National Library of Energy BETA

Sample records for address secure file

  1. OHA Security Cases Archive File

    Office of Energy Efficiency and Renewable Energy (EERE)

    This is a archive file of our Security decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of...

  2. Addressing Security and Reliability Concerns of Large Power Transformers |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Services » Addressing Security and Reliability Concerns of Large Power Transformers Addressing Security and Reliability Concerns of Large Power Transformers Large power transformers (LPTs) are critical to the nation's power grid, with more than 90 percent of consumed power passing through high-voltage transformers at some point. LPTs, however, face a number of challenges that make them one of the most vulnerable components on the grid. They are expensive, difficult to

  3. Addressing Security and Reliability Concerns of Large Power Transforme...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    With the nation's security and economy dependent on the reliable delivery of electricity, ... a Joint Electromagnetic Pulse (EMP) Resilience Strategy for the grid and are now ...

  4. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  5. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  6. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    SciTech Connect (OSTI)

    Thomas D'Agostino

    2009-07-14

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  7. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    SciTech Connect (OSTI)

    Thomas D'Agostino

    2009-07-14

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  8. Network Security Mechanisms Utilizing Dynamic Network Address Translation LDRD Project

    SciTech Connect (OSTI)

    PRICE, CARRIE M.; STANTON, ERIC; LEE, ERIK J.; MICHALSKI, JOHN T.; CHUA, KUAN SEAH; WONG, YIP HENG; TAN, CHUNG PHENG

    2002-11-01

    A new protocol technology is just starting to emerge from the laboratory environment. Its stated purpose is to provide an additional means in which networks, and the services that reside on them, can be protected from adversarial compromise. This report has a two-fold objective. First is to provide the reader with an overview of this emerging Dynamic Defenses technology using Dynamic Network Address Translation (Dynat). This ''structure overview'' is concentrated in the body of the report, and describes the important attributes of the technology. The second objective is to provide a framework that can be used to help in the classification and assessment of the different types of dynamic defense technologies along with some related capabilities and limitations. This information is primarily contained in the appendices.

  9. Address:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Additive Manufacturing: Pursuing the Promise Additive Manufacturing: Pursuing the Promise Fact sheet overviewing additive manufacturing techniques that are projected to exert a profound impact on manufacturing. Additive Manufacturing: Pursuing the Promise (1.42 MB) More Documents & Publications Unlocking the Potential of Additive Manufacturing in the Fuel Cells Industry Fiber Reinforced Polymer Composite Manufacturing Workshop A National Strategic Plan For Advanced Manufacturing

    Address:

  10. How Do You File A Whistleblower Complaint? | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) How Do You File A Whistleblower Complaint? The employee must first : Exhaust all applicable grievance or arbitration procedures provided by their employer prior to filing a complaint with DOE Submit the written complaint to the DOE/NNSA SC Employee Concerns Office. The complaint becomes a public document. File the complaint within 90 days of the alleged retaliation

  11. Department of Energy FILE& National Nuclear Secur~ty Administration

    Office of Legacy Management (LM)

    FILE& National Nuclear Securty Administration Nevada Site Office 2005 M U 22 AII 9 5 ... Salmon Site location) 2. Two underground nuclear tests conducted by DOE during the 1960's, ...

  12. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    SciTech Connect (OSTI)

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  13. Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security

    Broader source: Energy.gov [DOE]

    During a site visit to the Native Village of Teller in April 2012, the Office of Indian Energy's Strategic Technical Assistance Response Team helped the community successfully transfer 10,000 gallons of fuel to a bulk fuel facility to secure the community's heating supply for the winter.

  14. REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE

    SciTech Connect (OSTI)

    James E. O'Brien

    2010-06-01

    Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

  15. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  16. FILE

    Office of Legacy Management (LM)

    c&o--L>+/ co.o-09 ~~Epq-J+~~jDU" 1 . [o( / 5-/-- 1, "I ' -i, [ . - -. j s: FILE :3r.jNER is} -------.- pas',: Current: -----__---_---__-------- ----____-_________________ Cwner ccntacted 0 yes 0 nag i+ yet,? date czntacted ----___--I__- Ty-;Pfz ,' F iTiC~CC2~j 1 iljbj AA-r-ti--=' ="L---- /8;' ; z.eseaf-ch & sevei apment EJ F' raducticx scale tssting rJ Pilot si-jle 0 ' jench Scale Fracess 0 Theoretical Studies 0 Samp:! e & haivsis 0 Fz-citity Tvpe 0 Manui artur i ng

  17. PSH-12-0055- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. On October 11, 2011, the individual filed for personal bankruptcy under Chapter 7 of the federal bankruptcy laws. Upon being apprised of this, the local security office (LSO) summoned the individual for an interview with a personnel security specialist in order to address the security concerns raised by this filing.

  18. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  19. change_address_111609

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CHANGE OF ADDRESS and EMERGENCY NOTIFICATION TO: HUMAN RESOURCES DATE: Z# Social Security # Print First Name Print Middle Name or Initial Print Last Name (Currently in Payroll System) Complete appropriate changes: NAME CHANGE: Print Name Change to ADDRESS CHANGE: Mailing Address City State Zip TELEPHONE NUMBER CHANGE: FROM Area Code and # TO Area Code and # Cell Area Code and # Home phone Message phone EMERGENCY NOTIFICATION CHANGE: Name Relationship Day Phone Evening Phone Address City State

  20. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  1. Keynote Address

    Broader source: Energy.gov [DOE]

    Wednesday's keynote address by Dr. David Danielson, Assistant Secretary for Energy Efficiency and Renewable Energy, U.S. Department of Energy.

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  3. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  4. Filing Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Filing Information Filing Information The Office of Hearings and Appeals (OHA) encourages electronic filing of submissions, by e-mail or by telefax. OHA's e-mail address for filing submissions is OHA.filings@hq.doe.gov; the OHA telefax number is (202) 287-1415. Note, however, that because of signature issues, we may ask you to file a signed original of a document. We will send an acknowledgment (by letter or e-mail) upon our receipt of all principal pleadings. If you choose to file by regular

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  6. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signatures on File

  7. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signatures on File

  8. File Storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage File Storage Disk Quota Change Request Form Carver File Systems Carver has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  9. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  10. TFC-0010 - In the Matter of National Security Archive | Department...

    Broader source: Energy.gov (indexed) [DOE]

    The National Security Archive filed an Appeal from a determination that the National Nuclear Security Administration (NNSA) issued on April 21, 2011. In that determination, NNSA...

  11. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  12. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  13. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  14. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  15. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to

  16. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ATLAS uses the various systems: /common In the past ATLAS used /common primarily for their software installations but with cvmfs (see below) this is no longer necessary. ATLAS users also have made personal directories under /common/atlas. However, this is not the intended use of /common, as described on Other File

  17. Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signature on File Signature on File 5/29/08

  18. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where

  19. Security, Emergency Planning & Safety Records | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Protection program records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive ...

  20. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Broader source: Energy.gov (indexed) [DOE]

    Protection program records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive ...

  1. EEO Complaints Process | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Process A National Nuclear Security Administration employee or applicant for Federal employment may file an EEO complaint if the employee or applicant believes that heshe has been ...

  2. Addressing the workforce pipeline challenge

    SciTech Connect (OSTI)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  3. TSO-1105- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and has held a DOE security clearance for several years. Based on issues contained in the individual’s security file, the Local Security...

  4. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity ...

  5. June 2012 | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    June 2012 June 29, 2012 US Releases Updated Plutonium Inventory Report File Pu Inventory 6.29.12.docx June 27, 2012 World Institute for Nuclear Security Workshop at Y-12 Brings Together More than 20 Countries File 2012-06-27 WINS Workshop.docx June 18, 2012 NNSA Production Office Open for Business File NPO Open Release 06.18.12

  6. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ALICE uses the various systems: /common ALICE uses /common to build the software that supports its grid-based automated production work. This software includes AliRoot, Geant, AliEn, and XRootD. /eliza6, /eliza8, /eliza17 ALICE has space on 3 elizas: 16TB on /eliza6, 6TB on /eliza8 and 11TB on /eliza17. The space on

  7. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how STAR uses the various systems: /common The STAR software is installed on /common. For 32sl44 it is under /common/star/star44 and for sl53 it is under /common/star/star53. In both cases the software consists primarily of a STAR-specific ROOT installation on which releases of the STAR libraries are built as shown on the

  8. Dynamic Non-Hierarchical File Systems for Exascale Storage

    SciTech Connect (OSTI)

    Long, Darrell E.; Miller, Ethan L

    2015-02-24

    appliances. These search applications are often optimized for a single file system, making it difficult to move files and their metadata between file systems. Users have tried to solve this problem in several ways, including the use of separate databases to index file properties, the encoding of file properties into file names, and separately gathering and managing provenance data, but none of these approaches has worked well, either due to limited usefulness or scalability, or both. Our research addressed several key issues: • High-performance, real-time metadata harvesting: extracting important attributes from files dynami- cally and immediately updating indexes used to improve search. • Transparent, automatic, and secure provenance capture: recording the data inputs and processing steps used in the production of each file in the system. • Scalable indexing: indexes that are optimized for integration with the file system. • Dynamic file system structure: our approach provides dynamic directories similar to those in semantic file systems, but these are the native organization rather than a feature grafted onto a conventional system. In addition to these goals, our research effort will include evaluating the impact of new storage technolo- gies on the file system design and performance. In particular, the indexing and metadata harvesting functions can potentially benefit from the performance improvements promised by new storage class memories.

  9. FileSys.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Navigating NERSC File Systems May 3, 2011 David Turner NERSC User Services Group * Focus on user-writable file systems * Global file systems * Local file systems * Policies * ...

  10. To: File

    Office of Legacy Management (LM)

    In 1931 and 19Siz the Atomic Energy Commission He; and Safety Division participated in ... Information obtained from EPFI files indicates that the facilit continued operations ...

  11. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of the individual to address concerns about his falsification of information and alcohol use. The individual's behavior raised security concerns under Criteria F, H and L....

  12. File Transfer Protocol Guard Version 1.5

    Energy Science and Technology Software Center (OSTI)

    1999-01-13

    The FTP Guard provides a means for securely transferring files from an unclassified network to a classified network. Files are moved using the FTP protocol. To a user, the FTP Guard appears to be an FTP proxy server. The FTP Guard does not move files from the classified network to the unclassified network.

  13. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  14. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Cyber Security Audit and Attack Detection Toolkit project developed two commercial solutions-Bandolier and Portaledge. The Bandolier Audit Files enable energy sector asset ...

  15. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  16. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  17. World Institute for Nuclear Security Workshop at Y-12 Brings...

    National Nuclear Security Administration (NNSA)

    Nuclear Security (WINS). The workshop is jointly sponsored by the National Nuclear Security Administration (NNSA) and the Department of Defense (DoD). File 2012-06-27 WINS Workshop

  18. 1987 RECS Public Use Microdata Files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cvs file File 3: Type of Energy and Equipment text file cvs file File 4: Household Demographics text file cvs file File 5: Presence of Appliances text file cvs file File 6: Energy...

  19. TO: FILE

    Office of Legacy Management (LM)

    Homer Watson, Wright Paterson Air Force Base, as a starting point. AWmb ' I. .' ..x; . .:yx . . . . : File a.%-I. (d : AIR FORCE PLANT.36. EvENGALE, OilIO 'w .*:3 '. - ...

  20. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This file system is not configured for high IO performance. Home directories should ... Furthermore, SSH will not allow you to login if HOME.ssh is writeable by anyone other ...

  1. TO: FILE

    Office of Legacy Management (LM)

    ... C . Young ,.+-' E. Mitchal file FUS,RAP WI.4,, PA.40 L.-J Iany in :ee, anda Area ' radioactive *hap 6 as a d2 EC stop for 100 employee, and )mme :nd both these Ind Milwaukee

  2. Frequently Asked Questions on Filing EISs with EPA's Office of...

    Office of Environmental Management (EM)

    Filing EISs with EPA's Office of Federal Activities This letter from the Director of the Environmental Protection Agency's Office of Federal Activities addresses common questions...

  3. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  4. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SAFETY RECORDS | Department of Energy 8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive unclassified information, special nuclear materials, nuclear weapons, other Government property) ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,

  5. Security for Radioactive Sources: Fact Sheet | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Security for Radioactive Sources: Fact Sheet March 23, 2012 Radioactive materials are a critical and beneficial component of global medical, industrial, and academic efforts. The possibility that these materials could be used by terrorists is a national security concern. The National Nuclear Security Administration (NNSA), along with international and domestic partners, addresses radiological material security as part of its nuclear nonproliferation mission. US

  6. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  7. Nonproliferation Policy | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation Policy Challenge: Address evolving threats/challenges to the nonproliferation and arms control regimes. Solution: Develop programs and strategies to address emerging nonproliferation and arms control challenges and opportunities. Learn More 10 CFR Part 810 Related Topics international security international security policy NIS nuclear controls safeguards safeguards and security verification Related News Nuclear Verification International Nuclear Safeguards Nonproliferation and

  8. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  9. A Metadata-Rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  10. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Challenges | Department of Energy Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges. Southern recognizes that many policy and logistical concerns must be addressed for the promises of smart grid technologies and applications to be fully realized in ways that are beneficial, secure, and cost-effective

  11. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  12. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  13. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-15

    This Guide addresses the implementation steps for achieving safeguards and security systems that support the Department's projection objectives.

  14. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  15. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  16. Secure Smart Grid Association | Open Energy Information

    Open Energy Info (EERE)

    Smart Grid Association Jump to: navigation, search Name: Secure Smart Grid Association Address: 2374 S Josephine St Place: Denver, Colorado Zip: 80210 Region: Rockies Area Number...

  17. FAQS Reference Guide – Safeguards and Security

    Broader source: Energy.gov [DOE]

    This reference guide addresses the competency statements in the May 2009 edition of DOE-STD-1171-2009, Safeguards and Security Functional Area Qualification Standard.

  18. Clearance Adjudication | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Clearance Adjudication The Office of Personnel and Facility Clearances and Classification (OPFCC) submits the clearance paperwork to the proper investigative agency, the Office of Personnel Management (OPM) or the Federal Bureau of Investigation (FBI). Upon receipt of the investigation, the paperwork is matched to the Personnel Security File and assigned to a Personnel Security Specialist, who will adjudicate the investigation, using the Presidential Adjudicative Guidelines. If security concerns

  19. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Cases Security Cases RSS August 19, 2016 PSH-16-0014 - In the Matter of Personnel Security Hearing On August 19, 2016, an Administrative Judge issued a decision in which he determined that an individual's access authorization should not be restored. According to the Notification Letter, the individual's financial irresponsibility had led to a Chapter 13 bankruptcy that he filed in late 2014. Primary causes of the individual's financial overextension included providing $80,000 in support

  20. CEKRM. FILES

    Office of Legacy Management (LM)

    *:-I c-Y,- -.>A - L z.23 ' ,gQ+ CEKRM. FILES : -- i" ry .' ;,:;;:i ;- ' _ :;, I' -. .-,- p.." * .i' ' --yr:,? ,5 .Y' :?!, .I I >L L qgy~T.5 ,-:,,. \>,' yt r, .,-:,7 ,A : _ . . T_ 31' :;:: . .' : z ^., - -; &.' -" ' \-,-y . ..L' .:"A .:1i2*;,1 1- .,: _.,-.- 1 ,... _ . , , 2; J..i"!w , . . . .' _ \ ' d>; : r. . _ " ' . ;I 2: a : ..i. ,. 7, I . :ri cij?TL-i; 12, ;;,2;-,: ;. ." * 1. 1 .:1 : :: .' I .-=-. I. Iv-.. . . . . - i. ; i -2. ./ ..l,..- '

  1. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  2. Principal Associate Director - Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Principal Associate Director - Global Security As Principal Associate Director for Global Security, Terry Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505) 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C.

  3. NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sharing between platforms. File systems are configured for different purposes. On each machine you have access to at least three different file system Home: Permanent, relatively...

  4. Files systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Steps on Climate: United States Sarah O. Ladislaw Director and Senior Fellow, Energy and National Security Program Three Avenues for Action Post-Paris * Operationalize international framework * Deliver on targets and commitments * Focus on longer term goal setting United States: Climate Action Plan (2013) Mitigation Adaptation International Leadership  Deploy clean energy - Clean Power Plan - RE incentives - Innovation  21 st century transport sector - Increase fuel economy - Advanced

  5. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  6. FIC-16-0002- In the Matter of the National Security Archive

    Office of Energy Efficiency and Renewable Energy (EERE)

    On April 7, 2016, OHA issued a decision granting in part a FOIA Appeal filed by the National Security Archive from a determination issued to it by the DOE’s National Nuclear Security Administration...

  7. PSH-12-0020- In the Matter of Personnel Security Hearing

    Office of Energy Efficiency and Renewable Energy (EERE)

    The individual is employed by a DOE contractor, and has held a DOE access authorization for several years. Based on financial issues contained in the individual’s security file, the Local Security...

  8. FIA-16-0020- In the Matter of the National Security Archive

    Office of Energy Efficiency and Renewable Energy (EERE)

    On March 9, 2016, OHA granted in part a FOIA Appeal filed by the National Security Archive (Appellant) from a determination issued to it by the National Nuclear Security Administration (NNSA). In...

  9. FIC-12-0003- In the Matter of the National Security Archive

    Broader source: Energy.gov [DOE]

    On August 7, 2015, OHA denied a FOIA Appeal filed by the National Security Archive of a determination issued by the Office of Intelligence and Counterintelligence (IN).  The National Security...

  10. PSH-11-0025- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual’s security file,...

  11. PSH-11-0021- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual’s security file,...

  12. Environmental Security and Restoration | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environmental Security & Restoration Argonne's work in environmental security and restoration addresses soil, surface water, sediment, and groundwater at contaminated sites. Argonne's work in environmental restoration addresses soil, surface water, sediment, and groundwater at contaminated sites, starting with environmental evaluations and planning projects. Assessments are also conducted of approaches for long-term stewardship of remediated sites with residual contamination. Remedies range

  13. Brinkman Addresses JLab | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brinkman Addresses JLab Brinkman Addresses JLab Brinkman Addresses JLab Dr. William F. Brinkman, Director of the Department of Energy's Office of Science, addressed Jefferson Lab staff on the Office of Science perspective during his visit Monday. Dr. William F. Brinkman, Director of the Department of Energy's Office of Science, addressed Jefferson Lab staff on the Office of Science perspective during his visit Monday. "There is still a lot of interesting nuclear physics that we want to do

  14. NX Configuration File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Configuration File NX Configuration File This is the NX configuration file that you will need to connect to NERSC NX Server: NX5Confgure.nxs.zip To use this file, please follow the Online Tutorial. Last edited: 2016-04-29 11:34:57

  15. Security Improvements Project Completed Ahead of Schedule, $20 Million

    National Nuclear Security Administration (NNSA)

    Under Budget | National Nuclear Security Administration | (NNSA) Security Improvements Project Completed Ahead of Schedule, $20 Million Under Budget April 07, 2014 The National Nuclear Security Administration's (NNSA) Security Improvements Project (SIP) was recently completed ahead of schedule and approximately $20 million under its original budget of $72 million. File 2014-04-08 SIP.docx NPO Press Releases September 2016 (1) August 2016 (1) May 2016 (1) February 2016 (1) January 2016 (1)

  16. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  17. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  18. Frequently Asked Questions on Filing EISs with EPA's Office of Federal Activities (EPA, 1994)

    Broader source: Energy.gov [DOE]

    This letter from the Director of the Environmental Protection Agency's Office of Federal Activities addresses common questions related to the timing for filing EISs.

  19. Frequently Asked Questions on Filing EISs with EPA's Office of Federal Activities

    Broader source: Energy.gov [DOE]

    This letter from the Director of the Environmental Protection Agency's Office of Federal Activities addresses common questions related to the timing for filing EISs.

  20. Partially Superceded- Frequently Asked Questions on Filing EISs with EPA's Office of Federal Activities (EPA, 1994)

    Office of Energy Efficiency and Renewable Energy (EERE)

    This letter from the Director of the Environmental Protection Agency's Office of Federal Activities addresses common questions related to the timing for filing EISs.

  1. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  2. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  3. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  4. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  6. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  7. Keynote Address | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Keynote Address Keynote Address An overview and update on Environmental Management given by Alice Williams, Associate Principal Deputy Assistant Secretary of the Office of Environmental Management. Keynote Address (2.53 MB) More Documents & Publications EIS-0337-SA-01: Supplement Analysis West Valley Demonstration Project Low-Level Waste Shipment Chairs Meeting - October 2012

  8. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  9. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Office of Energy Efficiency and Renewable Energy (EERE)

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  10. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  11. Privacy and Security Notice | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the U.S. Government. It is for authorized use only. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system, associated connected systems and all files may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized site, Department of Energy, and law enforcement personnel, as well as authorized

  12. New partnership uses advanced computer science modeling to address climate

    National Nuclear Security Administration (NNSA)

    change | National Nuclear Security Administration | (NNSA) partnership uses advanced computer science modeling to address climate change Friday, August 29, 2014 - 10:26am Several national laboratories and institutions have joined forces to develop and apply the most complete climate and Earth system model to address the most challenging and demanding climate change issues. Accelerated Climate Modeling for Energy, or ACME, is designed to accelerate the development and application of fully

  13. Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Navigating NERSC File Systems May 3, 2011 David-Turner.jpg NERSC Training Event 10:00 - ... Navigating NERSC File Systems David Turner, NERSC User Services Group NERSC hosts a number ...

  14. Fast Global File Status

    Energy Science and Technology Software Center (OSTI)

    2013-01-01

    Fast Global File Status (FGFS) is a system software package that implimints a scalable mechanism to retrieve file information, such as its degree of distribution or replication and consistency.

  15. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  16. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  17. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. )

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  18. DOE Integrated Security System (DISS) preliminary communication security analysis

    SciTech Connect (OSTI)

    Sweeney, D. J.

    1993-10-01

    The purpose of this analysis is to document a technical approach to improve DOE Integrated Security System (DISS) dial-up communications security and the requirements to address them. This document is not intended as a comprehensive analysis of the security aspects of the DISS computer system but rather as an analysis of the dial-up communications security as it pertains to the use of the DISS database in the new DOE Automated Visitors Access Control System (DAVACS) procedures. Current access controls into the DISS will be discussed with emphasis on the DAVACS procedures. Recommendations will be provided for increasing the dial-up communications security into DISS as it relates to the automated visit procedures. Finally a design for an encrypted dial-up communication link to DISS will be given.

  19. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  1. Keynote Address | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    40PM to 2:05PM PDT Pacific Ballroom Wednesday keynote address by Dan Arvizu, Director, National Renewable Energy Laboratory

  2. 2015 Safeguards and Security Directors Conference- July 14- 16, 2015

    Broader source: Energy.gov [DOE]

    This event will address many of the significant policy updates, reorganization, and topics of departmental emphasis that have occurred in recent years while also focusing on the myriad of other contemporary security topics and programs that impact our security operations.

  3. T-644: Prenotification Security Advisory- Adobe Acrobat & Adobe Readers Updates

    Broader source: Energy.gov [DOE]

    A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products.

  4. Securing WLANs using 802.11i | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    WLANs using 802.11i Securing WLANs using 802.11i This paper addresses design principles and best practices regarding the secure implementation and operation of Wireless LAN (WLAN) ...

  5. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  7. Argonne Director Eric Isaacs addresses the National Press Club

    ScienceCinema (OSTI)

    Eric Isaccs

    2010-01-08

    Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  9. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  12. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  13. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  14. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  15. NNSA Production Office Open for Business | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Production Office Open for Business June 18, 2012 WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) Production Office (NPO) is now in operation, providing federal oversight of nuclear production missions at the Pantex Site in Amarillo, Texas, and the Y-12 National Security Complex in Oak Ridge, Tenn. File NPO Open Release 06.18

  16. Waltzer Receives NNSA Gold Medal Award | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Waltzer Receives NNSA Gold Medal Award June 26, 2014 Karl Waltzer, Acting Deputy Manager of the National Nuclear Security Administration's Production Office, has received the NNSA Gold Medal Award in recognition of his distinguished achievements in support of national security programs. File Waltzer Receives NNSA Gold Medal Award

  17. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eliza File Systems Eliza File Systems Storage at PDSF is organized by group and available to all the nodes in PDSF. Please note that files on these file systems are not backed up. It is the responsibility of users to back up their files themselves as necessary. Over the years at PDSF there have been incidents which resulted in a loss of data from disk, often related to aging hardware. You can display the UGE io units with the command "qconf -se global". Disk Vault Experiments SGE io

  18. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  19. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  20. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  1. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  2. Recommended Practices Guide For Securing ZigBee Wireless Networks...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments This paper addresses design principles and best practices regarding the ...

  3. FAQS Reference Guide – Safeguards and Security General Technical Base

    Office of Energy Efficiency and Renewable Energy (EERE)

    This reference guide addresses the competency statements in the July 2009 edition of DOE-STD-1123-2009, Safeguards and Security General Technical Base Qualification Standard.

  4. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  5. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  6. File:Bureauofreclamationfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bureauofreclamationfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bureauofreclamationfactsheet.pdf Size of this preview: 463 599 pixels....

  7. File:20121127144703735.pdf | Open Energy Information

    Open Energy Info (EERE)

    20121127144703735.pdf Jump to: navigation, search File File history File usage File:20121127144703735.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  8. File:Windyclassroom.pdf | Open Energy Information

    Open Energy Info (EERE)

    Windyclassroom.pdf Jump to: navigation, search File File history File usage Metadata File:Windyclassroom.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  9. File:Npsfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Npsfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Npsfactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  10. File:Oregonshpodocumentationstandards.pdf | Open Energy Information

    Open Energy Info (EERE)

    Oregonshpodocumentationstandards.pdf Jump to: navigation, search File File history File usage File:Oregonshpodocumentationstandards.pdf Size of this preview: 463 599 pixels....

  11. File:Noaafactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Noaafactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Noaafactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  12. File:Drillinghandbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Drillinghandbook.pdf Jump to: navigation, search File File history File usage File:Drillinghandbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  13. File:Energydatabusfacthseet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Energydatabusfacthseet.pdf Jump to: navigation, search File File history File usage Metadata File:Energydatabusfacthseet.pdf Size of this preview: 463 599 pixels. Other...

  14. File:Bonnevillepowerfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bonnevillepowerfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bonnevillepowerfactsheet.pdf Size of this preview: 463 599 pixels. Other...

  15. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA Security for Managers and Operators (8.15 MB) More Documents & Publications Intermediate SCADA Security Training Course Slides

  16. Contact Us | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    For general information about NNSA, please feel free to contact us: Mailing Address National Nuclear Security Administration U.S. Department of Energy 1000 Independence Ave., S.W. ...

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  20. detonation detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    detonation detection NNSA administrator visits NNSS to meet team, see national security work Last month, Department of Energy Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) visited NNSA's Nevada Field Office where he hosted an all-hands for NNSA-Nevada staff and presented several service awards. During the trip he visited the NNSA... Radiological Security The program collaborates with domestic and international partners to address the threat of illicit

  1. ldrd | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ldrd Laboratory Directed Research & Development The U.S. Department of Energy (DOE) is charged with a large and complex mission: to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The DOE executes this mission to a large extent at

  2. Grid collector: An event catalog with automated file management

    SciTech Connect (OSTI)

    Wu, Kesheng; Zhang, Wei-Ming; Sim, Alexander; Gu, Junmin; Shoshani, Arie

    2003-10-17

    High Energy Nuclear Physics (HENP) experiments such as STAR at BNL and ATLAS at CERN produce large amounts of data that are stored as files on mass storage systems in computer centers. In these files, the basic unit of data is an event. Analysis is typically performed on a selected set of events. The files containing these events have to be located, copied from mass storage systems to disks before analysis, and removed when no longer needed. These file management tasks are tedious and time consuming. Typically, all events contained in the files are read into memory before a selection is made. Since the time to read the events dominate the overall execution time, reading the unwanted event needlessly increases the analysis time. The Grid Collector is a set of software modules that works together to address these two issues. It automates the file management tasks and provides ''direct'' access to the selected events for analyses. It is currently integrated with the STAR analysis framework. The users can select events based on tags, such as, ''production date between March 10 and 20, and the number of charged tracks > 100.'' The Grid Collector locates the files containing relevant events, transfers the files across the Grid if necessary, and delivers the events to the analysis code through the familiar iterators. There has been some research efforts to address the file management issues, the Grid Collector is unique in that it addresses the event access issue together with the file management issues. This makes it more useful to a large variety of users.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  4. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  5. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  6. Original Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signature on File Page8 of 8 M. EMERGENCY PROCEDURES 1. The owneroperator must maintain an adequately trained onsite RCRA emergency coordinator to direct emergency...

  7. Other File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Home Directories Your home directory is located at homelogin-name. Home directories ... Home directories are backed up as insurance against catastrophic file system failure. ...

  8. EIA-411 Data File

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Form EIA-411 Database Form EIA-411 - Coordinated Bulk Power Supply Program Report Data ... except No. 7 (Transmission Outages) which will continue to be a voluntary filing. ...

  9. Addressing the Need for Independence in the CSE Model

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Ferragut, Erik M; Sheldon, Frederick T; Grimaila, Michael R

    2011-01-01

    Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.

  10. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  11. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  12. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  13. State of the Lab Address

    ScienceCinema (OSTI)

    King, Alex

    2013-03-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  14. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  15. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  16. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  17. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  19. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  20. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  1. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  2. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  3. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  4. Addressing Deferred Maintenance, Infrastructure Costs, and Excess...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities at Portsmouth and Paducah Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities ...

  5. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities A Public Meeting ...

  6. File:DIAsample.pdf | Open Energy Information

    Open Energy Info (EERE)

    DIAsample.pdf Jump to: navigation, search File File history File usage File:DIAsample.pdf Size of this preview: 776 600 pixels. Full resolution (1,650 1,275 pixels, file...

  7. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Alliance to Save Energy. | Department of Energy Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance to Save Energy (the Alliance) thanks the

  8. CAMD Policy Files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lists: Caretakers, Accelerator Operators, Shift Operators Building Security: Policy Crane: Directive, Use, Procedure Emergency: Policy, Procedure Experimental Hall: Policy ...

  9. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  11. PSH-12-0021- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The Individual is a contractor employee at a DOE facility. The Local Security Office (LSO) received information that the Individual had not filed a state income tax return for the year 2007....

  12. ADP computer security classification program

    SciTech Connect (OSTI)

    Augustson, S.J.

    1984-01-01

    CG-ADP-1, the Automatic Data Processing Security Classification Guide, provides for classification guidance (for security information) concerning the protection of Department of Energy (DOE) and DOE contractor Automatic Data Processing (ADP) systems which handle classified information. Within the DOE, ADP facilities that process classified information provide potentially lucrative targets for compromise. In conjunction with the security measures required by DOE regulations, necessary precautions must be taken to protect details of those ADP security measures which could aid in their own subversion. Accordingly, the basic principle underlying ADP security classification policy is to protect information which could be of significant assistance in gaining unauthorized access to classified information being processed at an ADP facility. Given this policy, classification topics and guidelines are approved for implementation. The basic program guide, CG-ADP-1 is broad in scope and based upon it, more detailed local guides are sometimes developed and approved for specific sites. Classification topics are provided for system features, system and security management, and passwords. Site-specific topics can be addressed in local guides if needed.

  13. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  14. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  15. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  16. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  17. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect (OSTI)

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  18. MEMORANDUM TO: FILE FROM:

    Office of Legacy Management (LM)

    p' : , .; ' ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a ---...e---e--- DATE 6j88 7 v---s -- ---... SUBJECT: ;&l a+-b IA Tcornqm Q afib4 SITE NAME: CITY: & &&at leg co ...

  19. Unix File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    also sometimes known as "world" permissions, and applies to all users who can login to the system. The command "ls -l" displays the permissions and associated group for any file. ...

  20. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    » Control Systems Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes

  1. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  2. PSH-15-0100 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 0 - In the Matter of Personnel Security Hearing PSH-15-0100 - In the Matter of Personnel Security Hearing On February 22, 2016, an Administrative Judge issued a decision in which he determined that an individual's access authorization should be restored. According to the Notification Letter, the individual had failed to file federal income tax returns for the years 2012 through 2014. The individual explained that his Certified Public Accountant, who had filed his taxes for him for the

  3. Keynote address: International nuclear cooperation

    SciTech Connect (OSTI)

    Kennedy, R.T.

    1989-01-01

    These meetings provide an important opportunity for the nuclear community to assess the scope and direction of its wide-ranging activities. Nuclear technology has given us the tools to understand and shape our physical environment in ways which can solve ancient problems of health, food supply, energy, and many others which affect the quality of our lives. International cooperation is necessary to secure the peaceful benefits of nuclear technology. Meeting global energy needs must be high on any priority list of issues for the coming decade and the 21st century. The satisfaction of energy needs is today and will increasingly be a crucial factor in international stability. Hand in hand with the need to assure energy sufficiency is the need to assure the long-term protection of the environment. Three key elements that give a useful framework for approaching the future of nuclear cooperation are technological factors, economic issues, and political acceptability. Technological avenues to greater safety must be vigorously pursued. Economic alternatives must be identified and objectively weighed. Most important of all, the framework of public confidence must be strengthened.

  4. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  5. Addressing Failures in Exascale Computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert; Abraham, Jacob; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, J.; Bose, Pradip; Cappello, Franck; Carlson, Bill; Chien, Andrew; Coteus, Paul; DeBardeleben, Nathan; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Fazzari, Saverio; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Rob; Stearley, Jon; Van Hensbergen, Eric

    2014-01-01

    We present here a report produced by a workshop on Addressing failures in exascale computing' held in Park City, Utah, 4-11 August 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system, discuss existing knowledge on resilience across the various hardware and software layers of an exascale system, and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia, and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  6. Addressing failures in exascale computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert W.; Abraham, Jacob A.; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, Jim; Bose, Pradip; Cappello, Franck; Carlson, William; Chien, Andrew A.; Coteus, Paul; Debardeleben, Nathan A.; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Saverio, Fazzari; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Robert; Stearly, Jon; Van Hensbergen, Eric

    2014-05-01

    We present here a report produced by a workshop on “Addressing Failures in Exascale Computing” held in Park City, Utah, August 4–11, 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system; discuss existing knowledge on resilience across the various hardware and software layers of an exascale system; and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia; and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  7. File:NREL-banglmetst-221.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-banglmetst-221.pdf Jump to: navigation, search File File history File usage Selected Meteorological Stations and Elevation Size of this...

  8. JLab Test Public Address System | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Public Address System May 18 at 5:30 p.m.: JLab Will Test its Public Address System On Wednesday, May 18, Jefferson Lab will conduct the monthly test of its Public Address ...

  9. PCS Security Technology Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2007-01-30

    P-STET assists in the security technology decision making process from a costlbeneflt perspective. It aids in addressing such questions as whether to acquire and deploy new security technology, to re-configure an existing product or system, or to maintain status quo. P-STET offers both a qualitative and quantitative option. P-STET is most efficient when tailored to an organization’s security cost/benefit environment. It then serves as both a guide to show what types of security questions shouldmore » be addressed and as a means to analyze the data gathered from the questions to make an informed decision. The quantitative option provides a straightforward way to express costs/benefits in terms of dollars. It relies on the organization to quantify benefits or cost avoidances, and, therefore, best serves as a guide to ensure various cost and benefit angles are evaluated. The qualitative option allows the organization to assess costs by levels with respect to security and PCS budgets, operational impacts, and opportunity costs. Benefits are represented in terms of improvements to the organization’s operations and are also assessed by levels with respect to some benchmark such as compliance with best practices. Results are displayed graphically using radar charts, allowing the user to make a more intuitive decision. The shaded area of each chart represents the overall cost and benefit of the security investment. A good investment is denoted when the ratio of benefit shaded area to cost shaded area is large.« less

  10. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  11. U.S. Energy Secretary Addresses International Atomic Energy Agency General

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conference | Department of Energy Energy Secretary Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 2:24pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in

  12. U.S. Energy Secretary Addresses International Atomic Energy Agency General

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conference | Department of Energy Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 4:48pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in the nuclear

  13. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  14. Deputy Secretary Poneman Addresses Nuclear Deterrence Summit...

    Office of Environmental Management (EM)

    Addresses Nuclear Deterrence Summit Deputy Secretary Poneman Addresses Nuclear Deterrence Summit February 17, 2010 - 12:00am Addthis Alexandria, VA - U.S. Deputy Secretary of ...

  15. EPA -- Addressing Children's Health through Reviews Conducted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EPA -- Addressing Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act EPA -- Addressing Children's ...

  16. Keynote Address: Update on Environmental Management | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Address: Update on Environmental Management Keynote Address: Update on Environmental Management Keynote presentation made by David G. Huizenga for the NTSF annual meeting held from ...

  17. Symbiosis: Addressing Biomass Production Challenges and Climate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Symbiosis: Addressing Biomass Production Challenges and Climate Change Symbiosis: Addressing Biomass Production Challenges and Climate Change This presentation was the opening ...

  18. It's the little things that count | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) It's the little things that count April 16, 2012 OAK RIDGE, Tenn. -- In just five months, the Jack Case Center at the National Nuclear Security Administration's Y-12 National Security Complex has not only achieved compliance with a national building standard for energy sustainability, but has also accomplished a 21.4 percent reduction in energy consumption. File It's the little things th

  19. Y-12 to Resume Wet Chemistry Operations | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration | (NNSA) to Install New Fence to Reduce Trespassing March 28, 2013 The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. File 2013-03-28 NPO.docx Administration | (NNSA)

    to Resume Wet Chemistry Operations March 14, 2003 PDF icon 3-14-03.pdf

  20. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    SciTech Connect (OSTI)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-07-09

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a dirty bomb. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  1. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  2. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  3. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  4. File:S-38-Well-Construction-and-Modification-Permit.pdf | Open...

    Open Energy Info (EERE)

    S-38-Well-Construction-and-Modification-Permit.pdf Jump to: navigation, search File File history File usage File:S-38-Well-Construction-and-Modification-Permit.pdf Size of this...

  5. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  6. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Klotz visits Y-12 to see progress on new projects and ongoing work on NNSA's national security missions Last week, NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. He also met with the Region 2 volunteers of the Radiogical... Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a

  7. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  8. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  9. Office of Security Assessments

    Broader source: Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  10. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  11. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  12. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  13. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  14. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  15. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  18. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  19. INSPIRE and SPIRES Log File Analysis

    SciTech Connect (OSTI)

    Adams, Cole; /Wheaton Coll. /SLAC

    2012-08-31

    SPIRES, an aging high-energy physics publication data base, is in the process of being replaced by INSPIRE. In order to ease the transition from SPIRES to INSPIRE it is important to understand user behavior and the drivers for adoption. The goal of this project was to address some questions in regards to the presumed two-thirds of the users still using SPIRES. These questions are answered through analysis of the log files from both websites. A series of scripts were developed to collect and interpret the data contained in the log files. The common search patterns and usage comparisons are made between INSPIRE and SPIRES, and a method for detecting user frustration is presented. The analysis reveals a more even split than originally thought as well as the expected trend of user transition to INSPIRE.

  20. File:Mmpa.pdf | Open Energy Information

    Open Energy Info (EERE)

    Mmpa.pdf Jump to: navigation, search File File history File usage File:Mmpa.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6...

  1. File:Keystone.pdf | Open Energy Information

    Open Energy Info (EERE)

    Keystone.pdf Jump to: navigation, search File File history File usage File:Keystone.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  2. File:Handbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Handbook.pdf Jump to: navigation, search File File history File usage File:Handbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  3. File:Install.pdf | Open Energy Information

    Open Energy Info (EERE)

    Install.pdf Jump to: navigation, search File File history File usage File:Install.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  4. File:Hydrofracking.pdf | Open Energy Information

    Open Energy Info (EERE)

    Hydrofracking.pdf Jump to: navigation, search File File history File usage File:Hydrofracking.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  5. File:Consultants.pdf | Open Energy Information

    Open Energy Info (EERE)

    Consultants.pdf Jump to: navigation, search File File history File usage File:Consultants.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  6. File:Installnot.pdf | Open Energy Information

    Open Energy Info (EERE)

    Installnot.pdf Jump to: navigation, search File File history File usage File:Installnot.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

  7. File:RSC.pdf | Open Energy Information

    Open Energy Info (EERE)

    RSC.pdf Jump to: navigation, search File File history File usage File:RSC.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  8. Category:Map Files | Open Energy Information

    Open Energy Info (EERE)

    has the following 4 subcategories, out of 4 total. M Map Image Files Map PDF Files N NREL Map Files 1 pages S SWERA Map Files Media in category...

  9. File:Primer.pdf | Open Energy Information

    Open Energy Info (EERE)

    Primer.pdf Jump to: navigation, search File File history File usage File:Primer.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4...

  10. File:600.pdf | Open Energy Information

    Open Energy Info (EERE)

    600.pdf Jump to: navigation, search File File history File usage File:600.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...