DOE]

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

140

DOE Cyber Security Role, Competency and Functional Matrix  

Broader source: Energy.gov (indexed) [DOE]

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

OPAM Policy Acquisition Guides | Department of Energy  

Energy Savers [EERE]

0 - Cost Accounting Standards Administration Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department of Energy (DOE) Order 350.1 and Special H Clause OPAM Policy...

142

Office of Acquisition Management (OAM) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

of Acquisition Management (OAM) | National Nuclear Security of Acquisition Management (OAM) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Acquisition Management (OAM) Home > About Us > Our Operations > Acquisition and Project Management > Office of Acquisition Management (OAM) Office of Acquisition Management (OAM) Office of Acquisition Management (OAM)

143

Office of Acquisition Management (OAM) | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Acquisition Management (OAM) | National Nuclear Security of Acquisition Management (OAM) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Acquisition Management (OAM) Home > About Us > Our Operations > Acquisition and Project Management > Office of Acquisition Management (OAM) Office of Acquisition Management (OAM) Office of Acquisition Management (OAM)

144

Memorandum for Chief Acquisition Officers, Senior Procurement Executives  

Broader source: Energy.gov (indexed) [DOE]

June 6, 2008 June 6, 2008 MEMORANDUM FOR CHIEF ACQUISITION OFFICERS SENIOR PROCUREMENT EXECUTIVES FROM: Paul A. Denett Administrator SUBJECT: Improving the Management and Use of Interagency Acquisitions Interagency acquisitions offer important benefits to federal agencies, including economies and efficiencies and the ability to leverage resources. The attached guidance is intended to help agencies achieve the greatest value possible from interagency acquisitions. Effective management and use of interagency acquisitions is a shared responsibility, especially for assisted acquisitions. Lack of clear lines of responsibility between agencies with requirements (requesting agencies) and the agencies which provide acquisition support and

145

Cyber-Physical Systems CPS Program  

E-Print Network [OSTI]

prosthetics Critical Infrastructure More reliable and efficient power grid Highways that allow denser traffic hybridization of computational (logical), physical, and human action." Examples of cyber-physical systems devices and systems, next-generation power grid, future defense systems, next-generation automobiles

Rajkumar, Ragunathan "Raj"

146

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

2011-05-16T23:59:59.000Z

147

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

2011-05-16T23:59:59.000Z

148

6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool-developed-to-catch-cyber-thieves-1370602608 1/5  

E-Print Network [OSTI]

cyber thieves Montreal: A new search tool developed by researchers in Canada can now help crime Lifestyle News Desk Cyber thief child porn search tool Canada cyber crime #12;6/16/13 New search tool6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool

Fung, Benjamin C. M.

149

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

150

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Broader source: Energy.gov (indexed) [DOE]

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

151

Cyber Security Requirements for Wireless Devices and Information Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

152

acquisition management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

153

SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)  

Science Journals Connector (OSTI)

The purpose of this document is to provide guidance for securing industrial control systems (ICS), including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other systems performing control functions. ... Keywords: Cyber-physcial systems, ICS, Industrial Control Systems, SCADA, Supervisory Control and Data Acquisition, security controls, threats, vulnerabilities

Keith A. Stouffer; Joseph A. Falco; Karen A. Scarfone

2011-06-01T23:59:59.000Z

154

Sandia National Laboratories: Cyber Security for Electric Infrastructu...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

advancements in phasor measurement units (PMUs), distributed energy resources (DER), smart-grid technologies, and cloud computing services represent significant cyber security...

155

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

156

Control Systems Cyber Security: Defense in Depth Strategies ...  

Broader source: Energy.gov (indexed) [DOE]

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

157

ADMINISTRATIVE RECORDS  

Broader source: Energy.gov (indexed) [DOE]

3: 3: PROCUREMENT, SUPPLY, AND GRANT RECORDS July 2008 Revision 2 Procurement and supply records document the acquisition of goods and non-personal services, controlling the volume of stock on hand, reporting procurement needs, and related supply matters which are part of daily procurement operations. The basic procurement files reflect a considerable range of procedure, from simple, small purchases to complicated prime contractor and subcontractor operations. Any records created prior to 1895 must first be offered to the National Archives and Records Administration (NARA) for appraisal before applying the disposal instructions. Frequently copies of procurement papers become integral parts of other files, such as project files of various types or general subject files pertaining to program operations;

158

Cyber Security Guidelines, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

159

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

160

Office of Security and Cyber Evaluations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

162

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

2011-05-16T23:59:59.000Z

163

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

2011-05-16T23:59:59.000Z

164

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01  

Broader source: Energy.gov (indexed) [DOE]

2 2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for, among other things, regulating interstate transmission of the Nation's electricity, natural gas and oil. In addition, the Commission licenses and inspects private, municipal and state hydroelectric projects. To achieve its mission, the Commission relies

165

ADMINISTRATIVE RECORDS SCHEDULE 11:  

Broader source: Energy.gov (indexed) [DOE]

ADMINISTRATIVE RECORDS SCHEDULE 11: ADMINISTRATIVE RECORDS SCHEDULE 11: SPACE AND MAINTENANCE RECORDS June 2007 Revision 1 This schedule provides for the disposal of all copies, wherever located in the Department, of records relating to space and maintenance, except as indicated below. Records documenting these functions pertain to the acquisition, allocation, utilization, and release of space and include related correspondence and reports submitted to the General Services Administration (or equivalent agency with similar Government-wide responsibilities) as directed by law and regulation (41 CFR 101-17); correspondence and forms relating to the compilation of directory service listings; identification credentials and related accountable records; requests for building and equipment services;

166

Ant-Based Cyber Security  

SciTech Connect (OSTI)

We describe a swarming-agent-based, mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries. The system places human administrators at the appropriate level where they provide system guidance while lower-level agents carry out tasks humans are unable to perform quickly enough to mitigate todays security threats. Cooperative Infrastructure Defense (CID) uses our ant-based approach to enable dialogue between humans and agents to foster a collaborative problem-solving environment, increase human situational awareness and influence using visualization and shared control. We discuss theoretical implementation characteristics along with results from recent proof-of-concept implementations.

Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Templeton, Steven J.; Fulp, Errin W.

2011-07-12T23:59:59.000Z

167

Time-based intrusion detection in cyber-physical systems  

Science Journals Connector (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

168

Cyber-physical energy systems: focus on smart buildings  

Science Journals Connector (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

169

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network [OSTI]

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

170

CyberPhysical System Security for the Electric Power Grid  

E-Print Network [OSTI]

INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally­physical systems (CPS); cyber security; electric grid; smart grid; supervisory control and data acquisi- tion

Manimaran, Govindarasu

171

Implementing constrained cyber-physical systems with IEC 61499  

Science Journals Connector (OSTI)

Cyber-physical systems (CPS) are integrations of computation and control with sensing and actuation of the physical environment. Typically, such systems consist of embedded computers that monitor and control physical processes in a feedback loop. While ... Keywords: Compilers, IEC 61499, cyber-physical systems, function blocks, software synthesis, synchronous

Li Hsien Yoong; Partha S. Roop; Zoran Salcic

2012-12-01T23:59:59.000Z

172

Deception used for Cyber Defense of Control Systems  

SciTech Connect (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

173

View Consistency in Architectures for Cyber-Physical Systems  

Science Journals Connector (OSTI)

Current methods for modeling, analysis, and design of cyber-physical systems lack a unifying framework due to the complexity and heterogeneity of the constituent elements and their interactions. Our approach is to define relationships between system ... Keywords: system architecture, view consistency, graph morphism, multi-domain modeling, cyber-physical systems

Ajinkya Bhave; Bruce H. Krogh; David Garlan; Bradley Schmerl

2011-04-01T23:59:59.000Z

174

A modelica coordination pattern library for cyber-physical systems  

Science Journals Connector (OSTI)

Today's embedded systems often do not operate individually anymore. Instead, they form so called cyber-physical systems, where the overall functionality is provided by the collaboration of systems. Consequently, the design of this collaboration is an ... Keywords: cyber-physical systems, design patterns, modelica, real-time coordination, simulation

Uwe Pohlmann; Stefan Dziwok; Matthias Meyer; Matthias Tichy; Sebastian Thiele

2014-03-01T23:59:59.000Z

175

Towards a theory for cyber-physical systems modeling  

Science Journals Connector (OSTI)

Modeling the heterogeneous composition of physical, computational and communication systems is an important challenge in engineering Cyber-Physical Systems (CPS), where the major sources of heterogeneity are causality, time semantics, and different physical ... Keywords: cyber-physical systems, formalization, heterogeneous composition, model-based engineering

Gabor Simko; Tihamer Levendovszky; Miklos Maroti; Janos Sztipanovits

2014-04-01T23:59:59.000Z

176

Acquisition Guide  

Broader source: Energy.gov (indexed) [DOE]

.4 (February 20 10) .4 (February 20 10) Source Evaluation Board (SEB) Secretariat and Knowledge Manager Guiding Principles P Establishment of a SEB Secretariat and Knowledge Management position will improve both the Department's procurement system and its management of knowledge attained by the Department's procurement personnel. REFERENCES Department of Energy (DOE) report on "Report on Reengineering the Business Clearance Process" issued November 2007 National Academy of Public Administration report on "Managing at the Speed of Light - Improving Mission Support Performance" issued July 2009 Government Accountability Office (GAO) report on "Better Performance Measures and Management Needed to Address Delays in Awarding Contracts (GAO-06-722)" issued June

177

The Department's Cyber Security Incident Management Program, IG-0787 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

178

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Broader source: Energy.gov (indexed) [DOE]

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

179

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

180

Policy Flash 2013-42 Acquisition Guide Chapter 19.1- Summary...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Policy Flash 2013-42 Acquisition Guide Chapter 19.1- Summary of Small Business Administration and Department of Energy Partnership Policy Flash 2013-42 Acquisition Guide Chapter...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Federal Acquisition Circular 2005-36  

Broader source: Energy.gov (indexed) [DOE]

Federal Acquisition Circular 2005-36 Federal Acquisition Circular 2005-36 Item Subject FAR case I.............. Federal Technical Data Solution (FedTeDS) 2008-038 II............. Fair Labor Standards Act and Service Contract 2007-021 Act Price Adjustment Clauses. III............ New Designated Country-Taiwan 2009-014 IV............. Prohibition on Restricted Business Operations 2008-004 in Sudan and Imports from Burma. V.............. List of Approved Attorneys, Abstractors, and 2006-013 Title Companies. VI............. Cost Accounting Standards (CAS) 2007-002 Administration and Associated Federal Acquisition Regulation Clauses. VII............ Technical Amendments

182

Acquisition Guide  

Broader source: Energy.gov (indexed) [DOE]

Chapter 71.1 (June 2010) Chapter 71.1 (June 2010) 1 HEADQUARTERS BUSINESS CLEARANCE PROCESS Overview This guide chapter provides guidance regarding the policies and procedures governing the Headquarters Business Clearance Review (BCR) process, the process by which certain procurement actions (solicitations, contracts, major contract changes, etc.) are reviewed and approved by the DOE Senior Procurement Executive (SPE) as a condition precedent to executing them. This section does not apply to the National Nuclear Security Administration (NNSA). Separate NNSA coverage is in BOP-003 and BOP-304. Background A. The Flow of Procurement Authority within the Department of Energy (DOE) The Secretary of Energy designated the Director, Office of Procurement and Assistance

183

Cyber security analysis testbed : combining real, emulation, and simulation.  

SciTech Connect (OSTI)

Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

2010-07-01T23:59:59.000Z

184

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

185

Sustainable Acquisition Coding System | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents &...

186

Policy Flash 2013-30 Acquisition Letter on Acquisition Planning...  

Energy Savers [EERE]

Letter on Acquisition Planning Considerations for Management and Operating Contracts Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management...

187

Project Management for the Acquisition of Capital Assets  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this Manual is to provide requirements and guidance to Department of Energy (DOE) employees, including National Nuclear Security Administration (NNSA) employees on the planning and acquisition of capital assets. Does not cancel other directives.

2003-03-28T23:59:59.000Z

188

EOTA Support Services Contract Acquisition  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Emergency Operations Training Academy (EOTA) Support Services Contract Emergency Operations Training Academy (EOTA) Support Services Contract Acquisition Welcome to the EOTA Support Services Contract Acquisition page. The U.S. Department of Energy National Nuclear Security Administration, EOTA requires support services to implement a comprehensive professional training development program to NNSA HQs and site office personnel. EOTA's training center located in Albuquerque, NM develop, coordinates, delivers, and certifies related emergency operations/management training at other NNSA site Offices located through out the country. EOTA ensures the effective and efficient training of emergency operations personnel throughout the DOE who are or may become involved in the planning, preparedness, and response of vital national resources. The EOTA provides

189

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

190

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

191

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Broader source: Energy.gov (indexed) [DOE]

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

192

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

193

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Broader source: Energy.gov (indexed) [DOE]

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

194

Ruminati : modeling the detection of textual cyber-bullying  

E-Print Network [OSTI]

The scourge of cyber-bullying has received widespread attention at all levels of society including parents, educators, adolescents, social scientists, psychiatrists and policy makers at the highest echelons of power. ...

Dinakar, Karthik

2012-01-01T23:59:59.000Z

195

CYBER SECURITY Software firm identifies hacking program against chemical makers  

Science Journals Connector (OSTI)

A cyber-attack campaign emanating from China targeted private companies involved in the research, development, and manufacture of chemicals and advanced materials between July and September of this year, according to a report from the computer security ...

RICK MULLIN

2011-11-07T23:59:59.000Z

196

Advances in Materials Genomics: Making CyberSteels Fly | Argonne...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Events Upcoming Events Upcoming Events Advances in Materials Genomics: Making CyberSteels Fly January 7, 2015 3:00PM to 4:00PM Presenter Greg Olson, Northwestern University and...

197

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

198

Towards a modeling language for cyber-physical systems  

Science Journals Connector (OSTI)

A cyber-physical system (CPS) is an interactive system of continuous plants and real-time controller programs. These systems usually feature a tight relationship between the physical and computational components and exhibit true concurrency with respect ...

Longfei Zhu; Yongxin Zhao; Huibiao Zhu; Qiwen Xu

2013-01-01T23:59:59.000Z

199

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Broader source: Energy.gov (indexed) [DOE]

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

200

Good Things in Small Packages: Micro Worlds and Cyber Security  

SciTech Connect (OSTI)

Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

David I Gertman

2013-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Cyber security best practices for the nuclear industry  

SciTech Connect (OSTI)

When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

2012-07-01T23:59:59.000Z

202

Cyber Security Vulnerability Impact on I&C Reliability  

SciTech Connect (OSTI)

We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities.

Hadley, Mark D.; McBride, Justin B.

2006-11-01T23:59:59.000Z

203

Acquisition of Real Property | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition of Real Property Acquisition of Real Property Acquisition of Real Property Acquisition of Real Property Memorandum of Understanding Between the U.S. Department of Energy and the U.S. Department of Army Amendment to the Memorandum of Understanding Between the U.S. Department of Energy and the U.S. Department of Army Standard Form 118 and 118A Report of Excess Real Property Forms Requirements: Document Title P.L. 106-580 Federal Property and Administrative Services Act of 1949, As Amended P.L. 95-91, Section 647 U.S. Department of Energy Organization Act P.L. 83-703 (68 Stat. 919), Section 161g Grants Special Authority as Required in the Act to Acquire, Sell, Dispose, etc., of Real Property in Furtherance of the Department's Mission (Under the Atomic Energy Act of 1954)

204

Data Acquisition Interpretation  

E-Print Network [OSTI]

Data Acquisition Inversion Interpretation Discussion Virgin River DCIP Report Justin Granek1 1 Report #12;Data Acquisition Inversion Interpretation Discussion Outline 1 Data Acquisition Location Survey Specications 2 Inversion Data Errors DCIP2D DCIP3D 3 Interpretation Correlations Snowbird Tectonic

Oldenburg, Douglas W.

205

DEPARTMENT OF DEFENSE GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND  

Broader source: Energy.gov (indexed) [DOE]

14 Federal Register / Vol. 75, No. 130 /Thursday, July 8, 2010 /Rules and Regulations 14 Federal Register / Vol. 75, No. 130 /Thursday, July 8, 2010 /Rules and Regulations DEPARTMENT OF DEFENSE GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 48 CFR Chapter 1 [Docket FAR-20104076, Sequence 61 Federal Acquisition Regulation; Federal Acquisition Circular 2005-44; Introduction AGENCY: Department of Defense (DoD), General Services Administration (GSA), and National Aeronautics and Space DATES:, For effective date, see separate Administration INASAI. document, which follows. ACTION: Summary presentation of an interim rule. SUMMARY: This document summarizes the Federal Acquisition Regulation (FAR) rule agreed to by the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council in this Federal Acquisition

206

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles  

E-Print Network [OSTI]

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles Large, and Definitions of Cybersecurity.... 8 Conventional Wisdom is Inadequate....................................... 9 Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles." The workshop

Feigenbaum, Joan

207

On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem  

E-Print Network [OSTI]

1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

Johansson, Karl Henrik

208

Acquisition Career Development Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes training and certification requirements and career development programs under the Acquisition Career Development (ACD) Program for DOE and NNSA acquisition workforce. The acquisition workforce includes contracting, purchasing, personal property management, program management, Contracting Officers and Contracting Officer Representatives. The ACD Program implements the Office of Federal Procurement Policy (OFPP) requirements, Federal Acquisition Regulation (FAR) requirements, Federal Acquisition Reform Act (FARA) requirements, and the objectives of Executive Order (E.O.) 129231, Federal Procurement Reform, dated 10-13-1994. This order cancels DOE O 361.1, Acquisition Career Development Program, dated 11-10-99, AND Acquisition Letter 2003-05, Personal Property Management Career Development, Training, and Certification Program, dated 9-10-03. Cancels DOE O 361.1 Chg 2. Canceled by DOE O 361.1B.

2004-04-19T23:59:59.000Z

209

CYSEP --A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao  

E-Print Network [OSTI]

1 of 9 CYSEP -- A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao.2Interface Memory Controller Cyber-Security Processor SPI4.2Interface To PCI Bus To Memory ToFramer To NP or End Sy stem Figure 1. Cyber-Security Processor (CYSEP) architecture The Firewall and Intrusion

Chao, Jonathan

210

Engineering Energy Systems of the Future as Cyber-Physical Ecosystems  

E-Print Network [OSTI]

Engineering Energy Systems of the Future as Cyber-Physical Ecosystems Marija Ilic, Carnegie Mellon University milic@andrew.cmu.edu Keynote at the Workshop on eNetworks as Infrastructure for the Future Cyber · Examples of existing and evolving energy industry architectures as particular cases of cyber- physical

Ilic, Marija D.

211

Cumulative strategic capability and performance of early movers and followers in the cyber market  

Science Journals Connector (OSTI)

Today, the cyber market is evolving rapidly in the networked age. In the cyber market, the traditional competitive strategy appears to no longer be effective. This study investigates the strategic choice differences of online firms based on their strategic ... Keywords: Cyber market, Early mover, Follower, Porter's generic strategies, Sand Cone model

Sang-Gun Lee; Chulmo Koo; Kichan Nam

2010-06-01T23:59:59.000Z

212

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

213

MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS  

E-Print Network [OSTI]

novel aspects of networked systems that include integrating dis- tributed computing systems with monitoring and controlling entities in the physical environment. For example, in real-time control systems stations. Other examples include smart grid systems and supervisory control and data acquisition (SCADA

Burmester, Mike

214

Acquisition Career Development Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order implements the Department's Acquisition Career Development program, mandatory for professionals in the GS-1102 and 1105 occupational procurement series, as well as others with significant procurement responsibilities. The Order also ensures that members of the acquisition workforce are aware of and adhere to the mandatory training and certification requirements. Cancels Acquisition Letter 98-06. Canceled by DOE O 361.1 Chg 1.

1999-11-10T23:59:59.000Z

215

Acquisition Career Development Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To set forth requirements and responsibilities for the Department of Energy (DOE) Acquisition Career Development (ACD) Program, which implements Office of Federal Procurement Policy (OFPP) requirements, Federal Acquisition Regulation (FAR) requirements, Federal Acquisition Reform Act (FARA) requirements, and the career development objectives of Executive Order (E.O.) 12931. Change 1 approved 12-20-2001. Cancels DOE O 361.1. Canceled by DOE O 361.1 Chg 2.

2001-12-20T23:59:59.000Z

216

Acquisition Career Development Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To set forth requirements and responsibilities for the Department of Energy (DOE) Acquisition Career Development (ACD) Program, which implements Office of Federal Procurement Policy (OFPP) requirements, Federal Acquisition Regulation (FAR) requirements, Federal Acquisition Reform Act (FARA) requirements, and the career development objectives of Executive Order (E.O.) 12931. Change 1 approved 12-20-2001. Change 2 approved 06-13-03. Cancels DOE O 361.1 Chg 1. Canceled by DOE O 361.1A.

2003-06-13T23:59:59.000Z

217

Announcements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Announcements | National Nuclear Security Administration Announcements | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Announcements Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Announcements

218

Evaluation Report on The Department's Unclassified Cyber Security Program  

Broader source: Energy.gov (indexed) [DOE]

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

219

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Broader source: Energy.gov (indexed) [DOE]

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

220

Microsoft Word - OE Cyber Release 10 18 07.doc  

Broader source: Energy.gov (indexed) [DOE]

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Acquisition Career Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order defines requirements and responsibilities for training, certification, and career development programs for the DOE acquisition workforce. Cancels DOE O 361.1A.

2008-01-24T23:59:59.000Z

222

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

223

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Broader source: Energy.gov (indexed) [DOE]

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

224

Cyber Security Evaluation of II&C Technologies  

SciTech Connect (OSTI)

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

225

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

226

Performance Based Service Acquisition Toolkit | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Procurement and Acquisition Guidance Contracting for Support Services Performance Based Service Acquisition Toolkit Performance Based Service Acquisition Toolkit...

227

Alternative Financing - New Acquisition Guide Subchapter | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Alternative Financing - New Acquisition Guide Subchapter Alternative Financing - New Acquisition Guide Subchapter policy flash Alternative Financing - New Acquisition Guide...

228

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect (OSTI)

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

229

Federal Acquisition Regulations Federal Acquisition Circular 2005-51 Summary  

Broader source: Energy.gov (indexed) [DOE]

Regulations Regulations Federal Acquisition Circular 2005-51 Summary Federal Register April 1, 2011 76FR 18304 I Women-Owned Small Business (WOSB) Program (Interim Rule). II Clarification of Standard Form 26--Award/Contract. Item I--Women-Owned Small Business (WOSB) Program (FAR Case 2010-015) (Interim) This interim rule amends the FAR to add subpart 19.15, Women-Owned Small Business Program, which will assist Federal agencies in achieving the 5 percent statutory goal for contracting with women-owned small business (WOSB) concerns. Agencies may restrict competition to economically disadvantaged women-owned small business (EDWOSB) concerns for contracts assigned a North American Industry Classification Systems (NAICS) code in an industry in which the Small Business Administration has

230

Policy Flash 20 Acquisition Letter 2014-05/Financial Acquisition...  

Energy Savers [EERE]

Appropriations Committees Subject to Energy and Water Development and Related Agencies Policy Flash 20 Acquisition Letter 2014-05Financial Acquisition Letter 2014-02 Congressional...

231

Overcoming performance collapse for 100Gbps cyber security  

Science Journals Connector (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

232

Synthesis of Optimal Controllers for Cyber Physical Systems Salar Moarref  

E-Print Network [OSTI]

Synthesis of Optimal Controllers for Cyber Physical Systems Salar Moarref November 16, 2012 construction. In this framework, we consider controller synthesis problem: given a model of the system.e. a controller that optimizes a quantitative measure.We review some of the recent works on synthesis of optimal

Plotkin, Joshua B.

233

CyberWalk: Enabling unconstrained omnidirectional walking through virtual environments  

Science Journals Connector (OSTI)

Despite many recent developments in virtual reality, an effective locomotion interface which allows for normal walking through large virtual environments was until recently still lacking. Here, we describe the new CyberWalk omnidirectional treadmill ... Keywords: Virtual reality, control system, locomotion, spatial navigation, treadmill

J. L. Souman; P. Robuffo Giordano; M. Schwaiger; I. Frissen; T. Thmmel; H. Ulbrich; A. De Luca; H. H. Blthoff; M. O. Ernst

2011-11-01T23:59:59.000Z

234

Statistical Model Checking for Cyber-Physical Systems  

E-Print Network [OSTI]

-Physical System (CPS). The autopilot is a software which provides inputs to the aircraft's engines and flight to keep control of the vehicle and improving safety. Cyber-Physical Systems enjoy wide adoption in our society, even in safety- critical applications, but are difficult to reason about. In particular

Clarke, Edmund M.

235

Secure control systems with application to cyber-physical systems  

Science Journals Connector (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power ... Keywords: SCADA systems, cyber-physical systems, secure control, security

Jin Dong; Seddik. M. Djouadi; James J. Nutaro; Teja Kuruganti

2014-04-01T23:59:59.000Z

236

Cyber-Physical Energy Systems: Focus on Smart Buildings  

E-Print Network [OSTI]

of a deeply coupled system of energy usage, comfort and work derived. At a macroscale, buildings use approxiCyber-Physical Energy Systems: Focus on Smart Buildings Jan Kleissl Dept. of Mechanical- tributions: one, a careful examination of different types of buildings and their energy use; two

Gupta, Rajesh

237

Cyber-Physical Systems Energy and the Environment  

E-Print Network [OSTI]

to Restructure · Generate energy locally ­ Wind, Solar ­ Energy Storage Plug in Hybrids ­ Share Power ­ Economics12/16/2008 1 Cyber-Physical Systems Energy and the Environment Bruce McMillin Department FREEDM ­ Future Renewable Electric Energy Delivery and Management Systems McMillin, 12/15/2008 Major

Rajkumar, Ragunathan "Raj"

238

Domestic campsites and cyber landscapes in the Rocky Mountains  

E-Print Network [OSTI]

Domestic campsites and cyber landscapes in the Rocky Mountains Laura L. Scheiber1 & Judson Byrd, Central Rocky Mountains, GIS, GPS, stone circles, architecture, multi-scalar, households, technology, tipis, horses and wagons occupying a flat clearing along a valley floor c. 1907. Photograph by Richard

Scheiber, Laura L.

239

Policy Flash 2013-30 Acquisition Letter on Acquisition Planning  

Broader source: Energy.gov (indexed) [DOE]

0 Acquisition Letter on Acquisition Planning 0 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Attached is Policy Flash 2013-30 Acquisition Letter on Acquisition Planning Considerations for Management and Operating Contracts Questions concerning this policy flash should be directed to Jason Taylor of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at (202) 287-1560 or at jason.taylor@hq.doe.gov. Policy Flash_MO Acq Planning AL.pdf AL_ 2013-03 Acq Planning_MO.pdf More Documents & Publications Attachment FY2011-09(3) Policy Flash 2013-78 Acquisition Guide Chapter 7.3 Acquisition Planning in

240

Categorical Exclusion Determinations: Southwestern Power Administration |  

Broader source: Energy.gov (indexed) [DOE]

Southwestern Power Southwestern Power Administration Categorical Exclusion Determinations: Southwestern Power Administration Categorical Exclusion Determinations issued by Southwestern Power Administration. DOCUMENTS AVAILABLE FOR DOWNLOAD August 6, 2013 CX-010879: Categorical Exclusion Determination Transmission Line 3005, Structure 290 Replacement CX(s) Applied: B4.6 Date: 08/06/2013 Location(s): Oklahoma Offices(s): Southwestern Power Administration July 25, 2013 CX-010880: Categorical Exclusion Determination Transmission Line 3016, Access Road Acquisition Project CX(s) Applied: B1.24 Date: 07/25/2013 Location(s): Oklahoma Offices(s): Southwestern Power Administration July 22, 2013 CX-010716: Categorical Exclusion Determination Short Mountain Access Road Easement Acquisition CX(s) Applied: B1.24

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

OPAM Policy Acquisition Guides  

Broader source: Energy.gov (indexed) [DOE]

17.3 (February 2004) 17.3 (February 2004) Acquisition, Use, and Disposal of Real Estate [Reference: DEAR 917.74, 970.5244-1] Overview This section provides internal Departmental information and a DOE point of contact for issues dealing with real estate acquisition, use, and disposal. Background DEAR 917.74 provides the policy and procedures to be followed in the acquisition, use, and disposal of real estate. In accordance with DEAR clause 970.5244-1, Management and Operating contractors also follow the DEAR 917.74 coverage when they acquire real property. Occasionally in the performance of cost type contracts, the performer will be required to acquire an interest in real estate. Real estate interests include purchases, leases, easements, permits, and licenses. In accordance with the current Secretarial delegation of authority for acquisition,

242

Acquisition and the Environment  

Broader source: Energy.gov [DOE]

The information provide on these pages are meant to be resource and tool for the DOE acquisition community. Please share suggestions for its further development and improvement. Provide your...

243

Data acquisition system  

DOE Patents [OSTI]

A data acquisition circuit for a particle detection system that allows for time tagging of particles detected by the system. The particle detection system screens out background noise and discriminate between hits from scattered and unscattered particles. The detection system can also be adapted to detect a wide variety of particle types. The detection system utilizes a particle detection pixel array, each pixel containing a back-biased PIN diode, and a data acquisition pixel array. Each pixel in the particle detection pixel array is in electrical contact with a pixel in the data acquisition pixel array. In response to a particle hit, the affected PIN diodes generate a current, which is detected by the corresponding data acquisition pixels. This current is integrated to produce a voltage across a capacitor, the voltage being related to the amount of energy deposited in the pixel by the particle. The current is also used to trigger a read of the pixel hit by the particle.

Shapiro, Stephen L. (14228 Amherst Ct., Los Altos Hills, CA 94022); Mani, Sudhindra (1618 17th St., Sacramento, CA 95814); Atlas, Eugene L. (440 De Anza Ct., Oceanside, CA 92057); Cords, Dieter H. W. (526 Cuesta Real, La Honda, CA 94020); Holbrook, Britt (4540 Varsity Ct., Sacramento, CA 95841)

1997-01-01T23:59:59.000Z

244

Acquisition of the Passive  

E-Print Network [OSTI]

This single-subject pilot study, modeled after de Villiers' 1973, investigates the subject's acquisition of the passive construction (i.e., 'The boy was hit by the girl', as opposed to The girl hit the boy'). The purposes ...

Hill, Francine

1998-01-01T23:59:59.000Z

245

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

246

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

247

Administrative Technician  

Broader source: Energy.gov [DOE]

(See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Upper Great Plains Region, Montana Maintenance, Fort Peck, Montana. Find out more...

248

Career Map: Land Acquisition Specialist  

Broader source: Energy.gov [DOE]

The Wind Program's Career Map provides job description information for Land Acquisition Specialist positions.

249

Procurement | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Procurement | National Nuclear Security Administration Procurement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Procurement Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Procurement Procurement NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

250

Use and Abuse of the Internet: Parental Knowledge of Cyber Bullying in Middle School.  

E-Print Network [OSTI]

??The current literature has emphasized the impact of cyber bullying on the lives of children and adolescents. However there are gaps in the literature in (more)

Rowe, Na Lisa

2008-01-01T23:59:59.000Z

251

Terrorism or hacking? A law interpretation on the concept of cyber terrorism.  

E-Print Network [OSTI]

?? Cyber-crime, terrorism and hacking is a topic discussed widely and many independent groups as for example Wikileaks and Anonymous are often taken into consideration (more)

Synnestvedt Jensen, Louise

2013-01-01T23:59:59.000Z

252

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network [OSTI]

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

253

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

254

Major Contract Solicitation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Solicitation | National Nuclear Security Administration Solicitation | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Major Contract Solicitation Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitation Major Contract Solicitation Pantex Plant Wind Farm Acquisition Y-12 National Security Complex, Pantex Plant, with Option for

255

Montana State University Administration and Finance University Services  

E-Print Network [OSTI]

Disposal Engineering & Utilities Engineering Services Utilities Acquisitions Heating Plant OperationMontana State University Administration and Finance University Services Associate Vice President Bob Lashaway Facilities Services Budget & IT Services Budgeting & Accounting IT Services

Maxwell, Bruce D.

256

Montana State University -Administration and Finance University Services  

E-Print Network [OSTI]

Disposal Engineering & Utilities Engineering Services Utilities Acquisitions Heating Plant OperationMontana State University - Administration and Finance University Services Associate Vice President Bob Lashaway Facilities Services Budget & IT Services Budgeting & Accounting IT Services

Lawrence, Rick L.

257

POLICY FLASH 2014-23 Acquisition Guide 13.3 Simplified Acquisition...  

Broader source: Energy.gov (indexed) [DOE]

23 Acquisition Guide 13.3 Simplified Acquisition Procedures POLICY FLASH 2014-23 Acquisition Guide 13.3 Simplified Acquisition Procedures Questions concerning this policy flash...

258

Policy Flash 2013-42 Acquisition Guide Chapter 19.1- Summary of Small  

Broader source: Energy.gov (indexed) [DOE]

2 Acquisition Guide Chapter 19.1- Summary of 2 Acquisition Guide Chapter 19.1- Summary of Small Business Administration and Department of Energy Partnership Policy Flash 2013-42 Acquisition Guide Chapter 19.1- Summary of Small Business Administration and Department of Energy Partnership Attached is Policy Flash 2013-42 Acquisition Guide Chapter 19.1 - Summary of Small Business Administration and Department of Energy Partnership Agreement Questions concerning this policy flash should be directed to Jason Taylor of the Contract and Financial Assistance Policy Division, Office of Policy, Office of Acquisition and Project Management at (202) 287-1560 or at jason.taylor@hq.doe.gov. Policy Flash 2013-42.pdf Department of Energy Partnership Agreement.pdf AG19 1.pdf More Documents & Publications Attachment FY2011-55 OPAM

259

A Comparison of Cross-Sector Cyber Security Standards  

SciTech Connect (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

260

Acquisition | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition Acquisition Acquisition In 2009, DOE competitively awarded Ameresco Federal Solutions, Inc. a fixed-price renewable Energy Savings Performance Contract (ESPC) to finance, design, construct, operate, maintain and fuel a new biomass facility at SRS for 20-years. Under ESPCs, private companies finance, install, and maintain new energy and water-efficient equipment in federal facilities, with no up-front funding or extra costs incurred by the government or taxpayers. In 2009, DOE competitively awarded Ameresco Federal Solutions, Inc. a fixed-price renewable Energy Savings Performance Contract (ESPC) to finance, design, construct, operate, maintain and fuel a new biomass facility at SRS for 20-years. Under ESPCs, private companies finance, install, and maintain new energy and water-efficient equipment in federal

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Acquisition Guide P  

Broader source: Energy.gov (indexed) [DOE]

P P h a p t e r 5.1 (September 2004) Release of Information: Congressional Notification and Long-range Acquisition Estimates [Reference: FAR 5.41 Overview This section discusses the procedures for providing Congressional notice of certain contract and financial assistance actions, and the release of long-range acquisition estimates. Background The Headquarters Office of Congressional and Intergovernmental Affairs notifies members of Congress of DOE activities likely to have an effect on their constituents. These activities include certain contract and financial assistance actions. FAR 5.404-1 identifies the requirements for the release of long-range acquisition planning estimates. Congressional Notification Contracting activities complete and submit form DOE F 4220.10, Congressional GrantIContract

262

Acquisition Strategy RM  

Broader source: Energy.gov (indexed) [DOE]

Acquisition Strategy Review Module Acquisition Strategy Review Module March 2010 CD-0 O 0 OFFICE OF C CD-1 F ENVIRO Standard R Acquisi Rev Critical Decis CD-2 M ONMENTAL Review Plan ition Stra view Module sion (CD) Ap CD March 2010 L MANAGE n (SRP) ategy e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets,

263

GridStat Cyber Security and Regional Deployment Project Report  

SciTech Connect (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

264

Aspects of Apache's Acquisition of Mariner Energy and Selected Devon Energy Assets  

Reports and Publications (EIA)

The Energy Information Administration reviews mergers, acquisitions, and alliances by companies that are respondents to Form EIA-28 (Financial Reporting System (FRS)), or that result in a company that meets the FRS reporting criteria.

2010-01-01T23:59:59.000Z

265

Control-theoretic cyber-physical system modeling and synthesis: A case study of an active direct methanol fuel cell  

Science Journals Connector (OSTI)

A joint optimization of the physical system and the cyber world is one of the key problems in the design of a cyber-physical system (CPS). The major mechanical forces and/or chemical reactions in a plant are commonly modified by actuators in the balance-of-plant ... Keywords: Balance of plants system, Cyber-physical systems, Direct methanol fuel cell

Donghwa Shin; Jaehyun Park; Younghyun Kim; Jaeam Seo; Naehyuck Chang

2012-12-01T23:59:59.000Z

266

Positive affect predicting worker psychological response to cyber-bullying in the high-tech industry in Northern Taiwan  

Science Journals Connector (OSTI)

Online cyber-bullying has become a frequent occurrence in organizations. To understand individual dispositions and the organizational factors that effect online cyber-bullying, the present study investigates the relationship among positive affect, the ... Keywords: Cyber-bullying, Organizational innovation climate, Positive thinking, Psychological response, Workplace bullying

Jon-Chao Hong; Lin Chien-Hou; Ming-Yueh Hwang; Ru-Ping Hu; Yi-Ling Chen

2014-01-01T23:59:59.000Z

267

Federal Acquisition Regulation; Federal Acquisition Circular  

Broader source: Energy.gov (indexed) [DOE]

2005-37; Introduction Federal Acquisition Circular (FAC) 2005-37 List of Rules in FAC 2005-37 Item Subject I. Registry of Disaster Response Contractors II. Limiting Length of Noncompetitive Contracts in "Unusual and Compelling Urgency" Circumstances III. GAO Access to Contractor Employees IV. Use of Commercial Services Item Authority V. Limitations on Pass-Through Charges VI. Award Fee Language Revision VII. National Response Framework VIII. Technical Amendments SUPPLEMENTARY INFORMATION: Summaries for each FAR rule follow. Item I-Registry of Disaster Response Contractors (FAR Case 2008-035) This interim rule amends the FAR at parts 2, 4, 7, 10, 13, 18, 26, and 52 to implement the Registry of Disaster Response Contractors provision, section 697 of the Department of

268

Federal Acquisition Regulation; Federal Acquisition Circular  

Broader source: Energy.gov (indexed) [DOE]

0 0 Federal Acquisition Circular (FAC) 2005-40 Federal Register /Vol. 75, No. 55 /Tuesday, March 23, 2010 /page 14059 A summary for the FAR rule follows. Federal Awardee Performance and Integrity Information System (FAPIIS) (FAR case 2008-027) Effective Date: April 22, 2010. This final rule amends the FAR to implement section 872 of the Duncan Hunter National Defense Authorization Act for Fiscal Year 2009. Section 872 requires the establishment of a data system, Federal Awardee Performance and Integrity Information System (FAPIIS), containing specific information on the integrity and performance of covered Federal agency contractors and grantees. FAPIIS is available for use in award decisions at www.ppirs.gov. Government input to FAPIIS is accomplished at www.cpars.csd.disa.mil.

269

Federal Acquisition Regulation; Federal Acquisition Circular 2005-47; Summary  

Broader source: Energy.gov (indexed) [DOE]

7; Summary 7; Summary This document summarizes the Federal Acquisition Regulation (FAR) rules agreed to by the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council (Councils) in this Federal Acquisition Circular (FAC) 2005-47. All were effective December 13, 2010 except Items II, HUB Zone, and VI, Pass Through, which will be effective January 12, 2011. List of Rules in FAC 2005-47 Item Subject FAR case Analyst ------------------------------------------------------------------------------------------------------------ ---- I..................................... Notification of Employee 2010-006 McFadden.

270

OPAM Policy Acquisition Guides | Department of Energy  

Energy Savers [EERE]

Policy Acquisition Guides Acquisition Guides OPAM Policy Acquisition Guides More Documents & Publications Weighted Guidelines Weighted Guidelines Microsoft Word - Final MR AL.doc...

271

ADMINISTRATIVE RECORDS SCHEDULE 23: ADMINISTRATIVE RECORDS SCHEDULE...  

Broader source: Energy.gov (indexed) [DOE]

ADMINISTRATIVE RECORDS SCHEDULE 23: RECORDS COMMON TO MOST OFFICES ADMINISTRATIVE RECORDS SCHEDULE 23: ADMINISTRATIVE RECORDS SCHEDULE 23: RECORDS COMMON TO MOST OFFICES This...

272

A multi-level approach to understanding the impact of cyber crime on the financial sector  

Science Journals Connector (OSTI)

This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible ... Keywords: Causal loop diagram, Cyber crime, Economic impact, Financial sector, System dynamics

Monica Lagazio, Nazneen Sherif, Mike Cushman

2014-09-01T23:59:59.000Z

273

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics  

E-Print Network [OSTI]

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics Informal Definition and Implication Abstract We argue that emergent behavior is inherent to cybersecurity). Scenario: Illustration of cyber epidemics model (which is a specific kind of Cybersecurity Dynamics model

Xu, Shouhuai

274

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid  

E-Print Network [OSTI]

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa stability in the smart grid in the face of cyber-physical attack. We model the smart grid as a networked the proposed framework. I. INTRODUCTION It is well known that the smart grid promises increased reliability

Kundur, Deepa

275

Department of Energy Acquisition System - A Guide for Executives |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Department of Energy Acquisition System - A Guide for Executives Department of Energy Acquisition System - A Guide for Executives Department of Energy Acquisition System - A Guide for Executives The principal purposes of the Department's acquisition system are to: Deliver on a timely basis the best value product or service to the customer by, for example, Maximizing the use of commercial products and services. Using contractors who have a track record of successful past performance or who demonstrate a current superior ability to perform. Promoting competition. Maintain the public's trust by conducting business with integrity, fairness, openness, and compliance with statutory and regulatory requirements. Minimize administrative operating costs Fulfill public policy objectsives, such as Providing opportunities for small and small disadvantaged business.

276

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Broader source: Energy.gov (indexed) [DOE]

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

277

ESPC ENABLE ACQUISITION PLAN TEMPLATE  

Broader source: Energy.gov [DOE]

Template serves as a tool to help agencies develop an acquisition plan. The acquisition plan is the first formal step in the Energy Savings Performance Contract (ESPC) ENABLE procurement process. The completed acquisition plan will serve as a guide throughout the rest of the process.

278

Southeastern Power Administration | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Southeastern Power Administration Southeastern Power Administration Search Search form Search Southeastern Power Administration Southeastern Power Administration Services Services Home Rate Schedules Acquisition Program Competitive Resource Strategies Annual Reports SEPA FOIA Power Operations Power Operations Home How it Works Generation Quick Facts Mission About Us About Us Home News News Home Press Releases Career Opportunities SEPA History SEPA Video Offices Southeastern Power Administration Southeastern Power Administration Power Operations Click to view a map of SEPA power operations. Latest Rate Schedules October 1, 2012 ALA-1-N Wholesale Power Rate Schedule Area: PowerSouth Energy Cooperative System: Georgia-Alabama-South Carolina October 1, 2012 Duke-1-E Wholesale Power Rate Schedule Area: Duke On-System System: Georgia-Alabama-South Carolina

279

Sustainable Acquisition | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition Acquisition Sustainable Acquisition Mission The team establishes a national approach to expand purchases of environmentally sound goods and services, including biobased products in accordance with Executive Order (EO) 13423, Strengthening Federal Environmental, Energy, and Transportation Management, and (EO) 13514, Federal Leadership in Environmental, Energy, and Economic Performance, and DOE Order 436.1, Departmental Sustainability, as approved by LM. The team advocates the implementation of a "green" procurement process. Scope The team has established a process to evaluate the procurement of goods and services for LM using the acquisition of environmentally preferable products and services, including the acquisition of biobased, environmentally preferable, energy-efficient, water-efficient, and

280

OPAM Policy Acquisition Guides | Department of Energy  

Energy Savers [EERE]

Acquisition, Use, and Disposal of Real Estate Acquisition, Use, and Disposal of Real Estate Chapter 17 - Special Contracting Methods...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Acquisition of Basic Information  

Science Journals Connector (OSTI)

The basic information allows the auditor to take a look of the actual situation of the building and facilities and can be gathered from the technical documentation and administrative documentation that the cli...

Giuliano DallO

2013-01-01T23:59:59.000Z

282

Subscribe / Unsubscribe | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Subscribe / Unsubscribe | National Nuclear Security Administration Subscribe / Unsubscribe | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Subscribe / Unsubscribe Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

283

Sources Sought | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sources Sought | National Nuclear Security Administration Sources Sought | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Sources Sought Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Sources Sought

284

Questions and Answers | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Questions and Answers | National Nuclear Security Administration Questions and Answers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Questions and Answers Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

285

Request for Proposal | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Request for Proposal | National Nuclear Security Administration Request for Proposal | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Request for Proposal Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

286

Reading Room | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reading Room | National Nuclear Security Administration Reading Room | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Reading Room Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Reading Room

287

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect (OSTI)

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

288

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect (OSTI)

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

289

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect (OSTI)

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

290

Revised Acquisition Guide Chapter 42.5, Contract Management Planning  

Broader source: Energy.gov (indexed) [DOE]

2-24 2-24 Date: February 21, 2012 To: Procurement Directors From: Director Contract and Financial Assistance Policy Division Office of Policy Office of Procurement and Assistance Management Subject: Revised Acquisition Guide Chapter 42.5, Contract Management Planning Summary: The Department of Energy (DOE) has been on GAO's High Risk List for the past several years as a result of inadequate contract and project management. Accordingly, the improvement of contract administration is a critical issue for DOE. The Acquisition Guide chapter on Contract Management Planning has been completely revised to address this matter.

291

Cyber security in the Smart Grid: Survey and challenges  

Science Journals Connector (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the silent features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we present a comprehensive survey of cyber security issues for the Smart Grid. Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid. We aim to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security.

Wenye Wang; Zhuo Lu

2013-01-01T23:59:59.000Z

292

Secure control systems with application to cyber-physical systems  

SciTech Connect (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

293

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Broader source: Energy.gov (indexed) [DOE]

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

294

Policy Flash 2013-68 Acquisition Guide 42.101 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8 Acquisition Guide 42.101 8 Acquisition Guide 42.101 Policy Flash 2013-68 Acquisition Guide 42.101 Questions concerning this policy flash should be directed to Michael Righi of the Contract and Financial Assistance Policy Division, Office of Policy, Office Acquisition and Project Management at (202) 287-1337 or at Michael.Righi@hq.doe.gov POLICY_FLASH_for Acquisition Guiide Chapter on Audit Requirements for non MO contracts.pdf ninth version of Audit Guide Chapter of April 2013--incorporating field comments -FINAL.pdf More Documents & Publications Chapter 42 - Contract Administration 2014-02 Acquistion Letter 2014-01: Management and Operating Contractors' Audit Coverage of Cost-Reimbursement Subcontracts Attached is Policy Flash 2013-44 Acquisition Guide- Allowability of Incurred Costs

295

Policy Flash 2013-68 Acquisition Guide 42.101 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Policy Flash 2013-68 Acquisition Guide 42.101 Policy Flash 2013-68 Acquisition Guide 42.101 Policy Flash 2013-68 Acquisition Guide 42.101 Questions concerning this policy flash should be directed to Michael Righi of the Contract and Financial Assistance Policy Division, Office of Policy, Office Acquisition and Project Management at (202) 287-1337 or at Michael.Righi@hq.doe.gov POLICY_FLASH_for Acquisition Guiide Chapter on Audit Requirements for non MO contracts.pdf ninth version of Audit Guide Chapter of April 2013--incorporating field comments -FINAL.pdf More Documents & Publications Chapter 42 - Contract Administration Attached is Policy Flash 2013-44 Acquisition Guide- Allowability of Incurred Costs 2014-02 Acquistion Letter 2014-01: Management and Operating Contractors' Audit Coverage of Cost-Reimbursement Subcontracts

296

Acquisition Guide | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Samples - forms and other useful documentation. The Guide is intended to serve as a primer on various acquisition issues, and may not present lengthy discussion on every...

297

MEMORANDUM FOR CHIEF ACQUISITION OFFICERS  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

is critical for agency program managers as they define requirements and for contracting officers as they develop acquisition strategies, seek opportunities for small...

298

Sustaninable Acquisition | Department of Energy  

Office of Environmental Management (EM)

Acquisition Federal agencies are required to give preference to products that are energy efficient, water efficient, made from biobased or recycled content, are non-toxic...

299

Bonneville Power Administration Administrator Steve Wright  

E-Print Network [OSTI]

Bonneville Power Administration Administrator Steve Wright PO Box 12999 Portland, OR 97208 Dear salmon, clean, renewable energy, and a healthy economy. The Bonneville Power Administration (BPA largely failed to meet their legal salmon recovery responsibilities. I urge the Bonneville Power

300

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical  

Broader source: Energy.gov (indexed) [DOE]

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of sustainable energy systems. The second webinar, Cyber-Physical Systems Security for the Smart Grid, will be held on Fecruary 7, 2012 by Manimaran Govindarasu, Professor if Electrical and Computer Engineering at Iowa State University. Govindarasu_PSERC_Webinar_Feb_2012.pdf More Documents & Publications April 2012 PSERC Webinars on Issues in Designing the Future Grid

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Broader source: Energy.gov (indexed) [DOE]

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

302

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network [OSTI]

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

303

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big Data  

E-Print Network [OSTI]

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big to cybersecurity and big data. Outstanding candidates from all areas of software engineering and computer science

Carver, Jeffrey C.

304

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

SciTech Connect (OSTI)

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

305

Treatment outcomes using CyberKnife for brain metastases from lung cancer  

Science Journals Connector (OSTI)

......Treatment outcomes using CyberKnife for brain metastases from lung cancer Keisuke Tamari...fractionated stereotactic radiotherapy (SRT) for brain metastases from lung cancer. A total of 67 patients with 109 brain metastases from lung cancer treated using......

Keisuke Tamari; Osamu Suzuki; Naoya Hashimoto; Naoki Kagawa; Masateru Fujiwara; Iori Sumida; Yuji Seo; Fumiaki Isohashi; Yasuo Yoshioka; Toshiki Yoshimine; Kazuhiko Ogawa

2014-10-01T23:59:59.000Z

306

Cyber visual training as a new method for the mastery of endoscopic surgery  

Science Journals Connector (OSTI)

We devised a new method incorporating cyber visual training whereby novices in endoscopic surgery are instructed via repetition of a video-recorded procedure. We then conducted a study designed to investigate ...

S. Takiguchi; M. Sekimoto; M. Yasui

2005-09-01T23:59:59.000Z

307

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network [OSTI]

of the level of their security defense processes' efficiency and the impact of their investment. Modeling and characterization of the dynamics of cyber security management are essential to risk prediction, damage assessment, and resource allocations...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

308

7.0 - Integrated Acquisition Planning Process  

Broader source: Energy.gov (indexed) [DOE]

0 (August 2006) 0 (August 2006) 1 INTEGRATING ACQUISITION PLANNING PROCESSES - AN OVERVIEW REFERENCES 1. FAR Part 7 Acquisition Planning 2. FAR Part 34 Major System Acquisition 3. Acquisition Letter 2005-08R, Small Business Programs 4. Acquisition Guide Chapter 7.1, Acquisition Planning 5. Acquisition Guide Chapter 42.5, Contract Management Planning 6. DOE O 580.1 Department of Energy Property Management Program 7. DOE O 413.3 Program and Project Management for the Acquisition of Capital Assets Guiding Principles n Acquisition planning benefits from integrating independent planning processes and a team approach that includes appropriate representation

309

OPAM Policy Acquisition Guides  

Broader source: Energy.gov (indexed) [DOE]

Chapter 15.4-2 (January 2007) Chapter 15.4-2 (January 2007) 1 Weighted Guidelines [References: FAR 15.4, DEAR 915.4] Overview This section provides guidance for applying the Department's structured approach in determining profit/fee. Background The FAR requires consideration of certain factors (described in 15.404-4 as "profit- analysis factors" or "common factors") in developing a structured profit/fee approach. DOE's structured approach for determining profit/fee objectives is used in those acquisitions when the contracting officer is required to perform a cost analysis. This system provides a comprehensive approach for determining a fair profit or fee. It ensures consistent consideration of the relative value of the factors and provides a basis for

310

"Data Acquisition Systems"  

SciTech Connect (OSTI)

This project involved support for Lou Costrell and myself in the development of IEEE and IEC standards for nuclear counting and data acquisition systems. Over the years, as a result of this support, Lou and I were able to attend standards meetings of IEEE and IEC, which led directly to the publication of many standards for NIM systems, FastBus and CAMAC. We also chaired several writing committees as well as ANSI N42 (Nuclear instrumentation), IEEE NIM (NIM standard), IEEE NID (NPSS nuclear instruments and detector) and IEC TC45 WG9 (Nuclear instrumentation). Through this support we were able to assure that the interests of the US and DOE were expressed and implemented in the various standards.

Unterweger, Michael; Costrell, Louis deceased

2009-07-07T23:59:59.000Z

311

Predicting Cyber-Production deviance in the workplace  

Science Journals Connector (OSTI)

The excessive use of the internet for non-work-related activities is a form of white-collar deviant behaviour at work. Applying the Theory of Reasoned Action, structural equation modelling was used to predict Cyber-Production (CP) deviant behaviours in the workplace. Attitude and intention to visit non-work-related websites were found to be important predictors of such behaviours. Workplace Subjective Norms (SN) had no impact on the tendency to perform CP deviant activities but did influence intention to visit work-related websites. The findings of the study contributed to an expanded understanding of the potential predictors of CP deviance in the workplace and suggested appropriate strategies for effective internet management.

Pruthikrai Mahatanankoon

2006-01-01T23:59:59.000Z

312

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

313

BROOKHAVEN NATIONAL LABORATORYS CAPABILITIES FOR ADVANCED ANALYSES OF CYBER THREATS  

SciTech Connect (OSTI)

BNL has several ongoing, mature, and successful programs and areas of core scientific expertise that readily could be modified to address problems facing national security and efforts by the IC related to securing our nations computer networks. In supporting these programs, BNL houses an expansive, scalable infrastructure built exclusively for transporting, storing, and analyzing large disparate data-sets. Our ongoing research projects on various infrastructural issues in computer science undoubtedly would be relevant to national security. Furthermore, BNL frequently partners with researchers in academia and industry worldwide to foster unique and innovative ideas for expanding research opportunities and extending our insights. Because the basic science conducted at BNL is unique, such projects have led to advanced techniques, unlike any others, to support our mission of discovery. Many of them are modular techniques, thus making them ideal for abstraction and retrofitting to other uses including those facing national security, specifically the safety of the nations cyber space.

DePhillips M. P.

2014-06-06T23:59:59.000Z

314

Computer Systems Administrator  

E-Print Network [OSTI]

Computer Systems Administrator Fort Collins, CO POSITION A Computer Systems Administrator (Non activities. RESPONSIBILITIES The System Administrator will provide Unix/Linux, Windows computer system or computer science, and three years computer systems administration experience. DURATION The work is planned

315

Acquisition Resources | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition » Acquisition Acquisition » Acquisition Resources Acquisition Resources Doing Business with DOE/EM Doing Business with DOE/EM EM Procurement Offices Doing Business with EM Consolidated Business Center Guide for Submission of Unsolicated Proposals Federal Business Opportunities Small Business Opportunities EM Major Procurements as of 10/01/13 EM Utility Contracts EM Partnering Initiative: Journey to Excellence Metric No. 3.5 Project Management Resources DOE Office of Environmental Management Project & Contract Management Improvement Timeline Project Management Approach Using Earned Value Management Root Cause Analysis and Corrective Actions Plan DOE Order 413.3B DOE Directives OMB Capital Programming Guide OECM Project Management Career Development Program OECM Project Management Policy and Guidance per Office of Management

316

Program and Project Management for the Acquisition of Capital Assets  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To provide the Department of Energy (DOE), including the National Nuclear Security Administration, with project management direction for the acquisition of capital assets with the goal of delivering projects on schedule, within budget, and fully capable of meeting mission performance, safeguards and security, and environmental, safety, and health standards. Cancels DOE O 413.3. Canceled by DOE O 413.3A Chg 1.

2011-05-18T23:59:59.000Z

317

Management and Administration | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management and Administration | National Nuclear Security Administration Management and Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Management and Administration Home > About Us > Our Programs > Powering the Nuclear Navy > Management and Administration Management and Administration NNSA's Naval Reactors is committed to excellence and dedicated to meeting

318

Categorical Exclusion Determinations: Bonneville Power Administration |  

Broader source: Energy.gov (indexed) [DOE]

June 4, 2013 June 4, 2013 CX-010433: Categorical Exclusion Determination Memaloose Meadows Land Acquisition CX(s) Applied: B1.25 Date: 06/04/2013 Location(s): Oregon Offices(s): Bonneville Power Administration June 3, 2013 CX-010436: Categorical Exclusion Determination Tri-Cities Maintenance Headquarters Project CX(s) Applied: B1.15 Date: 06/03/2013 Location(s): Washington, Washington Offices(s): Bonneville Power Administration June 3, 2013 CX-010435: Categorical Exclusion Determination De Moss Substation Expansion CX(s) Applied: B4.6 Date: 06/03/2013 Location(s): Oregon Offices(s): Bonneville Power Administration June 3, 2013 CX-010434: Categorical Exclusion Determination LaPine Substation Shunt Reactor Addition CX(s) Applied: B4.6 Date: 06/03/2013 Location(s): Oregon, Oregon Offices(s): Bonneville Power Administration

319

Microsoft Word - Similkameen_Acquisition_CX .docx  

Broader source: Energy.gov (indexed) [DOE]

Dave Roberts Dave Roberts Project Manager - KEWU-4 Proposed Action: Provision of funds to the Washington Department of Fish and Wildlife (WDFW) to purchase two parcels of land from the Trust for Public Land in Okanogan County, Washington. Fish and Wildlife Project No.: 2007-232-00 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.25 Transfer of land/habitat preservation wildlife management. Location: The two parcels are located in Township 40 North, Range 25 East, Sections 17 and 21 of the Nighthawk 7.5' USGS quadrangle map, in Okanogan County, Washington (northwest of the town of Oroville). Proposed by: Bonneville Power Administration (BPA). Description of the Proposed Action: BPA proposes to fund the acquisition of two parcels of

320

Small Business | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Home > About Us > Our Operations > Acquisition and Project Management > Small Business Small Business NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Small Business Toolbox | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Toolbox | National Nuclear Security Administration Toolbox | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Toolbox Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Small Business Toolbox Small Business Toolbox NNSA's Small Business program serves as the Info-structure through which

322

Contractor Human Resources | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contractor Human Resources | National Nuclear Security Administration Contractor Human Resources | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contractor Human Resources Home > About Us > Our Operations > Acquisition and Project Management > Contractor Human Resources Contractor Human Resources Welcome The Contractor Human Resources mission is to provide expert advice and

323

Chapter 13 - Simplified Acquisition Procedures | Department of...  

Broader source: Energy.gov (indexed) [DOE]

13 - Simplified Acquisition Procedures Chapter 13 - Simplified Acquisition Procedures 13.1 - Purchase Card Policy and Operating Procedures 13.2PurchaseOrders0.pdf More Documents...

324

Solar Acquisition Corp | Open Energy Information  

Open Energy Info (EERE)

Acquisition Corp Jump to: navigation, search Name: Solar Acquisition Corp Place: Ann Arbor, Michigan Product: Michigan-based holding company in the process of acquiring a portfolio...

325

OPAM Policy Acquisition Guides | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

17 - Special Contracting Methods Acquisition Letter 2009-03 Acquisition Planning-Extending A Management and Operating Contract Without Full and Open Competition and Site and...

326

Memorandum for Chief Acquisition Officers, Senior Procurement...  

Office of Environmental Management (EM)

in the acquisition lifecycle and a model interagency agreement to reinforce sound contracting and fiscal practices. The guidance reflects comments provided by Chief Acquisition...

327

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

328

Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department of  

Broader source: Energy.gov (indexed) [DOE]

2 Acquisition Letter 09 - Revision of Department 2 Acquisition Letter 09 - Revision of Department of Energy (DOE) Order 350.1 and Special H Clause Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department of Energy (DOE) Order 350.1 and Special H Clause Questions concerning this policy flash should be directed to Robert M. Myers, Director, Contractor Human Resources Policy Division (MA-612) at (202) 287-1584 or robert.myers@hq.doe.gov. Policy Flash - DOE O 350 1.pdf Consolidated Model H-Clause 06-27-13.pdf Acquisition Letter - DOE O 350 1 6-27-13.pdf More Documents & Publications Chapter 30 - Cost Accounting Standards Administration OPAM Policy Acquisition Guides GAO-04-539 Department of Energy: Certain Postretirement Benefits for Contractor Employees Are Unfunded and Program Oversight Could Be Improved

329

Acquisition Letters | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Acquisition Letters Acquisition Letters Acquisition Letters The following is a list of active Department of Energy Acquisition Letters. These files are in PDF (Portable Document Files), MS Excel, or htm (hypertext markup) format. To read PDF files you must have Adobe Acrobat Reader which is available at no charge from Adobe (http://www.adobe.com/). If you have any questions concerning this list, please contact the Office of Procurement and Assistance Policy on (202) 287-1330. NOTE: Copies of rescinded or cancelled AL's are available by calling the Office of Procurement and Assistance Policy at (202) 287-1330. ASSISTANCE ON USING THESE FILES: You may: (1) download these files to your local machine by clicking on the file name and choosing SAVE TO DISK, OR (2) you can configure Adobe Acrobat Reader to automatically open, which

330

Customer Acquisition | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

child looking at a silver box on the outside of a home. Customer acquisition costs in the solar energy industry include marketing efforts to reach potential customers and salary...

331

,"California Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","California Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sca_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sca_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:35 PM"

332

,"Louisiana Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Louisiana Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sla_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sla_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:36 PM"

333

,"Oklahoma Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Oklahoma Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sok_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sok_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:39 PM"

334

,"Utah Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Utah Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sut_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sut_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:40 PM"

335

,"Wyoming Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Wyoming Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16swy_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16swy_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:41 PM"

336

,"Virginia Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Virginia Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sva_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sva_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:40 PM"

337

,"Montana Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Montana Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16smt_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16smt_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:37 PM"

338

,"Texas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Texas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16stx_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16stx_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:39 PM"

339

,"Pennsylvania Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Pennsylvania Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16spa_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16spa_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:39 PM"

340

,"Alabama Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Alabama Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sal_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sal_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:34 PM"

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

,"Ohio Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Ohio Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16soh_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16soh_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:39 PM"

342

,"Kentucky Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Kentucky Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sky_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sky_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:36 PM"

343

,"Arkansas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Arkansas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sar_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sar_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:35 PM"

344

,"Kansas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Kansas Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sks_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sks_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:36 PM"

345

,"Florida Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Florida Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sfl_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sfl_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:35 PM"

346

,"Alaska Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Alaska Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sak_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sak_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:34 PM"

347

,"Mississippi Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet)" Acquisitions (Billion Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Mississippi Dry Natural Gas Reserves Acquisitions (Billion Cubic Feet)",1,"Annual",2011 ,"Release Date:","8/1/2013" ,"Next Release Date:","8/1/2014" ,"Excel File Name:","rngr16sms_1a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/rngr16sms_1a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/12/2013 6:10:37 PM"

348

Fast multi-core co-simulation of Cyber-Physical Systems : Application to internal combustion engines  

E-Print Network [OSTI]

on renewable energy and energy efficiency. This challenge affects the whole energy cycle: production, transport. Automobiles are typical examples of Cyber-Physical Systems, where chem- ical energy (gasoline, diesel, ethanol. Currently, building high fidelity system-level models of Cyber-Physical Sys- tems in general and automotive

Boyer, Edmond

349

Steve Wright, Administrator Bonneville Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

TDO 541.744.3659 ww"" .;'.I-ut': October 10,2008 Steve Wright, Administrator Bonneville Power Administration P.O. Box 3621 Portland, OR 97208-3621 Re: Increase in Slice Product...

350

Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Business USA FedBizOpps FedConnect Federal Acquisition Regulation (FAR) System for Award Management (SAM) Becoming a Vendor Southwestern is dedicated to supporting small business,...

351

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Broader source: Energy.gov (indexed) [DOE]

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

352

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web of Things, and Social Media Speaker(s): Edward Curry Date: April 24, 2013 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: James O'Donnell Philip Haves Cyber-Physical Energy Systems (CPES) exploit the potential of information technology to boost energy efficiency while minimising environmental impacts. CPES can help manage energy more efficiently by providing a functional view of the entire energy system so that energy activities can be understood, changed, and reinvented to better support sustainable practices. CPES can be applied at different scales from Smart Grids and Smart Cities to Smart Enterprises and Smart Buildings. Significant technical challenges exist in terms of information management, leveraging

353

A hybrid systems model to simulate cyber interdependencies between critical infrastructures  

Science Journals Connector (OSTI)

Critical infrastructures (CI) depend on communications and information technology infrastructure (CITI) for many of their key functionalities, which is known as cyber interdependency. In this paper, we presented a cyber interdependency simulation technique that is based on the idea that overall performance of a CI network is determined by the behaviour of its components at multiple time scales. Accordingly, for cyber interdependency simulation, we decomposed CI network into two time scales; regular CI events are captured in large time-steps and data communication network events are captured in smaller time-steps. Two different simulators are used for each of these partitions and results from both simulations are synchronised appropriately. A real life example is presented to demonstrate the accuracy and usefulness of our approach. The hybrid simulation model gives significant flexibility to plug-in domain specific models into the critical infrastructure simulator for accurate and efficient solution.

Hafiz Abdur Rahman; José R. Martí; K.D. Srivastava

2011-01-01T23:59:59.000Z

354

ADMINISTRATIVE RECORDS SCHEDULE 2: PAYROLL AND PAY ADMINISTRATION...  

Broader source: Energy.gov (indexed) [DOE]

: PAYROLL AND PAY ADMINISTRATION RECORDS ADMINISTRATIVE RECORDS SCHEDULE 2: PAYROLL AND PAY ADMINISTRATION RECORDS Payrolling and pay administration records pertain to the...

355

ADMINISTRATIVE RECORDS SCHEDULE 2: PAYROLL AND PAY ADMINISTRATION...  

Broader source: Energy.gov (indexed) [DOE]

2: PAYROLL AND PAY ADMINISTRATION RECORDS-Revision 2 ADMINISTRATIVE RECORDS SCHEDULE 2: PAYROLL AND PAY ADMINISTRATION RECORDS-Revision 2 Payrolling and pay administration records...

356

Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

April 2, 2014 Smith Named as New Deputy Assistant Administrator Smith Named as New Deputy Assistant Administrator Barbara Smith Barbara Smith, a former Liaison Specialist for...

357

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Broader source: Energy.gov (indexed) [DOE]

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

358

Southeastern Power Administration 2008 Annual Report  

SciTech Connect (OSTI)

Dear Secretary Chu: I am pleased to submit Southeastern Power Administrations (Southeasterns) fiscal year (FY) 2008 Annual Report for your review. The information included in this document reflects our agencys programs, accomplishments, operational and financial activities for the 12-month period beginning October 1, 2007 and ending September 30, 2008. Southeastern marketed more than 4.5 billion kilowatt-hours of energy to 491 wholesale customers in ten southeastern states this past year. Revenues from the sale of this power totaled approximately $263 million. Drought conditions persisted in the southeastern region of the United States during FY 2008 placing strains on our natural and financial resources. Power purchases for FY 2008 totaled $91 million. Approximately $44 million of this amount was for replacement power which is paid only during adverse water conditions in order to meet our customers contract requirements. With the continued financial assistance and support of our Federal power customers, funding for capitalized equipment purchases and replacements at U.S. Army Corps of Engineers (Corps) hydroelectric projects provided much needed repairs and maintenance for these aging facilities. Southeasterns cyber and physical security programs continued to be reviewed and updated to meet Department of Energy (DOE), Homeland Security, and North American Electric Reliability Corporation (NERC) standards and requirements. In the coming year, Southeastern will continue open communication and cooperation with DOE, the Federal power customers, and the Corps to maximize the benefits of our regions water resources. Although competing uses of water and the prolonged drought conditions will present another challenging year for our agency, Southeasterns employees will meet these challenges and continue to provide reliable hydroelectric power to the people in the southeast. Sincerely, Kenneth E.Legg Administrator

none,

2008-12-29T23:59:59.000Z

359

Southeastern Power Administration 2007 Annual Report  

SciTech Connect (OSTI)

Dear Secretary Chu: I am proud to submit Southeastern Power Administrations (Southeasterns) fiscal year (FY) 2007 Annual Report for your review. The information included in this report reflects Southeasterns programs, accomplishments, and financial activities for the 12-month period beginning October 1, 2006 and ending September 30, 2007. Southeastern marketed more than 5 billion kilowatt-hours of energy to 492 wholesale Federal power customers in an 11-state marketing area in FY 2007. Revenues from the sale of this power totaled approximately $219 million. Drought conditions continued to plague the southeast region of the United States during 2007 placing strains on our natural and financial resources. Southeastern purchased more than $40 million in replacement power to meet customer contract requirements to ensure the continued reliability of our nations power grid. With the financial assistance and support of our Federal power customers, continued funding for capitalized equipment replacements at various Corps of Engineers (Corps) hydroelectric projects provided much needed repairs and maintenance for aging facilities. Southeasterns cyber and physical security program continued to be reviewed and updated to meet Department of Energy (DOE), Homeland Security, and North American Electric Reliability Corporation standards and requirements. Plans for the upcoming year include communication and cooperation with DOE, Federal power customers, and the Corps to maximize the benefits of our nations water resources. Competition for the use of water and the prolonged drought conditions will present another challenging year for our agency. The employees at Southeastern will be proactive in meeting these challenges and providing reliable hydroelectric power to the people in the southeast. Sincerely, Kenneth E. Legg Administrator

none,

2007-12-28T23:59:59.000Z

360

U.S. Department of Energy Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Short Mountain Transmission Line Access Road Easement Acquisition Short Mountain Transmission Line Access Road Easement Acquisition Program or Field Office: Southwestern Power Administration Location(s) (City/County/State): Short Mountain, Leflore County, Oklahoma Proposed Action Description: Southwestern Power Administration proposes to obtain an easement to access a portion of transmission line located on Short Mountain in Leflore County, Oklahoma. Categorical Exclusion(s) Applied: l 0 CFR 102 l, Appendix B to Subpart D, Part B 1.24- Transfer, lease, disposition, or acquisition of interests in personal property or real property. For the complete DOE National Environmental Policy Act regulations regarding categorical exclusions, including the full text of each categorical exclusion, see Subpart D of 10 CFR Part 1021

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

U.S. Department of Energy Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transmission Line 3016 Access Road Acquisition Project Transmission Line 3016 Access Road Acquisition Project Program or Field Office: Southwestern Power Administration Location(s) (City/County/State): Porum, Muskogee County, Oklahoma Proposed Action Description: Southwestern Power Administration proposes to aquire an access road easement. This access road will enable vehicles and equipment to maintain and operate portion of transmission line 3016 near the structure 3 I area. Categorical Exclusion(s) Applied: 10 CFR l 021 , Appendix B to Subpart D, Part B 1.24- Transfer, lease, disposition, or acquisition of interests in personal property or real property. For the complete DOE National Environmental Policy Act regulations regarding categorical exclusions, including the full text of each categorical exclusion, see Subpart D of I 0 CFR Part 1021

362

U.S. Department of Energy Southwestern Power Administration  

Broader source: Energy.gov (indexed) [DOE]

Transmission Line 3016 Access Road Acquisition Project Transmission Line 3016 Access Road Acquisition Project Program or Field Office: Southwestern Power Administration Location(s) (City/County/State): Porum, Muskogee County, Oklahoma Proposed Action Description: Southwestern Power Administration proposes to aquire an access road easement. This access road will enable vehicles and equipment to maintain and operate portion of transmission line 3016 near the structure 3 I area. Categorical Exclusion(s) Applied: 10 CFR l 021 , Appendix B to Subpart D, Part B 1.24- Transfer, lease, disposition, or acquisition of interests in personal property or real property. For the complete DOE National Environmental Policy Act regulations regarding categorical exclusions, including the full text of each categorical exclusion, see Subpart D of I 0 CFR Part 1021

363

U.S. Department of Energy Southwestern Power Administration  

Broader source: Energy.gov (indexed) [DOE]

Short Mountain Transmission Line Access Road Easement Acquisition Short Mountain Transmission Line Access Road Easement Acquisition Program or Field Office: Southwestern Power Administration Location(s) (City/County/State): Short Mountain, Leflore County, Oklahoma Proposed Action Description: Southwestern Power Administration proposes to obtain an easement to access a portion of transmission line located on Short Mountain in Leflore County, Oklahoma. Categorical Exclusion(s) Applied: l 0 CFR 102 l, Appendix B to Subpart D, Part B 1.24- Transfer, lease, disposition, or acquisition of interests in personal property or real property. For the complete DOE National Environmental Policy Act regulations regarding categorical exclusions, including the full text of each categorical exclusion, see Subpart D of 10 CFR Part 1021

364

Acquisition Savings Reporting Process Template  

Broader source: Energy.gov (indexed) [DOE]

Savings Reporting Process Savings Reporting Process Reporting Template 083112 FINAL 1 of 7 As of August 28, 2012 ` Process 1 STEP 1 - Select Savings Type You must first determine if the savings is through a Strategic Sourcing process or an Other Acquisition Savings process. If it is Strategic Sourcing, it must satisfy the 8 step definition. If it does not satisfy the eight steps, then it is an Other Acquisition Savings process. 2 STEP 2 - Select Savings Methodology (In Order of Preference) Regardless if it is Strategic Sourcing or an Other Acquisition Savings process, the next step is to determine the savings methodology that will be used to calculate the savings. You must select only one methodology. a. Transactions are not reported as savings in multiple categories.

365

Acquisition News | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition News Acquisition News Acquisition News RSS July 12, 2013 Contract Awarded for Environmental Technical Services Cincinnati - The U.S. Department of Energy (DOE) awarded a contract for Environmental Technical Services to Restoration Services Inc. of Oak Ridge, Tennessee, for support services at the Portsmouth Gaseous Diffusion Plant located near Piketon, OH. March 7, 2013 Department of Justice: CH2M Hill Hanford Group Inc. Admits Criminal Conduct, Parent Company Agrees to Cooperate in Ongoing Investigation and Pay $18.5 Million to Resolve Civil and Criminal Allegations The Justice Department, in conjunction with the U.S. Attorney's Office for the Eastern District of Washington, announced today that Colorado-based CH2M Hill Hanford Group Inc. (CHG) and its parent company, CH2M Hill

366

Acquisition News | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition News Acquisition News Acquisition News RSS April 29, 2011 DOE Awards Contract for Decontamination & Decommissioning Project for the East Tennessee Technology Park Oak Ridge, Tenn. - As part of its ongoing commitment to cleaning up the legacy of the Cold War at sites across the weapons complex, the U.S. Department of Energy has awarded a contract for the remaining environmental cleanup at the East Tennessee Technology Park (ETTP) to URS | CH2M Oak Ridge, LLC. previous 1 2 next Waste Management Nuclear Materials & Waste Tank Waste and Waste Processing Waste Disposition Packaging and Transportation Site & Facility Restoration Deactivation & Decommissioning (D&D) Facility Engineering Soil & Groundwater Sustainability Program Management Safety Security Quality Assurance

367

SunShot Initiative: Customer Acquisition  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Customer Acquisition to someone Customer Acquisition to someone by E-mail Share SunShot Initiative: Customer Acquisition on Facebook Tweet about SunShot Initiative: Customer Acquisition on Twitter Bookmark SunShot Initiative: Customer Acquisition on Google Bookmark SunShot Initiative: Customer Acquisition on Delicious Rank SunShot Initiative: Customer Acquisition on Digg Find More places to share SunShot Initiative: Customer Acquisition on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Reducing Non-Hardware Costs Lowering Barriers Fostering Growth Customer Acquisition Photo of a woman, man, and child looking at a silver box on the outside of a home. The cost of acquiring customers and designing systems to fit their homes represents approximately 45% of all balance of systems costs in the U.S.

368

Acquisition Plan Strategy and Guidance  

Broader source: Energy.gov (indexed) [DOE]

3 3 01 ACQUISITION PLAN STRATEGY AND GUIDANCE NOTE: The process provided below is not intended to replace an agency's acquisition planning requirements. INSTRUCTIONS 1. Work with your DOE Federal Finance Specialist to determine whether a "pay from savings" project is feasible. a. Determine if appropriated dollars are available to offset some of the costs. b. Consider alternative finance options: Energy Savings Performance Contract (ESPC), Utility Energy Service Contract (UESC), Power Purchase Agreement (PPA), or Enhanced Use Lease (EUL) Scott Wolf 6848 Cooper Point Road NW Olympia, WA 98502 Phone: 360-866-9163 Fax: 360-866-9683 scott.wolf@ee.doe.gov Serving Montana, Wyoming, Utah, Colorado, Nebraska, New Mexico,

369

DIVISION OF ADMINISTRATION  

E-Print Network [OSTI]

, Oceanic & Atmospheric HSBC Health Sciences Business Center UABC University Administrative Employee

Escher, Christine

370

Microsoft Word - MissionCreek_Kingston_Acquisition_CX_final.doc  

Broader source: Energy.gov (indexed) [DOE]

purchase purchase of the Mission Creek Property. Fish and Wildlife Project No.: 2002-003-00, Contract # BPA-44646 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.25 Transfer, lease, disposition or acquisition of interests in uncontaminated land for habitat preservation or wildlife management, and only associated buildings that support these purposes. Uncontaminated means that there would be no potential for release of substances at a level, or in a form, that would pose a threat to public health or the environment. Location: Township 19 North, Range 21 West, Section 33 of the Dixon Quad, in Lake County, Montana Proposed by: Bonneville Power Administration (BPA) and CSKT Description of the Proposed Action: BPA proposes to fund the acquisition of 12 acres of property

371

Program and Project Management for the Acquisition of Capital Assets  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this Order is to a) provide the Department of Energy (DOE) Elements, including the National Nuclear Security Administration (NNSA), with program and project management direction for the acquisition of capital assets with the goal of delivering projects within the original performance baseline (PB), cost and schedule, and fully capable of meeting mission performance, safeguards and security, and environmental, safety, and health requirements unless impacted by a directed change; and b) implement Office of Management and Budget (OMB) Circulars to include: A-11, Part 7, Capital Programming Guide, which prescribes new requirements and leading practices for project and acquisition management; A-123, Management's Responsibility for Internal Control, which defines management's responsibility for internal control in Federal agencies; and A-131, Value Engineering, which requires that all Federal agencies use Value Engineering (VE) as a management tool. Cancels DOE O 413.3A, Chg 1 dated 6-28-06.

2010-11-29T23:59:59.000Z

372

Acquisition Workforce Information | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Certifications and Professional Certifications and Professional Development » Acquisition Workforce Information Acquisition Workforce Information The Department of Energy (DOE) Acquisition Workforce consists of a broad range of professional and technical personnel including: Contract Specialists/Contracting Officers, Contracting Officer's Technical Representatives, Financial Assistance Personnel, Technical Project Officers, Personal Property Managers, Real Estate Contracting Officers, Federal Project Directors/Program Managers, as well as personnel who perform acquisition-related activities and functions within DOE. DOE's goal is to continue to develop and maintain a highly professional, well-trained Acquisition Workforce. DOE requires Acquisition Workforce members to meet a variety of Federal and DOE established certifications

373

NNSA Points of Contact | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Points of Contact | National Nuclear Security Administration Points of Contact | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration NNSA Points of Contact Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

374

December 200 Copper Acquisition by  

E-Print Network [OSTI]

December 200 Copper Acquisition by Methanotrophic Bacteria 7 Term Paper HS2007 Major. One is soluble in the cytoplasm and the other is bound to the membrane. Since the expression of copper containing pMMO depends on copper availability it is supposed that some methanotrophs have developed

Fischlin, Andreas

375

National Geothermal Data Systems Data Acquisition and Access...  

Broader source: Energy.gov (indexed) [DOE]

National Geothermal Data Systems Data Acquisition and Access National Geothermal Data Systems Data Acquisition and Access Project objective: To support the acquisition of new and...

376

Verifiable Active Safety for Automotive Cyber-Physical Systems with Humans in the Loop  

E-Print Network [OSTI]

-6925 A recent trend in the automotive industry is the rapid inclusion of electronics, computers and controlsVerifiable Active Safety for Automotive Cyber-Physical Systems with Humans in the Loop Francesco that focus entirely on improved functionality and overall system robustness. This makes the automotive sector

Rajkumar, Ragunathan "Raj"

377

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer  

E-Print Network [OSTI]

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer Dept security challenges for a fu- ture power grid. It highlights deficiencies and shortcom- ings of existing and fault resilience of power as a utility must be a prime objective for power grids. Security compromises

Mueller, Frank

378

Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System  

E-Print Network [OSTI]

, or for sporadic reasons, for example a power plant goes offline unexpectedly (e.g., due to an earthquake or stagnant winds to propel wind turbines). Dur- ing an episode, the power grid operators must contend1 Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System Mary

379

Towards automation of low standardized logistic processes by use of cyber physical robotic systems (CPRS)  

Science Journals Connector (OSTI)

Global logistics networks have an increasing demand for handling of general cargo. Particularly, huband-spoke networks requires a lot of handling actions in order to realize benefits in comparison to point-to-point networks. The use of automation technologies ... Keywords: cooperative robotics, cyber physical systems, human computer interaction, human machine interface, industrial robots, virtual reality

Bernd Scholz-Reiter; Moritz Rohde; Stefan Kunaschk; Michael Ltjen

2011-11-01T23:59:59.000Z

380

Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric Vehicle  

Science Journals Connector (OSTI)

......cyber-physical systems; autonomous electric vehicle; energy management...applications [e.g., autonomous electric vehicle (AEV) with wireless...systems, such as aircrafts and automobiles, to large-scale systems...infrastructure that supplies electric energy for the recharging......

Jiafu Wan; Hehua Yan; Di Li; Keliang Zhou; Lu Zeng

2013-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network [OSTI]

these requirements, some technologies such as Phasor Measurement Unit (PMU), Flexible AC Transmission System (FACTS. Therefore, cyber physical security is vitally important for smart grid infrastructure. The data representing on the U.S. infrastructure increased 17-fold from 2009 to 2011 [4]. The Supervisory Control and Data

Kundur, Deepa

382

Towards A Framework for Cyber Social Status Based Trusted Open Collaboration  

E-Print Network [OSTI]

Towards A Framework for Cyber Social Status Based Trusted Open Collaboration Jaehong Park Institute University of Texas at San Antonio ravi.sandhu@utsa.edu Abstract--Collaboration takes place in both closed and open environments. While closed collaboration focuses on information or resource sharing amongst

Sandhu, Ravi

383

Survey Paper Cyber security in the Smart Grid: Survey and challenges q  

E-Print Network [OSTI]

), and renewable energy resources (e.g., solar and hydro) [2]. Therefore, the National Institute of StandardsSurvey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu importantly, with the integration of advanced computing and communication technologies, the Smart Grid

Wang, Wenye

384

Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department of  

Broader source: Energy.gov (indexed) [DOE]

Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department of Energy (DOE) Order 350.1 and Special H Clause Policy Flash 2013-62 Acquisition Letter 09 - Revision of Department of Energy (DOE) Order 350.1 and Special H Clause Questions concerning this policy flash should be directed to Robert M. Myers, Director, Contractor Human Resources Policy Division (MA-612) at (202) 287-1584 or robert.myers@hq.doe.gov. Policy Flash - DOE O 350 1.pdf Consolidated Model H-Clause 06-27-13.pdf Acquisition Letter - DOE O 350 1 6-27-13.pdf More Documents & Publications GAO-04-539 Department of Energy: Certain Postretirement Benefits for Contractor Employees Are Unfunded and Program Oversight Could Be Improved Chapter 30 - Cost Accounting Standards Administration

385

Test Acquisition Guide | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Test Acquisition Guide Test Acquisition Guide Test Acquisition Guide Regulatory requirements for the acquisition process are set forth in the Federal Acquisition Regulation (FAR) and are supplemented in the Department of Energy Acquisition Regulation (DEAR). FAR 1.301 provides for the issuance of additional internal agency guidance, including designations and delegations of authority, assignments of responsibilities, work-flow procedures, and internal reporting requirements. The DOE Acquisition Guide serves this purpose by identifying relevant internal standard operating procedures to be followed by both procurement and program personnel who are involved in various aspects of the acquisition process. The Guide also is intended to be a repository of best practices found throughout the agency

386

Miscellaneous States Shale Gas Proved Reserves Acquisitions ...  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet) Miscellaneous States Shale Gas Proved Reserves Acquisitions (Billion Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7...

387

Wyoming Coalbed Methane Proved Reserves Acquisitions (Billion...  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet) Wyoming Coalbed Methane Proved Reserves Acquisitions (Billion Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8...

388

Arkansas Coalbed Methane Proved Reserves Acquisitions (Billion...  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet) Arkansas Coalbed Methane Proved Reserves Acquisitions (Billion Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8...

389

Colorado Coalbed Methane Proved Reserves Acquisitions (Billion...  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet) Colorado Coalbed Methane Proved Reserves Acquisitions (Billion Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8...

390

Oklahoma Coalbed Methane Proved Reserves Acquisitions (Billion...  

U.S. Energy Information Administration (EIA) Indexed Site

Acquisitions (Billion Cubic Feet) Oklahoma Coalbed Methane Proved Reserves Acquisitions (Billion Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8...

391

ADMINISTRATIVE CHANGE TO NAP-25, Management and Operating Contractor Business Meals and Light Refreshment  

National Nuclear Security Administration (NNSA)

NAP-25 Admin Chg 1 1 NAP-25 Admin Chg 1 1 10-10-13 ADMINISTRATIVE CHANGE TO NAP-25, Management and Operating Contractor Business Meals and Light Refreshment Locations of Changes: Page Paragraph Changed To Every Header BOP-03.08 NAP-25 Cover Office of Acquisition &Supply Management Office of Acquisition & Project Management Cover Footer Office of Acquisition &Supply Management Office of Acquisition Management 1 1 Removed: FAR 31.205-14 and 1 1 Acquisition Letter 2005-12 Acquisition Letter 2012-05 1 3 Add: 3.a. NNSA Applicability 1 3a NNSA Service Center, NNSA Site Offices NNSA Federal personnel 1 3a And all NNSA Management and Operating (M&O) Contractors and to all NNSA Management and Operating (M&O) Contractors. Contracting Officers are responsible

392

Acquisition and Project Management | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Contractor Human Resources Performance Evaluations Acquisition Management Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs)...

393

Acquisition and Project Management Continuous Improvement Presentation...  

Office of Environmental Management (EM)

Occupational Safety Performance Voluntary Protection Program Onsite Review, Safeguards and Security - August 2012 Report on Acquisition and Project Management Continuous...

394

ESPC Acquisition Plan Strategy and Guidance  

Broader source: Energy.gov [DOE]

Document features a recommended process for developing an acquisition plan within a Federal energy savings performance contract (ESPC).

395

ADMINISTRATIVE RECORDS SCHEDULE 16:  

Broader source: Energy.gov (indexed) [DOE]

2 2 ADMINISTRATIVE RECORDS SCHEDULE 16: ADMINISTRATIVE MANAGEMENT RECORDS June 2007 Revision 1 This schedule covers those administrative management activities not covered by other Administrative Schedules. Included are disposable records created in the course of organizational planning, development, and simplification of procedures; records management activities; and administration of management improvement programs. See ADM 1 (items 12 and 13) for the disposition of case files on individuals involved in incentive award and similar types of management improvement programs. The organizational locations and titles of administrative management units vary. They may be scattered at numerous levels or locations, or may be centralized. For the purposes

396

AL 2014-06 ACQUISITION LETTERS REMAINING IN EFFECT | Department...  

Broader source: Energy.gov (indexed) [DOE]

AL 2014-06 ACQUISITION LETTERS REMAINING IN EFFECT AL 2014-06 ACQUISITION LETTERS REMAINING IN EFFECT AL 2014-06 ACQUISITION LETTERS REMAINING IN EFFECT Acquisition Letters (AL)...

397

Eder Acquisition 2007 Habitat Evaluation Procedures Report.  

SciTech Connect (OSTI)

A habitat evaluation procedures (HEP) analysis was conducted on the Eder acquisition in July 2007 to determine how many protection habitat units to credit Bonneville Power Administration (BPA) for providing funds to acquire the project site as partial mitigation for habitat losses associated with construction of Grand Coulee and Chief Joseph Dams. Baseline HEP surveys generated 3,857.64 habitat units or 1.16 HUs per acre. HEP surveys also served to document general habitat conditions. Survey results indicated that the herbaceous plant community lacked forbs species, which may be due to both livestock grazing and the late timing of the surveys. Moreover, the herbaceous plant community lacked structure based on lower than expected visual obstruction readings (VOR); likely a direct result of livestock impacts. In addition, introduced herbaceous vegetation including cultivated pasture grasses, e.g. crested wheatgrass and/or invader species such as cheatgrass and mustard, were present on most areas surveyed. The shrub element within the shrubsteppe cover type was generally a mosaic of moderate to dense shrubby areas interspersed with open grassland communities while the 'steppe' component was almost entirely devoid of shrubs. Riparian shrub and forest areas were somewhat stressed by livestock. Moreover, shrub and tree communities along the lower reaches of Nine Mile Creek suffered from lack of water due to the previous landowners 'piping' water out of the stream channel.

Ashley, Paul R.

2008-01-01T23:59:59.000Z

398

Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Business USA FedBizOpps FedConnect Federal Acquisition Regulation (FAR) System for Award Management (SAM) Payment to Vendors In order to promote electronic government (e-gov) as...

399

Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure  

Science Journals Connector (OSTI)

The advanced electric power grid is a cyber-physical system comprised of ... of the device and the reliability of the power grid on which they are deployed. The IEEE118...

Ayman Z. Faza; Sahra Sedigh

2009-01-01T23:59:59.000Z

400

Administrative | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Services » Employee Services » Administrative Services » Employee Services » Administrative Administrative The Office of Management provides many of the administrative services that keep the Department of Energy operational. These functions are primarily provided by the Office of Administration, MA-40, the Office of Administrative Management and Support, MA-42. Administrative Management Services Conferencing and Special Events Copier Services Document Imaging Graphics Mail and Distribution Photography Printing For a listing of office contacts please use the About Us menu, the Contact Us section, available directly through this link. We welcome your comments or questions regarding these services. Please feel free to provide feedback to the Office of Administration's Customer Mailbox at: MA-40Customervoice@hq.doe.gov.

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

ADMINISTRATIVE UNIVERSITY POLICY  

E-Print Network [OSTI]

ADMINISTRATIVE UNIVERSITY POLICY FACULTY UNIVERSITY POLICY STUDENT UNIVERSITY POLICY Issue stakeholder list "Log-In" of Proposed University Policy with the University Compliance Committee (UCC) UCC identifies which track (i.e., Administrative, Faculty, or Student) the proposed University Policy

402

Division of Administration  

E-Print Network [OSTI]

Contracts & Procurement Don Green Controller Steven Yim Budget Planning & Administration Sarah Song Admin Operations Lieutenant Scot Willey Administration Lieutenant John Brockie Division Communication Editorial Communication Editorial Board looks forward to improving communication within and from the Division and welcomes

de Lijser, Peter

403

Aerial robotic data acquisition system  

SciTech Connect (OSTI)

A small, unmanned aerial vehicle (UAV), equipped with sensors for physical and chemical measurements of remote environments, is described. A miniature helicopter airframe is used as a platform for sensor testing and development. The sensor output is integrated with the flight control system for real-time, interactive, data acquisition and analysis. Pre-programmed flight missions will be flown with several sensors to demonstrate the cost-effective surveillance capabilities of this new technology.

Hofstetter, K.J.; Hayes, D.W.; Pendergast, M.M. [Westinghouse Savannah River Co., Aiken, SC (United States); Corban, J.E. [Guided Systems Technologies, Atlanta, GA (United States)

1993-12-31T23:59:59.000Z

404

Bonneville Power Administrator Compares  

E-Print Network [OSTI]

Bonneville Power Administrator Compares Missouri Basin Reservoirs with Pacific Northwest's by Pat-16 was the dinner speech of a former Nebraskan from Schuyler, James Jura. Now administrator of the Bonneville Power Administration, Portland, Ore., Jura has been with Bonneville for the past 10 ears. He spoke to the group

Nebraska-Lincoln, University of

405

acquisition  

National Nuclear Security Administration (NNSA)

0%2A en Small Business http:nnsa.energy.govaboutusouroperationsapmsmallbusiness

Page...

406

DOE Administrative Records Schedules Changes | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Administrative Records Schedules Changes DOE Administrative Records Schedules Changes Changes posted to Administrative Records Schedules DOE Administrative Records Schedules...

407

Administrative Management Records | Department of Energy  

Office of Environmental Management (EM)

Administrative Management Records Administrative Management Records This schedule covers those administrative management activities not covered by other Administrative Schedules...

408

Energy Department Names Elliot Mainzer Bonneville Power Administration Administrator  

Broader source: Energy.gov [DOE]

The Energy Department announced that Elliot Mainzer has been appointed Administrator for the Bonneville Power Administration (BPA).

409

January 2015 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

with members of the Idaho National Laboratory. The lab has a long history in the nuclear energy area and its growing expertise in new threat areas such as cyber security; make it...

410

Forrest Ranch Acquisition, Annual Report 2001-2002.  

SciTech Connect (OSTI)

Through their John Day Basin Office, the Confederated Tribes of Warm Springs Reservation of Oregon (Tribes) acquired the Forrest Ranch during July of 2002. The property consists of two parcels located in the John Day subbasin within the Columbia basin. The mainstem parcel consists of 3,503 acres and is located 1/2 mile to the east of Prairie City, Oregon on the mainstem of the John Day River. The middle fork parcel consists of 820 acres and is located one mile to the west of the town of Austin, OR on the middle fork John Day River. The Forrest Ranch Project is under a memorandum of agreement with the Bonneville Power Administration (BPA) to provide an annual written report generally describing the real property interests of the project and management activities undertaken or in progress. The Forrest Ranch acquisition was funded by BPA as part of their program to protect, mitigate, and enhance fish and wildlife habitat affected by the operation of their hydroelectric facilities on the Columbia River and its tributaries. Following lengthy negotiations with the BPA and property owner, the Tribes were able to conclude the acquisition of the Forrest Ranch in July of 2002. The intent of the acquisition project was to partially mitigate fish and wildlife impacts for the John Day Dam on the Columbia River as outlined in the Northwest Power Planning Council's Wildlife Program (NPPC 1994, section 11.1, section 7.6). While the Tribes hold fee-title to the property, the BPA has assured a level of program funding through a memorandum of agreement and annual statement of work. As early as 1997, the Tribes identified this property as a priority for restoration in the John Day basin. In 2000, the Tribes arranged an agreement with the landowner to seek funds for the acquisition of both the Middle Fork and upper Mainstem John Day River holdings of Mr. John Forrest. This property had been a priority of not only the Tribes, but of many other basin natural resource agencies. The contract period was the first year of the program with December 2001 through July 2nd 2002 being previous to acquisition of the property. The majority of the activities conducted under the contract period were spent on O&M and pre acquisition activities.

Smith, Brent

2003-08-01T23:59:59.000Z

411

Energy Efficiency Program Administration Powerpoint Presentation...  

Broader source: Energy.gov (indexed) [DOE]

Efficiency Program Administration Powerpoint Presentation Energy Efficiency Program Administration Powerpoint Presentation Energy Efficiency Program Administration Powerpoint...

412

Southeastern Power Administration | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Southeastern Power Administration Southeastern Power Administration Southeastern Power Administration View All Maps Addthis...

413

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Broader source: Energy.gov (indexed) [DOE]

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

414

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Broader source: Energy.gov (indexed) [DOE]

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

415

Subsea control and data acquisition  

SciTech Connect (OSTI)

This book contains papers presented at the conference on subsea control and data acquisition. The tasks performed by subsea control systems, although fairly straightforward, are dominated by an alien environment and the high costs associated with failure and repair. The evolution of systems design has resulted in a growing confidence in equipment reliability. In the future, however, more searching demands may include active regulation of valves and the use of data for reservoir management purposes. The emphasis of the papers is on technical depth and understanding, with particular attention being paid to the science control and data monitoring in relation to the task of hydrocarbon recovery.

Not Available

1990-01-01T23:59:59.000Z

416

Procurement | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

is published for planning purposes only. Procurement Information Forecast Contracting Opportunities Related Topics apm acquisition contracting small business Related...

417

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect (OSTI)

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

418

Bullying and Cyber-Bullying in Higher Education: Current Institutional Practice and Prevention  

E-Print Network [OSTI]

. (2010) believes bullying, especially cyber-bullying, is a real 21st century concern and that it must be addressed by those in power. 8 Chapter 2 Bullying of all forms continues to plague the educational system, with no clear methods... report that bullying exists in their schools and it largely through electronic means. Students believe they are anonymous through electronic means and now feel an aura of power and a willingness to say something they would never say in person...

Early, Jeremy Scott

2014-05-31T23:59:59.000Z

419

Report: Acquisition, Project Management, and Quality Assurance  

Broader source: Energy.gov (indexed) [DOE]

Acquisition, Project Management, and Quality Assurance Acquisition, Project Management, and Quality Assurance September 30, 2009 Submitted by the EMAB Acquisition and Project Management Subcommittee Background For FY 2009 EMAB was tasked to review the management and delivery of EM's Construction Projects and confirm whether or not the program is headed in the right direction or needs to make some adjustments in order to improve efficiency. EMAB reviewed and discussed the topics of Acquisition and Project Management during its public meetings. The Acquisition and Project Management subcommittee, comprised of Mr. G. Brian Estes, Dr. Lawrence Papay, and Mr. David Swindle, engaged in teleconferences on August 7 and September 4 with EM senior personnel. Findings and Observations Deputy Assistant Secretary Jack Surash provided an update on EM acquisition initiatives, and he

420

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect (OSTI)

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Chemistry Department Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Administration Administration A. Harris, Chair (631) 344-4301 alexh@bnl.gov G. Hall, Deputy Chair (631) 344-4376 gehall@bnl.gov S. McAlary, Deputy BES Manager (631) 344-4305 mcalary2@bnl.gov J. Petterson, Senior Administrative Assistant (631) 344-4302 jpetter@bnl.gov Administrative Support Includes budgeting, procurement activities, foreign/domestic travel, seminars and general administrative concerns. Guest Appointments and Personnel matters should be referred to the Department's Senior Administrative Assistant. L. Sallustio (631) 344-4303 lsallust@bnl.gov Building and Stockroom Maintain the Chemistry Department stockroom and provide technical and building support to the staff. Information on the BNL Chemical Management Inventory system is available through the stockroom. Click here to view

422

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

423

Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Business USA Business USA FedBizOpps FedConnect Federal Acquisition Regulation (FAR) System for Award Management (SAM) Small Business Southwestern's policy is to provide the most opportunities possible in its acquisition process to small businesses, historically underutilized business (HUB) zone small business concerns, small disadvantaged business concerns, women owned small business concerns, service disabled veteran owned small businesses, and veteran owned small businesses. Southwestern promotes small business by: Meeting with small businesses to provide guidance and information Encouraging prime contractors to subcontract with small business concerns Publicizing contract actions to web sites dedicated to Federal business opportunities Matching our requirements with small business capabilities

424

Planning, Budget, and Acquisition | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Planning, Budget, and Acquisition Planning, Budget, and Acquisition Planning, Budget, and Acquisition The Office of Legacy Management's (LM) Planning, Budget, and Acquisition (PBA) Team performs the following management functions: Plans, develops, and implements improvements in efficiencies of business processes and identifies opportunities for reengineering or restructuring. Plans, develops, and implements strategic planning efforts, which include analyzing the organization's annual and long-term goals and the best approach for achieving those goals. Plans, develops, and implements budget formulation processes to include identifying future spending priorities and assessing the effectiveness of programs. Plans, develops, and implements processes for budget execution, including day-to-day obligations for agency expenditures, invoices, billing

425

SPR Acquisition Procedures - Final Rulemaking | Department of...  

Office of Environmental Management (EM)

Point of Contact: Nathan Harvey, Director of Operatons and Readiness, Strategic Petroleum Reserve, (202) 586-4691 SPR Crude Oil Acquisition Procedures - Final Rulemaking More...

426

Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7 ANNUAL REPORT 7 ANNUAL REPORT Southwestern Power Administration Letter to the Secretary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 About Southwestern. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Accomplishments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Supplementary Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

427

Is Administrative Law Inevitable?  

E-Print Network [OSTI]

cautionary tone. In Vermont Yankee v. NRDC, 120 the Supremenot do, declared the Vermont Yankee Court, to look outsideof administrative discretion. Vermont Yankee, as has been

Rodriguez, Daniel; Weingast, Barry

2009-01-01T23:59:59.000Z

428

BONNEVILLE POWER ADMINISTRATION  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

minimize customers switching between options to create simplicity in reporting and administration and avoid potential oversights. If circumstances change and Option 2 becomes...

429

Bonneville Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

o Includes option to elect into Shared Rate Plan, if room under limit Bonneville Power Administration 061708 Revision (Original version issued externally April 11, 2008)...

430

BONNEVILLE POWER ADMINISTRATION  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 minimize switching back and forth between options to create simplicity in reporting and administration. If circumstances change and Option 2 becomes burdensome for a utility BPA...

431

Bonneville Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agreement (Agreement) between the BC Hydro and Power uthority (BCH) and the Bonneville Power Administration (BP A), jointly the Parties, which BA for accounting purposes is...

432

ARM - Website Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Administration About Become a User Recovery Act Mission FAQ Outreach Displays History Organization Participants Facility Statistics Forms Contacts Facility Documents ARM Management...

433

Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of four Power Marketing Administrations in the United States, Southwestern markets hydroelectric power in Arkansas, Kansas, Louisiana, Missouri, Oklahoma, and Texas from 24 U.S....

434

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

435

Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

May 22, 2014 Lake Texoma Hydropower Generation to Remain Low for Near Future TULSA, OK - Southwestern Power Administration (Southwestern) announced today that in response to...

436

Federal Acquisition Regulation Federal Acquisition Circular 2005-61  

Broader source: Energy.gov (indexed) [DOE]

1 1 Summary of Rules in FAC 2005-61 Item Subject FAR Case I. United States--Korea Free Trade Agreement. 2012-004 II. Delete Outdated FAR Reference to the 2012-026 DoD Industrial Preparedness Program. III. NAICS and Size Standards 2012-021 IV. Bid Protest and Appeal Authorities. 2012-008 V. Technical Amendments. Item I--United States-Korea Free Trade Agreement (FAR Case 2012-004) This final rule adopts without change the interim rule published in the Federal Register on March 7, 2012 (77 FR 13952), to implement the United States-Korea Free Trade Agreement. The Republic of Korea is already party to the World Trade Organization Government Procurement Agreement (WTO GPA). The Korea Free Trade Agreement now covers acquisition of supplies and services between $100,000 and the current WTO GPA threshold of

437

Policy Flash 2013-29 Leveraging the General Services Administration's  

Broader source: Energy.gov (indexed) [DOE]

9 Leveraging the General Services 9 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Policy Flash 2013-29 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Attached is Policy Flash 2013-29: Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature Questions concerning this policy flash should be directed to Denise T. Clarke of the Office of Acquisition and Project Management, Strategic Programs Division at (202) 287-1748 or at DeniseT.Clarke@hq.doe.gov. POLICY_FLASH_2013_28 Leveraging GSA SmartPay2.pdf Signed_Memo with_ attachments.pdf More Documents & Publications Policy Flash 2013-50 Leveraging the General Services Administration's SmartPay2 Program and its Single Use Account Feature

438

TEPS/BPA Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

TEPS/BPA Information | National Nuclear Security Administration TEPS/BPA Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog TEPS/BPA Information Home > About Us > Our Operations > Acquisition and Project Management > Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs) > TEPS/BPA Information

439

Small Business Sourcing System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sourcing System | National Nuclear Security Administration Sourcing System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Sourcing System Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Small Business Toolbox > Small Business Sourcing System Small Business Sourcing System

440

Myth-Busting 2Ž: Addressing Misconceptions and Further Improving Communication During the Acquisition Process  

Broader source: Energy.gov (indexed) [DOE]

O F F I C E O F F E D E R A L May 7, 2012 P R O C U R E M E N T P O L I C Y MEMORANDUM FOR CHIEF ACQUISITION OFFICERS SENIOR PROCUREMENT EXECUTIVES CHIEF INFORMATION OFFICERS FROM: Lesley A. Field Acting Administrator for Federal Procurement Policy SUBJECT: "Myth-Busting 2": Addressing Misconceptions and Further Improving Communication During the Acquisition Process Early, frequent, and constructive engagement with industry leads to better acquisition outcomes, which is why it is one of the key tenets of the Office of Management and Budget's 25 Point Implementation Plan to Reform Federal IT Management. 1 Such engagement is especially

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

GSA Office of Governmentwide Policy CIVILIAN AGENCY ACQUISITION LETTER 2013-03  

Broader source: Energy.gov (indexed) [DOE]

Governmentwide Policy Governmentwide Policy CIVILIAN AGENCY ACQUISITION LETTER 2013-03 May 7, 2013 MEMORANDUM FOR Cl N AG THER THAN NASA FROM: -LAURAAULETTA CHAIR CIVILIAN AGENCY ACQUISITION COUNCIL (CAAC) SUBJECT: Class Deviation from the Federal Acquisition Regulation (FAR) to Remove the Dollar Limitation for Set-asides under the Women- owned Small Business (WOSB) Program Section 1697 of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2013, Public Law 112-239, amended section 8(m) of the Small Business Act, (15 U.S.C. 637(m)) by removing the dollar limitations for set-asides to an economically disadvantaged women-owned small business (EDWOSB) or WOSB eligible under the Small Business Administration's (SBA) Women-owned Small Business Federal Contract

442

Federal Aviation Administration  

E-Print Network [OSTI]

transportation systems FAA's RDT&E Organization: Federal Laboratory for R&D of aviation systems IndependentFederal Aviation Administration Federal Aviation AdministrationNextGen: Primer, Challenges. Wilson N. Felder Director, FAA William J. Hughes Technical Center Date: 6 February 2012 #12;2Federal

443

ADMINISTRATION CONTRACT NO.  

E-Print Network [OSTI]

MANAGEMENT AND OPERATING CONTRACT FOR THE LOS ALAMOS NATIONAL LABORATORY NATIONAL NUCLEAR SECURITY ADMINISTRATION CONTRACT NO. DE-AC52-06NA25396 DECEMBER 21, 2005 1943 Today Unofficial Conformed Copy as of 1 OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION NNSA SERVICE CENTER- ALBUQUERQUE M&O CONTRACT SUPPORT

444

Administrative morality in Colombia  

E-Print Network [OSTI]

for Improving Efficiency and Transparency in Public Contracting," (Bogot2002). 13 Presidencia de la Repblica, "Observatorio Anticorrupcin," http://www.anticorrupcion.gov.co/educacion/. 5...ADMINISTRATIVE MORALITY IN COLOMBIA By Copyright 2013 Angela Mara Pez Murcia Submitted to the graduate degree program in Public Affairs and Administration and the Graduate...

Paez Murcia, Angela Maria

2013-05-31T23:59:59.000Z

445

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

446

ADMINISTRATIVE RECORDS SCHEDULE 23:  

Broader source: Energy.gov (indexed) [DOE]

ADMINISTRATIVE RECORDS SCHEDULE 23: ADMINISTRATIVE RECORDS SCHEDULE 23: RECORDS COMMON TO MOST OFFICES June 2007 Revision 1 This schedule provides for the disposal of certain records common to most offices. It covers administrative subject files; facilitative records such as suspense files, tracking and control records, calendars, and indexes; and documents of transitory value. This schedule does not apply to any materials determined to be non-record or to materials such as calendars or work schedules claimed as personal. Office Administrative Files described under item 1 are records retained by an originating office as its record of initiation of an action, request, or response to requests for information. This item may be applied only to separate administrative files containing such records as copies of

447

Acquisition, Use, and Disposal of Real Estate  

Broader source: Energy.gov (indexed) [DOE]

Chapter 17.3 (March 2011) Chapter 17.3 (March 2011) 1 Acquisition, Use, and Disposal of Real Estate References DEAR 917.74 - Acquisition, Use, and Disposal of Real Estate DOE Directives DOE Order 413.3B, Program and Project Management for the Acquisition of Capital Assets, or current version DOE Order 430.1B, Real Property Asset Management, or current version Overview This section provides internal Departmental information and DOE and NNSA points of contact for issues dealing with real estate acquisition, use, and disposal for cost reimbursement and fixed price contracts when in performance of the contract, the contractor will acquire or proposes to acquire use of real property. Background DEAR Subpart 917.74 - Acquisition, Use, and Disposal of Real Estate provides the policy and

448

Report: Small Business, Acquisition, and Project Management  

Broader source: Energy.gov (indexed) [DOE]

SMALL BUSINESS, ACQUISITION, AND PROJECT MANAGEMENT SMALL BUSINESS, ACQUISITION, AND PROJECT MANAGEMENT Background In FY 2007 EMAB was tasked to dialogue with the Office of Acquisition and Project Management (EM-50) on the topic of Small Business and provide advice and recommendations drawn from EMAB members' experience in commercial industry. Additionally, EMAB continued to review and discuss the topics of Acquisition and Project Management during its public meetings and in exchanges with EM senior personnel. Discussion In FY 2006, EM's small business prime contract goal of $208 million was exceeded by well over $100 million. The FY 2007 goal was $198 million, and once again, the program was poised to exceed that mark. Statistically, EM's execution of its small business acquisition strategy is commendable; however, EMAB has a number of

449

Acquisition Strategy RM | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition Strategy RM Acquisition Strategy RM Acquisition Strategy RM The Acquisition Strategy (AS) Review Module (RM) is a tool that assists Department of Energy (DOE) federal project review teams in evaluating the adequacy of the AS prior to approval of CD-1. The key elements and Lines of Inquiry's (LOIs) identified in this Module were specifically developed to be generic in nature to ensure that they were applicable to as many DOE projects as possible. Therefore, it is essential that the review team use these key elements and LOIs only as a starting point, and that more detailed project specific elements and LOIs be developed to ensure that the project is adequately evaluated. Acquisition Strategy RM More Documents & Publications Conceptual Safety Design RM Checkout, Testing, and Commissioning Plan RM

450

Acquisition Strategy RM | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition Strategy RM Acquisition Strategy RM Acquisition Strategy RM The Acquisition Strategy (AS) Review Module (RM) is a tool that assists Department of Energy (DOE) federal project review teams in evaluating the adequacy of the AS prior to approval of CD-1. The key elements and Lines of Inquiry's (LOIs) identified in this Module were specifically developed to be generic in nature to ensure that they were applicable to as many DOE projects as possible. Therefore, it is essential that the review team use these key elements and LOIs only as a starting point, and that more detailed project specific elements and LOIs be developed to ensure that the project is adequately evaluated. Acquisition Strategy RM More Documents & Publications Conceptual Safety Design RM Checkout, Testing, and Commissioning Plan RM

451

Procurement and Acquisition | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Procurement and Acquisition Procurement and Acquisition Procurement and Acquisition Doing Business With the U.S. Department of Energy Welcome to the Department of Energy's Acquisition homepage. The Office of Procurement and Acquisition Management (OPAM) is responsible for all contracting, financial assistance and related activities to fulfill the Department's multitude of missions through its business relationships. As the business organization of the Department, OPAM develops and supports the policies, procedures and procurement operational elements. We hope that you find the information you're looking for but, if not, please call 202/287-1310 and we'll be glad to assist you. The links below provide additional detail on our policies, procedures and operations. The Office

452

Policy Flash 2013-37 Federal Acquisition Circular (FAC) 2005...  

Energy Savers [EERE]

37 Federal Acquisition Circular (FAC) 2005-66 Policy Flash 2013-37 Federal Acquisition Circular (FAC) 2005-66 Attached is Policy Flash 2013-37 Federal Acquisition Circular (FAC)...

453

Policy Flash 2013-27 Federal Acquisition Circular (FAC) 2005...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

27 Federal Acquisition Circular (FAC) 2005-65 Policy Flash 2013-27 Federal Acquisition Circular (FAC) 2005-65 Attached is Policy Flash 2013-27 Federal Acquisition Circular (FAC)...

454

AL 2014-06 ACQUISITION LETTERS REMAINING IN EFFECT | Department...  

Broader source: Energy.gov (indexed) [DOE]

AL 2014-06 ACQUISITION LETTERS REMAINING IN EFFECT AL 2014-06 ACQUISITION LETTERS REMAINING IN EFFECT Acquisition Letters (AL) that remain in effect are identified below. All other...

455

Acquisition Guide Chapter 71.1 - Headquarters Business Clearance Process  

Broader source: Energy.gov (indexed) [DOE]

Chapter 71.1 (June 2012) Chapter 71.1 (June 2012) 1 HEADQUARTERS BUSINESS CLEARANCE PROCESS Guiding Principles  Timely acquisition planning is critical  Effective oversight control systems are essential to ensuring the high quality/integrity of procurement transactions  Collaboration and cooperation are required for timely, effective procurement processes Overview This guide chapter provides guidance regarding the policies and procedures governing the Headquarters Business Clearance Review (BCR) process, the process by which certain procurement actions (solicitations, contracts, major contract changes, etc.) are reviewed and approved by the DOE Senior Procurement Executive (SPE) as a condition precedent to executing them. This section does not apply to the National Nuclear Security Administration (NNSA).

456

Program and Project Management for the Acquisition of Capital Assets  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To provide Department of Energy (DOE), including the National Nuclear Security Administration (NNSA), project management direction for the acquisition of capital assets that are delivered on schedule, within budget, and fully capable of meeting mission performance and environmental, safety and health standards. (Cancels DOE O 430.1A, paragraphs 6e(7); 7a(3); 7b(11); 7b(14); 7c(4), (6), (7), (11) and (16); 7d(4) and (8); 7e(3), (10), and (17); Attachment 1, Definitions (items 30 - Line Item Project; item 42 - Project, item 48 - Strategic System); and Attachment 2, Contractor Requirements Document (paragraph 1d regarding a project management system). Cancels DOE N 430.1 and DOE O 430.1A (in part). Canceled by DOE O 413.3 Chg 1.

2000-10-13T23:59:59.000Z

457

Program and Project Management for the Acquisition of Capital Assets  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To provide Department of Energy (DOE), including the National Nuclear Security Administration (NNSA), project management direction for the acquisition of capital assets that are delivered on schedule, within budget, and fully capable of meeting mission performance and environmental, safety and health standards. Cancels DOE O 430.1A, paragraphs 6e(7); 7a(3); 7b(11); 7b(14); 7c(4), (6), (7), (11) and (16); 7d(4) and (8); 7e(3), (10), and (17); Attachment 1, Definitions (items 30 - Line Item Project; item 42 - Project, item 48 - Strategic System; and Attachment 2, Contractor Requirements Document paragraph 1d regarding a project management system. Cancels DOE N 430.1 and DOE O 430.1A (in part). Canceled by DOE O 413.3A.

2000-10-13T23:59:59.000Z

458

Microsoft Word - Longview-WashWay Acquisition CX.docx  

Broader source: Energy.gov (indexed) [DOE]

4, 2012 4, 2012 REPLY TO ATTN OF: KEC-4 SUBJECT: Environmental Clearance Memorandum Joan Kendall Project Manager - TERR-3 Proposed Action: Acquisition of Cowlitz County Public Utility District's (CCPUD) 115-kV transmission line from BPA's Longview Substation to CCPUD's Washington Way Substation Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.24 Property Transfers Location: Township 8 North, Range 3 West, Section 36, and Township 8 North, Range 2 West, Sections 31 and 32 in Cowlitz County, Washington Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action: BPA proposes to acquire a 1.5 mile portion of CCPUD's existing Longview-Washington Way 115-kV transmission line in order to provide a parallel

459

Adam Sieminski Administrator Biography  

Gasoline and Diesel Fuel Update (EIA)

Adam Sieminski Adam Sieminski Administrator Biography Adam Sieminski was sworn in on June 4, 2012, as the eighth administrator of the U.S. Energy Information Administration (EIA). From March 2012 to May 2012, while awaiting confirmation as EIA administrator, Mr. Siemin- ski served as senior director for energy and environment on the staff of the National Security Council. From 2005 until March 2012, he was the chief energy economist for Deutsche Bank, working with the Bank's global research and trading units. Drawing on extensive industry, government, and academic sources, Mr. Sieminski forecasted energy market trends and wrote on a variety of topics involving energy economics, climate change, geopoli- tics, and commodity prices. From 1998 to 2005, he served as the director and energy strategist for

460

Bonneville Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ENT OFFS Department of Energy Bonneville Power Administration P.O. Box 3621 ' 91 FS F P Portland, Oregon 97208-3621 PUBLIC AFFAIRS April 20, 2011 In reply refer to: DK-7...

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Bonneville Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

- NT oc Department of Energy Bonneville Power Administration * r ' P.Q. Box 3621 Portland, Oregon 97208-3621 PUBLIC AFFAIRS September 30. 201 1 In reply refer to: DK-7 Richard...

462

Bonneville Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

is your final response to your request for information that you made to the Bonneville Power Administration (BPA) under the Freedom of Information Act (FOIA), 5 U.S.C. 552. You...

463

Bonneville Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

http:www.bpa.gov PR 02 14 BONNEVILLE POWER ADMINISTRATION FOR IMMEDIATE RELEASE Thursday, Jan. 23, 2014 CONTACT: Kevin Wingert, 503-230-4140971-207-8390 or 503-230-5131 BPA...

464

Bonneville Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

is a final response to your request for information that you made to the Bonneville Power Administration (BPA) under the Freedom of Information Act (FOIA), 5 USC 552. You...

465

Southwestern Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contact Us U.S. Department of Energy Southwestern Power Administration Gore Maintenance Office Mailing Address: P.O. Box 728 Gore, OK 74435-0728 Delivery Address: 14165 East 143rd...

466

Administrative Policy Approval Process  

E-Print Network [OSTI]

Administrative Policy Approval Process Faculty Handbook Policy Approval Process Policy idea. Faculty Handbook Committee meets during the academic year to discuss and evaluate proposed changes to Handbook policies. Policy changes approved by the Handbook Committee are forwarded to the President

467

Gina Pearson Assistant Administrator  

Gasoline and Diesel Fuel Update (EIA)

Gina Pearson Gina Pearson Assistant Administrator for Communications Duties Gina Pearson is the Assistant Administrator (AA) for Communications, and in this capacity provides leadership and direction to conduct the U.S. Energy Information Administration's comprehensive communications program for diverse external customer groups and agency employees. The AA for Communications is responsible for Agency communications policies and standards, the www.eia.gov website, press and media rela- tions, marketing and outreach services, energy education and literacy efforts, and the Agency's employee intranet site. Biography Since 2006, Gina Pearson has played a leadership role in the U.S. Energy Information Administration's (EIA) strategy and operations for commu- nicating information and data to Federal, State and local agencies; the

468

17.1 - Interagency Acquisitions, Interagency Transactions, and Interagency Agreements  

Broader source: Energy.gov (indexed) [DOE]

June 2012) June 2012) 1 Interagency Acquisitions, Interagency Transactions, and Interagency Agreements CONTENTS Guiding Principles  This chapter provides guidance on interagency acquisitions, interagency transactions and interagency agreements  In addition to interagency acquisitions authorized by the Economy Act, Federal Acquisition Regulation (FAR) 17.5 is revised to broaden the scope of coverage to address all Interagency Acquisitions to include orders over $500,000 issued against Federal Supply Schedules.  Determination of best procurement approach is required for an assisted acquisition or a direct acquisition. The analysis is different for these two determinations.  An assisted acquisition requires a written interagency agreement to include any agency unique

469

February 2013 FPD + Acquisition Workforce News | Department of...  

Energy Savers [EERE]

February 2013 FPD + Acquisition Workforce News February 2013 FPD + Acquisition Workforce News February 2013 newsletter.pub.pdf More Documents & Publications Microsoft Word -...

470

Meeting the Challenge: Integrating Acquisition and Project Management...  

Energy Savers [EERE]

Meeting the Challenge: Integrating Acquisition and Project Management - J. E. Surash, P.E. Meeting the Challenge: Integrating Acquisition and Project Management - J. E. Surash,...

471

POLICY GUIDANCE MEMORANDUM #09A Direct Hire Authority for Acquisition...  

Broader source: Energy.gov (indexed) [DOE]

9A Direct Hire Authority for Acquisition Positions (Expired) POLICY GUIDANCE MEMORANDUM 09A Direct Hire Authority for Acquisition Positions (Expired) THIS GUIDANCE HAS EXPIRED...

472

DOE Acquisition and Project Management (APM) Glossary of Terms...  

Broader source: Energy.gov (indexed) [DOE]

DOE Acquisition and Project Management (APM) Glossary of Terms Handbook FINAL VERSION 9-30-2014 DOE Acquisition and Project Management (APM) Glossary of Terms Handbook FINAL...

473

Chapter 1 - Acquisition Regulations System | Department of Energy  

Energy Savers [EERE]

- Acquisition Regulations System 1.1AcquisitionRegulationSystem0.pdf 1.2HeadofContractingActivity(HCA)Authority,Functions,andResponsibilities0.pdf...

474

ACQUISITION LETTER DEAR Part 933 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

ACQUISITION LETTER DEAR Part 933 ACQUISITION LETTER DEAR Part 933 This AL establishes policy and provides guidance for the use of alternative dispute resolution techniques in...

475

Green Lease Policies and Procedures for Lease Acquisition | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Green Lease Policies and Procedures for Lease Acquisition Green Lease Policies and Procedures for Lease Acquisition RSL-2007-12 More Documents & Publications Attachment 1: Green...

476

Alternative Fuels Data Center: Vehicle Acquisition Priorities and  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Vehicle Acquisition Vehicle Acquisition Priorities and Alternative Fuel Use Requirement to someone by E-mail Share Alternative Fuels Data Center: Vehicle Acquisition Priorities and Alternative Fuel Use Requirement on Facebook Tweet about Alternative Fuels Data Center: Vehicle Acquisition Priorities and Alternative Fuel Use Requirement on Twitter Bookmark Alternative Fuels Data Center: Vehicle Acquisition Priorities and Alternative Fuel Use Requirement on Google Bookmark Alternative Fuels Data Center: Vehicle Acquisition Priorities and Alternative Fuel Use Requirement on Delicious Rank Alternative Fuels Data Center: Vehicle Acquisition Priorities and Alternative Fuel Use Requirement on Digg Find More places to share Alternative Fuels Data Center: Vehicle Acquisition Priorities and Alternative Fuel Use Requirement on

477

Alternative Fuels Data Center: Vehicle Acquisition and Petroleum Reduction  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Vehicle Acquisition Vehicle Acquisition and Petroleum Reduction Requirements to someone by E-mail Share Alternative Fuels Data Center: Vehicle Acquisition and Petroleum Reduction Requirements on Facebook Tweet about Alternative Fuels Data Center: Vehicle Acquisition and Petroleum Reduction Requirements on Twitter Bookmark Alternative Fuels Data Center: Vehicle Acquisition and Petroleum Reduction Requirements on Google Bookmark Alternative Fuels Data Center: Vehicle Acquisition and Petroleum Reduction Requirements on Delicious Rank Alternative Fuels Data Center: Vehicle Acquisition and Petroleum Reduction Requirements on Digg Find More places to share Alternative Fuels Data Center: Vehicle Acquisition and Petroleum Reduction Requirements on AddThis.com... More in this section...

478

DOE to Resume Filling Strategic Petroleum Reserve: Oil Acquisition...  

Energy Savers [EERE]

to Resume Filling Strategic Petroleum Reserve: Oil Acquisition Slated for 2009 DOE to Resume Filling Strategic Petroleum Reserve: Oil Acquisition Slated for 2009 January 2, 2009 -...

479

Acquisition Of Land (Tennessee) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Acquisition Of Land (Tennessee) Acquisition Of Land (Tennessee) Acquisition Of Land (Tennessee) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Tennessee Program Type Siting and Permitting Provider Tennessee Regulatory Authority Every corporation organized under the laws of any state of the United

480

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01  

Broader source: Energy.gov (indexed) [DOE]

1 1 OAS-M-12-01 November 2011 Department of Energy Washington, DC 20585 November 15, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011" INTRODUCTION AND OBJECTIVE The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for regulating the Nation's oil pipeline, natural gas, hydroelectric and wholesale electric industries. The Commission relies on a wide range of information technology (IT) resources in achieving its mission of assisting consumers in

Note: This page contains sample records for the topic "acquisition administration cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Shopping For Danger: E-commerce techniques applied to collaboration in cyber security  

SciTech Connect (OSTI)

Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

Bruce, Joseph R.; Fink, Glenn A.

2012-05-24T23:59:59.000Z

482

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

483

Property:DataAcquisition | Open Energy Information  

Open Energy Info (EERE)

DataAcquisition DataAcquisition Jump to: navigation, search Property Name DataAcquisition Property Type Text Description Information on acquisition, including both collection and lists of data repositories. Subproperties This property has the following 27 subproperties: A Active Seismic Techniques Aeromagnetic Survey C Controlled Source Frequency-Domain Magnetics Core Analysis D Direct-Current Resistivity Survey E Electrical Techniques F FLIR FMI Log Frequency-Domain Electromagnetic Survey G Ground Gravity Survey Ground Magnetics H Hand-held X-Ray Fluorescence (XRF) I Isotopic Analysis- Fluid Isotopic Analysis- Rock M Magnetotellurics Mud Logging P PSInSAR R Radar Reflection Survey R cont. Refraction Survey S SRT Self Potential Step-out Well Stereo Satellite Imagery T Telluric Survey Time-Domain Electromagnetics

484

Federal Acquisition Circular 2005-60  

Broader source: Energy.gov (indexed) [DOE]

Circular 2005-60 Circular 2005-60 SUMMARY: This document summarizes the Federal Acquisition Regulation (FAR) rules agreed to by the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council (Councils) in this Federal Acquisition Circular (FAC) 2005-60. Item Subject FAR Case I Reporting Executive Compensation and First-Tier Subcontract Awards 2008-039 II Payments Under Time-and- Materials and Labor-Hour Contracts 2011-003 III Extension of Sunset Date for Protests of Task and Delivery Orders 2012-007 IV DARPA-New Mexico Tax Agreement 2012-019 V Clarification of Standards for Computer Generation of Forms 2011-022 VI Technical Amendments Item I Reporting Executive Compensation and First-Tier Subcontract Awards (FAR Case

485

Walnut Capital Acquisitions | Open Energy Information  

Open Energy Info (EERE)

Acquisitions Acquisitions Jump to: navigation, search Name Walnut Capital Acquisitions Place Pittsburgh, Pennsylvania Zip 15232 Product Walnut Capital Acquisitions is the project development arm of Walnut Capital, one of Pittsburgh's largest and fastest growing real estate management, development and brokerage companies. Coordinates 40.438335°, -79.997459° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.438335,"lon":-79.997459,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

486

Weapon Systems Acquisition for Defense Forces  

Science Journals Connector (OSTI)

Technology is changing the shape of warfare through multidimensional influences on the components of war-making machinery. Weapon system acquisitions by a countrys armed ... , owing to the longer life-period of

2004-01-01T23:59:59.000Z

487

Acquisition Fellows Program | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

with experience in DOE's acquisition culture who can be contacted by participants on an ad hoc basis as questions come up. * Level 1 Certification - FAC-C Training and applied...

488

OPAM Policy Acquisition Guides | Department of Energy  

Office of Environmental Management (EM)

2014-37 Update to the Department of Energy Acquisition Guide Chapter 16.2, Performance Evaluation and Measurement Plans for Cost-Reimbursement, Non-Management and Operating...

489

Energy Systems Acquisitions Advisory Board Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice streamlines the Energy Systems Acquisition Advisory Board (ESAAB) process to ensure informed, objective, and documented Strategic and Major System Critical Decision, Baseline Change Proposal, and site selection final decisions. Does not cancel other directives.

1997-10-28T23:59:59.000Z

490

President Obama Announces More Key Administration Posts | Department of  

Broader source: Energy.gov (indexed) [DOE]

January 23, 2012 - 8:28pm January 23, 2012 - 8:28pm Addthis THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE January 23, 2012 President Obama Announces More Key Administration Posts WASHINGTON - Today, President Barack Obama announced his intent to nominate the following individuals to key Administration posts: Erin C. Conaton - Under Secretary of Defense for Personnel and Readiness, Department of Defense Scott H. DeLisi - Ambassador to the Republic of Uganda, Department of State Deborah Delisle - Assistant Secretary for Elementary and Secondary Education, Department of Education Tracey Ann Jacobson - Ambassador to the Republic of Kosovo, Department of State James J. Jones - Assistant Administrator for Toxic Substances, Environmental Protection Agency Frank Kendall III - Under Secretary of Defense for Acquisition,

491

Cyber Crime, Cyber Security and Cyber Warfare  

Science Journals Connector (OSTI)

The digital world has become a battleground for the forces of good and evil. There is an ever increasing awareness that the digital world provides an unlimited opportunity to further ones goals.

Mark A. Gregory; David Glance

2013-01-01T23:59:59.000Z

492

A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks  

SciTech Connect (OSTI)

The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

2008-02-01T23:59:59.000Z

493

Enabling cyber-physical systems with machine-to-machine technologies  

Science Journals Connector (OSTI)

In recent years, Cyber-Physical Systems (CPS) has emerged as a promising direction to enrich the interactions between physical and virtual worlds. While Machine-to-Machine (M2M), Wireless Sensor Networks (WSNs) and CPS are quite similar in many networking aspects, there are still some major differences. In this paper, we first review several concepts and terms, including M2M, WSNs, CPS and Internet of Things (IoT). Then, we conduct a case study exemplified by home M2M networks, and outline the further research proposals of M2M communications. On this basis, a case of CPS, Human-Cyber-Physical System (HCPS) to achieve system safety and efficiency for connected vehicles, is proposed, and the research proposals and challenges for HCPS are summarised. Finally, we carry out a comparison of M2M and CPS to demonstrate how M2M systems with the capabilities of decision-making and real-time control can be upgraded to CPS.

Jiafu Wan; Hehua Yan; Qiang Liu; Keliang Zhou; Rongshuang Lu; Di Li

2013-01-01T23:59:59.000Z

494

Western Area Power Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Loveland Area Projects November 29-30, 2011 2 Agenda * Overview of Western Area Power Administration * Post-1989 Loveland Area Projects (LAP) Marketing Plan * Energy Planning and Management Program * Development of the 2025 PMI Proposal * 2025 PMI Proposal * 2025 PMI Comment Period & Proposal Information * Questions 3 Overview of Western Area Power Administration (Western) * One of four power marketing administrations within the Department of Energy * Mission: Market and deliver reliable, renewable, cost-based Federal hydroelectric power and related services within a 15-state region of the central and western U.S. * Vision: Provide premier power marketing and transmission services Rocky Mountain Region (RMR) is one of five regional offices 4 Rocky Mountain Region

495

SMALL BUSINESS ADMINISTRATION  

Broader source: Energy.gov (indexed) [DOE]

22 Federal Register 22 Federal Register / Vol. 76, No. 29 / Friday, February 11, 2011 / Rules and Regulations SMALL BUSINESS ADMINISTRATION 13 CFR Parts 121 and 124 RIN 3245-AF53 Small Business Size Regulations; 8(a) Business Development/Small Disadvantaged Business Status Determinations AGENCY: U.S. Small Business Administration. ACTION: Final rule. SUMMARY: This rule makes changes to the regulations governing the section 8(a) Business Development (8(a) BD) program, the U.S. Small Business Administration's (SBA or Agency) size regulations, and the regulations affecting Small Disadvantaged Businesses (SDBs). It is the first comprehensive revision to the 8(a) BD program in more than ten years. Some of the changes involve technical issues such as changing the term ''SIC code'' to

496

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

497

Energy Information Administration  

Gasoline and Diesel Fuel Update (EIA)

Marks 25th Anniversary of 1973 Oil Embargo Marks 25th Anniversary of 1973 Oil Embargo Jay Hakes, Administrator, Energy Information Administration (EIA) September 3, 1998 Click here to start Table of Contents Energy Information Administration Some Views of 1973 Major Disruptions of World Oil Supply Imported Oil as a Percent of Total U. S. Consumption Percent of OPEC and Persian Gulf World Oil Production U. S. Retail Price of Gasoline U. S. Total Petroleum Consumption U. S. Per Capita Use of Petroleum U. S. Government Owned Crude Oil Stocks Cost of Finding Oil and Gas Reserves U. S. MPG Ratings for New Vehicles U. S. Average Horsepower of a New Vehicle Share of U. S. Electricity Generated By Petroleum Futures And Options Markets Changed Energy Marketing U. S. Total Energy Consumption U. S. Per Capita Use of Energy

498

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

499

Federal Railroad Administration  

Broader source: Energy.gov (indexed) [DOE]

Update Du Update Du Jour Department Of Energy Transportation External Coordination Working Group Meeting Albuquerque, New Mexico April 21-23, 2004 Presented by Kevin R. Blackwell Radioactive Materials Program Manager Federal Railroad Administration Federal Railroad Administration Dedicated Train Study- Report to Congress FRA' s Research & Development Office (as lead on the study) received a draft final report from the Volpe National Transportation Systems Center (VNTSC) in late November, 2003. Editorial corrections were made and a final draft dated February, 2004 was provided to FRA. Final Draft Report FRA has been reviewed and been sent to FRA Administrator for clearance and forwarding to DOT OST. FRA has already "Officially Coordinated" and briefed DOT OST and

500

STEM Incubator in Cyber Security (Haxor) Wednesdays 4:00 5:00pm, Manchester 244 Spring 2014  

E-Print Network [OSTI]

curity. Students will experiment with ethical hacking, cyber defense, and reverse engineering techniques: Demonstrable Outcomes . Understanding of ethical hacking approaches and awareness of laws concerning hacking code . The end of semester hacking challenge There is not a single text book that is best suited

Fulp, Errin W.