National Library of Energy BETA

Sample records for administration cyber security

  1. cyber | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cyber | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  2. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  3. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  4. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  5. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  6. Chapter_14_Cyber_Security

    Office of Environmental Management (EM)

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  7. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  8. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  9. Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  10. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber ...

  11. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  12. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for ...

  13. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  14. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  15. DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA

    Broader source: Energy.gov [DOE]

    DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber Security Role: Certification Agent (CA)

  16. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization√?¬Ę√?¬?√?¬?s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  17. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization√ɬÉ√ā¬Ę√ɬā√ā¬Ä√ɬā√ā¬ôs ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore¬†¬Ľ enhance cybersecurity controls.¬ę¬†less

  18. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  19. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  1. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments This document ...

  2. Cyber Security Standards.PDF

    Energy Savers [EERE]

    1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL ...

  3. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Points of Contact For cyber security-related matters, call (202) 586-6691. FormsSamplesGraphics Sample ISSO Appointment Memorandum (see Attachment 1400-1) Chapter 14-1 ATTACHMENT ...

  4. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  5. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  6. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  7. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  8. DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS puzzle-693870960720.jpg PDF icon DOE CYBER ...

  9. Visualizing Cyber Security: Usable Workspaces

    SciTech Connect (OSTI)

    Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

    2009-10-11

    An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

  10. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-06

    This Notice extends DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, dated 3-18-02, until 7-6-05.

  11. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation‚Äôs cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested ‚Äď both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  12. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector from cyber attack PDF icon Strengthening Cyber Security More Documents & Publications Considering Cumulative Effects Under the National Environmental Policy Act (CEQ, 1997) Vision for 2025: A Framework for Change Demand Response and Smart Metering Policy Actions Since the Energy Policy Act of 2005: A Summary for

  13. Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  14. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In

  15. NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft

    Broader source: Energy.gov [DOE]

    The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services.

  16. contracts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    contracts NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... NNSA Makes Up to $200 Million in Awards to Five Small Business Teams for Enterprise-Wide Management, Organizational and Administrative Support

  17. Strengthening Cyber Security

    Energy Savers [EERE]

    E n E rgyB i z November/December 2008 ¬Ľ TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption

  18. Safeguards and Security and Cyber Security RM | Department of Energy

    Energy Savers [EERE]

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. PDF icon Safeguards and Security and Cyber Security RM More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 References, Canceled -7

  19. Cyber and Security Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber and Security Assessments Cyber and Security Assessments Cyber and Security Assessments within the Office of Independent Enterprise Assessments implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1A, Independent Oversight

  20. Microgrid cyber security reference architecture.

    SciTech Connect (OSTI)

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  1. Mathematical and Statistical Opportunities in Cyber Security

    Office of Scientific and Technical Information (OSTI)

    Mathematical and Statistical Opportunities in Cyber Security ‚ąó Juan Meza ‚Ć Scott Campbell ‚Ä° David Bailey ¬ß Abstract The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question "What fundamental problems exist within cyber security research that can be helped by advanced

  2. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  3. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  4. Department of Energy's July 2013 Cyber Security Breach

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Special Report The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the

  5. Obama's Call for Public-Private Cyber Security Collaboration...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities ...

  6. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  7. NNSA Seeking Comments on Consolidated IT and Cyber Security Support...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 ...

  8. Office of Cyber and Security Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments Office of Cyber and Security Assessments MISSION The Office of Cyber and Security Assessments is responsible for the independent evaluation of the effectiveness of ...

  9. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system ...

  10. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  11. NNSA Seeking Comments on Consolidated IT and Cyber Security Support...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013...

  12. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  13. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by ...

  14. Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-03-18

    To establish Department of Energy (DOE) requirements and responsibilities for reporting cyber security incidents involving classified and unclassified systems and responding to cyber security alerts and advisories; and to implement requirements of DOE N 205.1, Unclassified Cyber Security Program, and DOE M 471.2-2, Classified Information Systems Security Manual. DOE N 205.13, dated 7-6-04, extends this notice until 7-6-05. Cancels DOE M 471.2-2, Chapter III, section 8.

  15. Rocky Mountain Electrical League (RMEL) Physical and Cyber Security

    Energy Savers [EERE]

    Conference - January 26-27, 2016 | Department of Energy Rocky Mountain Electrical League (RMEL) Physical and Cyber Security Conference - January 26-27, 2016 Rocky Mountain Electrical League (RMEL) Physical and Cyber Security Conference - January 26-27, 2016 January 4, 2016 - 11:22am Addthis Power SURGE is joint project between the DOE√ʬĬôs Office of Security Assistance and the Department√ʬĬôs Power Marketing Administrations, led by the Western Area Power Marketing Administration. Power

  16. Tom Harper receives cyber security award

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Harper receives cyber security award Tom Harper receives cyber security award The Charlene Douglass Memorial Award recognizes an individual's expertise, dedication, and significant contributions to information security. June 8, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los

  17. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  18. Camp Smith Microgrid Controls and Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADVANCING THE POWER OF ENERGY Camp Smith Microgrid Controls and Cyber Security Darrell D. Massie, PhD, PE Aura Lee Keating, CISSP SPIDERS Industry Day - Camp Smith, HI 27 August ...

  19. Realizing Scientific Methods for Cyber Security

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  20. Cyber Fed Model Application in support of DOE Cyber Security Initiatives -

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ames Participation | The Ames Laboratory Cyber Fed Model Application in support of DOE Cyber Security Initiatives - Ames Participation FWP/Project Description: The Cyber Fed Model (CFM) is a communication and coordination framework focused on the reduction and mitigation of cyber security risk across a large distributed organization like the Department of Energy. The CFM framework can be used to help integrate various cyber security systems and capabilities spanning the DOE enterprise, the

  1. Embracing the Cloud for Better Cyber Security

    SciTech Connect (OSTI)

    Shue, Craig A; Lagesse, Brent J

    2011-01-01

    The future of cyber security is inextricably tied to the future of computing. Organizational needs and economic factors will drive computing outcomes. Cyber security researchers and practitioners must recognize the path of computing evolution and position themselves to influence the process to incorporate security as an inherent property. The best way to predict future computing trends is to look at recent developments and their motivations. Organizations are moving towards outsourcing their data storage, computation, and even user desktop environments. This trend toward cloud computing has a direct impact on cyber security: rather than securing user machines, preventing malware access, and managing removable media, a cloud-based security scheme must focus on enabling secure communication with remote systems. This change in approach will have profound implications for cyber security research efforts. In this work, we highlight existing and emerging technologies and the limitations of cloud computing systems. We then discuss the cyber security efforts that would support these applications. Finally, we discuss the implications of these computing architecture changes, in particular with respect to malware and social engineering.

  2. INL Cyber Security Research (2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    INL Cyber Security Research (2008) INL Cyber Security Research (2008) Cybersecurity research at INL will help protect critical infrastructure control system computers against worms and other viruses. PDF icon INL Cyber Security Research (2008) More Documents & Publications Mitigations for Security Vulnerabilities Found in Control System Networks The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations

  3. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  4. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  5. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-06

    Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint Cybersecurity Coordination Center and transfer of responsibility for communications security and TEMPEST to the Office of Health, Safety and Security.

  6. Office of Cyber Security Evaluations Appraisal Process Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Cyber Security Evaluations Appraisal Process Guide Table of Contents April 2008 ii Table of Contents Acronyms......

  7. Cyber Security Evaluations Appraisal Process Guide - April 2008 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. This process guide provides information about the Department of Energy's (DOE) Independent Oversight

  8. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. PDF icon Lessons Learned from Cyber

  9. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, supersedes Chg 2.

  10. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

  11. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  12. Lab hosts multi-lab cyber security games

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab hosts multi-lab cyber security games Lab hosts multi-lab cyber security games Eventide brought together cyber and IT leaders from 20 sites to develop recommendations on resources they need from the Joint Cyber Coordination Center. April 12, 2012 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and

  13. Towards Efficient Collaboration in Cyber Security

    SciTech Connect (OSTI)

    Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

    2010-06-03

    Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independentlyó for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

  14. Using Operational Security (OPSEC) to Support a Cyber Security Culture in

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control Systems Environments | Department of Energy Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments This document reviews several key operational cyber security elements that are important for control systems and industrial networks and how those elements can drive the creation of a cyber security-sensitive culture. PDF icon Using

  15. Alliance Project: Cyber-Physical Security Unified Access Solution

    Energy Savers [EERE]

    Alliance Project: Cyber-Physical Security Unified Access Solution Unified cyber-physical security to protect energy sector control systems and facilities Background The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards require utility operators to control, monitor, and record physical access to cybersecurity assets and establish physical security perimeters (PSPs). Many operators engage security contractors to provide access controls,

  16. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

  17. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

  18. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  19. Mathematical and Statistical Opportunities in Cyber Security (Technical

    Office of Scientific and Technical Information (OSTI)

    Report) | SciTech Connect Mathematical and Statistical Opportunities in Cyber Security Citation Details In-Document Search Title: Mathematical and Statistical Opportunities in Cyber Security The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist

  20. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    2014-09-30

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closely related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.

  1. Management of Naval Reactors' Cyber Security Program, OIG-0884

    Broader source: Energy.gov (indexed) [DOE]

    It is imperative that the systems are protected against cyber security threats, regardless of classification, given the sensitive nature of the Naval Reactors mission and its ...

  2. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SEM, and transform this information into meta events that the enterprise SEM can detect. ... security events from data and develop meta events that will be detected as cyber ...

  3. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise Global Forum, U.S. Energy ...

  4. Continuous Monitoring And Cyber Security For High Performance...

    Office of Scientific and Technical Information (OSTI)

    Continuous Monitoring And Cyber Security For High Performance Computing Malin, Alex B. Los Alamos National Laboratory; Van Heule, Graham K. Los Alamos National Laboratory...

  5. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process ...

  6. The Department's Cyber Security Incident Management Program, IG-0787 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy The Department's Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its

  7. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  8. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  9. Cyber security best practices for the nuclear industry

    SciTech Connect (OSTI)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  10. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect (OSTI)

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  11. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  12. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... of September 24, 2011 3 The Department of Energy (DOE) National Nuclear Security ...

  13. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  14. The Department's Unclassified Cyber Security Program - 2012, IG-0877

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information

  15. The Department's Unclassified Cyber Security Program 2002, IG-0567

    Energy Savers [EERE]

    DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to

  16. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  17. Evaluation Report on The Department's Unclassified Cyber Security Program

    Energy Savers [EERE]

    2002, DOE/IG-0567 | Department of Energy Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and

  18. Continuous Monitoring And Cyber Security For High Performance Computing

    Office of Scientific and Technical Information (OSTI)

    (Conference) | SciTech Connect Conference: Continuous Monitoring And Cyber Security For High Performance Computing Citation Details In-Document Search Title: Continuous Monitoring And Cyber Security For High Performance Computing Authors: Malin, Alex B. [1] ; Van Heule, Graham K. [1] + Show Author Affiliations Los Alamos National Laboratory Publication Date: 2013-08-02 OSTI Identifier: 1089452 Report Number(s): LA-UR-13-21921 DOE Contract Number: AC52-06NA25396 Resource Type: Conference

  19. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  20. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect (OSTI)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  1. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  3. Cyber Assessment Methods for SCADA Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure

  4. GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development

    Energy Savers [EERE]

    the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House

  5. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry

    SciTech Connect (OSTI)

    Akyol, Bora A.

    2012-09-01

    This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

  6. Report of the Cyber Security Research Needs for Open Science Workshop |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while maintaining ease of access, represents the "perfect storm" of challenges in the area of cyber security. PDF icon Report of the Cyber Security Research Needs for Open Science Workshop More Documents & Publications Networking and Information Technology Research and Development Supplement to the

  7. Towards A Network-of-Networks Framework for Cyber Security

    SciTech Connect (OSTI)

    Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

    2013-06-07

    Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

  8. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  9. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  10. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or 1-888-246-2460 using the following timeframes

    using the following timeframes

    //A * ~ w r_ra (b11 II V &. l,4t~Cf..-"i National Nuclear Security Administration DOE/NV--325-Rev. lOa February 2015 Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security Site Waste Acceptance Criteria Disclaimer Notice

  11. Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security

    Broader source: Energy.gov [DOE]

    Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland SecurityBy: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery...

  12. Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010

    Broader source: Energy.gov [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for...

  13. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  14. UVI Cyber-security Workshop Workshop Analysis.

    SciTech Connect (OSTI)

    Kuykendall, Tommie G.; Allsop, Jacob Lee; Anderson, Benjamin Robert; Boumedine, Marc; Carter, Cedric; Galvin, Seanmichael Yurko; Gonzalez, Oscar; Lee, Wellington K.; Lin, Han Wei; Morris, Tyler Jake; Nauer, Kevin S.; Potts, Beth A.; Ta, Kim Thanh; Trasti, Jennifer; White, David R.

    2015-07-08

    The cybersecurity consortium, which was established by DOE/NNSA’s Minority Serving Institutions Partnerships Program (MSIPP), allows students from any of the partner schools (13 HBCUs, two national laboratories, and a public school district) to have all consortia options available to them, to create career paths and to open doors to DOE sites and facilities to student members of the consortium. As a part of this year consortium activities, Sandia National Laboratories and the University of Virgin Islands conducted a week long cyber workshop that consisted of three courses; Digital Forensics and Malware Analysis, Python Programming, and ThunderBird Cup. These courses are designed to enhance cyber defense skills and promote learning within STEM related fields.

  15. NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines

    Broader source: Energy.gov [DOE]

    The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats.

  16. A Comparison of Cross-Sector Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01

    This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

  17. Automatic Labeling for Entity Extraction in Cyber Security

    SciTech Connect (OSTI)

    Bridges, Robert A; Jones, Corinne L; Iannacone, Michael D; Testa, Kelly M; Goodall, John R

    2014-01-01

    Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often not a viable solution. In response, we develop a very precise method to automatically label text from several data sources by leveraging related, domain-specific, structured data and provide public access to a corpus annotated with cyber-security entities. Next, we implement a Maximum Entropy Model trained with the average perceptron on a portion of our corpus (~750,000 words) and achieve near perfect precision, recall, and accuracy, with training times under 17 seconds.

  18. Cyber Security Research Frameworks For Coevolutionary Network Defense

    SciTech Connect (OSTI)

    Rush, George D.; Tauritz, Daniel Remy

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  19. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    physical security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  20. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear ...

  1. Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2006, the National Nuclear Security Administration (NNSA) announced the selection of National Security Technologies, LLC (NSTec) to manage and operate the Nevada Test Site (NTS) for the NNSA Nevada Site Office. The contract, valued at approxi- mately $500 million annually, is for five years. There are poten- tially five additional perform- ance-based award-term years available under this contract. NSTec is made up of Northrop Grumman, AECOM, CH2M Hill, and Nuclear Fuel Services. Dr. James E.

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    20 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex Performance Period: October 2012 - September 2013 December 24, 2013 APPROVED FOR PUBLIC RELEASE This document has been approved for release to the public by: Name / Title: Scott A. Hawks, NPO Y-12 Classification Officer Date: 12/31/2013 NNSA Production Office, Y-12 Page 2 of 20 Executive Summary This

  3. The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01

    Energy Savers [EERE]

    2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent

  4. Validating Cyber Security Requirements: A Case Study

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  5. GridStat Ė Cyber Security and Regional Deployment Project Report

    SciTech Connect (OSTI)

    Clements, Samuel L.

    2009-02-18

    GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStatís cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

  6. Bio-Inspired Cyber Security for Smart Grid Deployments

    SciTech Connect (OSTI)

    McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.; Fink, Glenn A.; Fulp, Errin W.

    2013-05-01

    mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants framework is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.

  7. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  8. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Rights / Workforce Statistics National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual Report

  9. cyber security | OpenEI Community

    Open Energy Info (EERE)

    and discussion of smart grid technologies, tools, and techniques. The Smart Grid Investment Grant (SGIG) program is authorized by the Energy Independence and Security Act of...

  10. Cyber Assessment Methods for SCADA Security

    Energy Savers [EERE]

    INTRODUCTION The National SCADA Test Bed (NSTB) program is sponsored by the Department of ... The Idaho National Laboratory (INL) SCADA Test Bed is a venue for assessing the security ...

  11. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  12. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  13. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  14. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  15. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  16. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ($ Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon Activities 241 242 252 10 Mixed Oxide Fuel Fabrication Facility (MOX) 340 332 270 (62) Defense Nuclear Nonproliferation (DNN) 77 58 91 33 Federal Expenses 4.7 5.2 5.4 .2 Total Budget for NNSA at SRS 662.7 637.2 618.4 (18.8)

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Pantex, LLC Performance Evaluation Report NNSA Production Office Pantex Plant Performance Period: October 2012 - September 2013 November 13, 2013 APPROVED FOR PUBLIC RELEASE This document has been approved for release to the public by: Name / Title: Del W. Kellogg, NPO Pantex Classification Officer Date: 01/06/2014 NNSA Production Office, Pantex 11-13-13 Page 2 of 15 IExecutive Summary This

  1. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  2. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  3. security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit Participants in Apex Gold at Lawrence Livermore National Laboratory. What would national leaders do in the face of a transnational nuclear terrorism threat? Last week, ministers and other senior delegates from 37 nations, along with representatives from the International Atomic Energy Agency, the... Pantex Plant's Calvin Nelson honored as Analyst of the Year for Transportation Security

  4. Tensions in collaborative cyber security and how they affect incident detection and response

    SciTech Connect (OSTI)

    Fink, Glenn A.; McKinnon, Archibald D.; Clements, Samuel L.; Frincke, Deborah A.

    2009-12-01

    Security often requires collaboration, but when multiple stakeholders are involved, it is typical for their priorities to differ or even conflict with one another. In todayís increasingly networked world, cyber security collaborations may span organizations and countries. In this chapter, we address collaboration tensions, their effects on incident detection and response, and how these tensions may potentially be resolved. We present three case studies of collaborative cyber security within the U.S. government and discuss technical, social, and regulatory challenges to collaborative cyber security. We suggest possible solutions, and present lessons learned from conflicts. Finally, we compare collaborative solutions from other domains and apply them to cyber security collaboration. Although we concentrate our analysis on collaborations whose purpose is to achieve cyber security, we believe that this work applies readily to security tensions found in collaborations of a general nature as well.

  5. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  6. accountability | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    accountability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  7. emergencyresponse | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    emergencyresponse | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  8. whistleblower | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    whistleblower | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  9. Probabilistic Characterization of Adversary Behavior in Cyber Security

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  10. Comparison of two methods to quantify cyber and physical security effectiveness.

    SciTech Connect (OSTI)

    Wyss, Gregory Dane; Gordon, Kristl A.

    2005-11-01

    With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

  11. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    port security NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy Administrator for Defense Nuclear Nonproliferation (DNN), David Huizenga, participated in a ceremony commemorating the transition of a radiation detection system at the Port of Yangshan to the General

  12. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems,

  13. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement

  14. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  15. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NSDD NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  16. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    containers NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  17. Sandia Energy - Sandia Cyber Engineering Research Laboratory...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Engineering Research Laboratory (CERL) Formally Opens Home Infrastructure Security Cyber Infrastructure Assurance Facilities News News & Events Analysis Cyber Engineering...

  18. Independent Oversight Review, National Nuclear Security Administration...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February ...

  19. Australia | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Australia | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. DNDO | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Energy National Nuclear Security Administration (NNSA) helicopter may be seen flying at low altitudes around the California Bay Area from September 1 - 6, 2015. The

  2. NSTec | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  3. Savannah | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  4. green | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  5. fleet | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    fleet | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  6. VPP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    VPP | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  7. ors | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ors | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. emt | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    emt | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. cielo | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cielo | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  11. OSIO | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    OSIO | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. OCPC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    OCPC | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. performance | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    performance | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  14. oversight | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    oversight | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    policy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. sites | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    sites | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. AMP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AMP | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. fors | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    fors | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. airport | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    airport | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. Uzbekistan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Uzbekistan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. removal | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    removal | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  2. foal | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    foal | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  3. Romania | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Romania | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  4. Korea | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Korea | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  5. ap | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ap | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  6. UPF | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    UPF | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  7. exports | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    exports | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. eota | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    eota | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. dhs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    dhs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. governance | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    governance | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. CFR | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CFR | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. exportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    exportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. nr | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nr | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  14. NMIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NMIP | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. forrestal | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    forrestal | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. associates | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    associates | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. tajikistan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    tajikistan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. IND | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IND | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. Links | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Links | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. noc | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    noc | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. energy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    energy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS ... Apply for Our Jobs Our Jobs Working at NNSA Blog Home energy energy Researchers 3D print ...

  2. Jamaica | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Jamaica Jamaica NNSA Removes U.S.-Origin HEU from Jamaica, Makes the Caribbean HEU Free WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration...

  3. SSAC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    SSAC NNSA and IAEA Hold the 20th International Training Course on Nuclear Material Accounting and Control Washington, D.C. - The National Nuclear Security Administration (NNSA)...

  4. ONAC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ONAC NNSA and IAEA Hold the 20th International Training Course on Nuclear Material Accounting and Control Washington, D.C. - The National Nuclear Security Administration (NNSA)...

  5. counterproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Administration (NNSA) released its report on NNSA's efforts to prevent nuclear proliferation and terrorism, Prevent, Counter, and Respond-A Strategic Plan to Reduce Global

  6. grant | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The Department of Energy's National Nuclear Security Administration ( NNSA Hosts Cybersecurity Consortium Members Following White House Announcement of 25 Million in Grants to...

  7. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. ITC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ITC | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. internships | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    internships | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  11. gms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, NNSA Provides Tajikistan Specialized...

  12. radiation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, NNSA to Conduct Aerial Radiological...

  13. laos | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    stakeholder organizations attended the event. WASHINGTON - The U.S. Department of Energy's National Nuclear Security Administration (DOENNSA) sponsored the Fundamentals of Nuclear

  14. rsl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Conduct Aerial Radiation Monitoring Survey over Boston April 17-20 BOSTON - The National Nuclear Security Administration (NNSA) will measure naturally occurring background...

  15. hydrogen | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hydrogen | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Energy Savers [EERE]

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  17. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect (OSTI)

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  18. Cyber Friendly Fire: Research Challenges for Security Informatics

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2013-06-06

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a systemís topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FFó including both training concepts and suggestions for decision aids and visualization approachesóare discussed.

  19. NSS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NSS Statement on Signing of the Administrative Arrangement to the Agreement for Cooperation between the United States and Republic of Korea Concerning Peaceful Uses of Nuclear Energy (WASHINGTON, D.C.)-Today, Administrator Frank Klotz of the U.S. Department of Energy's National Nuclear Security Administration and Chairman Un Chul Lee of the Republic of Korea's (ROK) Nuclear Safety and Security Commission reached agreement on the terms of the Administrative Arrangement to the... NNSA keeps the

  20. ROK | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ROK Statement on Signing of the Administrative Arrangement to the Agreement for Cooperation between the United States and Republic of Korea Concerning Peaceful Uses of Nuclear Energy (WASHINGTON, D.C.)-Today, Administrator Frank Klotz of the U.S. Department of Energy's National Nuclear Security Administration and Chairman Un Chul Lee of the Republic of Korea's (ROK) Nuclear Safety and Security Commission reached agreement on the terms of the Administrative Arrange

  1. Towards an Experimental Testbed Facility for Cyber-Physical Security Research

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

    2012-01-07

    Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

  2. Cyber-Security Considerations for the Smart Grid

    SciTech Connect (OSTI)

    Clements, Samuel L.; Kirkham, Harold

    2010-07-26

    The electrical power grid is evolving into the ‚Äúsmart grid‚ÄĚ. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

  3. Armenia | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Armenia Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA hosts CTBT inspectors at Nevada National Security Site Read more Y-12 honors its inventors for technology transfer Read more Sandia National Laboratories Contract Process Announced Read more NNSA honors two security professionals who protect U.S. nuclear enterprise Read more NNSA lab makes fire tornados to ensure weapon safety Read more Sandia's California site invites community to 60th anniversary Read more CTBT inspectors Tech Transfer Sandia Contract Security awards Fire tornados Sandia

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  7. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Budget Full details of the President's FY17 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy Feb. 9, 2016 (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today released details of its portion of

  8. Cyber Science and Security - An R&D Partnership at LLNL

    SciTech Connect (OSTI)

    Brase, J; Henson, V

    2011-03-11

    Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

  9. gms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    gms NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA

  10. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security

  11. The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01

    Energy Savers [EERE]

    Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011 OAS-M-12-01 November 2011 Department of Energy Washington, DC 20585 November 15, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011"

  12. The Federal Energy Regulatory Commission's Unclassified Cyber Security Program ¬Ö 2013

    Energy Savers [EERE]

    Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program -

  13. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment at National SCADA Test Bed | Department of Energy and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE)

  14. Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878

    Energy Savers [EERE]

    Follow-up Audit of the Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of

  15. Congress | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Congress NNSA administrator shows NM congressional delegation the Albuquerque Complex to make case for new facility WASHINGTON, DC - Lt. Gen. Frank Klotz (Ret.), Administrator of the Department of Energy's National Nuclear Security Administration, hosted two members of the New Mexico congressional delegation on Feb. 18 for a tour of the aging facilities occupied by 1,200 NNSA employees at the Albuquerque Complex

  16. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    SciTech Connect (OSTI)

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.; Endicott-Popovsky, Barbara E.

    2011-04-11

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus on our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.

  17. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  18. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  19. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  20. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  1. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

  2. Japan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Japan Fukushima: Five Years Later After the March 11, 2011, Japan earthquake, tsunami, and ensuing nuclear reactor accident, the United States sent Department of Energy (DOE) National Nuclear Security Administration (NNSA) emergency response teams. The NNSA teams included nuclear experts in predictive modeling, monitoring, sample... U.S-, Japan Exchange Best Practices on Nuclear Emergency Response Washington D.C.--The Department of Energy's (DOE) National Nuclear Security Administration (NNSA)

  3. npcr | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    npcr NNSA Delivers Annual Reports to Congress on Progress for Stockpile Stewardship and Nuclear Nonproliferation WASHINGTON, D.C.-The Department of Energy's National Nuclear Security Administration (DOE/NNSA) today released the annual reports outlining the strategic direction for two of its vital and enduring missions-maintaining a safe, secure and effective nuclear deterrent and reducing the threat of

  4. BUILDER | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    BUILDER NNSA Achieves Major Milestone in BUILDER Implementation WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) achieved a major milestone in improving the management of the Nuclear Security Enterprise's infrastructure through the successful migration of all current information on building

  5. JCPOA | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    JCPOA NNSA Delivers Annual Reports to Congress on Progress for Stockpile Stewardship and Nuclear Nonproliferation WASHINGTON, D.C.-The Department of Energy's National Nuclear Security Administration (DOE/NNSA) today released the annual reports outlining the strategic direction for two of its vital and enduring missions-maintaining a safe, secure and effective nuclear deterrent and reducing the threat

  6. sitemap | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home sitemap Front page Front page of National Nuclear Security Administration Main menu People Mission Powering the Nuclear Navy Concern for the Environment Protection of People Naval Nuclear Propulsion Plants Management and Administration Public Affairs More About NNSA's Naval Reactors Office Emergency Response Counterterrorism Recapitalizing Our Infrastructure Preventing Proliferation Managing the Stockpile Dismantlement and Disposition Stockpile Stewardship Program Quarterly Experiments

  7. April 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

  8. workforce | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    workforce NNSA administrator shows NM congressional delegation the Albuquerque Complex to make case for new facility WASHINGTON, DC - Lt. Gen. Frank Klotz (Ret.), Administrator of the Department of Energy's National Nuclear Security Administration, hosted two members of the New Mexico congressional delegation on Feb. 18 for a tour of the aging facilities occupied by 1,200 NNSA employees at the Albuquerque Complex... DOE Celebrates LGBT Pride Month To recognize the accomplishments of Lesbian,

  9. Harold Washington Social Security Administration (SSA) Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation ...

  10. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

    2011-04-01

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

  11. SSMP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    SSMP NNSA Delivers Annual Reports to Congress on Progress for Stockpile Stewardship and Nuclear Nonproliferation WASHINGTON, D.C.-The Department of Energy's National Nuclear Security Administration (DOE/NNSA) today released the annual reports outlining the strategic direction for two of its vital and enduring missions-maintaining a safe, secure and effective nuclear deterrent and reducing the threat of... NNSA Releases Annual Stockpile Stewardship & Management Plan Annual Report Provides

  12. helicopter | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    helicopter NNSA to conduct Aerial Radiation Assessment Survey over Boston area BOSTON - On April 12 through April 15, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Boston to measure naturally occurring background radiation. Officials from NNSA announced that the... Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams

  13. infrastructure | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    infrastructure NNSA Achieves Major Milestone in BUILDER Implementation WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) achieved a major milestone in improving the management of the Nuclear Security Enterprise's infrastructure through the successful migration of all current information on building... Extended Life Program asks 'How do you make your buildings last?' The challenge is this: Preserve two key processing facilities at Y-12 National

  14. lep | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    lep NNSA Delivers Annual Reports to Congress on Progress for Stockpile Stewardship and Nuclear Nonproliferation WASHINGTON, D.C.-The Department of Energy's National Nuclear Security Administration (DOE/NNSA) today released the annual reports outlining the strategic direction for two of its vital and enduring missions-maintaining a safe, secure and effective nuclear deterrent and reducing the threat of... NNSA Honors SRS Employees for Excellence Don Zecha, center, representative of the Savannah

  15. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role:

  16. PUNT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    PUNT U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... United States and China Continue Partnership for the Peaceful Uses of Nuclear Technology

  17. explosives | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home explosives NNSA Conducts Fifth Experiment aimed to Improve U.S. Ability to Detect Foreign Nuclear Explosions WASHINGTON, D.C. - On April 26, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) conducted the fifth experimental conventional explosion as part of its Source Physics Experiment (SPE) series. The SPE series, conducted at the Nevada National Security Site,... The Hurt-Locker School NNSA's Los Alamos National Laboratory (LANL) puts world-class science to

  18. Good Things in Small Packages: Micro Worlds and Cyber Security

    SciTech Connect (OSTI)

    David I Gertman

    2013-11-01

    Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

  19. heu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    heu NNSA deputy administrator travels to Ukraine Earlier this month, Deputy Administrator for Defense Nuclear Nonproliferation Anne Harrington traveled to Ukraine to celebrate the 20th anniversary of the Science and Technology Center in Ukraine (STCU) and visit the Neutron Source Facility at the Kharkiv Institute of Physics and Technology. The U... NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear

  20. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary

    SciTech Connect (OSTI)

    Hu, Tan Chang; Robinson, David G.

    2011-09-08

    As the national focus on cyber security increases, there is an evolving need for a capability to provide for high-speed sensing of events, correlation of events, and decision-making based on the adverse events seen across multiple independent large-scale network environments. The purpose of this Shared Vision project, Cyber Security Indications and Warning System, was to combine both Sandia's and LMC's expertise to discover new solutions to the challenge of protecting our nation's infrastructure assets. The objectives and scope of the proposal was limited to algorithm and High Performance Computing (HPC) model assessment in the unclassified environment within funding and schedule constraints. The interest is the identification, scalability assessment, and applicability of current utilized cyber security algorithms as applied in an HPC environment.

  1. Obama’s Call for Public-Private Cyber Security Collaboration Reflected in DOE’s Priorities

    Broader source: Energy.gov [DOE]

    In releasing the results of his Administration’s 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack.

  2. T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security

    SciTech Connect (OSTI)

    Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

    2009-07-20

    Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

  3. sfo | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    sfo Sandia National Laboratory Sandia Field Office Contact the Field Office Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance Programs NEPA Reading Room... Sandia National Laboratories

  4. computing | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computing NNSA Announces Procurement of Penguin Computing Clusters to Support Stockpile Stewardship at National Labs The National Nuclear Security Administration's (NNSA's) Lawrence Livermore National Laboratory today announced the awarding of a subcontract to Penguin Computing - a leading developer of high-performance Linux cluster computing systems based in Silicon Valley - to bolster computing for stockpile

  5. lllnl | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    lllnl NNSA Announces Procurement of Penguin Computing Clusters to Support Stockpile Stewardship at National Labs The National Nuclear Security Administration's (NNSA's) Lawrence Livermore National Laboratory today announced the awarding of a subcontract to Penguin Computing - a leading developer of high-performance Linux cluster computing systems based in Silicon Valley - to bolster computing for stockpile

  6. USACE | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    USACE Design-Build Contract Awarded for Electrical Substation at Los Alamos National Laboratory LOS ALAMOS, NM - Under an interagency agreement with the Department of Energy's National Nuclear Security Administration (DOE/NNSA), the U.S. Army Corps of Engineers (USACE) has awarded a design-build contract at Los Alamos National Laboratory (LANL) to Gardner Zemke Mechanical

  7. Utah | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Utah Gamma Shield Thunder Exercise Concludes National Nuclear Security Administration (NNSA) and the FBI announced today the completion of the Gamma Shield Thunder counterterrorism table-top exercise at LDS Hospital. The exercise is part of NNSA's Silent Thunder table-top series, which is aimed at giving federal, state and local

  8. hepf | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hepf Construction on Pantex High Explosives Pressing Facility Reaches 85% Mark WASHINGTON, D.C. - Work on the National Nuclear Security Administration's (NNSA) High Explosives Pressing Facility at its Pantex Plant, located near Amarillo, Texas, this month passed the 85 percent construction completion mark and is on schedule and under budget. The new 45,000 square-foot state-

  9. visit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    visit NNSA Hosts NPT Parties at Los Alamos and Sandia National Laboratories WASHINGTON D.C. - On March 25-27, 2015, the National Nuclear Security Administration (NNSA) hosted representatives from 11 States Parties to the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) and one representative from the United Nations Office for Disarmament Affairs. The

  10. MIS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    MIS NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" The G2 team and the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information Award. (WASHINGTON, D.C) - The National Nuclear Security Administration (NNSA) has received the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information

  11. Massachusetts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Massachusetts NNSA to conduct Aerial Radiation Assessment Survey over Boston area BOSTON - On April 12 through April 15, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Boston to measure naturally occurring background radiation. Officials from NNSA announced that the

  12. Center of Excellence | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Deputy Administrator Creedon Travels to China In March, National Nuclear Security Administration (NNSA) Principal Deputy Administrator Madelyn Creedon traveled to China to ...

  13. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  14. National Nuclear Security Administration | Department of Energy

    Office of Environmental Management (EM)

    Administration National Nuclear Security Administration PDF icon National Nuclear Security Administration More Documents & Publications Global Threat Reduction Initiative U.S. Global Threat Reduction Initiative/U.S.-Origin Nuclear Fuel Removals EIS-0249: Record of Decision (September 1996)

  15. Modeling and simulation for cyber-physical system security research, development and applications.

    SciTech Connect (OSTI)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  16. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.

    2010-09-01

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, so as to move from an insider threat detection stance to one that enables prediction of potential insider presence. Two distinctive aspects of the approach are the objective of predicting or anticipating potential risks and the use of organizational data in addition to cyber data to support the analysis. The chapter describes the challenges of this endeavor and progress in defining a usable set of predictive indicators, developing a framework for integrating the analysis of organizational and cyber security data to yield predictions about possible insider exploits, and developing the knowledge base and reasoning capability of the system. We also outline the types of errors that one expects in a predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  17. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs Defense Nuclear Security The Office of Defense Nuclear Security develops and implements NNSA security programs to protect, control, and account for materials, information, and facilities across the nuclear security enterprise. The Office of the Chief, Defense Nuclear Security (CDNS) executes responsibility for the overall direction and management of security programs employed across the nuclear security enterprise comprised of NNSA's operations and facilities. The CDNS is charged with

  18. About NNSA | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About NNSA March 02, 2010 President Obama has outlined a bold nuclear security agenda that makes the National Nuclear Security Administration (NNSA) and its four core missions more ...

  19. July 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Jul 1, 2014 Transition for Pantex and Y-12 Contract Completed The National Nuclear Security Administration Production Office and Consolidated Nuclear Security...

  20. March 2013 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex...

  1. NA 15 - Assistant Deputy Administrator for Secure Transportation | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration NA 15 - Assistant Deputy Administrator for Secure Transportation

  2. NA 70 - Associate Administrator for Defense Nuclear Security | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration 70 - Associate Administrator for Defense Nuclear Security

  3. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration. ...

  4. npo | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    npo NNSA NPO M&O Contract Placement Team receives DOE 2015 Secretary's Achievement Award The National Nuclear Security Administration's (NNSA) Production Office (NPO) Management and Operating (M&O) Contract Placement team recently received the 2014 Secretary of Energy Achievement Award for their efforts in fostering innovation through efficient procurement strategy. Through... Pantex, Y-12 celebrate 'One Team, Better Together' Thousands of employees at the Pantex Plant and the Y-12

  5. ODP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ODP NNSA Physicist Named One of Ebony's Power 100 Dr. Njema Frazier walked the red carpet at the Ebony Power 100 event in Los Angeles Dec. 2. Dr. Njema Frazier is a physicist in the NNSA's Office of Defense Programs, leading scientific and technical efforts to ensure that the United States maintains a credible nuclear deterrent... NNSA releases Stockpile Stewardship Program quarterly experiments summary WASHIGTON, DC. - The National Nuclear Security Administration today released its current

  6. Switzerland | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Switzerland United States Collaborates with Switzerland to Remove Last Remaining Separated Plutonium (WASHINGTON, D.C.) - The Department of Energy's National Nuclear Security Administration (NNSA), working in collaboration with the Government of Switzerland, announced that approximately 20 kilograms of separated plutonium have been transported from Switzerland to the United States. The... Last HEU Removed from Switzerland under NNSA Collaboration WASHINGTON, D.C. - The Department of Energy's

  7. ams | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ams NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On March 21 through March 24, the Department of Energy's National Nuclear Security Administration (NNSA) will participate in a federal and state/local training exercise in Philadelphia that will also include the Philadelphia Police Department and the Departments of Defense,... DC Survey 2013 DC Background Survey (.zip) NNSA to Conduct Aerial Radiation Monitoring Survey over Boston

  8. boston | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    boston NNSA to conduct Aerial Radiation Assessment Survey over Boston area BOSTON - On April 12 through April 15, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Boston to measure naturally occurring background radiation. Officials from NNSA announced that the... NNSA to conduct Aerial Radiation Assessment Survey over Boston Harbor BOSTON- A helicopter may be seen flying at low altitudes around Boston Harbor

  9. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    dnn Dedication of Radioactive Source Storage Facilities in Tajikistan (Dushanbe, Tajikistan) - On May 11, the United States' Embassy of Tajikistan, the Department of Energy/National Nuclear Security Administration (DOE/NNSA), the United Kingdom's Department of Energy and Climate Change (DECC), and the Government of Tajikistan dedicated two... NNSA Researchers Advance Technology for Remote Reactor Monitoring NNSA's Defense Nuclear Nonproliferation Research and Development Program drives the

  10. radiation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    radiation NNSA to conduct Aerial Radiation Assessment Survey over Boston area BOSTON - On April 12 through April 15, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Boston to measure naturally occurring background radiation. Officials from NNSA announced that the... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On March 21 through March 24, the

  11. russia | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    russia NNSA Partnership Successfully Removes All Remaining HEU from Uzbekistan WASHINGTON, DC - Today, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the successful return of the final 5 kilograms (approximately 11 pounds) of highly enriched uranium (HEU) spent fuel from the IIN-3M "Foton" research reactor in Tashkent, Uzbekistan to... US, Kazakhstan Cooperate to Eliminate Highly Enriched Uranium WASHINGTON D.C - The Department of Energy's

  12. Kazakhstan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Kazakhstan NNSA Hosts International Nuclear Forensics Workshop with Participants from Eight Countries WASHINGTON, D.C. - During May 11-22, the National Nuclear Security Administration's (NNSA) Nuclear Smuggling Detection and Deterrence program held a hands-on nuclear forensics course at the Pacific Northwest National Laboratory (PNNL) in Richland, Washington. The "International Training Course on... US, Kazakhstan Cooperate to Eliminate Highly Enriched Uranium WASHINGTON D.C - The

  13. Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge

  14. molybdenum | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    molybdenum DOE/NNSA Successfully Establishes Uranium Lease and Takeback Program to Support Critical Medical Isotope Production In January 2016, the U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA) successfully established the Uranium Lease and Take-Back (ULTB) program, as directed in the American Medical Isotopes Production Act of 2012, to support the commercial production of the medical... NNSA's work aids in fight against cancer World Cancer Day encourages

  15. Cyber

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water ...

  16. SPECIAL REVIEW The National Nuclear Security Administration's...

    Broader source: Energy.gov (indexed) [DOE]

    FOR THE ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General...

  17. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nonproliferation Global Material Security The mission of the Office of Global Material Security (GMS) is to help partner countries secure and account for nuclear weapons, weapons-useable nuclear and radiological materials, as well as to build capacity to deter, detect and interdict the illicit trafficking of such materials. GMS achieves its mission through three subprograms: International Nuclear Security Radiological Security Nuclear Smuggling Detection and Deterrence (formerly Second Line of

  18. International Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such as

  19. W-88 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. non-proliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ...proliferation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear ...

  1. Proliferation Detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Proliferation Detection | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the ...

  2. Research Reactor Conversion | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Reactor Conversion | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  3. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  4. charity | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    charity NNSA thanks CFC key workers for a job well done In a late March ceremony, NNSA Principal Deputy Administrator Madelyn Creedon thanked key workers in NNSA's most recent season of giving in the largest and most successful workplace fundraising campaign in the world, the 2015 Combined Federal Campaign (CFC). Largely due to the efforts of 14 people... Pantex/Y-12 donate $1.1M to local United Way campaigns United Way contributions at the Pantex Plant and the Y-12 National Security Complex

  5. Newsletters | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Newsletters U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Newsletters NMMSS is sponsored by the National Nuclear Security Administration's (NNSA) Office of Materials Integration within the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission Attachment Size November 2015 616.94 KB July 2015 441.12 KB March 2015 739.06 KB December 2014 397.5 KB October 2014 330.08 KB July 2014 1.29 MB April 2014 761.67 KB

  6. Evaluation Report on The Department's Unclassified Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Program 2002, DOEIG-0567 Evaluation Report on The Department's Unclassified ... program management, implementation, and evaluation of the security of unclassified and ...

  7. Nuclear Security Enterprise | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Study options for ensuring the safety, security, and reliability of nuclear warheads on a ... required to ensure the long-term safety, security, and reliability of the nuclear arsenal.

  8. Independent Oversight Review, National Nuclear Security Administration

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Production Office - February 2014 | Department of Energy Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February 2014 Review of the National Nuclear Security Administration Production Office Readiness Review Program The U.S. Department of Energy (DOE) Office of Enforcement and Oversight (Independent Oversight), within the Office of Health, Safety and Security, conducted

  9. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About / Our Programs / Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and

  10. Security Forms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  11. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    25M NNSA Grant for Nuclear Science and Security Research Working With PNNL Mentors, Engineering Students Deliver Prototype Safeguards Fixtures Shaping the future of nuclear ...

  12. Nuclear Security 101 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Twenty-eight nations have plans to eliminate all current stocks of HEU by the end of 2013. Upgrading security measures, including physical protection, material control and ...

  13. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Announces 2014 Security Professional of the Year Awards Michael Lempke receives NNSA's Gold Medal of Excellence NNSA's Nevada Field Office Transfers Two Armored Vehicles to FBI...

  14. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    SciTech Connect (OSTI)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.

  15. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore¬†¬Ľ established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.¬ę¬†less

  16. Before the House Subcommittee on Emerging Threats, Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity ... More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary ...

  17. budget request | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    budget request National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today...

  18. Accomplishments | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ... In FY 2009, ASC released improved codes to support stockpile stewardship and other nuclear security missions, including secure transportation, NSE infrastructure, and nuclear ...

  19. maritime supply chain | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    maritime supply chain NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  20. Rocky Mountain Electrical League (RMEL) Physical and Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Administrations, led by the Western Area Power Marketing Administration, to develop a fiscally responsible and effective protection strategy for physical attacks on the grid. ...

  1. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, ... Over the past 65 years, the force has changed in size and structure but its mission has... ...

  2. Information Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or NNSA and Department of Energy (DOE) directives. Classified Matter Protection and Control ensures the protection and control of classified matter. It includes briefing and training requirements for personnel who work with classified on identifying, marking, reproducing, protecting, handling, transmitting,

  3. Comprehensive, Multi-Source Cyber-Security Data Set

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Kent, Alexander D. [Los Alamos National Laboratory

    2015-05-21

    This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory’s corporate, internal computer network. The data sources include Windows-based authentication events from both individual computers and centralized Active Directory domain controller servers; process start and stop events from individual Windows computers; Domain Name Service (DNS) lookups as collected on internal DNS servers; network flow data as collected on at several key router locations; and a set of well-defined red teaming events that present bad behavior within the 58 days. In total, the data set is approximately 12 gigabytes compressed across the five data elements and presents 1,648,275,307 events in total for 12,425 users, 17,684 computers, and 62,974 processes. Specific users that are well known system related (SYSTEM, Local Service) were not de-identified though any well-known administrators account were still de-identified. In the network flow data, well-known ports (e.g. 80, 443, etc) were not de-identified. All other users, computers, process, ports, times, and other details were de-identified as a unified set across all the data elements (e.g. U1 is the same U1 in all of the data). The specific timeframe used is not disclosed for security purposes. In addition, no data that allows association outside of LANL’s network is included. All data starts with a time epoch of 1 using a time resolution of 1 second. In the authentication data, failed authentication events are only included for users that had a successful authentication event somewhere within the data set.

  4. Comprehensive, Multi-Source Cyber-Security Data Set

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Kent, Alexander D. [Los Alamos National Laboratory

    This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratoryís corporate, internal computer network. The data sources include Windows-based authentication events from both individual computers and centralized Active Directory domain controller servers; process start and stop events from individual Windows computers; Domain Name Service (DNS) lookups as collected on internal DNS servers; network flow data as collected on at several key router locations; and a set of well-defined red teaming events that present bad behavior within the 58 days. In total, the data set is approximately 12 gigabytes compressed across the five data elements and presents 1,648,275,307 events in total for 12,425 users, 17,684 computers, and 62,974 processes. Specific users that are well known system related (SYSTEM, Local Service) were not de-identified though any well-known administrators account were still de-identified. In the network flow data, well-known ports (e.g. 80, 443, etc) were not de-identified. All other users, computers, process, ports, times, and other details were de-identified as a unified set across all the data elements (e.g. U1 is the same U1 in all of the data). The specific timeframe used is not disclosed for security purposes. In addition, no data that allows association outside of LANLís network is included. All data starts with a time epoch of 1 using a time resolution of 1 second. In the authentication data, failed authentication events are only included for users that had a successful authentication event somewhere within the data set.

  5. Comprehensive, Multi-Source Cyber-Security Data Set

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Kent, Alexander D. [Los Alamos National Laboratory

    2015-05-21

    This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratoryís corporate, internal computer network. The data sources include Windows-based authentication events from both individual computers and centralized Active Directory domain controller servers; process start and stop events from individual Windows computers; Domain Name Service (DNS) lookups as collected on internal DNS servers; network flow data as collected on at several key router locations; and a set of well-defined red teaming events that present bad behavior within the 58 days. In total, the data set is approximately 12 gigabytes compressed across the five data elements and presents 1,648,275,307 events in total for 12,425 users, 17,684 computers, and 62,974 processes. Specific users that are well known system related (SYSTEM, Local Service) were not de-identified though any well-known administrators account were still de-identified. In the network flow data, well-known ports (e.g. 80, 443, etc) were not de-identified. All other users, computers, process, ports, times, and other details were de-identified as a unified set across all the data elements (e.g. U1 is the same U1 in all of the data). The specific timeframe used is not disclosed for security purposes. In addition, no data that allows association outside of LANLís network is included. All data starts with a time epoch of 1 using a time resolution of 1 second. In the authentication data, failed authentication events are only included for users that had a successful authentication event somewhere within the data set.

  6. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  7. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  8. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  9. Safeguards & Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    programmatic input to assist the Assistant Manager for Contract Administration and Business Management with the formulation and execution oversight of the safeguards and...

  10. nuclear smuggling | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear smuggling NNSA Deputy Administrator Creedon Travels to China In March, National Nuclear Security Administration (NNSA) Principal Deputy Administrator Madelyn Creedon traveled to China to participate in activities related to NNSA's cooperative engagement with various Chinese ministries on nuclear security. Creedon was accompanied by Principal Assistant... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit Participants in Apex Gold at Lawrence

  11. DEMO Project Goals | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    DEMO Project Goals | National Nuclear Security Administration Facebook Twitter Youtube ... and responsiveness of the position classification system to managers; Increase the ...

  12. January 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Jan 3, 2014 Construction on Pantex High Explosives Pressing Facility Reaches 85% Mark Work on the National Nuclear Security Administration's (NNSA) High...

  13. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot...

  14. Contact Us | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security...

  15. Federal Register Notice: National Nuclear Security Administration...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    New Mexico (SNLNM) Federal Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL...

  16. Source Physics Experiment | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Source Physics Experiment | National Nuclear Security Administration Facebook Twitter ... Apply for Our Jobs Our Jobs Working at NNSA Blog Home Source Physics Experiment Source ...

  17. acquisition management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    management | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. Asset Management Plan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Asset Management Plan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  19. public service | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    public service | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  20. Grant Application Process | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Grant Application Process | National Nuclear Security Administration Facebook Twitter ... Apply for Our Jobs Our Jobs Working at NNSA Blog Home Grant Application Process Grant ...

  1. university of california | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    university of california | National Nuclear Security Administration Facebook Twitter ... Apply for Our Jobs Our Jobs Working at NNSA Blog Home university of california ...

  2. air force | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA, Air Force Complete Successful B61-12 Life Extension Program Development Flight Test at Tonopah Test Range WASHINGTON - The National Nuclear Security Administration (NNSA) and ...

  3. b-61 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA, Air Force Complete Successful B61-12 Life Extension Program Development Flight Test at Tonopah Test Range WASHINGTON - The National Nuclear Security Administration (NNSA) and ...

  4. Life Extension Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA, Air Force Complete Successful B61-12 Life Extension Program Development Flight Test at Tonopah Test Range WASHINGTON - The National Nuclear Security Administration (NNSA) and ...

  5. Life Extension Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA, Air Force Complete Successful B61-12 Life Extension Program Development Flight Test at Tonopah Test Range WASHINGTON - The National Nuclear Security Administration (NNSA) and ...

  6. B61 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA, Air Force Complete Successful B61-12 Life Extension Program Development Flight Test at Tonopah Test Range WASHINGTON - The National Nuclear Security Administration (NNSA) and ...

  7. watch office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    watch office | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. Video Gallery | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Gallery | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. Video test page | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    test page | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. National Nuclear Security Administration Fact Sheet Preliminary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nuclear Safety Violations at Los Alamos National Laboratory On August 25, 2015, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV)...

  11. Privacy Act Exemptions | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Exemptions | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. July 2010 | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    0 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  13. September 2011 | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  14. March 2011 | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  15. Additional Resources | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Resources | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Video Library | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Library | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. Readiness Assurance | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  18. First Responders | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Responders | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. EEO Links | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Links | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. Life Insurance | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Insurance | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. Kansas City Plant | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  2. National Nuclear Security Administration United States Department...

    National Nuclear Security Administration (NNSA)

    United States Department of Energy Washington, DC 20585 Prevent, Counter, and Respond-A ... Department of EnergyNational Nuclear Security Administration | March 2016 Prevent, ...

  3. Management and Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Highlights FY'17 Budget Request FY2016 Budget Request: Positioned for the 21st Century Mission Delivery FY2015 Budget Request: Preserving...

  4. 2010 Report Released | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Report Released | National Nuclear Security Administration Facebook Twitter Youtube Flickr ... Home About Us Our History NNSA Timeline 2010 Report Released 2010 Report Released ...

  5. Salt Lake City | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Administration (NNSA) and the FBI announced today the completion of the Gamma Shield Thunder counterterrorism table-top exercise at LDS Hospital. The exercise is part...

  6. renewable energy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    renewable energy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  7. Nuclear Controls | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Controls | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy ...

  8. nuclear safety | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response ...

  9. nuclear material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response ...

  10. nuclear enterprise | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response ...

  11. nuclear technology | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response ...

  12. National Nuclear Security Administration Contractors' Disability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Audit Report The National Nuclear Security Administration Contractors' Disability Compensation and Return-to-Work Programs DOEIG-0867 June 2012 U.S. Department of Energy Office of ...

  13. strategic vision | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    strategic vision | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  14. Turkey HEU Removal | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Turkey HEU Removal | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  15. Bettis Laboratory | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Klotz visits Bettis Atomic Power Laboratory Lt. Gen. Frank G. Klotz, DOE Undersecretary for Nuclear Security and NNSA Administrator, visited the Bettis Atomic Power Laboratory in ...

  16. design basis threat | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    design basis threat | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  17. March 2012 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Mar 23, 2012 Y-12 Site Office Recognized For Contributions To Combined Federal Campaign OAK RIDGE, Tenn. -- Employees of the National Nuclear Security Administration's Y-12...

  18. test44 | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    test44 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. June 2012 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    2 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  20. radiation detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, NNSA, Argentina Transition Radiation...

  1. Los Angeles | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home Los Angeles Los Angeles NNSA to Participate in Aerial Radiation Training Exercise Long Beach, CA Areas The National Nuclear Security Administration (NNSA) Aerial Measuring...

  2. May 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release May 1, 2014 Pantex to Become Wind Energy Research Center Officials from the National Nuclear Security Administration Production Office (NPO) and Texas Tech...

  3. June 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Press Release Jun 26, 2014 Waltzer Receives NNSA Gold Medal Award Karl Waltzer, Acting Deputy Manager of the National Nuclear Security Administration's Production Office, has...

  4. na-00 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    require a secure production and laboratory infrastructure meeting immediate and long term needs. The Associate Administrator for Infrastructure and Operations develops and...

  5. Sandia Cyber Omni Tracker

    Energy Science and Technology Software Center (OSTI)

    2014-07-02

    SCOT cyber security team enhancement tool that coordinates activities, captures knowledge, and serves as a platform to automate time-consuming tasks that a cyber security team needs to perform in its daily operations.

  6. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  7. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  8. Towards a Relation Extraction Framework for Cyber-Security Concepts

    SciTech Connect (OSTI)

    Jones, Corinne L; Bridges, Robert A; Huffer, Kelly M; Goodall, John R

    2015-01-01

    In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised NLP and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.

  9. iaea | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    iaea Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United States Mission to International Organizations in Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he... NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in

  10. Cyber Security Summer School: Lessons for the Modern Grid

    Broader source: Energy.gov [DOE]

    The Energy Department has partnered with a university-based project performing cutting-edge research to improve the way electric infrastructure is built, increasing the security and reliability of the grid.

  11. Defining and Computing a Valued Based Cyber Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  12. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  13. Republic of Korea | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Republic of Korea Statement on Signing of the Administrative Arrangement to the Agreement for Cooperation between the United States and Republic of Korea Concerning Peaceful Uses of Nuclear Energy (WASHINGTON, D.C.)-Today, Administrator Frank Klotz of the U.S. Department of Energy's National Nuclear Security Administration and Chairman Un Chul Lee of the Republic of Korea's (ROK) Nuclear Safety and Security Commission reached agreement on the terms of the Administrative Arrangement to the

  14. 123 agreement | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    123 agreement Statement on Signing of the Administrative Arrangement to the Agreement for Cooperation between the United States and Republic of Korea Concerning Peaceful Uses of Nuclear Energy (WASHINGTON, D.C.)-Today, Administrator Frank Klotz of the U.S. Department of Energy's National Nuclear Security Administration and Chairman Un Chul Lee of the Republic of Korea's (ROK) Nuclear Safety and Security Commission reached agreement on the terms of the Administrative Arrangement to the... United

  15. Management and Administration | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Management and Administration NNSA's Naval Reactors is committed to excellence and dedicated to meeting its human resource needs in a manner that is customer driven. NNSA's Naval Reactors is committed to excellence and dedicated to meeting its human resource needs in a manner that is customer driven. EMPLOYEE RESOURCES All Employees Thrift Savings Plan off site link (TSP) - Retirement savings plan for civilians who are employed by the United States Government and members of the uniformed

  16. kcp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home kcp Kansas City National Security Campus volunteers help students with FIRST Robotics The FIRST Robotics competition in Kansas City, March 10-12, resembled a medieval battlefield as nearly 50 high school teams battled robot against robot to scale the opponent's defenses and capture their tower and flag. For the past 10 years, Kansas City National Security Campus employees have... Under Secretary Klotz packs last crate at Kansas City Plant DOE Under Secretary for Nuclear Security and NNSA

  17. Nevada | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nevada Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United States Mission to International Organizations in Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he... Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams visited the

  18. cdns | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cdns Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. One major challenge has been, and remains, ensuring that SNM is well protected, while at the same time,... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes,

  19. Mission | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Mission Mission Statement "Enhancing and ensuring the future of the Nuclear Security Enterprise through effective nuclear production operations" Mission Execute effective contract management and oversight to safely and securely maintain the nuclear weapon stockpile for the Nuclear Security Enterprise; provide enriched uranium for naval, research, and isotope production reactors, and support nonproliferation activities to reduce the global nuclear threat. Vision Make the world safer by

  20. transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    transportation Pantex Plant's Calvin Nelson honored as Analyst of the Year for Transportation Security Pantex's Calvin Nelson was recently awarded the 2015 Analyst of the Year for Transportation Security by the Department of Energy's Nuclear Materials Information Program. The award, for which Nelson is the first-ever Pantex recipient, recognizes outstanding analytic support to the NMIP. All... Office of Secure Transportation Celebrates 40th Anniversary On Thursday morning, Dec. 17, NNSA's Office

  1. HSEMC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Blog Home HSEMC HSEMC Homeland Security and ... of Emergency Management assists the NNSA and Department of Energy sites in ... the NNSA Emergency Management System (EMS). ...

  2. Newsletters | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the nuclear security enterprise. Online archives are available back to 2003. NNSA publishes a monthly newsletter featuring current events and activities across the nuclear ...

  3. Engineering | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses modern tools and capabilities in the engineering sciences field which are needed to ensure the safety, security, reliability and performance of the current and future ...

  4. Weapons | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and Russia all with the goal of reducing nuclear weapons in both countries and, ultimately, lowering the global nuclear proliferation risk and increasing international security. ...

  5. Library | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Blog NNSA & Nuclear Security Enterprise support nation's preparedness NNSA Blog NNSA's work aids in fight against cancer NNSA Blog NSC leader recognized as community role model...

  6. Compensation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Blog NNSA & Nuclear Security Enterprise support nation's preparedness NNSA Blog NNSA's work aids in fight against cancer NNSA Blog NSC leader recognized as community role model...

  7. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy(...

  8. Reports | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Library Reports NNSA Comments: Final Report of the Congressional Advisory Panel on the Governance of the Nuclear Security Enterprise Related News Categorical Exclusion ...

  9. IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop

    SciTech Connect (OSTI)

    Clements, Samuel L.; Edgar, Thomas W.; Manz, David O.

    2012-04-01

    The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.

  10. inspection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    inspection NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports

  11. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home cygnus Cygnus fires its 3,000th shot Cygnus, a dual-axis flash X-ray radiography system designed by Sandia National Laboratories (SNL) and jointly constructed and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  12. police | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home police Perfecting marksmanship: Sandia California Security Police Officers train to improve skills In training, the Protective Force has looked carefully at this threat to identify trends, courses of action, and response techniques. Training trumps everything. Security Police Officers (SPO) at Sandia/California continue to far exceed the minimum standard of required training. Pablo Maurino, the...

  13. Anne Harrington | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Anne Harrington Deputy Administrator for Defense Nuclear Nonproliferation Anne Harrington Anne Harrington was sworn in as Deputy Administrator for Defense Nuclear Nonproliferation for the National Nuclear Security Administration in October 2010. Previously, Ms. Harrington was the Director of the U.S. National Academy of Sciences Committee on International Security and Arms Control (CISAC) a position she held from March 2005 to October 2010. While at CISAC, she managed several key studies on a

  14. Administrator Highlights U.S.-Georgian Nuclear Security Cooperation...

    National Nuclear Security Administration (NNSA)

    Administrator Highlights U.S.-Georgian Nuclear Security Cooperation in Tbilisi June 14, 2010 TBILISI, GEORGIA - National Nuclear Security Administration (NNSA) Administrator Thomas ...

  15. Counterterrorism | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Counterterrorism Tilden appointed as Associate Administrator of Counterterrorism and Counterproliferation We are delighted to announce two key personnel changes. Mr. Jay Tilden has officially been appointed as the Associate Administrator for Counterterrorism and Counterproliferation. Jay has been the Acting Associate Administrator since Steve Aoki's departure at the end of last year. ... NNSA announces retirement of Dr. Steve Aoki, after 33 years of service NNSA Administrator Frank Klotz, Dr.

  16. appointment | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    appointment Tilden appointed as Associate Administrator of Counterterrorism and Counterproliferation We are delighted to announce two key personnel changes. Mr. Jay Tilden has officially been appointed as the Associate Administrator for Counterterrorism and Counterproliferation. Jay has been the Acting Associate Administrator since Steve Aoki's departure at the end of last year.

  17. Tennessee | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Tennessee Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United States Mission to International Organizations in Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he... Pantex/Y-12 donate $1.1M to local United Way campaigns United Way contributions at the Pantex Plant and the Y-12 National Security Complex totaled some $1.1

  18. Madelyn Creedon | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Madelyn Creedon NNSA Principal Deputy Administrator Our Leadership Madelyn Creedon was confirmed by the Senate on Wednesday, July 23, 2014, as the Department of Energy's (DOE) Principal Deputy Administrator for the National Nuclear Security Administration (NNSA). As NNSA's Principal Deputy Administrator, Ms. Creedon will support NNSA Administrator Frank Klotz in the management and operation of the NNSA, as well as policy matters across the DOE and NNSA enterprise in support of President Obama's

  19. Randall M. Hendrickson | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Randall M. Hendrickson Associate Administrator for Management and Budget Our Leadership Randall Hendrickson is a member of the Senior Executive Service and serves as the Associate Administrator for Management and Budget in the National Nuclear Security Administration (NNSA). He is the Senior Career official leading and managing the budget and administrative staffs responsible for enterprise-wide systems and policies at NNSA. His organization guides and assists the Administrator in all aspects of

  20. lbnl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home lbnl lbnl Consortium Led by University of California, Berkeley Awarded 25M NNSA Grant for Nuclear Science and Security ...

  1. canning | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Our Jobs Our Jobs Working at NNSA Blog Home canning canning Y-12's uranium canning machine to save money During a recent visit to the Y-12 National Security Complex, NNSA...

  2. HEUMF | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 facilities During a recent visit to the Y-12 National Security Complex, Rep. Mike Simpson (R-Idaho), chairman of the House Energy and Water Appropriations Subcommittee, is...

  3. DOE | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE NNSA & DOE Employees Use Tiny Smartphone Microscopes to Teach STEM Users discovered items the device could magnify, such as yarn, human hair, and flower petals. Employees lunching on Friday, January 15, in the Department of Energy headquarters cafeteria received smartphone microscopes and a mission: Engage five students over Martin Luther King Jr. Day of Service... Nevada National Security Site contractor receives safety recertification for 5th straight year LAS VEGAS - National Security

  4. construction | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home construction Y-12 employee engineering success for group that serves people with disabilities in East Tennessee Jennifer Enderson, president of Emory Valley Center, and Bill Hevrdeys look over plans for the new facility. Bill Hevrdeys, a Consolidated Nuclear Security Construction engineer who has worked at Y-12 for more than 12 years, has worked on hundreds of construction projects all over the... NNSA's Asset Management Program Completes First Pilot The National Nuclear Security

  5. kcnsc | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    kcnsc NNSA team members make a living in nuclear security, make a difference giving back NNSA is focused on the mission first, people always, and NNSA's people make a difference, both on and off the clock. During National Volunteer Week, we recognize those across the enterprise who are active, energetic, and engaged in their communities. Every day, members of America's nuclear... Kansas City National Security Campus contractor and University of Kansas to collaborate on NNSA technology projects

  6. mac | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    mac Site Information Kansas City National Security Campus (NSC), located in Kansas City, Mo., is the principal nonnuclear production site within the nuclear weapons complex, responsible for manufacturing and procuring nonnuclear components for nuclear weapons, including electronic, mechanical, and engineered... Military Academy Cadet/Midshipman Program This program places military academy cadets/midshipmen in tours of duty within science, technology, engineering, national security, and relevant

  7. narac | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    narac NNSA & Nuclear Security Enterprise support nation's preparedness Scientists at NNSA facilities study climate and meteorology. Other sites are key players in weather preparedness. Today, on National Weatherperson Day, NNSA recognizes numerous contributions to the nation's climate and weather readiness in any situation. With emergency response as one of its core... Emergency Response Planning for Emergencies Exercise Program Field Assistance and Oversight Liaison Homeland Security and

  8. radioactivity | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    radioactivity Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams visited the Nevada National Security Site (NNSS) in his role as Chief Risk Officer for the Department of Energy. He reviewed the various ways the NNSS contributes to the department's and NNSA's missions, including radiological... San Francisco Bay Area Aerial Radiation Assessment Survey (SAN JOSE and SAN FRANCISCO, California) - A helicopter

  9. lanl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    lanl NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports... Making the perfect recipe just got faster: NNSA research accelerates materials science In a recent

  10. Newsletters | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back to 2003. NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back to 2003. September 2011 Newsletter PDF: PDF icon September 2011 NNSA NEWS.pdf Printer Friendly Newsletter PDF: PDF icon 2011 September NNSA News Viewable.pdf NNSA, Y-12 Complete

  11. CTBT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CTBT NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports... Head of Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) Preparatory Commission Visits NNSA's

  12. NGFP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NGFP Forum engages current and developing nuclear security leaders In late March, the NNSA Graduate Fellowship Program (NGFP) Alumni Forum brought together current and former fellows with leaders from across the national laboratories and the nuclear security enterprise. The annual event invites participants to share their career experiences as developing leaders... Graduate Fellows learn skills on starting careers as fellowships end NGFP Fellows at the annual NGFP Career Skills Workshop, where

  13. leadership | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    leadership Forum engages current and developing nuclear security leaders In late March, the NNSA Graduate Fellowship Program (NGFP) Alumni Forum brought together current and former fellows with leaders from across the national laboratories and the nuclear security enterprise. The annual event invites participants to share their career experiences as developing leaders... Livermore Field Office sets core values as part of continuous improvement process At their recent off-site continuous

  14. gold medal | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    gold medal NNSA Administrator honors nonproliferation research leader Last week DOE Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) presented the agency's Assistant Deputy Administrator for Nonproliferation Research and Development (R&D) Dr. Rhys Williams with the Distinguished Service Gold Medal Award at a

  15. Our Operations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Operations Infrastructure and Operations NNSA's missions require a secure production and laboratory infrastructure meeting immediate and long term needs. The Associate Administrator for Infrastructure and Operations develops and executes NNSA's infrastructure investment, maintenance, and operations programs and policies. Administration Programs Management and Budget The organization provides timely, cost-effective, and efficient administrative and financial support for NNSA headquarters staff.

  16. Deborah Wilber | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Deborah Wilber Associate Administrator for Emergency Operations Deborah Wilber Deborah Wilber is the Associate Administrator for the Office of Emergency Operations, National Nuclear Security Administration (NNSA). In this role, she is responsible for emergency management policy and execution of emergency management support, to include the Continuity of Operations and Government programs, the Headquarters and Alternate Emergency Operations Centers, and the Emergency Communications Network across

  17. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Management and Budget The organization provides timely, cost-effective, and efficient administrative and financial support for NNSA headquarters staff. The major functions of the ...

  18. sba | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Jobs Our Jobs Working at NNSA Blog Home sba sba SBA recognizes Pantex as a leader Small Business Administration Region VI SBA District Director Calvin Davis and Regional...

  19. China | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    China NNSA Deputy Administrator Creedon Travels to China United States and China Continue Partnership for the Peaceful Uses of Nuclear Technology United States and China Mark 10th ...

  20. Search | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    small business administration Smithsonian snl SNL Los Alamos National Laboratory snm solar solar energy solar power Source Physics Experiment South Carolina South Korea SPE-4...

  1. Engineering | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Engineering The Sandia Field Office's Engineering office performs oversight and contract administration activities for the facilities, projects and environmental programs at Sandia National Laboratories

  2. Shopping For Danger: E-commerce techniques applied to collaboration in cyber security

    SciTech Connect (OSTI)

    Bruce, Joseph R.; Fink, Glenn A.

    2012-05-24

    Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

  3. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect (OSTI)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    AbstractóThis paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  4. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect (OSTI)

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  5. Ukraine | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Ukraine NNSA deputy administrator travels to Ukraine Earlier this month, Deputy Administrator for Defense Nuclear Nonproliferation Anne Harrington traveled to Ukraine to celebrate the 20th anniversary of the Science and Technology Center in Ukraine (STCU) and visit the Neutron Source Facility at the Kharkiv Institute of Physics and Technology. The U

  6. volunteering | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    volunteering Y-12 completes 20th year of volunteering at Great Smoky Mountains National Park OAK RIDGE, Tenn. - Some 30 volunteers from Y-12 National Security Complex kicked off the 2016 CNS community service focus by volunteering to restore the Elkmont Campground Amphitheater in the Great Smoky Mountains National Park in April. This effort marks the 20th year that the Y-12 Help to the... NNSA team members make a living in nuclear security, make a difference giving back NNSA is focused on the

  7. CTBTO | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CTBTO NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports... Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United

  8. gtri | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home gtri Joint Statement by the United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here. The White HouseOffice of the Press Secretary Italy and the United States of America are pleased to announce that they have jointly completed the removal of approximately 20 kilograms of excess highly enriched uranium (HEU) and separated plutonium from Italy. At the 2012... Joint Statement by President Obama and Prime Minister Elio Di Rupo of Belgium on the 2014 Nuclear Security

  9. Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives,

    Broader source: Energy.gov [DOE]

    Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability, before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology,...

  10. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On March 21 through March 24, the Department of Energy's National Nuclear Security Administration (NNSA) will participate in a federal and state/local training exercise in Philadelphia that will also include the Philadelphia Police Department and the Departments of Defense

  11. donation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    donation NNSA's Y-12 & Pantex partner donates $10,000 for children's hospital Y-12's Site Manager Bill Tindal (right) presents a $10,000 donation to East Tennessee Children's Hospital CEO Keith Goodwin in support of the hospital's capital campaign. NNSA's management and operations partner Consolidated Nuclear Security (CNS) continued its legacy of community giving this

  12. fusion | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    fusion Inertial Confinement Fusion The Office of ICF provides experimental capabilities and scientific understanding in high energy density physics (HEDP) necessary to ensure a safe, secure, and effective nuclear weapons stockpile without underground testing. The demonstration of laboratory ignition and its use to support the

  13. neutron | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    neutron Sniffing out danger from above NNSA's efforts to prevent, counter, and respond to the dangers of nuclear proliferation and terrorism are vital to U.S. national security. Terrorist attacks in the past year in Europe and the United States have highlighted the evolving and unpredictable nature of the threat. Science,...

  14. nit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nit Operations NNSA's Emergency Response Operations program acts as the headquarters command and control, functioning as the coordinating focal point for all deployed assets during a nuclear or radiological incident. It also acts as support to any national special security events, special events, the

  15. nrat | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nrat Operations NNSA's Emergency Response Operations program acts as the headquarters command and control, functioning as the coordinating focal point for all deployed assets during a nuclear or radiological incident. It also acts as support to any national special security events, special events, the...

  16. aviation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home aviation NNSA walks away with 3 Aviation Awards The DOE Headquarters Office of Aviation Management (OAM) awarded the following aviation management awards for performance in 2014. The NNSA, Office of Secure Transportation, Aviation Operations Division, Albuquerque, NM, has, for the second consecutive year, won the U.S. Department of...

  17. counterintelligence | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    counterintelligence Bruce Held Announces Retirement After Nearly 40 Years of Public Service After nearly four decades of public service, Bruce Held, Department of Energy's Associate Deputy Secretary, announces retirement from federal govenrment.In July 2013 and with President Obama's approval, Held stepped in to serve as the Acting Under Secretary for Nuclear Security and NNSA...

  18. diversity | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home diversity NSC employees celebrate diversity The National Security Campus culminated its Diversity Among Us-themed celebration with a special guest speaker on March 13. Dr. Andres Sayles, DOE Principal Deputy Director of the Office of Economic Impact and Diversity, spoke to employees about inclusion and fostering mentorships. He praised...

  19. ldrd | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home ldrd Laboratory Directed Research & Development The U.S. Department of Energy (DOE) is charged with a large and complex mission: to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The DOE executes this mission to a large extent at...

  20. May 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    May 2014 Charles E. Messick receives the Administrator's Gold Award Friday, May 30, 2014 - 2:30pm Charles E. Messick receives the Administrator's Gold Award upon his retirement after more than 40 years of public service. From left to right: Anne Harrington, Deputy Administrator for Defense Nuclear Nonproliferation; Charles E Messick, Susan Messick, and Frank Klotz, DOE Undersecretary for Nuclear Security and NNSA Administrator. NNSA Blog NSC completes last part to facilitate relocation

  1. H-canyon | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    H-canyon | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS ... Apply for Our Jobs Our Jobs Working at NNSA Blog Home H-canyon H-canyon Savannah River ...

  2. Life Extension Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Alvin Leung and Matt H. B61-12 Life Extension Program Undergoes First Full-Scale Wind Tunnel Test WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA)...

  3. Contact Us | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    For general information about NNSA, please feel free to contact us: Mailing Address National Nuclear Security Administration U.S. Department of Energy 1000 Independence Ave., S.W. ...

  4. maritime supply chain | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  5. Nonproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ... to detect nuclear explosions near and far NNSA Deputy Administrator Creedon Travels to China DNN Sentinel Newsletter Volume II, No. 1 (March 2016) Volume I, No. 3 (November 2015) ...

  6. emergency exercise | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    emergency exercise Emergency Exercise to Focus on Aerial Radiation Detection and Measuring Systems at Nevada National Security Site LAS VEGAS - The National Nuclear Security Administration (NNSA) and the Department of Homeland Security's Federal Emergency Management Agency (FEMA) will be sponsoring an Aerial Measuring System (AMS) WINGS exercise March 25-27, the agencies announced today. WINGS is a series of tabletop exercises... Emergency Exercise to Focus on Aerial Radiation Detection and

  7. managing the stockpile | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    managing the stockpile NNSA Releases Annual Stockpile Stewardship & Management Plan Annual Report Provides Insight into Vital National Security Programs WASHINGTON, DC - The Department of Energy's National Nuclear Security Administration (NNSA) has released its Fiscal Year 2016 Stockpile Stewardship and Management Plan (SSMP). The FY16 SSMP documents NNSA's 25-year strategic plan... Law Enforcement & Emergency Management Liaison Mission StatementThe Office of Secure Transportation (OST)

  8. Military Academic Collaborations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense Programs offers a suite of activities to enhance collaboration between NNSA's eight sites and the U.S. Military/Service Academies. These programs are administered at NNSA and executed at NNSA sites, including the labs, production facilities and the Nevada National Security Site. At each location, leading-edge research and development is carried out on key national security technologies

  9. NNSA Established | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Established NNSA Established Washington, DC The Department activates the National Nuclear Security Administration (NNSA), meeting the statutory deadline established by the FY 2000 defense authorization act. NNSA's mission is to carry out the national security responsibilities of the Department of Energy, including maintenance of a safe, secure, and reliable stockpile of nuclear weapons and associated materials, capabilities, and technologies; promotion of international nuclear safety and

  10. National Nuclear Security Administration Los Alamos National

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Los Alamos National Security, LLC Fiscal Year 2014 Performance Evaluation Report (PER) NNSA Los Alamos Field Office Performance Period: October 2013 - September 2014 November 14, 2014 NA-LA November 14, 2014 Executive Summary This Performance Evaluation Report (PER) provides the assessment of Los Alamos National Security, LLC performance for the period of October 1, 2013 through September 30, 2014, as evaluated against the objectives defined in the Fiscal

  11. NEPA Reading Room | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NEPA Reading Room Welcome to the National Nuclear Security Administration's NEPA Reading Room. This site serves as a focal point for NNSA NEPA implementation and contains information about past and current NNSA NEPA actions as well as other resources for NEPA practitioners and members of the public. Welcome to the National Nuclear Security Administration's NEPA Reading Room. This site serves as a focal point for NNSA NEPA implementation and contains information about past and current NNSA NEPA

  12. iran deal | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    iran deal NNSA Delivers Annual Reports to Congress on Progress for Stockpile Stewardship and Nuclear Nonproliferation WASHINGTON, D.C.-The Department of Energy's National Nuclear Security Administration (DOE/NNSA) today released the annual reports outlining the strategic direction for two of its vital and enduring missions-maintaining a safe, secure and effective nuclear deterrent and reducing the threat

  13. cost savings | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cost savings NNSA's Nevada Field Office Transfers Two Armored Vehicles to FBI LAS VEGAS - The National Nuclear Security Administration's (NNSA) Nevada Field Office recently transferred two Advanced Concept Armored Vehicles (ACAVs) to The Department of Justice's local FBI office in Nevada. The transfer created $474,000 in savings to the government as the NFO security force no...

  14. engineering | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    engineering NNSA labs and sites get girls excited about engineering NNSA workers across the nuclear security enterprise took advantage of "Introduce a girl to engineering day" to instill hundreds of young women with excitement for science, technology, engineering, and math (STEM) careers. This year's theme, "#ilooklikeanengineer," celebrated expanding diversity in... Working With PNNL Mentors, Engineering Students Deliver Prototype Safeguards Fixtures Earlier this month,

  15. school | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    school Hip-hop physics education program inspires Kansas City students on STEM Everything was in motion in Kansas City recently as the National Security Campus's M&O contractor, Honeywell, brought the award-winning, hip-hop physics education program, FMA Live! Forces in Motion, to more than 1,500 middle school students. The show brings hip-hop music, dancers, larger-than... Sandia donates 242 computers to northern California schools Sandia National Laboratories electronics technologist Mitch

  16. supercompuring | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    supercompuring NNSA's missions get a boost from brain-inspired, radically different computer design The first computers to contribute to the nation's nuclear security work used thousands of vacuum tubes-which resembled fat light bulbs that gave off lots of heat-and consumed 125 kW of power to perform around 1,900 operations per second. This month NNSA's Lawrence Livermore National Laboratory (

  17. supercomputer | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    supercomputer NNSA's missions get a boost from brain-inspired, radically different computer design The first computers to contribute to the nation's nuclear security work used thousands of vacuum tubes-which resembled fat light bulbs that gave off lots of heat-and consumed 125 kW of power to perform around 1,900 operations per second. This month NNSA's Lawrence Livermore National Laboratory (... Two of the World's Most Powerful Computers work for NNSA Two NNSA supercomputers-Trinity and

  18. women | National Nuclear Security Administration

    Office of Scientific and Technical Information (OSTI)

    women NNSA Celebrates Women's History Month 2016 Department of Energy employees celebrated the legacy of women trailblazers, past and present, on the morning as Women's History Month 2016 reached its conclusion at the end of March. With the theme "Working to Form a More Perfect Union: Honoring Women in Public Service and Government," the event... NNSA labs and sites get girls excited about engineering NNSA workers across the nuclear security enterprise took advantage of "Introduce

  19. detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    detection Sniffing out danger from above NNSA's efforts to prevent, counter, and respond to the dangers of nuclear proliferation and terrorism are vital to U.S. national security. Terrorist attacks in the past year in Europe and the United States have highlighted the evolving and unpredictable nature of the threat. Science,... NNSA Researchers Advance Technology for Remote Reactor Monitoring NNSA's Defense Nuclear Nonproliferation Research and Development Program drives the innovation of

  20. ornl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ornl Sandia's ice sheet modeling of Greenland, Antarctica helps predict sea-level rise The Greenland and Antarctic ice sheets will make a dominant contribution to 21st century sea-level rise if current climate trends continue. However, predicting the expected loss of ice sheet mass is difficult due to the complexity of modeling ice sheet behavior. To better understand this loss, a... Consortium Led by University of California, Berkeley Awarded $25M NNSA Grant for Nuclear Science and Security

  1. terrorism | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    terrorism Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit Participants in Apex Gold at Lawrence Livermore National Laboratory. What would national leaders do in the face of a transnational nuclear terrorism threat? Last week, ministers and other senior delegates from 37 nations, along with representatives from the International Atomic Energy Agency, the... About Counterterrorism NNSA provides expertise, practical tools, and technically informed

  2. training | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    training Nation's Radiological Assistance Program teams practice emergency response Radiological Assistance Program (RAP) teams from around the country gathered in Albuquerque in late March as part of RAP Training for Emergency Response (RAPTER). This training consists of an intensive series of drills conducted four times a year to provide recertification for members of... Perfecting marksmanship: Sandia California Security Police Officers train to improve skills In training, the Protective

  3. Operations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Operations NNSA's Emergency Response Operations program acts as the headquarters command and control, functioning as the coordinating focal point for all deployed assets during a nuclear or radiological incident. It also acts as support to any national special security events, special events, the Department of Defense; the Department of State during operations outside the continental United States and local, state, or federal law enforcement. The Operations Program coordinates the following

  4. Labs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home Labs In 20th Year, Stockpile Stewardship Program Celebrated As One of Nation's Greatest Achievements in Science and Security (WASHINGTON) - The proven success of the Stockpile Stewardship Program (SSP)-which pushed the limits of modern science and engineering by requiring the transition from explosive nuclear weapons testing to what is effectively virtual nuclear testing-was celebrated today at a half-day public event... Savannah River Analytical Laboratories Achieve International Standard

  5. Nonproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs Nonproliferation One of the gravest threats the United States and the international community face is the possibility that terrorists or rogue nations will acquire nuclear weapons or other weapons of mass destruction (WMD). NNSA, through its Office of Defense Nuclear Nonproliferation (DNN), works closely with a wide range of international partners, key U.S. federal agencies, the U.S. national laboratories, and the private sector to secure, safeguard, and/or dispose of dangerous nuclear

  6. Engineering | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Engineering NNSA uses modern tools and capabilities in the engineering sciences field which are needed to ensure the safety, security, reliability and performance of the current and future U.S. nuclear weapons stockpile. It also provides the solid and sustained engineering basis for stockpile certification and assessments that are needed throughout the entire lifecycle of each weapon. NNSA develops capabilities to assess and improve the engineering components of both the non-nuclear and nuclear

  7. MSIPP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home MSIPP Advanced Manufacturing pipeline brings NSC and Minority Serving Institutions together In an ongoing effort to build a sustainable STEM pipeline between DOE's sites/labs and historically black colleges and universities, the National Security Campus (NSC) helped form the Advanced Manufacturing Consortium under the Minority Serving Institutes Partnership Program (MSIPP). This year... NNSA Hosts Cybersecurity Consortium Members Following White House Announcement of $25 Million in Grants

  8. climate | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home climate Sandia's ice sheet modeling of Greenland, Antarctica helps predict sea-level rise The Greenland and Antarctic ice sheets will make a dominant contribution to 21st century sea-level rise if current climate trends continue. However, predicting the expected loss of ice sheet mass is difficult due to the complexity of modeling ice sheet behavior. To better understand this loss, a... NNSA & Nuclear Security Enterprise support nation's preparedness Scientists at NNSA facilities study

  9. donations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    donations NNSA's Y-12 & Pantex partner donates $10,000 for children's hospital Y-12's Site Manager Bill Tindal (right) presents a $10,000 donation to East Tennessee Children's Hospital CEO Keith Goodwin in support of the hospital's capital campaign. NNSA's management and operations partner Consolidated Nuclear Security (CNS) continued its legacy of community giving this... Pantex kicks off United Way campaign Clarence Rashada holds up a sign expressing Pantexans' support during the United

  10. vehicles | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    vehicles Bay Area national labs team to tackle long-standing automotive hydrogen storage challenge Sandia National Laboratories chemist Mark Allendorf, shown here at Berkeley Lab's Advanced Light Source facility, is leading the Hydrogen Materials - Advanced Research Consortium (HyMARC) to advance solid-state materials for onboard hydrogen storage. Sandia National Laboratories will lead a new tri... Nevada National Security Site operator recognized for green fleet The management and operating

  11. Belgium | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Belgium Joint Statement by President Obama and Prime Minister Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here. The White HouseOffice of the Press Secretary Belgium and the United States of America are pleased to announce that they have jointly completed the removal of a significant amount of excess highly enriched uranium (HEU) and separated plutonium from Belgium. At

  12. of Western Area Power Administration's Cyber Security Program

    Office of Environmental Management (EM)

    ... automation, project management and multimedia functions; * During internal ... functions such as office automation, multimedia and project management that were not ...

  13. CFC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CFC NNSA thanks CFC key workers for a job well done In a late March ceremony, NNSA Principal Deputy Administrator Madelyn Creedon thanked key workers in NNSA's most recent season of giving in the largest and most successful workplace fundraising campaign in the world, the 2015 Combined Federal Campaign (CFC). Largely due to the efforts of 14 people...

  14. MSI | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home MSI NNSA's Minority Serving Institutions Internship Program On Thursday, July 16, NNSA Administrator Klotz had a brown bag lunch with the 14 high school and college students participating in NNSA's Minority Serving Institutions' (MSI) Internship Program assigned to NNSA headquarters. The MSI Internship Program targets students who are majoring in...

  15. Texas | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Texas Wind farm generating more renewable energy than expected for Pantex The Texas Panhandle has some of the world's best winds for creating renewable energy, and the Wind Farm at the Pantex Plant is taking advantage of those winds, generating up to 60% of the energy needs of the plant in an inaugural program, mandated by the White House. Back in 2013,... Pantex/Y-12 donate $1.1M to local United Way campaigns United Way contributions at the Pantex Plant and the Y-12 National Security Complex

  16. history | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    history Keeping the "Spirit of '45 Alive" in Kansas City National Security Campus employees commemorated the 70th anniversary of the end of World War II by sharing stories of their loved ones, viewing photographs and documents with Truman Library historians and listening to WWII veteran Max DeWeese reminisce about his experience in the war. The August... Y-12 has almost 500 visitors from 23 states tour site during Secret City Festival B&W Y-12 employee and tour guide Bill Wilburn,

  17. Our Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About Our Programs NNSA's program support is divided into several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator. Each program area is focused on specific challenges. NNSA's program support is divided into several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure

  18. Radiological Assistance Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Assistance Program NNSA Administrator visits Brookhaven National Laboratory On Friday, May 6, DOE Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) visited Brookhaven National Laboratory in Upton, New York. Brookhaven Lab brings world-class facilities and expertise to the most exciting and important questions in basic and applied...

  19. fmd | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home fmd Nonproliferation Working in close collaboration with DOE laboratories, DNN develops and tests new technologies to advance U.S. capabilities to monitor nonproliferation and arms control treaty and agreement implementation, provides unique training and capacity-building programs, and engages internationally to... Analysis of Surplus Weapons-Grade Plutonium Disposition Options The Administration remains firmly committed to disposing of surplus weapon-grade plutonium. However, through an

  20. NPT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NPT NNSA Labs host U.S. and Nuclear Non-Proliferation Treaty (NPT) Non-Nuclear Weapon State Representatives NNSA Principal Deputy Administrator Madelyn Creedon with SNL Director and President Jill Hruby welcome Department of State Representatives and seven NPT Non-Nuclear Weapon State Representatives for 2nd NPT Transparency Visit. WASHINGTON - On October 26 and 27, 2015, Los Alamos National... NNSA Hosts NPT Parties at Los Alamos and Sandia National Laboratories WASHINGTON D.C. - On March