Powered by Deep Web Technologies
Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Advanced Metering Infrastructure (AMI) System Security Requirements  

Science Conference Proceedings (OSTI)

This report identifies key cyber security requirements and suggests basic security approaches for safeguarding the many interfaces of Advanced Metering Infrastructure (AMI) systems. These requirements, which were developed through a clearly defined security assessment procedure, are generic; but they can be used to develop more specific security requirements based on actual configurations and environments.

2009-12-21T23:59:59.000Z

2

AMI System Security Requirements - v1_01-1 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AMI System Security Requirements - v101-1 AMI System Security Requirements - v101-1 This document provides the utility industry and vendors with a set of security requirements...

3

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UCAIUG: AMI-SEC-ASAP UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents. 5 6 This document provides substantial supporting information for the use of these requirements 7 including scope, context, constraints, objectives, user characteristics, assumptions, and 8

4

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and data staging Business Services core business applications (includes asset management) 559 Table 7 - AMI Security Domain Descriptions 560 561 Each utility's AMI...

5

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

6

AMI security issues and best practices.  

E-Print Network (OSTI)

??This report discusses about potential Advance Metering Infrastructure (AMI) security threats and best practices to mitigate the risks caused by the security threats. Issues specifically… (more)

Dave, Aditi

2011-01-01T23:59:59.000Z

7

AMI Risk Assessment and Security Requirements  

Science Conference Proceedings (OSTI)

Advanced Metering Infrastructure (AMI) is a transforming technology that has broad impact on the energy market and its consumers. AMI allows utilities to balance supply, demand, and capacity making a smarter, more efficient, grid by pushing aspects of grid monitoring and control out to the endpoints of delivery. Stakeholders are implementing the systems and technologies required to deploy AMI today. AMI systems promise to provide advanced energy monitoring and recording, sophisticated tariff/rate program...

2009-12-18T23:59:59.000Z

8

Microsoft Word - NSTB_AMI_SecurityConsiderationsV4.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SANDIA REPORT SAND2007-7327 Unlimited Release Printed November 2007 Advanced Metering Infrastructure Security Considerations Raymond C. Parks Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Advanced Metering Infrastructure Security Considerations 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

9

Design and Implementation of AMI System Using Binary CDMA for Smart Grid  

Science Conference Proceedings (OSTI)

To solve the energy problem and find new growth engines, the smart grid is getting more and more attention these days. AMI is the key component that should be preferentially constructed for smart grid. To establish a PLC-based AMI system with the existing ... Keywords: PLC, data concentrator unit, Binary CDMA, AMI

Inwhee Joe, Jong Yuel Jeong, Fu-Quan Zhang

2013-01-01T23:59:59.000Z

10

Identifying Stakeholders, Applications and Impacts of AMI Systems  

Science Conference Proceedings (OSTI)

Utilities are eager to understand what the impacts and benefits are from advanced metering infrastructure (AMI). There have been many cost benefit studies done on AMI but very little information is available on realized benefits and actual costs from AMI deployments. In 2013 the IntelliGrid program will launch a project document the applications, impacts, value chains, benefits and costs of AMI deployments. This paper provides background information for this project by defining the stakeholders in ...

2012-12-12T23:59:59.000Z

11

Amy Lopez  

Science Conference Proceedings (OSTI)

Web Manager Amy Lopez Contact Information contact contact us Amy Lopez Web Content Strategy Manager ...

12

Advanced Metering Infrastructure Security Management Guidelines  

Science Conference Proceedings (OSTI)

Advanced Metering Infrastructure (AMI) systems have raised many security concerns since they connect traditionally self-contained power system operations with widely dispersed, un-trustable customer sites. Many different groups are identifying the security requirements for AMI systems, including the NIST Smart Grid Security Guidelines and the ASAP-SG AMI Security Profile v2.0. Vendors are applying security technologies to their products in an effort to meet those security requirements. However, AMI netwo...

2010-12-31T23:59:59.000Z

13

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

14

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

15

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

16

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

17

Amie Ziegler-Fernandes  

Science Conference Proceedings (OSTI)

Web Content Specialist Contact Amie Ziegler-Fernandes Contact Information contact contact us Amie Ziegler-Fernandes Web Content Specialist    

18

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

19

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

20

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

22

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

23

Advanced Metering Infrastructure Security Objects  

Science Conference Proceedings (OSTI)

With the widespread deployment of large-scale Advanced Metering Infrastructure (AMI) systems, utilities must address the task of managing the alarms and events that are generated by the meters. However, AMI systems do not easily integrate into Security Information and Event Management (SIEM) systems and Intrusion Detection Systems (IDSs) due to the fact that AMI vendors do not use standard data objects for representing the alarms and events that are generated by the meters. This project addresses ...

2012-12-28T23:59:59.000Z

24

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

25

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

26

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

27

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

28

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

29

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

30

Amy Foster Parish  

Energy.gov (U.S. Department of Energy (DOE))

Amy Foster Parish is on staff with the Washington State University Extension Energy Program and answers inquiries through the EERE Information Center.

31

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management • Architecture security focus • Physical interaction ... Cybersecurity • Cybersecurity Framework • Smart Grid Program ...

2013-06-05T23:59:59.000Z

32

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

33

AMI and Demand Response Evaluator, Version 2.0  

Science Conference Proceedings (OSTI)

The AMI and Demand Response Evaluator software, Version 2.0, permits a utility to discover the possible functions of an advanced metering infrastructure (AMI) or demand response (DR) system, and to determine the benefits and requirements arising from selecting particular functions. The tool also enables a utility to evaluate various communications technologies that may be appropriate for implementing such an AMI or DR system. Description AMI and Demand Response Evaluator is a Microsoft® Access databa...

2008-10-16T23:59:59.000Z

34

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

35

ARM - AMIE Field Campaign  

NLE Websites -- All DOE Office Websites (Extended Search)

climate models have difficulty predicting its effects and its interactions with the monsoon and El Nio. AMIE-Gan will measure the area where the MJO begins its eastward...

36

PIA - Security Clearance Tracking System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Clearance Tracking System PIA - Security Clearance Tracking System PIA - Security Clearance Tracking System PIA - Security Clearance Tracking System More Documents &...

37

ETTP Security Access Control System (ESACS) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

38

The development of the AMI system for the transcription of speech in meetings  

Science Conference Proceedings (OSTI)

The automatic processing of speech collected in conference style meetings has attracted considerable interest with several large scale projects devoted to this area. This paper describes the development of a baseline automatic speech transcription system ...

Thomas Hain; Lukas Burget; John Dines; Iain McCowan; Giulia Garau; Martin Karafiat; Mike Lincoln; Darren Moore; Vincent Wan; Roeland Ordelman; Steve Renals

2005-07-01T23:59:59.000Z

39

AMI | OpenEI  

Open Energy Info (EERE)

AMI AMI Dataset Summary Description This dataset represents a historical repository of all the numerical data from the smartgrid.gov website condensed into spreadsheets to enable analysis of the data. Below are a couple of things worth noting: Source Smartgrid.gov Date Released March 04th, 2013 (11 months ago) Date Updated March 04th, 2013 (11 months ago) Keywords AMI costs distribution smart grid transmission Data application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon SmartGrid.gov Quarterly Data Summary 4Q12 (xlsx, 112.1 KiB) application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon SmartGrid.gov Quarterly Data Summary 3Q12 (xlsx, 107.9 KiB) application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon SmartGrid.gov Quarterly Data Summary 2Q12 (xlsx, 111.9 KiB)

40

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

42

The National Information Systems Security Conference ...  

Science Conference Proceedings (OSTI)

The National Information Systems Security Conference announces its Keynote and Banquet Speakers. August Bequai, Esq ...

1996-10-28T23:59:59.000Z

43

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

security efforts by establishing the national SCADA test bed program INL [INL/EXT- 05-00671, Idaho National Laboratory. US-CERT [2008], Control Systems Security

Amin, Saurabh

2011-01-01T23:59:59.000Z

44

System and method for secure group transactions  

DOE Patents (OSTI)

A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

Goldsmith, Steven Y. (Rochester, MN)

2006-04-25T23:59:59.000Z

45

Control Systems Security Publications Library | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Technology Development Transmission Planning Smart Grid Energy Delivery Systems Cybersecurity Control Systems Security News Archive Control...

46

NREL: Biomass Research - Amie Sluiter  

NLE Websites -- All DOE Office Websites (Extended Search)

Amie Sluiter Amie Sluiter Amie Sluiter (aka Amie D. Sluiter, Amie Havercamp) is a scientist at the National Renewable Energy Laboratory's National Bioenergy Center in Golden, Colorado. Research Interests Amie Sluiter began research in the biomass-to-ethanol field in 1996. She joined the Biomass Analysis Technologies team to provide compositional analysis data on biomass feedstocks and process intermediates for use in pretreatment models and techno-economic analyses. The results of wet chemical analysis provide guidance on feedstock handling, pretreatment conditions, economic viability, and life cycle analyses. Amie Sluiter has investigated a number of biomass analysis methods and is an author on 11 Laboratory Analytical Procedures (LAPs), which are being used industry-wide. She has taught full biomass compositional analysis

47

Control Systems Security News Archive | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Delivery Systems Cybersecurity Control Systems Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu...

48

Designing Secure SCADA Systems Using Security Patterns  

Science Conference Proceedings (OSTI)

Critical infrastructure systems are those systems that support our daily lives and their protection is fundamental. The key component of a critical infrastructure system is the process control system, also known as the supervisory, control, and data ...

Eduardo B. Fernandez; Maria M. Larrondo-Petrie

2010-01-01T23:59:59.000Z

49

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

50

AMIE (ACRF MJO Investigation Experiment)  

NLE Websites -- All DOE Office Websites (Extended Search)

AMIE AMIE (ACRF MJO Investigation Experiment) Planning Meeting AMIE Science Steering Committee Chuck Long, Tony DelGenio, Bill Gustafson, Bob Houze, Mike Jensen, Steve Klein, Ruby Leung, Xaihong Liu, Ed Luke, Peter May, Sally McFarlane, Pat Minnis, Courtney Schumacher, Andy Vogelmann, Yi Wang, Xiaoqing Wu, Shaohong Xie Agenda * Proposal due May 1 !!!!!! * Primary purpose of this meeting is discussions and planning in support of

51

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

52

National SCADA Test Bed Enhancing control systems security in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of...

53

Control Systems Security Standards: Accomplishments And Impacts |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

54

Information technology - Security techniques - Information security management systems - Requirements  

E-Print Network (OSTI)

ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

International Organization for Standardization. Geneva

2005-01-01T23:59:59.000Z

55

Pantex Occupational Health System (OHS), National Nuclear Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

56

Scalable security for petascale parallel file systems  

Science Conference Proceedings (OSTI)

Petascale, high-performance file systems often hold sensitive data and thus require security, but authentication and authorization can dramatically reduce performance. Existing security solutions perform poorly in these environments because they cannot ... Keywords: capabilities, high-performance computing, scalability, secure object-based storage

Andrew W. Leung; Ethan L. Miller; Stephanie Jones

2007-11-01T23:59:59.000Z

57

A Tiered Security System for Mobile Devices  

E-Print Network (OSTI)

We have designed a tiered security system for mobile devices where each security tier holds user-defined security triggers and actions. It has a friendly interface that allows users to easily define and configure the different circumstances and actions they need according to context. The system can be set up and activated from any browser or directly on the mobile device itself. When the security system is operated from a Web site or server, its configuration can be readily shared across multiple devices. When operated directly from the mobile device, no server is needed for activation. Many different types of security circumstances and actions can be set up and employed from its tiers. Security circumstances can range from temporary misplacement of a mobile device at home to malicious theft in a hostile region. Security actions can range from ringing a simple alarm to automatically erasing, overwriting, and re-erasing drives.

Bardsley, Scott; Morris, R Paul

2008-01-01T23:59:59.000Z

58

Secure Systems and Applications Group  

Science Conference Proceedings (OSTI)

... technologies, and on developing security solutions ... the earliest stages of technology development through proof ... industry, and to develop tests, test ...

2013-01-17T23:59:59.000Z

59

Systems security and functional readiness  

SciTech Connect

In Protective Programming Planning, it is important that every facility or installation be configured to support the basic functions and mission of the using organization. This paper addresses the process of identifying the key functional operations of our facilities in Europe and providing the security necessary to keep them operating in natural and man-made threat environments. Functional Readiness is important since many of our existing facilities in Europe were not constructed to meet the demands of today's requirements. There are increased requirements for real-time systems with classified terminals and stringent access control, tempest and other electronic protection devices. One must prioritize the operations of these systems so that essential functions are provided even when the facilities are affected by overt or covert hostile activities.

Bruckner, D.G.

1988-01-01T23:59:59.000Z

60

Electronic DOE Information Security System (eDISS) PIA, Office...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Fenix Secure Operating System: Principles, Models and Architecture  

Science Conference Proceedings (OSTI)

The paper introduces design principles of Secure Operating System Fenix developed in Information Security Centre of Saint-Petersburg Technical University. Fenix is a special purpose secure operating system supposed to be a basis for secure information ...

Dmitry P. Zegzhda; Pavel G. Stepanov; Alexey D. Otavin

2001-05-01T23:59:59.000Z

62

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

... of the Federal Information Systems Security Educator's ... and those involved in instructional design and curriculum ... NIST that is designed to improve ...

2012-02-07T23:59:59.000Z

63

Collaboration Topics - System Software | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our...

64

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... to two CISOs at the US Department of Energy. ... Prior to EES, Al worked for Keane Federal Systems, Inc ... the FBI on all matters of cyber security policy. ...

65

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

66

Processes in securing open architecture software systems  

Science Conference Proceedings (OSTI)

Our goal is to identify and understand issues that arise in the development and evolution processes for securing open architecture (OA) software systems. OA software systems are those developed with a mix of closed source and open source software components ... Keywords: Open architecture, configuration, continuous software development, process integration, process modeling, security

Walt Scacchi, Thomas A. Alspaugh

2013-05-01T23:59:59.000Z

67

Secure videoconferencing equipment switching system and method  

DOE Patents (OSTI)

A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

Hansen, Michael E. (Livermore, CA)

2009-01-13T23:59:59.000Z

68

Argonne's National Security Information Systems  

E-Print Network (OSTI)

was asked by the DOE National Nuclear Security Administration (NNSA) to install the ARG-US RFID equipment in the NNSA vehicles (a Peterbilt truck and a Dodge Sprinter van) and integration with the in-vehicle Omni about the DOE/NNSA's Global Threat Reduction Initiative (GTRI) for voluntary security enhancements

Kemner, Ken

69

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Hauser, Katie R [ORNL; Lantz, Margaret W [ORNL; Mili, Ali [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

70

ORO Office Safeguards and Security Clearance Tracking System...  

NLE Websites -- All DOE Office Websites (Extended Search)

Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System...

71

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network (OSTI)

This thesis examines how perturbing selected adversary capabilities in a design basis threat (DBT) may affect the assessment of a facility's security system performance. We found that using a strictly defined DBT to design and analytically test facility security systems can lead to invalid assessments that security measures are meeting standards. Design Basis Threats are intended to represent the most severe yet realistic attack a facility might face. However, the static nature of the standard DBT makes it unable to test the performance of a facility security system in the case where a specialized adversary may possess different capabilities than defined in the DBT. Our analysis of security system performance for various modeled facilities revealed significant vulnerabilities to certain perturbations of adversary capabilities. These vulnerabilities went undetected when the original strictly defined graded DBT was used in the assessment procedure. By maximizing one adversary capability at the expense of others, a specialized adversary force was able to efficiently defeat each facility. To address this problem, we proposed employing a so-called "point-based" DBT as an alternative to the existing strictly defined DBT. In a point-based DBT, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities will outweigh the additional cost of generating a point-based DBT, especially if the vulnerabilities are identified during the initial design of the security system.

Conchewski, Curtis

2012-08-01T23:59:59.000Z

72

Advanced Metering Infrastructure (AMI) Roadmap for the Tennessee Valley  

Science Conference Proceedings (OSTI)

This report summarizes the findings of an advanced metering infrastructure (AMI) roadmap project that was conducted for the distributors of the Tennessee Valley. These distributors, collectively represented by the Tennessee Valley Public Power Association (TVPPA), along with the Tennessee Valley Authority, are developing a long-term Smart Grid vision for the Valley and believe that the diversity of AMI systems in the region can form a foundation for advanced applications.

2009-08-17T23:59:59.000Z

73

Situated Usability Testing for Security Systems  

Science Conference Proceedings (OSTI)

While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

Greitzer, Frank L.

2011-03-02T23:59:59.000Z

74

Collaboration Topics - System Software | National Nuclear Security  

National Nuclear Security Administration (NNSA)

System Software | National Nuclear Security System Software | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

75

Recommended Practice for Securing Control System Modems  

SciTech Connect

This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

James R. Davidson; Jason L. Wright

2008-01-01T23:59:59.000Z

76

Audit Report, Evaluation of Classified Information Systems Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report, Evaluation of Classified Information Systems Security Program, DOEIG-0518 Audit Report, Evaluation of Classified Information Systems Security Program, DOEIG-0518 All...

77

NERSC Increases System Storage and Security for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve IO Performance Throughout the month...

78

A Summary of Control System Security Standards Activities in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector...

79

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

80

Security Analysis and Project Management Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security approaches for Radio Frequency Identification systems  

E-Print Network (OSTI)

In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain ...

Foley, Joseph Timothy, 1976-

2007-01-01T23:59:59.000Z

82

Secure and Efficient Routable Control Systems  

SciTech Connect

This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

2010-05-01T23:59:59.000Z

83

IPS - Secure Internet Payment System  

Science Conference Proceedings (OSTI)

There are a number of questions one might ask about security of money transactions on the Internet. A first question might be: "Why do we need to protect money transaction on the Internet?" The Internet is an insecure and unreliable communication medium ...

Zoran Djuric

2005-04-01T23:59:59.000Z

84

Ami - The Chemist's Amanuensis  

E-Print Network (OSTI)

for time-lapse video motion-snapshot monitoring. He also did the investigations into the use of the Arduino. ? SEA developed software for driving the RFID reader system and advised on application development, testing environments, and troubleshooting... into the use of the Arduino. SEA developed software for driving the RFID reader system and advised on application development, testing environments, and troubleshooting. He also helped with the brainstorming session. JAT configured the code management systems...

Brooks, Brian; Thorn, Adam; Smith, Matthew; Matthews, Peter; Chen, Shaoming; O'Steen, Ben; Adams, Sam; Townsend, Joseph A; Murray-Rust, Peter

2011-07-04T23:59:59.000Z

85

Aerial Measuring System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Measuring System | National Nuclear Security Administration Measuring System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Aerial Measuring System Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management > Aerial Measuring System Aerial Measuring System AMS Logo NNSA's Aerial Measuring System (AMS) provides specialized airborne

86

Ami - The Chemist's Amanuensis  

E-Print Network (OSTI)

-lapse video motion- snapshot monitoring. He also did the investigations into the use of the Arduino. SEA developed software for driving the RFID reader system and advised on application development, testing environments, and troubleshooting. He also helped...

Brooks, Brian J; Thorn, Adam L; Smith, Matthew; Matthews, Peter; Chen, Shaoming; O'Steen, Ben; Adams, Sam E; Townsend, Joe A; Murray-Rust, Peter

2011-10-14T23:59:59.000Z

87

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

88

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

89

Analytical foundations of physical security system assessment  

E-Print Network (OSTI)

Physical security systems are intended to prevent or mitigate potentially catastrophic loss of property or life. Decisions regarding the selection of one system or configuration of resources over another may be viewed as design decisions within a risk theoretic setting. The problem of revealing a clear preference among design alternatives, using only a partial or inexact delineation of event probabilities, is examined. In this dissertation, an analytical framework for the assessment of the risk associated with a physical security system is presented. Linear programming is used to determine bounds on the expected utility of an alternative, and conditions for the separation of preferences among alternatives are shown. If distinguishable preferences do not exist, techniques to determine what information may help to separate preferences are presented. The linear programming approach leads to identification of vulnerabilities in a security system through an examination of the solution to the dual problem. Security of a hypothetical military forward operating base is considered as an illustrative example. For two alternative security schemes, the uncertainty inherent in the scenario is represented using probability assessments consisting of bounds on event probabilities and exact probability assignments. Application of the framework reveals no separation of preferences between the alternatives. Examination of the primal and dual solutions to the linear programming problems, however, reveals insights into information which, if obtained, could lead to a separation of preferences as well as information on vulnerabilities in one of the alternative security postures.

Graves, Gregory Howard

2006-08-01T23:59:59.000Z

90

BRC-Systems and Emerging Technologies Security Research ...  

Science Conference Proceedings (OSTI)

... Systems and Emerging Technologies Security Research Group Biometric Standards and Related Technical Developments. ...

2013-08-01T23:59:59.000Z

91

Guidelines for System Security and Information System Management  

Science Conference Proceedings (OSTI)

This document provides a concise set of guidelines and best practices for performing risk assessment, security management, and system management within utility automation networks.

2008-06-09T23:59:59.000Z

92

Design tools for complex dynamic security systems.  

SciTech Connect

The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

2007-01-01T23:59:59.000Z

93

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network (OSTI)

. http://docs.info.apple.com/article.html?artnum=303411 BEA Systems - 2007 Daylight Savings Time ChangesIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Shellcode Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The 2007 Daylight

94

On the importance of securing telephony systems  

Science Conference Proceedings (OSTI)

In the following work we present an easy to read essay about the array of threats that modern telephony systems face, that will prove, hopefully, useful for both administrators and simple users. We have taxonomized these threats and we have further provided ... Keywords: communication systems security, telephony fraud, telephony threats

Iosif I. Androulidakis

2009-01-01T23:59:59.000Z

95

DOE and Industry Showcase New Control Systems Security Technologies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Technology Development Transmission Planning Smart Grid Energy Delivery Systems Cybersecurity Control Systems Security News Archive Control...

96

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

97

Secure Control Systems for the Energy Sector  

Science Conference Proceedings (OSTI)

Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

Smith, Rhett; Campbell, Jack; Hadley, Mark

2012-03-31T23:59:59.000Z

98

NNSA Policy System | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy System | National Nuclear Security Administration Policy System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Policy System Home > About Us > Our Operations > Management and Budget > NNSA Policy System NNSA Policy System The NNSA's Policy System is established under the authority of Section 3212(d) of Public Law 106-65, the National Defense Authorization Act for

99

Securing a Wireless Networked Control System Using Information Fusion  

Science Conference Proceedings (OSTI)

Security of a wireless sensor network practically governs its usability in several applications. Especially, in applications like Industrial control systems which use NCS and SCADA systems, the security affects the stability of the system. We propose ...

Brijesh Kashyap Chejerla, Sanjay Madria

2012-10-01T23:59:59.000Z

100

Comparison of Routable Control System Security Approaches  

SciTech Connect

This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

2011-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Cyber security in power systems .  

E-Print Network (OSTI)

??Many automation and power control systems are integrated into the 'Smart Grid' concept for efficiently managing and delivering electric power. This integrated approach created several… (more)

Sridharan, Venkatraman

2012-01-01T23:59:59.000Z

102

Control Systems Security Standards: Accomplishments & Impacts  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

019 019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

103

22nd National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... Techniques Dr. Roshan Thomas, NAI Labs ... Kubic, National Security Agency Tom Shake, MIT ... Security Implementations Bret Hartman, Concept Five ...

2000-10-25T23:59:59.000Z

104

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

105

Senior Systems Engineer | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Senior Systems Engineer | National Nuclear Security Administration Senior Systems Engineer | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Regina Griego Senior Systems Engineer Regina Griego Regina Griego Role: Senior Systems Engineer Profile: Regina Griego has been elected a fellow of the International Council on

106

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

107

AMIE (ARM MJO Investigation Experiment):  

NLE Websites -- All DOE Office Websites (Extended Search)

7 7 AMIE (ARM MJO Investigation Experiment): Observations of the Madden-Julian Oscillation for Modeling Studies Science Plan ARM Climate Research Facility Tropical Western Pacific Manus Site October 2011-March 2012 C Long Principal Investigator A DelGenio P May W Gustafson S McFarlane R Houze P Minnis C Jakob C Schumacher M Jensen A Vogelmann S Klein Y Wang L Ruby Leung X Wu X Liu S Xie E Luke March 2010 DISCLAIMER This report was prepared as an account of work sponsored by the U.S Government Neither the United States nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed,

108

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

109

Service Oriented Architecture in Network Security - a novel Organisation in Security Systems  

E-Print Network (OSTI)

Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed.

Hilker, Michael

2008-01-01T23:59:59.000Z

110

Scalable Security for Petascale Parallel File Systems  

E-Print Network (OSTI)

Y. Hu. Snare: A strong security scheme for network-attachedThekkath. Block-level security for network-attached disks.and J. Satran. The OSD security protocol. In Proc. 3rd IEEE

Leung, Andrew W.; Miller, Ethan L; Jones, Stephanie

2007-01-01T23:59:59.000Z

111

Ultra Safe And Secure Blasting System  

SciTech Connect

The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

Hart, M M

2009-07-27T23:59:59.000Z

112

Neumann Receives Computer System Security Award  

Science Conference Proceedings (OSTI)

... in the area of information security and assurance. ... significant long-term contributions to computer security ... trade, and improve the quality of life. ...

2012-12-13T23:59:59.000Z

113

A survey of security in multi-agent systems  

Science Conference Proceedings (OSTI)

Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security ... Keywords: Agents, Multi-agent systems, Multi-agents, Security, Security in MAS

Rodolfo Carneiro Cavalcante; Ig Ibert Bittencourt; Alan Pedro da Silva; Marlos Silva; Evandro Costa; Robério Santos

2012-04-01T23:59:59.000Z

114

Ideal based cyber security technical metrics for control systems  

Science Conference Proceedings (OSTI)

Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the ... Keywords: control system security, cyber security metrics

Wayne Boyer; Miles McQueen

2007-10-01T23:59:59.000Z

115

Recommended Practice for Securing Control System Modems | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Practice for Securing Control System Modems Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. Recommended Practice for Securing Control System Modems More Documents & Publications

116

Security Framework for Control System Data Classification and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for Control System Data Classification and Protection Security Framework for Control System Data Classification and Protection This document presents a data...

117

Selection of Model in Developing Information Security Criteria for Smart Grid Security System  

E-Print Network (OSTI)

At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

118

Security-Constrained Adequacy Evaluation of Bulk Power System Reliability  

E-Print Network (OSTI)

Security-Constrained Adequacy Evaluation of Bulk Power System Reliability Fang Yang, Student Member. Stefopoulos, Student Member, IEEE Abstract -- A framework of security-constrained adequacy evaluation (SCAE electric load while satisfying security constraints. It encompasses three main steps: (a) critical

119

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

120

Advanced Metering Infrastructure (AMI) Considerations for Distributed Renewables Integration  

Science Conference Proceedings (OSTI)

Unlike traditional forms of generation that are currently effective only as large concentrated facilities, wind and solar generation can be reasonably employed on a small scale. This fact, together with the dispersed nature of the underlying energy sources, leads to the potential for a future system that includes substantial distributed renewables generation. This report is one part in a portfolio of research discussing how utility communication systems, such as the Advanced Metering Infrastructure (AMI)...

2009-12-15T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Advanced Metering Infrastructure Cyber Security Risks  

Science Conference Proceedings (OSTI)

The deployment of advanced metering infrastructure (AMI) systems is introducing millions of components to the electric grid that support two-way communication for next-generation grid applications. Although these systems can increase operational efficiencies and enable new capabilities such as demand-response, they also increase the attack surface for potential adversaries. Utilities must address these new cyber security risks as part of their overall enterprise risk management strategy. These ...

2013-12-23T23:59:59.000Z

122

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

123

ORO Office Safeguards and Security Clearance Tracking System and Visitor  

NLE Websites -- All DOE Office Websites (Extended Search)

Office Safeguards and Security Clearance Tracking System and Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking System(VETS) PIA, Oak ridge Operations Office iManage Strategic Integrated Procurement Enterprise System (STRIPES) PIA, Office of Procurement and Assistance Management

124

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... 9:15 NIST Welcome William Barker, NIST Computer Security Division NO BIO and Presentation Available. ... BIO & Abstract Presentation. ...

125

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... Jim Wiggins, Federal IT Security Institute ... Gale Warshawsky, Department of Energy: Lawrence Livermore ... Notice & Privacy Policy Send comments or ...

126

NNSA Policy System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

127

Aerial Measuring System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

128

List of Major Information Systems,National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

129

Process Control Systems in the Chemical Industry: Safety vs. Security  

Science Conference Proceedings (OSTI)

Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

Jeffrey Hahn; Thomas Anderson

2005-04-01T23:59:59.000Z

130

Prototype system brings advantages of wireless technology to secure  

National Nuclear Security Administration (NNSA)

Prototype system brings advantages of wireless technology to secure Prototype system brings advantages of wireless technology to secure environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Prototype system brings advantages of wireless technology ... Prototype system brings advantages of wireless technology to secure environment

131

Roadmap to Secure Control Systems in the Energy Sector 2006 ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Energy Sector More Documents & Publications Security is Not an Option DOE National SCADA Test Bed Program Multi-Year Plan Roadmap to Achieve Energy Delivery Systems...

132

Security Controls for Computer Systems (U): Report of ...  

Science Conference Proceedings (OSTI)

... This first step is essential in order that ... other computing systems, any facilities for security ... management controls and procedures, facility clearance is ...

2013-04-15T23:59:59.000Z

133

Securing Wide Area Measurement Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the...

134

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations Appendix F ...

2013-05-09T23:59:59.000Z

135

Security and Privacy Controls for Federal Information Systems  

Science Conference Proceedings (OSTI)

NIST Special Publication 800-53. Revision 4. Security and Privacy Controls for Federal Information Systems. and Organizations. JOINT TASK FORCE ...

2013-06-18T23:59:59.000Z

136

Security Issues and Challenges for Cyber Physical System  

Science Conference Proceedings (OSTI)

In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set ... Keywords: Cyber-Physical System, Security, actuation, context-aware

Eric Ke Wang; Yunming Ye; Xiaofei Xu; S. M. Yiu; L. C. K. Hui; K. P. Chow

2010-12-01T23:59:59.000Z

137

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy, mitigation, and resilience ­ is among the most important R&D needs for the emerging smart grid. One

138

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy important R&D needs for the emerging smart grid. One of the overarching goals of the future research

139

FORTUNA-A framework for the design and development of hardware-based secure systems  

Science Conference Proceedings (OSTI)

Security requires a holistic view. In this work we contribute to this goal by taking a new viewpoint, with the proposal of the logic-probabilistic framework FORTUNA to support the design and development of hardware-based-security systems (HwBSS). It ... Keywords: Formal methods for security, Hardware-based security, Information security, Security evaluation tool, Security metrics

Roberto Gallo, Henrique Kawakami, Ricardo Dahab

2013-08-01T23:59:59.000Z

140

Cyber Security Procurement Methodology for Power Delivery Systems  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new power delivery systems requires cyber security experts, power system engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfit to meet requirements.The Electric Power Research ...

2012-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

142

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network (OSTI)

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

143

TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH  

SciTech Connect

The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

Lee, Hsien-Hsin S

2010-05-11T23:59:59.000Z

144

A testbed for secure and robust SCADA systems  

Science Conference Proceedings (OSTI)

The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a ...

Annarita Giani; Gabor Karsai; Tanya Roosta; Aakash Shah; Bruno Sinopoli; Jon Wiley

2008-07-01T23:59:59.000Z

145

20th National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... NIST does not accept any other credit cards. ... and CD-ROM of the conference proceedings will be ... In January 1981, the National Computer Security ...

146

DOE and Industry Showcase New Control Systems Security Technologies at  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Development » Energy Delivery Systems Technology Development » Energy Delivery Systems Cybersecurity » Control Systems Security News Archive » DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy infrastructure from cyber attack on Tuesday through Thursday, March 23-25. Visit Booth #231 at the DistribuTECH 2010 Conference & Exhibition in Tampa, FL, to see first-hand demonstrations of several newly commercialized control systems security products-each developed through a

147

AMIS (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

AMIS (Smart Grid Project) AMIS (Smart Grid Project) Jump to: navigation, search Project Name AMIS Country Austria Headquarters Location Steyr, Austria Coordinates 48.050091°, 14.41827° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":48.050091,"lon":14.41827,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

148

Research challenges for the security of control systems  

Science Conference Proceedings (OSTI)

In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirements and problems for the security of control systems? We also propose ...

Alvaro A. Cárdenas; Saurabh Amin; Shankar Sastry

2008-07-01T23:59:59.000Z

149

Developing Secure Power Systems Professional Competence: Alignment and Gaps  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Developing Secure Power Systems Professional Competence: Alignment Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to protect and enable the modernized grid currently being built. In the spring of 2011 a project was initiated to identify those capabilities and competencies along with assessing the need and qualifications for a certification program for Secure Power Systems

150

Guideline for Securing Control Systems and Corporate Network Interfaces  

Science Conference Proceedings (OSTI)

Until recent years, many electric utilities have dealt with the cyber security issues of protecting control system networks by keeping the control system and corporate system networks physically separate. Others have prohibited remote access to control system networks, requiring all connections be made onsite. While these techniques effectively protect the system from external cyber-security-based threats, they are restricting a growing requirement for access, particularly among corporate users who need ...

2005-12-05T23:59:59.000Z

151

Privacy and Security Research Group workshop on network and distributed system security: Proceedings  

Science Conference Proceedings (OSTI)

This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

Not Available

1993-05-01T23:59:59.000Z

152

Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations  

Science Conference Proceedings (OSTI)

Safety Instrumented Systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil & natural gas installations. SIS typically include the Emergency Shutdown System (ESD) that ensures that process systems return ... Keywords: Offshore, Process Control, Safety Instrumented Systems, Secure remote access

Martin Gilje Jaatun; Tor Olav Grřtan; Maria B. Line

2008-06-01T23:59:59.000Z

153

Ami Pro - PAPER.SAM  

Science Conference Proceedings (OSTI)

... method. A fourth approach automates the generation of concurrent designs for SARA (the System ARchitects Apprentice). ...

2009-02-03T23:59:59.000Z

154

ARM MJO Investigation Experiment on Gan Island (AMIE-Gan) Science Plan  

Science Conference Proceedings (OSTI)

The overarching campaign, which includes the ARM Mobile Facility 2 (AMF2) deployment in conjunction with the Dynamics of the Madden-Julian Oscillation (DYNAMO) and the Cooperative Indian Ocean experiment on intraseasonal variability in the Year 2011 (CINDY2011) campaigns, is designed to test several current hypotheses regarding the mechanisms responsible for Madden-Julian Oscillation (MJO) initiation and propagation in the Indian Ocean area. The synergy between the proposed AMF2 deployment with DYNAMO/CINDY2011, and the corresponding funded experiment on Manus, combine for an overarching ARM MJO Investigation Experiment (AMIE) with two components: AMF2 on Gan Island in the Indian Ocean (AMIE-Gan), where the MJO initiates and starts its eastward propagation; and the ARM Manus site (AMIE-Manus), which is in the general area where the MJO usually starts to weaken in climate models. AMIE-Gan will provide measurements of particular interest to Atmospheric System Research (ASR) researchers relevant to improving the representation of MJO initiation in climate models. The framework of DYNAMO/CINDY2011 includes two proposed island-based sites and two ship-based locations forming a square pattern with sonde profiles and scanning precipitation and cloud radars at both island and ship sites. These data will be used to produce a Variational Analysis data set coinciding with the one produced for AMIE-Manus. The synergy between AMIE-Manus and AMIE-Gan will allow studies of the initiation, propagation, and evolution of the convective cloud population within the framework of the MJO. As with AMIE-Manus, AMIE-Gan/DYNAMO also includes a significant modeling component geared toward improving the representation of MJO initiation and propagation in climate and forecast models. This campaign involves the deployment of the second, marine-capable, AMF; all of the included measurement systems; and especially the scanning and vertically pointing radars. The campaign will include sonde launches at a rate of eight per day for the duration of the deployment. The increased sonde launches for the entire period matches that of the AMIE-Manus campaign and makes possible a far more robust Variational Analysis forcing data set product for the entire campaign, and thus better capabilities for modeling studies and synergistic research using the data from both AMIE sites.

Long, CL; Del Genio, A; Deng, M; Fu, X; Gustafson, W; Houze, R; Jakob, C; Jensen, M; Johnson, R; Liu, X; Luke, E; May, P; McFarlane, S; Minnis, P; Schumacher, C; Vogelmann, A; Wang, Y; Webster, P; Xie, S; Zhang, C

2011-04-11T23:59:59.000Z

155

Secure transfer of measurement data in open systems  

Science Conference Proceedings (OSTI)

The liberalization of different markets which are liable to legal metrology accelerates the need for transferring measuring data over open networks. This increases the involvement of communication technology in measuring systems and raises new security ... Keywords: Digital signatures, Legal metrology, SELMA, Secure data transfer

Luigi Lo Iacono; Christoph Ruland; Norbert Zisky

2006-01-01T23:59:59.000Z

156

Neutralization: new insights into the problem of employee systems security policy violations  

Science Conference Proceedings (OSTI)

Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers have traditionally viewed violations of IS security ... Keywords: IS security, IS security policies, compliance, deterrence theory, neutralization theory

Mikko Siponen; Anthony Vance

2010-09-01T23:59:59.000Z

157

Measurable Control System Security through Ideal Driven Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

2008-01-01T23:59:59.000Z

158

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

159

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

160

IT Security for Automation Systems – Motivations and Mechanisms  

E-Print Network (OSTI)

The protection of safety-critical and infrastructure systems (such as automation systems for utilities, but also for manufacturing plants) against electronic and communication network based attacks becomes more and more important. This paper examines how such safety-critical plants and automation systems can be secured against information system and network based attacks. Based on the defense-in-depth approach, a conceptional, generic security zone model for use in analysis and synthesis of a plant security architecture is proposed, and for each of its zones a survey of the available and appropriate security mechanisms for delay, detection, and reaction is given. Der Schutz von sicherheitskritischen Systemen und Infrastruktureinrichtungen (wie zum Beispiel der Automatisierungsanlagen von Versorgungsunternehmen, aber auch von Fabrikationsanlagen) gegen

Martin Naedele; Abb Schweiz Ag

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security Analysis of Emerging Remote Obstetrics Monitoring Systems  

E-Print Network (OSTI)

assume home-based systems have a higher level of security protections. A password protection mechanism and management will need to be in place. No medical professionals to operate monitoring device in home-based

Wu, Jie

162

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network (OSTI)

This fact sheet describes Homeland Security issues that affect Texas and the nation. It includes an overview of some of the key water resource issues associated with preventing intentional contamination of water supplies served by small water systems.

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

163

AMI (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

Project Name AMI Project Name AMI Country Slovenia Headquarters Location Kranj, Slovenia Coordinates 46.239208°, 14.355654° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":46.239208,"lon":14.355654,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

164

Roadmap to Secure Control Systems in the Energy Sector  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roadmap Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic framework for guiding industry and goernment efforts based on a clear ision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctie feature of this collaboratie effort is the actie inolement and leadership of energy asset

165

Small Business Sourcing System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sourcing System | National Nuclear Security Administration Sourcing System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Sourcing System Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Small Business Toolbox > Small Business Sourcing System Small Business Sourcing System

166

Project Management and Systems Support | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

167

Project Management and Systems Support | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

168

Network Security Management for Transmission Systems  

Science Conference Proceedings (OSTI)

The electric power grid is increasingly dependent on information technology and telecommunication infrastructures.   While great benefits will result from this influx of technology, a holistic and granular awareness of all elements of the information infrastructure supporting a control subsystem will be critical to ensure long term reliability and security. The management of this information infrastructure requires connectivity and analytics to support both IT and OT assets in a unified ...

2012-12-31T23:59:59.000Z

169

GAO Challenges and Efforts to Secure Control Systems (March 2004) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) Computerized control systems perform vital functions across many of our nation's critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and flow of gas through pipelines. In October 1997, the President's Commission on Critical Infrastructure Protection emphasized the increasing vulnerability of control systems to cyber attacks. The House Committee on Government Reform and its Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census asked GAO to report on potential cyber vulnerabilities, focusing on (1) significant cybersecurity risks associated with control systems (2) potential and reported cyber attacks

170

IT-Security for Safety-Critical Automation Systems  

E-Print Network (OSTI)

The protection of safety-critical and infrastructure systems (such as automation systems for utilities, but also for manufacturing plants) against electronic and communication network based attacks becomes more and more important. This paper investigates how such safety-critical plants and automation systems can be secured against information system and network based attacks. The two common approaches, hard perimeter, and defense-in-depth are discussed. Based on the defense-in-depth approach, a conceptional, generic security zone model for use in analysis and synthesis of a plant security architecture is proposed, and for each of its zones a survey of the available and appropriate security mechanisms is given. Using an example from the substation automation domain, it is shown how threats and counter-measures can be systematically derived and how the specific system and usage characteristics of automation systems (or at least their restricted safety critical sub-functions) can be exploited in a positive way to deploy security mechanisms that would in this form not be available and applicable to home or office information systems. 1.

Martin Naedele

2002-01-01T23:59:59.000Z

171

Secure Systems Editors: Patrick McDaniel, mcdaniel@cse.psu.edu  

E-Print Network (OSTI)

the smartgrid technology. His research interests include network and systems security, telecommunications

McDaniel, Patrick Drew

172

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

on control systems . . . . . . . . . . . . . . . . 7.2control system. . . . . . . . . . . . . . . . . . . . . . . . . .8 Stabilization of Networked Control Systems using 8.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

173

Crops reap benefits of Pantex irrigation system | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Crops reap benefits of Pantex irrigation system | National Nuclear Security Crops reap benefits of Pantex irrigation system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Crops reap benefits of Pantex irrigation system Home > content > Crops reap benefits of Pantex irrigation system Crops reap benefits of Pantex irrigation system

174

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

175

Marine asset security and tracking (MAST) system  

DOE Patents (OSTI)

Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

Hanson, Gregory Richard (Clinton, TN); Smith, Stephen Fulton (Loudon, TN); Moore, Michael Roy (Corryton, TN); Dobson, Eric Lesley (Charleston, SC); Blair, Jeffrey Scott (Charleston, SC); Duncan, Christopher Allen (Marietta, GA); Lenarduzzi, Roberto (Knoxville, TN)

2008-07-01T23:59:59.000Z

176

Pressurized security barrier and alarm system  

DOE Patents (OSTI)

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

Carver, D.W.

1994-12-31T23:59:59.000Z

177

Pressurized security barrier and alarm system  

DOE Patents (OSTI)

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

Carver, D.W.

1995-04-11T23:59:59.000Z

178

Pressurized security barrier and alarm system  

DOE Patents (OSTI)

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder's making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

Carver, Don W. (Knoxville, TN)

1995-01-01T23:59:59.000Z

179

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach  

Science Conference Proceedings (OSTI)

Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%--75% of security incidents originate from within an organization. ... Keywords: IS misuse, IS security, end-user security, general deterrence theory, security countermeasures, security management

John D'Arcy; Anat Hovav; Dennis Galletta

2009-03-01T23:59:59.000Z

180

Computational Systems & Software Environment | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Computational Systems & Software Environment | National Nuclear Security Computational Systems & Software Environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog CSSE Computational Systems & Software Environment Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Using Multiple Unmanned Systems for a Site Security Task  

SciTech Connect

Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

2009-04-01T23:59:59.000Z

182

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

183

InkTag: secure applications on an untrusted operating system  

Science Conference Proceedings (OSTI)

InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design ... Keywords: application protection, paraverification, virtualization-based security

Owen S. Hofmann; Sangman Kim; Alan M. Dunn; Michael Z. Lee; Emmett Witchel

2013-04-01T23:59:59.000Z

184

A secure monitoring and control system for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

The maintenance of Wireless Sensor Networks (WSNs) can carry high or prohibitive costs, particularly, if the WSN is deployed in unattended areas. Secure monitoring and control of the WSN is vital, however, practical systems are rare and limited with ... Keywords: Monitoring,Wireless sensor networks,Control systems,Intrusion detection,Elliptic curve cryptography

Michael Riecker, Rainer Thome, Dingwen Yuan, Matthias Hollick

2012-10-01T23:59:59.000Z

185

Control Systems Security News Archive | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

News Archive News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award October 2009 - DOE NSTB researchers demonstrated R&D successes to asset owners at EnergySec Conference September 2009 - ISA approves standard for wireless automation in process control applications Sept. 2009 - Government and Industry a Force for Collaboration at the

186

Use of a hybrid technology in a critical security system.  

SciTech Connect

Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

Scharmer, Carol; Trujillo, David J.

2010-08-01T23:59:59.000Z

187

Use of a hybrid technology in a critical security system.  

SciTech Connect

Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

Trujillo, David J.

2010-10-01T23:59:59.000Z

188

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

189

AmiGO: online access to ontology and annotation data  

SciTech Connect

AmiGO is a web application that allows users to query, browse, and visualize ontologies and related gene product annotation (association) data. AmiGO can be used online at the Gene Ontology (GO) website to access the data provided by the GO Consortium; it can also be downloaded and installed to browse local ontologies and annotations. AmiGO is free open source software developed and maintained by the GO Consortium.

Carbon, Seth; Ireland, Amelia; Mungall, Christopher J.; Shu, ShengQiang; Marshall, Brad; Lewis, Suzanna

2009-01-15T23:59:59.000Z

190

Consistency-based System Security Techniques  

E-Print Network (OSTI)

terminates the operation of the wireless system that isDuring the operation mode of the wireless system when theHT-embedded wireless system enters the operation mode. The

Wei, Sheng

2013-01-01T23:59:59.000Z

191

Training programs for the systems approach to nuclear security.  

Science Conference Proceedings (OSTI)

In support of the US Government and the International Atomic Energy Agency (IAEA) Nuclear Security Programmes, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been implemented as the basis for a performance methodology for the design and evaluation of Physical Protection Systems against a Design Basis Threat (DBT) for theft or sabotage of nuclear and/or radiological materials. Since integrated systems must include people as well as technology and the man-machine interface, a critical aspect of the human element is to train all stakeholders in nuclear security on the systems approach. Current training courses have been beneficial but are still limited in scope. SNL has developed two primary international courses and is completing development of three new courses that will be offered and presented in the near term. In the long-term, SNL envisions establishing a comprehensive nuclear security training curriculum that will be developed along with a series of forthcoming IAEA Nuclear Security Series guidance documents.

Ellis, Doris E.

2005-07-01T23:59:59.000Z

192

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

193

Microsoft Word - AMI White paper final 013108 _2_.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

are able to greatly improve consumer service by refining utility operating and asset management processes based on AMI data. Through the integration of multiple technologies (such...

194

Roadmap to Secure Control Systems in the Energy: Executive Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Foreword Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctive feature of this collaborative effort is the active involvement and leadership of energy asset owners and operators in developing the Roadmap content and priorities. The Roadmap synthesizes

195

NERSC Increases System Storage and Security for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Increases Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve I/O Performance Throughout the month of March the Cray XT4 machine Franklin underwent a series of upgrades and improvements, including a major I/O upgrade. The disk capacity of the scratch file system was increased by 30% to 460 TB, and the I/O bandwidth was nearly tripled to an aggregate write performance of 32 GB/sec, compared to 11 GB/s before the upgrade. Instead of adding the new hardware to the existing scratch file system, NERSC chose to implement a second scratch file system so that Franklin now has two scratch file systems, each with a peak write bandwidth of 16 GB/sec. "We doubled the amount of I/O hardware and nearly tripled the bandwidth,

196

Critical issues in process control system security : DHS spares project.  

SciTech Connect

The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

2010-10-01T23:59:59.000Z

197

Towards secure multi-sited transactional revision control systems  

Science Conference Proceedings (OSTI)

Version control systems play a very important role in maintaining the revision history of software and facilitating software evolution. As the software development process is gradually taking the form of a collaborative effort among several teams hosted ... Keywords: Configuration management, Security, Transaction processing, Version control

Junxing Zhang; Indrajit Ray

2007-03-01T23:59:59.000Z

198

Towards a secure Frequency Monitoring NETwork (FNET) system  

Science Conference Proceedings (OSTI)

Reactive and real-time wide area monitoring systems (WAMS), such as the Frequency Monitoring NETwork (FNET) developed at Virginia Tech, allow for the gathering of frequency data throughout the entire power grid. FNET uses the Internet as a communication ... Keywords: FNET, Smart Grid, cyber security

Joseph L. McDaniel; Ambareen Siraj

2010-04-01T23:59:59.000Z

199

Bellingham, Washington, Control System Cyber Security Case ...  

Science Conference Proceedings (OSTI)

... of software used on the Olympic system was shipped to Houston to allow the ... site, the maximum bandwidth of the communication channel and the ...

2007-10-24T23:59:59.000Z

200

Towards Security of Integrated Enterprise Systems ...  

Science Conference Proceedings (OSTI)

... corrective actions” (Merit Projecta 98, p. 8). The enterprise system management framework should include an object repository (Yankee 97, p.2 ...

1999-11-05T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

Science Conference Proceedings (OSTI)

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

202

SRS upgrades helium recovery system | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

upgrades helium recovery system | National Nuclear Security upgrades helium recovery system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > SRS upgrades helium recovery system SRS upgrades helium recovery system Posted By Office of Public Affairs Savannah River Site (SRS) Tritium Programs recently completed a project to design, build and relocate a new system for separating and capturing

203

Countering automated exploits with system security CAPTCHAS  

Science Conference Proceedings (OSTI)

Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users can do everything necessary to fulfil their tasks with the computer. The disadvantage ...

Dinan Gunawardena; Jacob Scott; Alf Zugenmaier; Austin Donnelly

2005-04-01T23:59:59.000Z

204

MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS  

E-Print Network (OSTI)

network at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, was infected [39]. There have been-physical systems, threat models, protocols for treaty verification. 1. Introduction The rapid growth of information) sys- tems that monitor power, gas/oil transportation, water and waste-water distribution. Such systems

Burmester, Mike

205

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

206

Security problems with a SC-CNN-based Chaotic Masking Secure Communication System  

E-Print Network (OSTI)

This paper studies the security of a chaotic cryptosystem based on the Chua circuit and implemented with State Controlled Cellular Neural Networks. It is shown that the plaintext can be retrieved by ciphertext band-pass filtering after an imperfect decoding with wrong receiver parameters. It is also shown that the key space of the system can be notably reduced easing a brute force attack. The system parameters were determined with high precision through the analysis of the decoding error produced by the mismatch between receiver and transmitter parameters.

A. B. Orue; G. Alvarez; F. Montoya; C. Sanchez-Avila

2007-06-20T23:59:59.000Z

207

Asbestos : operating system security for mobile devices  

E-Print Network (OSTI)

This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital ...

Stevenson, Martijn

2006-01-01T23:59:59.000Z

208

Secure Video Surveillance System (SVSS) for unannounced safeguards inspections.  

Science Conference Proceedings (OSTI)

The Secure Video Surveillance System (SVSS) is a collaborative effort between the U.S. Department of Energy (DOE), Sandia National Laboratories (SNL), and the Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC). The joint project addresses specific requirements of redundant surveillance systems installed in two South American nuclear facilities as a tool to support unannounced inspections conducted by ABACC and the International Atomic Energy Agency (IAEA). The surveillance covers the critical time (as much as a few hours) between the notification of an inspection and the access of inspectors to the location in facility where surveillance equipment is installed. ABACC and the IAEA currently use the EURATOM Multiple Optical Surveillance System (EMOSS). This outdated system is no longer available or supported by the manufacturer. The current EMOSS system has met the project objective; however, the lack of available replacement parts and system support has made this system unsustainable and has increased the risk of an inoperable system. A new system that utilizes current technology and is maintainable is required to replace the aging EMOSS system. ABACC intends to replace one of the existing ABACC EMOSS systems by the Secure Video Surveillance System. SVSS utilizes commercial off-the shelf (COTS) technologies for all individual components. Sandia National Laboratories supported the system design for SVSS to meet Safeguards requirements, i.e. tamper indication, data authentication, etc. The SVSS consists of two video surveillance cameras linked securely to a data collection unit. The collection unit is capable of retaining historical surveillance data for at least three hours with picture intervals as short as 1sec. Images in .jpg format are available to inspectors using various software review tools. SNL has delivered two SVSS systems for test and evaluation at the ABACC Safeguards Laboratory. An additional 'proto-type' system remains at SNL for software and hardware testing. This paper will describe the capabilities of the new surveillance system, application and requirements, and the design approach.

Galdoz, Erwin G. (Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Rio de Janeiro, Brazil); Pinkalla, Mark

2010-09-01T23:59:59.000Z

209

Communications Security Analysis for Control System Networks: Preliminary Report  

Science Conference Proceedings (OSTI)

Communications capabilities in the control system network are expanding and security issues are becoming more important as the electric power industry migrates from relatively slow, serial communications to high-speed, asynchronous communications. This report surveys current and evolving wired and wireless high-speed communication technologies to create a roadmap for planning control system network upgrades before regulation or equipment obsolescence and reliability concerns become issues. Technologies s...

2007-02-15T23:59:59.000Z

210

Framework for Evaluating Cyber Security Posture for Power Delivery Systems  

Science Conference Proceedings (OSTI)

While many asset owners and operators are performing self-assessments of their control systems, the methods used vary widely across the electric sector. This lack of consistent criteria and metrics makes it difficult to benchmark and compare the cyber security posture of power delivery systems.The objective of this technical update is to develop an evaluation framework that uses both the Department of Energy (DOE) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) ...

2013-11-28T23:59:59.000Z

211

Improving security applications using indoor location systems on wireless sensor networks  

Science Conference Proceedings (OSTI)

One of the fields in which companies are investing more money is security, either personal security to avoid industrial accidents or security against intrusions. There is also the huge effort that the scientific community is doing developing all required ... Keywords: IEEE 802.15.4, ILS, indoor location systems, security applications, wireless sensor networks

Josep Paradells; Jordi Vilaseca; Jordi Casademont

2009-01-01T23:59:59.000Z

212

Integrated training for the Department of Energy stadnard security system  

SciTech Connect

Lawrence Livermore National Laboratory has been successful in designing and providing technical performance-based training for the Argus security system. This training has been developed for technical and operational staff at facilities installing or using the Argus security system. The Argus training program is designed to instruct candidates to become the trainers for their facilities. The design criteria of the Argus training program includes: Meeting orders of the Department of Energy and the Department of Defense, Being flexible for a changing environment, Customizing lessons to site`s needs, and Configuring for a specific job. The Argus training staff has implemented a successful process for designing and developing integrated training to sup port complex systems, each with its own operational needs, and adapting it to specific sites.

Wadsworth, M.

1997-06-01T23:59:59.000Z

213

Security analysis of communication system based on the synchronization of different order chaotic systems  

E-Print Network (OSTI)

This work analyzes the security weakness of a recently proposed communication method based on chaotic modulation and masking using synchronization of two chaotic systems with different orders. It is shown that its application to secure communication is unsafe, because it can be broken in two different ways, by high-pass filtering and by reduced order system synchronization, without knowing neither the system parameter values nor the system key.

G. Alvarez; L. Hernandez; J. Munoz; F. Montoya; Shujun Li

2005-06-27T23:59:59.000Z

214

Agentc: Agent-based system for securing maritime transit  

E-Print Network (OSTI)

Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-based traffic management techniques can be used to improve the security of transit through piracy-affected areas. Combining agent-based modeling and simulation of maritime traffic and novel route planning and vessel scheduling techniques, the system shows the promising potential of agent-based methods for increasing maritime security. Real-world data sources Control and presentation interface (Google Earth) Route planning and scheduling Optimum group transit formation Maritime traffic simulation Maritime environment model Randomized transit routing FSM-based vessel behavior models Optimum transit patrolling Inter-agent communication channels

Michal Jakob; Branislav Bošanský; Michal P?chou?ek

2011-01-01T23:59:59.000Z

215

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

216

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project  

SciTech Connect

This is the final report of Phase 2 of the Secure Power Systems Professional project, a 3 phase project. DOE will post to their website upon release.

O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; leo, R.; Perman, K.

2013-08-26T23:59:59.000Z

217

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

218

Security data extraction from IEC 61850 ACSI models for network and system management  

Science Conference Proceedings (OSTI)

The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and sabotage, ... Keywords: IEC 61850, IEC 62351, network and system management, power grid security, smart grid security

Chung-Hyo Kim; Moon-Seok Choi; Seong-Ho Ju; Yong-Hun Lim; Jong-Mock Baek

2011-08-01T23:59:59.000Z

219

SecTTS: A secure track & trace system for RFID-enabled supply chains  

Science Conference Proceedings (OSTI)

Due to the highly sensitive business information communicated within RFID-enabled supply chain networks, there is an urgent need for a secure and effective track & trace system. In this paper, we aim to design and implement a secure track & trace system ... Keywords: EPCglobal network, RFID, Relay policy, Security, Supply chains

Jie Shi; Yingjiu Li; Wei He; Darren Sim

2012-08-01T23:59:59.000Z

220

Circuits of power in creating de jure standards: shaping an international information systems security standard  

Science Conference Proceedings (OSTI)

This paper addresses the role of power and politics in setting standards. It examines the interaction of external contingencies, powerful agents, resources, meaning, and membership of relevant social and institutional groupings in generating successful ... Keywords: information systems security management, information systems security standards, institutionalization, power and politics, security management code of practice

James Backhouse; Carol W. Hsu; Leiser Silva

2006-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Design principles and patterns for computer systems that are simultaneously secure and usable  

E-Print Network (OSTI)

It is widely believed that security and usability are two antagonistic goals in system design. This thesis argues that there are many instances in which security and usability can be synergistically improved by revising ...

Garfinkel, Simson

2005-01-01T23:59:59.000Z

222

A collaborative framework for multi-area dynamic security assessment of large scale systems  

E-Print Network (OSTI)

that our knowledge of power system dynamics and the quality of available dynamic security analysis software- security assessment (load-flow computations) [4]­[10]. But there remain several open questions which have

Wehenkel, Louis

223

Analysis of costs-benefits tradeoffs of complex security systems  

SciTech Connect

Essential to a systems approach to design of security systems is an analysis of the cost effectiveness of alternative designs. While the concept of analysis of costs and benefits is straightforward, implementation can be at the least tedious and, for complex designs and alternatives, can become nearly intractable without the help of structured analysis tools. PACAIT--Performance and Cost Analysis Integrated Tools--is a prototype tool. The performance side of the analysis collates and reduces data from ASSESS, and existing DOE PC-based security systems performance analysis tool. The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. Costs are reported over the full life-cycle of the system, that is, the costs to procure, operate, maintain and retire the system and all of its components. Results are collected in Microsoft{reg_sign} Excel workbooks and are readily available to analysts and decision makers in both tabular and graphical formats and at both the system and path-element levels.

Hicks, M.J. [Sandia National Labs., Albuquerque, NM (United States). Security Systems Analysis and Development Dept.

1996-12-31T23:59:59.000Z

224

Capacity Utilization Study for Aviation Security Cargo Inspection Queuing System  

SciTech Connect

In this paper, we conduct performance evaluation study for an aviation security cargo inspection queuing system for material flow and accountability. The queuing model employed in our study is based on discrete-event simulation and processes various types of cargo simultaneously. Onsite measurements are collected in an airport facility to validate the queuing model. The overall performance of the aviation security cargo inspection system is computed, analyzed, and optimized for the different system dynamics. Various performance measures are considered such as system capacity, residual capacity, throughput, capacity utilization, subscribed capacity utilization, resources capacity utilization, subscribed resources capacity utilization, and number of cargo pieces (or pallets) in the different queues. These metrics are performance indicators of the system s ability to service current needs and response capacity to additional requests. We studied and analyzed different scenarios by changing various model parameters such as number of pieces per pallet, number of TSA inspectors and ATS personnel, number of forklifts, number of explosives trace detection (ETD) and explosives detection system (EDS) inspection machines, inspection modality distribution, alarm rate, and cargo closeout time. The increased physical understanding resulting from execution of the queuing model utilizing these vetted performance measures should reduce the overall cost and shipping delays associated with new inspection requirements.

Allgood, Glenn O [ORNL; Olama, Mohammed M [ORNL; Lake, Joe E [ORNL; Brumback, Daryl L [ORNL

2010-01-01T23:59:59.000Z

225

Control Systems Security Publications Library | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications Library Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require Adobe Acrobat Reader. You can download a free copy of the Reader by visiting Adobe.) VULNERABILITY REPORTS PERIODICAL ARTICLES ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION DOE NSTB PROGRAM PLANNING AND RESOURCE DOCUMENTS PROJECT FACT SHEETS TRAINING MATERIALS AND RECOMMENDED PRACTICES ASSESSMENT AND TECHNICAL PUBLICATIONS SANDIA NATIONAL LABORATORIES REPORTS FOR NSTB PACIFIC NORTHWEST NATIONAL LABORATORY REPORTS FOR NSTB IDAHO NATIONAL LABORATORY REPORTS FOR NSTB FEDERAL GUIDANCE AND POLICY DOCUMENTS VULNERABILITY REPORTS INL Common Vulnerabilities Report - 2008 NERC Top 10 Vulnerabilities of Control Systems and Their Associated

226

Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)  

Science Conference Proceedings (OSTI)

In earlier work we presented a metric that quantifies system security in terms of the average loss per unit of time incurred by a stakeholder of the system as a result of security threats. The computational infrastructure of this metric involves system ... Keywords: cyber security metrics, information security, risk management

Robert K. Abercrombie; Frederick T. Sheldon; Katie R. Hauser; Margaret W. Lantz; Ali Mili

2013-01-01T23:59:59.000Z

227

Smartgrid supervisory control and data acquisition (SCADA) system security issues and counter measures.  

E-Print Network (OSTI)

??This project discusses security issues, countermeasures and research issues in the Supervisory Control And Data Acquisition (SCADA) system. SCADA system is used in power sector… (more)

Sunku Ravindranath, Raksha

2010-01-01T23:59:59.000Z

228

A privilege management system for a secure network  

Science Conference Proceedings (OSTI)

Modern research projects may involve dozens of geographically distributed collaborators who access distributed information, applications workstations and devices. We are developing an architecture and methods for distributed, decentralized privilege ... Keywords: CEBAF, Chinese Institute of High Energy Physics, Continuous Electron Beam Accelerator Facility, DICCE project, Distributed Informatics Computing and Collaborative Environments project, ESnet, Internet, Old Dominion University, US Department of Energy's Energy Science Network, World Wide Web based interfaces, X-windows, authentication, authorisation, authorization, computer network management, design, distributed computing environment networks, distributed information, implementation, network interfaces, privilege management system, secure network

K. J. Maly; A. Gupta; B. Kvande; I. B. Levinstein; R. Mukkamala; M. Olson; R. Whitney; R. Chambers

1996-06-01T23:59:59.000Z

229

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Conference Proceedings (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

230

ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains  

Science Conference Proceedings (OSTI)

In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently ... Keywords: decentralized access control, identity privacy, location privacy, mobile privacy, wireless security

Jiejun Kong; Shirshanka Das; Edward Tsai; Mario Gerla

2003-09-01T23:59:59.000Z

231

Improved security for commercial container transports using an innovative active RFID system  

Science Conference Proceedings (OSTI)

The huge number of containers daily involved in the global transportation system opens important logistic and security issues. The matter of improving the management of goods in the harbor and the serious vulnerability problem of containers are relevant ... Keywords: Electronic seals, RFID technology, Secure supply chain, Secure transport, Wireless communications

Francesco Rizzo; Marcello Barboni; Lorenzo Faggion; Graziano Azzalin; Marco Sironi

2011-05-01T23:59:59.000Z

232

Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

233

Report on emergency electrical power supply systems for nuclear fuel cycle and reactor facilities security systems  

SciTech Connect

The report includes information that will be useful to those responsible for the planning, design and implementation of emergency electric power systems for physical security and special nuclear materials accountability systems. Basic considerations for establishing the system requirements for emergency electric power for security and accountability operations are presented. Methods of supplying emergency power that are available at present and methods predicted to be available in the future are discussed. The characteristics of capacity, cost, safety, reliability and environmental and physical facility considerations of emergency electric power techniques are presented. The report includes basic considerations for the development of a system concept and the preparation of a detailed system design.

1977-01-01T23:59:59.000Z

234

National SCADA Test Bed Enhancing control systems security in the energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed Enhancing control systems security in the energy sector More Documents & Publications NSTB Summarizes Vulnerable Areas Transmission and Distribution World March 2007: DOE Focuses on Cyber

235

Agent Tcl: A flexible and secure mobile-agent system  

E-Print Network (OSTI)

An information agent manages all or a portion of a user's information space. The electronic resources in this space are often distributed across a network and can contain tremendous quantities of data. Mobile agents provide efficient access to such resources and are a powerful tool for implementing information agents. A mobile agent is an autonomous program that can migrate from machine to machine in a heterogeneous network. By migrating to the location of a resource, the agent can access the resource efficiently even if network conditions are poor or the resource has a low-level interface. Telescript is the best-known mobile-agent system. Telescript, however, requires the programmer to learn and work with a complex object-oriented language and a complex security model. Agent Tcl, on the other hand, is a simple, flexible, and secure system that is based on the Tcl scripting language and the Safe Tcl extension. In this paper we describe the architecture of Agent Tcl and its current implementation.

Robert S. Gray

1996-01-01T23:59:59.000Z

236

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... JOINT TASK FORCE TRANSFORMATION INITIATIVE ... aspects of information security (ie, technical ... physical, personnel, cyber-physical); and 4. Is ...

2013-05-09T23:59:59.000Z

237

New Tools to Help Configure Secure Operating Systems  

Science Conference Proceedings (OSTI)

... assist federal agencies in complying with computer security requirements mandated by the government's Office of Management and Budget (OMB). ...

2013-07-08T23:59:59.000Z

238

ITL Bulletin Security Of Bluetooth Systems And Devices ...  

Science Conference Proceedings (OSTI)

... hopping spread spectrum (FHSS) technology for transmissions. ... but provides for minimal transmission security. ... for radio link power control, which ...

2013-04-16T23:59:59.000Z

239

Secure Data Center (Fact Sheet), Energy Systems Integration Facility...  

NLE Websites -- All DOE Office Websites (Extended Search)

engineering. Partners at the ESIF's Secure Data Center include: * Government agencies * Vehicle manufacturers * Transit agencies * Hydrogen suppliers * Fuel cell developers *...

240

A Summary of Control System Security Standards Activities in the Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Summary of Control System Security Standards Activities in the A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of several of the sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the Energy Sector.pdf More Documents & Publications

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Analysis of Secure Mobile Grid Systems: A systematic approach  

Science Conference Proceedings (OSTI)

Developing software through systematic processes is becoming more and more important due to the growing complexity of software development. It is important that the development process used integrates security aspects from the first stages at the same ... Keywords: Requirements Analysis, Reusable use cases, Secure mobile Grid development, Security

David G. Rosado; Eduardo Fernández-Medina; Javier López; Mario Piattini

2010-05-01T23:59:59.000Z

242

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

243

T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity networking solution.

244

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporation’s Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

245

The investigation of the structural properties of machines for the design of secure and trustworthy systems  

Science Conference Proceedings (OSTI)

In this paper, we investigate the problem of designing secure and trustworthy systems based on the notion of attack space. In particular, we consider the study of structural properties of a system at a design or architectural level. This preliminary ... Keywords: attack space, design for trustworthiness, secure systems, structure theory

Edward Jung; Chih-Cheng Hung; Guangzhi Ma; Seonho Choi

2011-11-01T23:59:59.000Z

246

Hardware-assisted security enhanced Linux in embedded systems: a proposal  

Science Conference Proceedings (OSTI)

As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. This is especially true for embedded systems, often operating in non-secure environments, ... Keywords: SELinux, access controls, embedded systems

Leandro Fiorin; Alberto Ferrante; Konstantinos Padarnitsas; Stefano Carucci

2010-10-01T23:59:59.000Z

247

'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State  

Science Conference Proceedings (OSTI)

This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

Miles McQueen; Annarita Giani

2011-09-01T23:59:59.000Z

248

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

249

Activities to Secure Control Systems in the Energy Sector  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

sector sector NSTB November 2008 Hank Kenchington - Program Manager Office of Electricity of Delivery and Energy Reliability U.S. Department of Energy Activities to Secure Control Systems in the Energy Sector * 2,000,000 Miles of Oil Pipelines * 1,300,000 Miles of Gas Pipelines * 2,000 Petroleum Terminals * ~1,000,000 Wells * Extensive Ports, Refineries, Transportation, and LNG Facilities * 160,000 Miles of Electrical Transmission lines * ~17,000 Generators; 985,000 Megawatts (net summer capacity) * Over 3,100 Electric Utilities, with 131 million customers Refinery Locations, Crude and Product Pipelines Source: Energy Information Administration, Office of Oil & Gas LNG Import Facilities (Reactivation underway) Legend Interstate Pipelines Intrastate and Other Pipelines

250

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53 53 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman August 2013 PNNL- 22653 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members August 2013 Prepared by: Pacific Northwest National Laboratory and

251

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

252

List of Major Information Systems,National Nuclear Security Administra...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

253

ITL Bulletin Information Security in the System Development ...  

Science Conference Proceedings (OSTI)

... 800-17) c. CC product reevaluation (Additional References: CC) d. Assessment ... Security into the Capital Planning and Investment Control Process ...

2012-04-05T23:59:59.000Z

254

Final Version of Industrial Control Systems Security Guide ...  

Science Conference Proceedings (OSTI)

... Stouffer recommends using the new guide along with Guidelines for Smart Grid Cyber Security (NISTIR 7628), which NIST issued last September ...

2011-06-21T23:59:59.000Z

255

Information Retrieval and Web Search Amy N. Langville  

E-Print Network (OSTI)

Information Retrieval and Web Search Amy N. Langville Carl D. Meyer January, 2006 Information retrieval is the process of searching within a document collection for information most relevant to a user and Web collections. Traditional information retrieval is search within small, controlled, nonlinked

Kunkle, Tom

256

AMI&SMARTMETERING 48 METERING INTERNATIONAL ISSUE 1 2010  

E-Print Network (OSTI)

AMI&SMARTMETERING 48 METERING INTERNATIONAL ISSUE 1 2010 T he regulation ­ which was visionary this efficiency is not obtained overnight. The current metering technology for end consumers does not allow promoting a more efficient level of consumption. The introduction of new metering technology, widely used

Catholic University of Chile (Universidad CatĂłlica de Chile)

257

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

258

Design and Simulation of a Four-channel Security System of Rocket Fuze  

Science Conference Proceedings (OSTI)

The light armored equipment has been widely used in modern wars, but it is vulnerable to be destroyed by the incoming projectile, so its battlefield survivability can not be guaranteed. In this paper, a four-channel security system has been designed ... Keywords: rocket fuse, security system, multi-point detonation, directional detonation

Shao-Jie Ma; Hao Qin; He Zhang; Hui Li

2010-06-01T23:59:59.000Z

259

Secure virtual architecture: a safe execution environment for commodity operating systems  

Science Conference Proceedings (OSTI)

This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach, which we call Secure Virtual Architecture (SVA), defines ... Keywords: compiler, memory safety, operating systems, security, type safety, typed assembly language, virtual machine

John Criswell; Andrew Lenharth; Dinakar Dhurjati; Vikram Adve

2007-10-01T23:59:59.000Z

260

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems  

Science Conference Proceedings (OSTI)

In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, ... Keywords: Information confinement, Privacy, Probabilistic algorithm, RFID systems, Security

Roberto Di Pietro; Refik Molva

2011-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Development & expansion of an industrial control system security laboratory and an international research collaboration  

Science Conference Proceedings (OSTI)

In this paper, we describe the incremental building of a unique industrial control system laboratory designed to investigate security vulnerabilities and to support development of mitigating tools and techniques. The laboratory has been built over time ... Keywords: SCADA, critical infrastructure security, industrial control systems, test bed

Rayford B. Vaughn; Thomas Morris; Elena Sitnikova

2013-01-01T23:59:59.000Z

262

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

263

Effect of imperfect Faraday mirrors on security of a Faraday-Michelson quantum cryptography system  

E-Print Network (OSTI)

The one-way Faraday-Michelson system is a very useful practical quantum cryptography system where Faraday mirrors(FMs) play an important role. In this paper we analyze the security of this system against imperfect FMs. We consider the security loophole caused by the imperfect FMs in Alice's and Bob's security zones. Then we implement a passive Faraday mirror attack in this system. By changing the values of the imperfection parameters of Alice's FMs, we calculate the quantum bit error rate between Alice and Bob induced by Eve and the probability that Eve obtains outcomes successfully. It is shown that the imperfection of one of Alice's two FMs makes the system sensitive to the attack. At last we give a modified key rate as a function of the Faraday mirror imperfections. The security analysis indicates that both Alice's and Bob's imperfect FMs can compromise the secure key.

Wang Weilong; Gao Ming; Ma Zhi

2013-10-29T23:59:59.000Z

264

Power System Dynamic Security Analysis Using Artificial Intelligence Systems: Phase 1 -- Feasibility Evaluation  

Science Conference Proceedings (OSTI)

On-line transient stability analysis, using actual system conditions, will allow more realistic stability limits. The result will be improved economy through increased transfers across the transmission grid. This feasibility evaluation explores ways of using artificial intelligence and other techniques to solve the computational problems associated with dynamic security analysis.

1994-04-26T23:59:59.000Z

265

A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis  

Science Conference Proceedings (OSTI)

With the increasing organizational dependence on information systems, information systems security has become a very critical issue in enterprise risk management. In information systems, security risks are caused by various interrelated internal and ... Keywords: Ant colony optimization, Bayesian networks, Information systems, Security risk, Vulnerability propagation

Nan Feng, Harry Jiannan Wang, Minqiang Li

2014-01-01T23:59:59.000Z

266

Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems  

SciTech Connect

Portable implantable medical device systems are playing a larger role in modern health care. Increasing attention is now being given to the wireless control interface of these systems. Our position is that wireless security in portable implantable medical device systems is just a part of the overall system security, and increased attention is needed to address low-tech security issues.

Paul, Nathanael R [ORNL; Kohno, Tadayoshi [University of Washington, Seattle

2012-01-01T23:59:59.000Z

267

Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Executive Summary Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy: Executive Summary

268

Roadmap to Secure Control Systems in the Energy Sector - 2006 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- 2006 - 2006 Roadmap to Secure Control Systems in the Energy Sector - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy Sector More Documents & Publications

269

Improving Security of Oil Pipeline SCADA Systems Using Service-Oriented Architectures  

Science Conference Proceedings (OSTI)

Oil pipeline Supervisory Control and Data Acquisition (SCADA) systems monitor and help control pipes transporting both crude and refined petroleum products. Typical SCADA system architectures focus on centralized data collection and control --- however, ... Keywords: SCADA, architecture, petroleum, pipeline, security, services

Nary Subramanian

2008-11-01T23:59:59.000Z

270

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems ?  

E-Print Network (OSTI)

We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide the necessary security within timing constraints; the previous solution that does provide the necessary security is not BITW. At a comparable hardware cost, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency. A microcontroller prototype of our

Patrick P. Tsang; Sean W. Smith

2007-01-01T23:59:59.000Z

271

CyberPhysical System Security for the Electric Power Grid  

E-Print Network (OSTI)

on the vulnerabil- ity of SCADA protocols. Security venues such as DEFCON, Blackhat, and RSA have recently included implementation vulnerabilities that allow attack- ers to execute arbitrary code in specific SCADA protocols

Manimaran, Govindarasu

272

Cyber Security Solutions for Instrumentation and Control Systems  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection standards requirements of the North American Electric Reliability Corporation and related requirements in the international community. Compliance with ...

2012-12-12T23:59:59.000Z

273

A method for modeling and quantifying the security attributes of intrusion tolerant systems  

Science Conference Proceedings (OSTI)

Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, ... Keywords: MTTSF, QoS, intrusion tolerance, security attributes, semi Markov model

Bharat B. Madan; Katerina Goševa-Popstojanova; Kalyanaraman Vaidyanathan; Kishor S. Trivedi

2004-03-01T23:59:59.000Z

274

Evaluation of power system security and development of transmission pricing method  

E-Print Network (OSTI)

The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed 1) The description of probabilistic methods for power system security assessment 2) The computation time of simulation methods 3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.

Kim, Hyungchul

2003-08-01T23:59:59.000Z

275

Technical Guideline for Cyber Security Requirements and Life Cycle Implementation Guidelines for Nuclear Plant Digital Systems  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This EPRI guideline document provides technical guidance for addressing c...

2010-10-29T23:59:59.000Z

276

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

277

Risk assessment of climate systems for national security.  

SciTech Connect

Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing [University of Illinois-Urbana; Conrad, Stephen Hamilton; Constantine, Paul [Stanford University; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael [National Center for Atmospheric Research; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

2012-10-01T23:59:59.000Z

278

A cyber-physical experimentation environment for the security analysis of networked industrial control systems  

Science Conference Proceedings (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these ...

BéLa Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-09-01T23:59:59.000Z

279

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41 41 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman July 2013 PNNL- 22641 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members July, 2013 Prepared by: Pacific Northwest National Laboratory and NBISE Secure Power Systems Professional Project Team This document is a summarization of the report, Developing Secure Power Systems

280

A privacy expectations and security assurance offer system  

Science Conference Proceedings (OSTI)

Consumers accessing web sites for information or to purchase products face limited opportunity to express their privacy preferences, and even less recourse if security violations lead to inadvertent disclosure of privacy sensitive information. A privacy ... Keywords: e-commerce, incentives, insurance, privacy

Jeffrey Hunker

2008-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

282

Network and System Management for Reliability and Cyber Security  

Science Conference Proceedings (OSTI)

The evolving control of the electric power grid is increasingly dependent on information technology and telecommunication infrastructures, which, like the grid itself, must be managed in a holistic way to ensure reliability and security. The management of this information infrastructure requires connectivity and analytics to support both information technology (IT) and operational technology (OT) assets in a unified manner.This project utilized a telecommunications modeled network ...

2012-11-28T23:59:59.000Z

283

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

284

Security of the Europena Electricity Systems: Conceptualizing the ssessment Criteria and Core Indicators  

E-Print Network (OSTI)

.,  2006).  It  is  generally  believed  that  greater  diversity  enhances  the  robustness  of  an  electricity  system  to  fossil  fuel  supply  shocks  generating economic and security of supply benefits while also promoting network  resilience...  availability of  energy  sources  (Winzer, 2012;  Jamasb and Pollitt,  2008). This implies that security of supply has traditionally come to be defined in  terms of fuel availability or network reliability. However, there are also emerging  concerns with regards to...

Jamasb, Tooraj Nepal, Rabindra

2012-12-10T23:59:59.000Z

285

Verification of initial-state opacity in security applications of discrete event systems  

Science Conference Proceedings (OSTI)

In this paper, we formulate and analyze methodologies for verifying the notion of initial-state opacity in discrete event systems that are modeled as non-deterministic finite automata with partial observation on their transitions. A system is initial-state ... Keywords: Discrete event system, Formal methods in security analysis, Initial state estimation, Initial state estimator, Tracking in sensor network

Anooshiravan Saboori, Christoforos N. Hadjicostis

2013-10-01T23:59:59.000Z

286

AMI Communication Requirements to Implement Demand-Response: Applicability of Hybrid Spread Spectrum Wireless  

Science Conference Proceedings (OSTI)

While holistically defining the smart grid is a challenge, one area of interest is demand-response. In 2009, the Department of Energy announced over $4 billion in grant and project funding for the Smart Grid. A significant amount of this funding was allotted to utilities for cost sharing projects to deploy Smart Grid technologies, many of whom have deployed and are deploying advanced metering infrastructure (AMI). AMI is an enabler to increase the efficiency of utilities and the bulk power grid. The bulk electrical system is unique in that it produces electricity as it is consumed. Most other industries have a delay between generation and consumption. This aspect of the power grid means that there must be enough generation capacity to meet the highest demand whereas other industries could over produce during off-peak times. This requires significant investment in generation capacity to cover the few days a year of peak consumption. Since bulk electrical storage doesn't yet exist at scale another way to curb the need for new peak period generation is through demand-response; that is to incentivize consumers (demand) to curtail (respond) electrical usage during peak periods. Of the various methods proposed for enabling demand-response, this paper will focus on the communication requirements for creating an energy market using transactional controls. More specifically, the paper will focus on the communication requirements needed to send the peak period notices and receive the response back from the consumers.

Hadley, Mark D.; Clements, Samuel L.; Carroll, Thomas E.

2011-09-30T23:59:59.000Z

287

Symposium on the Nature of Science?George Lisensky, Amy Payne...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nanotechnology into the Curriculum George Lisensky, Amy Payne, and Cynthia Widstrand "Nano-" means a thousandth of a thousandth of a thousandth. Nanotechnology involves the...

288

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

289

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

290

Data acquisition and monitoring system for Los Alamos National Security and Resources Study Center  

DOE Green Energy (OSTI)

The National Security and Resources Study Center, a modern, three level building containing 5574 m/sup 2/ of temperature controlled space and an integral solar energy heating and cooling system is in operation at Los Alamos, New Mexico. The instrumentation system used to measure the energy production (solar energy system) and consumption (HVAC system) in all the building operating modes is described. Included are descriptions of the sensors (temperature, mass flow, power, etc.) and the data acquisition system.

Trump, M.A.

1978-01-01T23:59:59.000Z

291

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

292

Secure distribution of events in content-based publish subscribe systems  

Science Conference Proceedings (OSTI)

Content-based publish-subscribe systems are an emerging paradigm for building a range of distributed applications. A specific problem in content-based systems is the secure distribution of events to clients subscribing to those events. In content-based ...

Lukasz Opyrchal; Atul Prakash

2001-08-01T23:59:59.000Z

293

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

294

The Mobil Integrated C{sup 3} (command control and communications) and Security System  

SciTech Connect

The current political and economic situations suggest that significant reductions of nuclear forces outside the US will continue. This implies that in times of crisis the rapid deployment of nuclear weapons into a theater may be required. This paper describes a proposed Mobile Integrated C{sup 3} and Security System (MICSS). The MICSS, together with associated personnel, could satisfy the command and control and security requirements of a deployed nuclear operation. Rapid deployment poses unique nuclear weapon surety difficulties that must be overcome for the operation to be effective and survivable. The MICSS must be portable, reliable, limited in size, and easily emplaced to facilitate movement, reduce the possibility of detection, and minimize manpower requirements. The MICSS will be based on existing technology. Sandia has designed prototype mobile command centers for the military. These command centers are based on an approach that stresses modularity, standards, and the use of an open architecture. Radio, telephone, satellite communications, communication security, and global positioning system equipment has been successfully integrated into the command centers. Sandia is also supporting the development of portable security systems for the military. These systems are rapidly deployable and mission flexible and are capable of intrusion detection, area and alarm display, night assessment, and wireless sensor communications. This paper is organized as follows: Background information about the prototype mobile command centers will be presented first. Background information about portable security systems concepts will then be given. Next, an integrated communications and security system will be presented, and finally, the design and status of a prototype MICSS will be described.

Eras, A.; Brown, R.D.

1993-06-15T23:59:59.000Z

295

AMIS (Smart Grid Project) (Traun, Austria) | Open Energy Information  

Open Energy Info (EERE)

Traun, Austria) Traun, Austria) Jump to: navigation, search Project Name AMIS Country Austria Headquarters Location Traun, Austria Coordinates 48.226349°, 14.23442° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":48.226349,"lon":14.23442,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

296

AMI (Smart Grid Project) (Poland) | Open Energy Information  

Open Energy Info (EERE)

Poland) Poland) Jump to: navigation, search Project Name AMI Country Poland Coordinates 51.919437°, 19.145136° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":51.919437,"lon":19.145136,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

297

Microsoft Word - OE AMI-SEC Requirements Document.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

expanding domain. "As our nation's utilities quickly work to implement innovative Smart Grid technologies, it is critical that we work together to ensure cyber security is built in...

298

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

299

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

300

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

A VECTOR ENERGY FUNCTION APPROACH FOR SECURITY ANALYSIS OF AC/DC SYSTEMS  

E-Print Network (OSTI)

This paper examines dynamic behavior in system models that reflect reasonably detailed (third order) HVDC dynamics along with ac system models that include reactive flows, and frequency and voltage dependent load models. A vector Lyapunov function approach is employed to define a system wide energy function that can be used for general security analysis. The paper describes the derivation of individual component Lyapunov functions for simplified models of HVDC links connected to "infinitely strong" ac systems, along with a standard ac only system Lyapunov function. A novel method of obtaining weighting coefficients to sum these components for the overall system energy function is proposed. Use of the new energy function for transient stability and security analysis is illustrated in a test system.

Christopher L. DeMarco; Claudio A. Cańizares

1992-01-01T23:59:59.000Z

302

DOE/CX-00007 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07 07 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM (PROJECT S-221) HANFORD SITE, RICHLAND, WASHINGTON PROPOSED ACTION The U.S. Department of Energy (DOE) proposes to install six wooden utility poles to support the safeguards and security enhanced assessment system. LOCATION OF ACTION The locations of the proposed action are generally within and around 200 East Area of the Hanford Site. The specific locations cannot be disclosed due to their safeguards and security related nature, and the locations have been designated Official Use Only. It is the policy of the DOE to make records available to the public to the greatest extent possible, in keeping with the spirit of the Freedom of Information Act (FOIA), while at the same time

303

S-Security Protective Force and Systems Services for the Nevada Site  

NLE Websites -- All DOE Office Websites (Extended Search)

S-Security Protective Force and Systems Services for the Nevada Site S-Security Protective Force and Systems Services for the Nevada Site Office Solicitation Number: DE-SOL-0002014 Agency: Department of Energy Office: Federal Locations Location: All DOE Federal Contracting Offices Notice Type: Modification/Amendment Original Posted Date: June 22, 2010 Posted Date: June 13, 2011 Response Date: Jul 13, 2011 5:00 pm Mountain Original Response Date: July 7, 2010 Archiving Policy: Manual Archive Original Archive Date: August 6, 2010 Archive Date: - Original Set Aside: N/A Set Aside: N/A Classification Code: S -- Utilities and housekeeping services NAICS Code: 561 -- Administrative and Support Services/561612 -- Security Guards and Patrol Services Solicitation Number: DE-SOL-0002014 Notice Type:

304

Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security  

E-Print Network (OSTI)

Approved for public release; distribution is unlimited. Lexington Massachusetts This page intentionally left blank. EXECUTIVE SUMMARY Concern about energy security on domestic Department of Defense installations has led to the possibility of using natural gas-fired electricity generators to provide power in the event of electric grid failures. As natural gas is an increasingly base-load fuel for electricity generation in the United States, the electricity generation system has become increasingly dependent on the operation of the natural gas system. However, as the natural gas system is also partly dependent on electricity for its ability to deliver natural gas from the well-head to the consumer, the question arises of whether, in the event of an electric grid failure, the natural gas would continue to flow. As the natural gas transmission system largely uses natural gas from the pipelines as a source of power, once the gas has been extracted from the ground, the system is less dependent on the electric grid. However, some of the drilling rigs, processing units, and pipeline compressors do depend on electric power, making the vulnerability to the system to a disruption in the national electricity supply network vary depending on the cause, breadth, and geographic location of the disruption. This is due to the large numbers of players in the natural gas production and

N. Judson; N. Judson

2013-01-01T23:59:59.000Z

305

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

306

Access Rate Control System | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support...

307

Cyber-Physical Systems Security for the Smart Grid  

Science Conference Proceedings (OSTI)

... Untrusted input Smart Grid Function ... Smart meter, control data Load balancing ... System (FACTS) Transmission/Distribution Automation

2012-05-05T23:59:59.000Z

308

Machine-to-Machine Communications and Security Solution in Cellular Systems  

Science Conference Proceedings (OSTI)

This paper introduces an efficient machine-to-machine M2M communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage ... Keywords: 4G Network, Ad Hoc, Machine-To-Machine, Security, Terminals

Mahdy Saedy; Vahideh Mojtahed

2011-04-01T23:59:59.000Z

309

North American Electricity Infrastructure: System Security, Quality, Reliability, Availability, and Efficiency  

E-Print Network (OSTI)

1 North American Electricity Infrastructure: System Security, Quality, Reliability, Availability for reliable and disturbance-free electricity. The massive power outages in the United States, Canada, UK and Italy in 2003 underscored electricity infrastructure's vulnerabilities [1-11]. This vital yet complex

Amin, S. Massoud

310

Industrial Control System Security and NIST SP 800-53 ...  

Science Conference Proceedings (OSTI)

... Automation and Control Systems • Leaders: – Johan Nye - ExxonMobil, Kevin Staggs - Honeywell: Co-chairs – Dennis Holstein: Editor Page 54. 54 ...

2008-07-16T23:59:59.000Z

311

PIA - Security Clearance Work Tracking and Budget System | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office Occupational Injury & Illness System (01&15) PIA, Idaho National Laboratory TRAIN-PIA.pdf...

312

Security Metricsfor Process Control Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics...

313

Control Systems Cyber Security: Defense in Depth Strategies ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and direction for developing 'defense-in-depth' strategies for organizations that use control system networks while maintaining a multi-tier information architecture. Control...

314

Cyber-Physical Systems Security for the Smart Grid  

Science Conference Proceedings (OSTI)

... D. Transmission Automation ... or reputation manage ment systems for smart grid applications where ... the topology of the power distribution network to ...

2012-04-05T23:59:59.000Z

315

Abstract--Distribution factors play a key role in many system security analysis and market applications. The injection shift  

E-Print Network (OSTI)

1 Abstract-- Distribution factors play a key role in many system security analysis and market of the other distribution factors. The line outage distribution factors (LODFs) may be computed using the ISFs distribution factors, line outage distribution factors, multiple-line outages, system security. I. INTRODUCTION

316

A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?  

E-Print Network (OSTI)

A growing number of security applications are being developed and deployed to explicitly reduce risk from adversaries ’ actions. However, there are many challenges when attempting to evaluate such systems, both in the lab and in the real world. Traditional evaluations used by computer scientists, such as runtime analysis and optimality proofs, may be largely irrelevant. The primary contribution of this paper is to provide a preliminary framework which can guide the evaluation of such systems and to apply the framework to the evaluation of ARMOR (a system deployed at LAX since August 2007). This framework helps to determine what evaluations could, and should, be run in order to measure a system’s overall utility. A secondary contribution of this paper is to help familiarize our community with some of the difficulties inherent in evaluating deployed applications, focusing on those in security domains. Povzetek: Kako ovrednotiti varnostne aplikacije, kot recimo sistem ARMOR, ki je od 2007 dalje v uporabi na LAX?

Matthew E. Taylor; Christopher Kiekintveld; Craig Western; Milind Tambe

2009-01-01T23:59:59.000Z

317

Integration of a security type system into a program logic  

Science Conference Proceedings (OSTI)

Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal software analyses. In this paper we show that a flow-sensitive type system ensuring non-interference in a simple while language can be expressed through ...

Reiner Hähnle; Jing Pan; Philipp Rümmer; Dennis Walter

2006-11-01T23:59:59.000Z

318

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements  

SciTech Connect

Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

Ondrej Linda; Milos Manic; Miles McQueen

2012-09-01T23:59:59.000Z

319

Privacy Act System Notices | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

on himher; how an individual can access or amend the record; and the categories of sources of records in the system. The Act requires an agency to publish notice of a proposed...

320

Space Systems: Principal Associate Directorate for Global Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Eric Dors Program Managers Roger Petrin Marc Kippen Tom Vestrand Jared Dreicer Mark Dunham Administrator Patti Remelius Phone: 1-505-667-6722 Fax: 1-505-667-7442 Space Systems For...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

322

GnatDb: a small-footprint, secure database system  

Science Conference Proceedings (OSTI)

This paper describes GnatDb, which is an embedded database system that provides protection against both accidental and malicious corruption of data. GnatDb is designed to run on a wide range of appliances, some of which have very limited resources. Therefore, ...

Radek Vingralek

2002-08-01T23:59:59.000Z

323

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

324

Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge  

Science Conference Proceedings (OSTI)

The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

Ondrej Linda; Todd Vollmer; Milos Manic

2012-08-01T23:59:59.000Z

325

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

326

Security assessment of power systems including energy storage. Progress report, July 1, 1978--September 30, 1978  

DOE Green Energy (OSTI)

Progress in assessing the security of power systems is reviewed. Further evaluation has been performed on the previously developed simplified model of the current-fed force-commutated converter (CFFCC). Validation studies were performed using the CFFCC as a control interface between a one-machine, three-bus power system equivalent and a superconducting magnetic energy storage device. The highlights of this investigation are reported. The identification of power system electromechanical models from systems measurements, with only normal load variation as a disturbing input, is being studied. A maximum liklihood estimation procedure has been partly developed. The procedure uses auto correlation information as an input rather than the observed time series.

Carroll, D.P.; Triezenberg, D.M.

1978-10-01T23:59:59.000Z

327

GnatDb: A Small-Footprint, Secure Database System  

E-Print Network (OSTI)

This paper describes GnatDb, which is an embedded database system that provides protection against both accidental and malicious corruption of data. GnatDb is designed to run on a wide range of appliances, some of which have very limited resources. Therefore, its design is heavily driven by the need to reduce resource consumption. GnatDb employs atomic and durable updates to protect the data against accidental corruption. It prevents malicious corruption of the data using standard cryptographic techniques that leverage the underlying log-structured storage model. We show that the total memory consumption of GnatDb, which includes the code footprint, the stack and the heap, does not exceed 11 KB, while its performance on a typical appliance platform remains at an acceptable level.

Radek Vingralek

2002-01-01T23:59:59.000Z

328

A Security Study of Digital TV Distribution Systems  

E-Print Network (OSTI)

1 This Thesis corresponds to 20 weeks of full-time work for the authors. For digital TV distribution, the current predominant business model is vertical. That is, TV operators and end users are locked to some certain proprietary conditional access (CA) systems, CA vendors control set-top-box manufacturers with their proprietary technology, and subscribers can achieve new services at the cost of changing STBs. Thus the horizontal business model is required to enable the open and competing market for any TV operator, and the attractive services for subscribers. The SSNF 2 is making efforts on providing households high quality TV services over the urban networks, where households can freely choose the competing offerings via an open platform. The traditional battleground of TV operators is in broadcast networks; however, the more mature IP technology becomes, TV operators will increase interests in providing services in IP networks. Furthermore, TV operators are aware of the possible additional value from the mobile distribution channel due to the evolution of cellular networks from “pure voice telephony networks to universal data networks ” [67].

Nariman Molavi; Xu Zhao; Copyright Nariman Molavi; Xu Zhao

2005-01-01T23:59:59.000Z

329

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements  

Science Conference Proceedings (OSTI)

This paper proposes a new approach for assessing the organization's vulnerability to information-security breaches. Although much research has been done on qualitative approaches, the literature on numerical approaches to quantify information-security ... Keywords: Information security, Information-security measurement, Risk analysis, Security threats, Vulnerability measurement

Sandip C. Patel; James H. Graham; Patricia A. S. Ralston

2008-12-01T23:59:59.000Z

330

A systems-theoretic security model for large scale, complex systems applied to the US air transportation system  

E-Print Network (OSTI)

Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from ...

Laracy, Joseph R. (Joseph Raymond)

2007-01-01T23:59:59.000Z

331

Towards a Secure and Efficient System for End-to-End Provenance  

E-Print Network (OSTI)

Work on the End-to-End Provenance System (EEPS) began in the late summer of 2009. The EEPS effort seeks to explore the three central questions in provenance systems: (1) “Where and how do I design secure hostlevel provenance collecting instruments (called provenance monitors)?”; (2) “How do I extend completeness and accuracy guarantees to distributed systems and computations?”; and (3) “What are the costs associated with provenance collection? ” This position paper discusses our initial exploration into these issues and posits several challenges to the realization of the EEPS vision.

Patrick Mcdaniel; Kevin Butler; Steve Mclaughlin; Radu Sion; Erez Zadok; Marianne Winslett

2010-01-01T23:59:59.000Z

332

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

333

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

334

Knowledge representation and case-based reasoning in a knowledge management system for ambient intelligence products  

Science Conference Proceedings (OSTI)

The paper presents the theoretical background and realization of a KM system for the technically advanced customer and product support in the Ambient Intelligence (AmI) domain. Current products include more and more elements of AmI. AmI area is still ... Keywords: ambient intelligence, case-based reasoning, customer support system, diagnostics system, knowledge management system, knowledge representation

Ljubisa Urosevic; Sandor Kopacsi; Dragan Stokic; Ana Rita Campos; Geza Bognar

2006-02-01T23:59:59.000Z

335

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

2011-01-01T23:59:59.000Z

336

To appeared in "Securing Transportation Systems, Protecting Critical Infrastructures Series (Book)", 2012 On the Rationality and Optimality of Transportation  

E-Print Network (OSTI)

To appeared in "Securing Transportation Systems, Protecting Critical Infrastructures Series (Book)", 2012 On the Rationality and Optimality of Transportation Networks Defense -- a Network Centrality Eng., Ben-Gurion University {puzis,elovici}@bgu.ac.il 3 Transportation Research Institute, Technion

337

Roadmap to Secure Control Systems in the Energy Sector 2006- Presentation to the 2008 ieRoadmap Workshop  

Energy.gov (U.S. Department of Energy (DOE))

Presentation by Hank Kenchington on the 2006 roadmap to secure control systems in the energy sector at the ieRoadmap Workshop in Chicago, May 28-29, 2008.  

338

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

339

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

340

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

342

Homeland Security Programs/Projects for the Intelligent ...  

Science Conference Proceedings (OSTI)

Homeland Security Programs/Projects for the Intelligent Systems Division. Department of Homeland Security Urban Search ...

2011-12-23T23:59:59.000Z

343

Comprehensive National Cyber Security: Leap-Ahead ...  

Science Conference Proceedings (OSTI)

Comprehensive National Cyber Security: Leap-Ahead Security for Interconnected Systems (+10 FTE, +$5,500,000). Challenge. image: ...

2010-10-05T23:59:59.000Z

344

Security Configuration Checklists for IT Commercial Products  

Science Conference Proceedings (OSTI)

Security Configuration Checklists for Commercial IT Products. ... The use of checklists improves the consistency and predictability of system security. ...

2013-01-15T23:59:59.000Z

345

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

346

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Sánchez; Eduardo Fernández-Medina

2010-06-01T23:59:59.000Z

347

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

348

GAO-07-1036, CRITICAL INFRASTRUCTURE PROTECTION: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Congressional Requesters Congressional Requesters CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain September 2007 GAO-07-1036 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2007 CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain Highlights of GAO-07-1036, a report to congressional requesters Control systems-computer-based systems that monitor and control sensitive processes and physical functions-perform vital functions in many of our nation's critical infrastructures, including electric power, oil and gas, water treatment, and chemical production. The disruption of

349

AMIS (Smart Grid Project) (Vöcklabruck, Austria) | Open Energy Information  

Open Energy Info (EERE)

AMIS (Smart Grid Project) (Vöcklabruck, Austria) AMIS (Smart Grid Project) (Vöcklabruck, Austria) Jump to: navigation, search Project Name AMIS Country Austria Headquarters Location Vöcklabruck, Austria Coordinates 48.003342°, 13.65613° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":48.003342,"lon":13.65613,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

350

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

351

Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned, 1st edition  

Science Conference Proceedings (OSTI)

Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. ...

Milind Tambe

2011-12-01T23:59:59.000Z

352

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

353

Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI  

E-Print Network (OSTI)

Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

Jurjens, Jan

354

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

355

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

356

Research Challenges for the Security of Control Systems Alvaro A. Cardenas Saurabh Amin  

E-Print Network (OSTI)

analysis attacks. · Modbus security issues: A SCADA protocol of note- worthy concern is the Modbus protocol

Sastry, S. Shankar

357

NIST SP 800-81 Revision 1, Secure Domain Name System ...  

Science Conference Proceedings (OSTI)

... guidelines for the cost-effective security ... Key Rollovers (Key Lifetimes)....11-1 ... as a standalone administrative entity ...

2012-02-21T23:59:59.000Z

358

Security Evaluation for Software System with Vulnerability Life Cycle and User Profiles  

Science Conference Proceedings (OSTI)

This paper proposes the definition of a security criterion and security assessment based on the criterion. More precisely, we present a stochastic model with a vulnerability life-cycle model and a user profile using continuous-time Markov chains. The ... Keywords: vulnerability, security evaluation, user profile

Hiroyuki Okamura; Masataka Tokuzane; Tadashi Dohi

2012-11-01T23:59:59.000Z

359

Formal validation of automated policy refinement in the management of network security systems  

Science Conference Proceedings (OSTI)

Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy ... Keywords: Formal validation, Model-based management, Network security, Policy based management, Security policies

Joăo Porto de Albuquerque; Heiko Krumm; Paulo Lício de Geus

2010-04-01T23:59:59.000Z

360

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Intrusion Detection System for Advanced Metering Infrastructure  

Science Conference Proceedings (OSTI)

The deployment of Advanced Metering Infrastructure (AMI) technology significantly increases the attack surface that utilities have to protect. As a result, there is a critical need for efficient monitoring solutions to supplement protective measures and keep the infrastructure secure. This document investigates current industrial and academic efforts to address the challenge of detecting security events across the range of AMI networks and devices. The goal of this study is to help utilities and ...

2012-12-31T23:59:59.000Z

362

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

363

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

364

Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent-Based Systems  

E-Print Network (OSTI)

Although pattern languages have already been proposed for security modelling, such languages mostly employ concepts and notations related to object-oriented systems, and have mainly neglected the agent-oriented paradigm. In this position paper we argue about the need to define a security pattern language applicable to agent-based systems that employs concepts based in the agent-oriented paradigm. In addition, we motivate the need to integrate such a language within the development stages of an agent-oriented methodology, and we briefly discuss what such a language should contain, Keywords: documenting pattern languages, linking requirements to patterns, patterns for secure agent-based systems, integrating patterns with a development methodology, agentoriented software engineering methodologies 1.

Haralambos Mouratidis; Paolo Giorgini; Michael Weiss

2003-01-01T23:59:59.000Z

365

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

366

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

367

Conservation Subdivision Survey Data Collection: Erica Christoph, Kenna Hall, Amy Salley  

E-Print Network (OSTI)

Conservation Subdivision Survey Data Collection: Erica Christoph, Kenna Hall, Amy Salley Data conservation subdivisions in Georgia and prepared a report updating information from a survey completed several years ago. Members compiled a list of developers of conservation subdivisions and telephoned them asking

Radcliffe, David

368

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A – Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

369

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

370

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

371

Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.  

SciTech Connect

Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

2005-12-01T23:59:59.000Z

372

Security Implications of OPC, OLE, DCOM, and RPC in Control Systems  

SciTech Connect

OPC is a collection of software programming standards and interfaces used in the process control industry. It is intended to provide open connectivity and vendor equipment interoperability. The use of OPC technology simplifies the development of control systems that integrate components from multiple vendors and support multiple control protocols. OPC-compliant products are available from most control system vendors, and are widely used in the process control industry. OPC was originally known as OLE for Process Control; the first standards for OPC were based on underlying services in the Microsoft Windows computing environment. These underlying services (OLE [Object Linking and Embedding], DCOM [Distributed Component Object Model], and RPC [Remote Procedure Call]) have been the source of many severe security vulnerabilities. It is not feasible to automatically apply vendor patches and service packs to mitigate these vulnerabilities in a control systems environment. Control systems using the original OPC data access technology can thus inherit the vulnerabilities associated with these services. Current OPC standardization efforts are moving away from the original focus on Microsoft protocols, with a distinct trend toward web-based protocols that are independent of any particular operating system. However, the installed base of OPC equipment consists mainly of legacy implementations of the OLE for Process Control protocols.

2006-01-01T23:59:59.000Z

373

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

374

Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system  

DOE Patents (OSTI)

A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

Chen, Yu-Gene T.

2013-04-16T23:59:59.000Z

375

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

376

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY  

E-Print Network (OSTI)

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

377

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

378

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

379

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

380

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A grid computing based approach for the power system dynamic security assessment  

Science Conference Proceedings (OSTI)

This paper addresses the problem of parallel dynamic security assessment applications from static homogeneous cluster environment to dynamic heterogeneous grid environment. Functional parallelism and data parallelism are supported by each of the message ... Keywords: Adaptive load balancing, Dynamic security assessment, Grid computing, Latency exploitation technique, Modularity

Xingzhi Wang; Zheng Yan; Li Li

2010-05-01T23:59:59.000Z

382

Advanced Metering Infrastructure (AMI) for Distributed Solar (PV) Integration  

Science Conference Proceedings (OSTI)

This report summarizes the findings from a survey on two-way communication with distributed photovoltaic (PV) generation. The survey focused specifically on exploring how advanced metering infrastructure might be used as the communication means for the integration of residential PV systems. This investigation is one of several data-gathering projects in the Electric Power Research Institute’s (EPRI’s) Renewables Integration program (P174). Together, these projects and the data they provide will lay the ...

2009-09-09T23:59:59.000Z

383

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

384

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

385

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

386

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

387

Towards Security Evaluation BASED ON EVIDENCE COLLECTION  

E-Print Network (OSTI)

Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed in this field. Unfortunately, there is no practical approach to carrying out security evaluation in a systematic way. Here we introduce a general-level holistic framework for security evaluation based on security behaviour modelling and security evidence collection, and discuss its applicability to the design of security evaluation experimentation setups in real-world systems.

Reijo Savola

2006-01-01T23:59:59.000Z

388

Model-Based security engineering with UML  

Science Conference Proceedings (OSTI)

Developing security-critical systems is difficult and there are many well-known examples of security weaknesses exploited in practice. Thus a sound methodology supporting secure systems development is urgently needed. Our aim is to aid the difficult ...

Jan Jürjens

2005-01-01T23:59:59.000Z

389

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

390

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

391

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... PIV Implementation, Daniel Wood, Treasury; Electricity Subsector Cybersecurity ... Basic Input/Output System (BIOS) Security - Andrew Regenscheid ...

392

Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada  

SciTech Connect

This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: · CAS 02-26-11, Lead Shot · CAS 02-44-02, Paint Spills and French Drain · CAS 02-59-01, Septic System · CAS 02-60-01, Concrete Drain · CAS 02-60-02, French Drain · CAS 02-60-03, Steam Cleaning Drain · CAS 02-60-04, French Drain · CAS 02-60-05, French Drain · CAS 02-60-06, French Drain · CAS 02-60-07, French Drain · CAS 23-60-01, Mud Trap Drain and Outfall · CAS 23-99-06, Grease Trap · CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: · A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 · The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

NSTec Environmental Restoration

2012-08-15T23:59:59.000Z

393

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

394

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

395

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

396

The AMI Database Project: Atlas Data Challenge Bookkeeping, and the Tag Collector, a new tool for Release Management  

E-Print Network (OSTI)

Many database tools have the same or similar requirements. The Atlas Metadata Interface (AMI) project aims to provide a set of generic tools for managing database applications. AMI has a three-tier architecture with a core that supports a connection to any RDBMS using JDBC and SQL. The middle layer assumes that the databases have an AMI compliant self-describing structure. It provides a generic web interface and a generic command line interface. The top layer contains application specific features. Currently 7 such applications exist. Two of these applications are described. The first, and principal use of AMI, is the Atlas Data Challenge Production Bookkeeping interface. The second application is called Tag Collector, a web tool for release management, has many features which have greatly facilitated Atlas software management.

Solveig Albrand; Johann Collot; Jerome Fulachier

2003-04-23T23:59:59.000Z

397

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

398

A Multi-Agent System's Approach to Communication Security in the Web  

Science Conference Proceedings (OSTI)

This paper presents the Split and Merge method, an approach to provide secure communication over the Internet using software agents. Instead of relying exclusively on the traditional approaches of ciphering the message at the source and then sending ...

Joao Paulo Pimentao; Pedro A. C. Sousa; Pedro Amaral; Adolfo Steiger-Garcao

2004-09-01T23:59:59.000Z

399

High-Fidelity Nuclear Energy System Optimization towards an Environmentally Benign, Sustainable, and Secure Energy Source  

E-Print Network (OSTI)

A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of MCNPX for highfidelity fuel cycle component simulations. The impact associated with energy generation and utilization is immeasurable due to the immense, widespread, and myriad effects it has on the world and its inhabitants. The polar extremes are demonstrated on the one hand, by the high quality of life enjoyed by individuals with access to abundant reliable energy sources, and on the other hand by the global-scale environmental degradation attributed to the affects of energy production and use. Thus, nations strive to increase their energy generation, but are faced with the challenge of doing so with a minimal impact on the environment and in a manner that is self-reliant. Consequently, a revival of interest in nuclear energy has followed with much focus placed on technologies for transmuting nuclear spent fuel. In this dissertation, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The reactor systems include the AP1000, VHTR, and HEST. The diversity in performance and spectral characteristics for each was used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. The High Level Waste (HLW) stream produced by typical nuclear systems was characterized according to the radionuclides that are key contributors to long-term waste management issues. The TRU component of the waste stream becomes the main radiological concern for time periods greater than 300 years. A TRU isotopic assessment was developed and implemented to produce a priority ranking system for the TRU nuclides as related to long-term waste management and their expected characteristics under irradiation in the different reactor systems of the NES. Detailed 3D whole-core models were developed for analysis of the individual reactor systems of the NES. As an inherent part of the process, the models were validated and verified by performing experiment-to-code and/or code-to-code benchmarking procedures, which provided substantiation for obtained data and results. Reactor core physics and material depletion calculations were performed and analyzed. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques. The NES has demonstrated great potential for providing safe, clean, and secure energy and doing so with foreseen advantages over the LEU once-through fuel cycle option. The main advantages exist due to better utilization of natural resources by recycling the used nuclear fuel, and by reducing the final amount and time span for which the resulting HLW must be isolated from the public and the environment due to radiological hazard. If deployed, the NES can substantially reduce the long-term radiological hazard posed by current HLW, extend uranium resources, and approach the characteristics of an environmentally benign energy system.

Ames, David E.

2010-08-01T23:59:59.000Z

400

Cyber Security Solutions for Instrumentation and Control Systems, Topic 2: Patch Management and Automated Change Management  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, have undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection (CIP) standards requirements of the North American Electric Reliability Corporation (NERC) and related requirements in the international ...

2013-04-18T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

402

New NIST Pub Can Help IT Managers Assess Security ...  

Science Conference Proceedings (OSTI)

... the security controls in federal information systems ... with respect to meeting organizational security policies. ... the Departments of Energy, Justice and ...

2011-05-03T23:59:59.000Z

403

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

404

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

405

INL Cyber Security Research | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Research Cyber security research at INL will help protect critical infrastructure control system computers against worms and other viruses. INL Cyber Security Research More...

406

Composite Data Products (CDPs) from the Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF)  

DOE Data Explorer (OSTI)

The Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF) plays a crucial role in NREL's independent, third-party analysis of hydrogen fuel cell technologies in real-world operation. NREL partners submit operational, maintenance, safety, and cost data to the HSDC on a regular basis. NREL's Technology Validation Team uses an internal network of servers, storage, computers, backup systems, and software to efficiently process raw data, complete quarterly analysis, and digest large amounts of time series data for data visualization. While the raw data are secured by NREL to protect commercially sensitive and proprietary information, individualized data analysis results are provided as detailed data products (DDPs) to the partners who supplied the data. Individual system, fleet, and site analysis results are aggregated into public results called composite data products (CDPs) that show the status and progress of the technology without identifying individual companies or revealing proprietary information. These CDPs are available from this NREL website: 1) Hydrogen Fuel Cell Vehicle and Infrastructure Learning Demonstration; 2) Early Fuel Cell Market Demonstrations; 3) Fuel Cell Technology Status [copied with editing from http://www.nrel.gov/hydrogen/facilities_secure_data_center.html].

407

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

408

Security metrics for source code structures  

Science Conference Proceedings (OSTI)

Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectives of a software system have not ... Keywords: code quality and security., metrics, security metrics

Istehad Chowdhury; Brian Chan; Mohammad Zulkernine

2008-05-01T23:59:59.000Z

409

Automated analysis of security-design models  

Science Conference Proceedings (OSTI)

We have previously proposed SecureUML, an expressive UML-based language for constructing security-design models, which are models that combine design specifications for distributed systems with specifications of their security policies. Here, we show ... Keywords: Formal analysis, Metamodels, OCL, SecureUML, Security policies, UML

David Basin; Manuel Clavel; Jürgen Doser; Marina Egea

2009-05-01T23:59:59.000Z

410

Towards an algebra for security policies  

Science Conference Proceedings (OSTI)

Clashing security policies leads to vulnerabilities. Violating security policies leads to vulnerabilities. A system today operates in the context of a multitude of security policies, often one per application, one per process, one per user. The more ...

Jon Pincus; Jeannette M. Wing

2005-06-01T23:59:59.000Z

411

Security on the US Fusion Grid  

E-Print Network (OSTI)

Foster, et al. , “A Security Architecture for ComputationalComputer and Communications Security Conf. 83, T.W. FredianInformation and System Security ( TISSEC) J.R. Burruss, et

Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

2005-01-01T23:59:59.000Z

412

Data security on the national fusion grid  

E-Print Network (OSTI)

Foster, et al. , “A Security Architecture for ComputationalComputer and Communications Security Conf. 83, T.W. FredianInformation and System Security ( TISSEC) J.R. Burruss, et

Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

2005-01-01T23:59:59.000Z

413

Secure collaborations over message boards  

Science Conference Proceedings (OSTI)

We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed architecture employs only efficient symmetric cryptographic principles, and ... Keywords: collaborative systems, cryptography, key predistribution, message boards, networks, secure collaboration, security, service attacks, trust modules

Mahalingam Ramkumar; Nasir Memon

2006-09-01T23:59:59.000Z

414

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

415

Corrective Action Plan for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada  

Science Conference Proceedings (OSTI)

This Corrective Action Plan has been prepared for Corrective Action Unit (CAU) 562, Waste Systems, in accordance with the Federal Facility Agreement and Consent Order (1996; as amended March 2010). CAU 562 consists of 13 Corrective Action Sites (CASs) located in Areas 2, 23, and 25 of the Nevada National Security Site. Site characterization activities were performed in 2009 and 2010, and the results are presented in Appendix A of the Corrective Action Decision Document for CAU 562. The scope of work required to implement the recommended closure alternatives is summarized. (1) CAS 02-26-11, Lead Shot, will be clean closed by removing shot. (2) CAS 02-44-02, Paint Spills and French Drain, will be clean closed by removing paint and contaminated soil. As a best management practice (BMP), asbestos tile will be removed. (3) CAS 02-59-01, Septic System, will be clean closed by removing septic tank contents. As a BMP, the septic tank will be removed. (4) CAS 02-60-01, Concrete Drain, contains no contaminants of concern (COCs) above action levels. No further action is required; however, as a BMP, the concrete drain will be removed. (5) CAS 02-60-02, French Drain, was clean closed. Corrective actions were completed during corrective action investigation activities. As a BMP, the drain grates and drain pipe will be removed. (6) CAS 02-60-03, Steam Cleaning Drain, will be clean closed by removing contaminated soil. As a BMP, the steam cleaning sump grate and outfall pipe will be removed. (7) CAS 02-60-04, French Drain, was clean closed. Corrective actions were completed during corrective action investigation activities. (8) CAS 02-60-05, French Drain, will be clean closed by removing contaminated soil. (9) CAS 02-60-06, French Drain, contains no COCs above action levels. No further action is required. (10) CAS 02-60-07, French Drain, requires no further action. The french drain identified in historical documentation was not located during corrective action investigation activities. (11) CAS 23-60-01, Mud Trap Drain and Outfall, will be clean closed by removing sediment from the mud trap. As a BMP, the mud trap and outfall pipe will be removed. (12) CAS 23-99-06, Grease Trap, will be clean closed by removing sediment from the grease trap and backfilling the grease trap with grout. (13) CAS 25-60-04, Building 3123 Outfalls, will be clean closed by removing contaminated soil and the sludge-containing outfall pipe.

NSTec Environmental Restoration

2011-04-30T23:59:59.000Z

416

April 8, 2005 --Lecture 30 Computer Security  

E-Print Network (OSTI)

April 8, 2005 -- Lecture 30 22C:169 Computer Security Douglas W. Jones Department of Computer Science Administrative Issues #12;Warning Security is a system property An emergent property of the whole of system Security rarely emerges by accident Adding a security module to a system rarely achieves much! #12

Jones, Douglas W.

417

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

418

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network (OSTI)

the message to 1 A typical SCADA message has a length of roughly 20 bytes. However, some SCADA protocols allow-3032-2, support all standard SCADA protocols, including DNP3-Serial and Modbus/RTU, at data rates up an insecure SCADA protocol into their Secure SCADA Communications Protocol (SSCP). PNNL's technology is being

Smith, Sean W.

419

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź Enterprise Continuity â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź

420

Cyber Security | More Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

422

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

423

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

424

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

425

Securing Supervisory Control and Data Acquisition (SCADA) ...  

Science Conference Proceedings (OSTI)

... Acquisition (SCADA) and Industrial Control Systems (ICS) Linkage of Security and Safety in SCADA and Industrial Control Systems ...

2013-04-09T23:59:59.000Z

426

Security Science & Technology | Nuclear Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Treaty Verification Nuclear Systems Modeling, Simulation & Validation Nuclear Systems Technology Reactor Technology Nuclear Science Home | Science & Discovery |...

427

Lemnos Interoperable Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Lemnos Interoperable Security The Lemnos Interoperable Security Program began with one logical concept: If vendors develop control systems security products using an agreed-upon set of capability and operational requirements, energy asset owners can better evaluate product functions and purchase products from different vendors knowing they will be interoperable. Three years later, the Lemnos team developed those specifications-called interoperable configuration profiles-and one of the first products built to those profiles is in the market. Lemnos Interoperable Security More Documents & Publications Lemnos Interoperable Security Program SECURITY CORE FUNCTION AND DEFINITION REPORT Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

428

Axiomatic Semantics Verification of a Secure Web Server  

Science Conference Proceedings (OSTI)

... systems: heart pacemakers, airline flight control systems, nuclear reactor shutdown systems. ... ffl Security systems: systems connected to the Internet ...

2013-05-07T23:59:59.000Z

429

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

430

Security & Sustainability College of Charleston  

E-Print Network (OSTI)

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10 we can think about generating greater security and prosperity through systemic change that arises, then providing security is paramount consideration along that path. Using frames of collective, national

Young, Paul Thomas

431

MINIMUM SECURITY REQUIREMENTS FOR FEDERAL  

E-Print Network (OSTI)

March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

432

Measuring network security using dynamic bayesian network  

Science Conference Proceedings (OSTI)

Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics have generally focused on measuring individual vulnerabilities without ... Keywords: attack graph, intrusion detection, security, security metric

Marcel Frigault; Lingyu Wang; Anoop Singhal; Sushil Jajodia

2008-10-01T23:59:59.000Z

433

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

434

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

435

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

436

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

437

sSCADA: securing SCADA infrastructure communications  

Science Conference Proceedings (OSTI)

Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems ... Keywords: DCS, SCADA, authenticated broadcast channels, authenticated emergency channels, authentication, critical infrastructures, cyber attacks, data acquisition, distributed control systems, infrastructure protection, secure channels, secure communications, smart grid security, supervisory control

Yongge Wang

2011-12-01T23:59:59.000Z

438

SecureBox: National Security Through Secure Cargo – Team Members  

SecureBox: National Security Through Secure Cargo – Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

439

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... 114 patents cite NIST RBAC patents as of 6 June 08. IBM: US Patent #6,381,579, "System and method to provide secure navigation to resources on ...

440

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

442

Investigations of Possible Low-Level Temperature and Moisture Anomalies During the AMIE Field Campaign on Manus Island  

SciTech Connect

This document discusses results stemming from the investigation of near-surface temperature and moisture “oddities” that were brought to light as part of the Atmospheric Radiation Measurement (ARM) Madden-Julian Oscillation (MJO) Investigation Experiment (AMIE), Dynamics of the Madden-Julian Oscillation (DYNAMO), and Cooperative Indian Ocean experiment on intraseasonal variability in the Year 2011 (CINDY2011) campaigns.

Long, CN; Holdridge, DJ

2012-11-19T23:59:59.000Z

443

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

444

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

445

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

446

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

447

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

448

Security - Center for Transportation Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

successfully protect the surface transportation systems in an integrated and accessible cyber-secured environment. Primary Contact: Diane Davidson Focus Areas: integrated...

449

Newsletters | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Newsletters Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Newsletters Newsletters U.S....

450

Training | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Training Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > Training Training 2013 Annual Users Training Meeting Presentations...

451

Secure Data Center (Fact Sheet)  

DOE Green Energy (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

452

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

453

Quantifying security threats and their impact  

Science Conference Proceedings (OSTI)

In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this ... Keywords: cyber security metrics, information security, risk management

Anis Ben Aissa; Robert K. Abercrombie; Frederick T. Sheldon; Ali Mili

2009-04-01T23:59:59.000Z

454

How to Cheat at Securing Your Network  

Science Conference Proceedings (OSTI)

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. ... Keywords: Security

Ido Dubrawsky

2007-10-01T23:59:59.000Z

455

Security Challenges During VLSI Test David Hely  

E-Print Network (OSTI)

Security Challenges During VLSI Test David H´ely LCIS Grenoble Institute of Technology Valence testability can reduce system security. Data confidentiality and intellectual property protection can be breached through testing security breaches. In this paper we review testing security problems, focusing

Cortes, Corinna

456

Server Security Policy 1.0 Purpose  

E-Print Network (OSTI)

Server Security Policy COE­SSP­01 1.0 Purpose The purpose of this policy is to establish standards configurations must be in accordance with approved College guidelines to ensure a significant level of security Wrappers or other security mechanisms. · The most recent security patches must be installed on the system

Demirel, Melik C.

457

Cyber Security Recommendations for Digital I&C Systems Within Power Generation Facilities Unregulated by North American Electric Rel iability Corporation Critical Infrastructure Protection  

Science Conference Proceedings (OSTI)

Fossil generating facilities represent a significant investment, as well as a primary source of revenue, for many electric utilities. The digital instrumentation and control (I&C) systems of these generation facilities are essential to their successful operations. As such, the security of digital I&C systems is fundamental to ensure continued, reliable production. It is therefore prudent to employ appropriate ...

2012-12-12T23:59:59.000Z

458

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

459

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

460

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

462

NIST Computer Security Publications - Archived FIPS ...  

Science Conference Proceedings (OSTI)

... FIPS 39, February 1976, Glossary for Computer Systems Security * Withdrawn: April 29, 1993 Superceded By: NIST IR 7298. ...

463

Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI)  

Science Conference Proceedings (OSTI)

Smart grid technologies are introducing millions of new intelligent components to the electric grid that communicate in much more advanced ways (two-way communications, dynamic optimization, and wired and wireless communications) than in the past. Cyber security is important because the bi-directional flow of two-way communication and control capabilities in the smart grid that will enable an array of new functionalities and applications.One area of critical importance to the security of ...

2012-11-29T23:59:59.000Z

464

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

465

Integration of sensing and computing in an intelligent decision support system for homeland security defense  

Science Conference Proceedings (OSTI)

We propose an intelligent decision support system based on sensor and computer networks that incorporates various component techniques for sensor deployment, data routing, distributed computing, and information fusion. The integrated system is deployed ... Keywords: Data routing, Distributed computing, Dynamic programming, Intelligent decision support system, Sensor deployment, Sensor fusion

Qishi Wu; Mengxia Zhu; Nageswara S. V. Rao

2009-04-01T23:59:59.000Z

466

Open Advanced Metering Infrastructure (AMI) Systems: Leveraging Customer Broadband for Grid Integration  

Science Conference Proceedings (OSTI)

Retail broadband networks, such as cable, digital subscriber line (DSL), and high-speed wireless networks are available at nearly all customer premises in the United States and many other countries. With this increased availability, the percentage of the population subscribing to these networks for Internet service is rising. This report explores the possibility of using retail broadband networks for Smart Grid applications, particularly those related to residential customer integration. The report ...

2012-12-13T23:59:59.000Z

467

Enabling AMI System Prognostics and Health Management: A Procedural Guide for Utilities  

Science Conference Proceedings (OSTI)

Electromechanical meter production has halted in the United States and utilities are now deploying solid state electronic meters exclusively. The service life expectancy and failure modes of these solid state meters are not well known. The prior generation of electromechanical meters had well established life characteristics, but many questions exist regarding the newer solid state products. With any new technology there are risks. When the new technology is integrated with core business processes, ...

2013-12-23T23:59:59.000Z

468

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

469

The Air Microwave Yield (AMY) experiment - A laboratory measurement of the microwave emission from extensive air showers  

E-Print Network (OSTI)

The AMY experiment aims to measure the microwave bremsstrahlung radiation (MBR) emitted by air-showers secondary electrons accelerating in collisions with neutral molecules of the atmosphere. The measurements are performed using a beam of 510 MeV electrons at the Beam Test Facility (BTF) of Frascati INFN National Laboratories. The goal of the AMY experiment is to measure in laboratory conditions the yield and the spectrum of the GHz emission in the frequency range between 1 and 20 GHz. The final purpose is to characterise the process to be used in a next generation detectors of ultra-high energy cosmic rays. A description of the experimental setup and the first results are presented.

K. Louedec; J. Alvarez-Muńiz; M. Blanco; M. Bohácová; B. Buonomo; G. Cataldi; M. R. Coluccia; P. Creti; I. De Mitri; C. Di Giulio; P. Facal San Luis; L. Foggetta; R. Gaďor; D. Garcia-Fernandez; M. Iarlori; S. Le Coz; A. Letessier-Selvon; I. C. Mari?; D. Martello; G. Mazzitelli; M. Monasor; L. Perrone; R. Pesce; S. Petrera; P. Privitera; V. Rizi; G. Rodriguez Fernandez; F. Salamida; G. Salina; M. Settimo; P. Valente; J. R. Vazquez; V. Verzi; C. Williams

2013-10-17T23:59:59.000Z

470

Risktech} Proceedings: International Conference on Risk Technology & Management Risk in Secure and Dependable System: a Survey  

E-Print Network (OSTI)

-by-wire system for heavy duty trucks is derived using MIL-HDBK-217 standard. The computer node consists of a 32

471

A Drought Monitoring and Forecasting System for Sub-Sahara African Water Resources and Food Security.  

Science Conference Proceedings (OSTI)

Capsule: The development and implementation of a drought monitoring and seasonal hydrological forecast system for sub-Saharan Africa contributes to building capacity through technology and knowledge transfer.

Justin Sheffield; Eric F. Wood; Nathaniel Chaney; Kaiyu Guan; Sara Sadri; Xing Yuan; Luke Olang; Abou Amani; Abdou Ali; Siegfried Demuth; Laban Ogallo

472

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

473

Chapter_11_Incidents_of_Security_Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. HS-91 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect the safeguards and security program's capability to protect DOE safeguards and security interests * Indicate failure to adhere to security procedures * Reveal that the system is not functioning properly, by identifying and/or mitigating potential threats (e.g., detecting suspicious activity, hostile acts, etc.).

474

Informatica 29 page xxx–yyy 1 A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?  

E-Print Network (OSTI)

A growing number of security applications are being developed and deployed to explicitly reduce risk from adversaries ’ actions. However, there are many challenges when attempting to evaluate such systems, both in the lab and in the real world. Traditional evaluations used by computer scientists, such as runtime analysis and optimality proofs, may be largely irrelevant. The primary contribution of this paper is to provide a preliminary framework which can guide the evaluation of such systems and to apply the framework to the evaluation of ARMOR (a system deployed at LAX since August 2007). This framework helps to determine what evaluations could, and should, be run in order to measure a system’s overall utility. A secondary contribution of this paper is to help familiarize our community with some of the difficulties inherent in evaluating deployed applications, focusing on those in security domains. 1

Matthew E. Taylor; Christopher Kiekintveld; Craig Western; Milind Tambe

2009-01-01T23:59:59.000Z

475

A knowledge-based approach for power system dynamic security assessment  

Science Conference Proceedings (OSTI)

This paper presents a knowledge-based method for predicting the robustness of a power system to severe disturbances. The method builds decision trees using the attributes which are closely related to the stability of the power system. A simple power ...

B. Jeyasurya; S. S. Venkata

1990-06-01T23:59:59.000Z

476

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 Protecting unclassified information systems continues to...

477

Report of the Cyber Security Research Needs for Open Science...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while maintaining...

478

Development of a Secure, Economic and Environmentally friendly...  

Open Energy Info (EERE)

a Secure, Economic and Environmentally friendly Modern Power System (Smart Grid Project) Jump to: navigation, search Project Name Development of a Secure, Economic and...

479

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

480

Software security testing of an online banking system: a unique research experience for undergraduates and computer teachers  

Science Conference Proceedings (OSTI)

This paper presents a unique summer project for a group of undergraduate students and high school computer teachers to gain research experiences in the area of cybersecurity. The students and teachers were selected from the participants in the NSF REU ... Keywords: access control, cybersecurity, mutation analysis, security attacks, security testing, software testing

Dianxiang Xu

2013-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Architectural support for enhancing security in clusters  

E-Print Network (OSTI)

Cluster computing has emerged as a common approach for providing more comput- ing and data resources in industry as well as in academia. However, since cluster computer developers have paid more attention to performance and cost e±ciency than to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust to security attacks intrinsically. In this research, we propose architectural supports for enhancing security of clus- ter systems with marginal performance overhead. This research proceeds in a bottom- up fashion starting from enforcing each cluster component's security to building an integrated secure cluster. First, we propose secure cluster interconnects providing con- Żdentiality, authentication, and availability. Second, a security accelerating network interface card architecture is proposed to enable low performance overhead encryption and authentication. Third, to enhance security in an individual cluster node, we pro- pose a secure design for shared-memory multiprocessors (SMP) architecture, which is deployed in many clusters. The secure SMP architecture will provide conŻdential communication between processors. This will remove the vulnerability of eavesdrop- ping attacks in a cluster node. Finally, to put all proposed schemes together, we propose a security/performance trade-o® model which can precisely predict performance of an integrated secure cluster.

Lee, Man Hee

2008-08-01T23:59:59.000Z

482

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network (OSTI)

Background 6 2.1 SCADA Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. Communication protocols used in these systems, or serial-based SCADA protocols, are very compact some background on SCADA protocols and cryp- tographic tools, and review several existing BITW

483

Using VMware VCenter lab manager in undergraduate education for system administration and network security  

Science Conference Proceedings (OSTI)

We have developed and managed a virtual laboratory environment by deploying the VMware vCenter Lab Manager and the VMware vSphere vCenter on a load-balanced cluster of eight ESX 3.5 servers and a storage area network of 10.8 Tera bytes. This system has ... Keywords: education, hands-on, lab manager, laboratory experiments, system administration, virtualization

Xinli Wang; Guy C. Hembroff; Rick Yedica

2010-10-01T23:59:59.000Z

484

Security is Not an Option | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security is Not an Option Security is Not an Option A 10-year roadmap for achieving control system cyber security in the energy industry has been hailed as a model for other...

485

Secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-05-01T23:59:59.000Z

486

Disentangling the relations between safety and security  

Science Conference Proceedings (OSTI)

This article aims at a finer apprehension of the relations between safety and security, which are intrinsically and increasingly intricate. We introduce a new conceptual framework to better capture their moving perimeters. Then, we present our on-going ... Keywords: SIS, computer security, dependability, industrial control systems, safety, safety systems, security

Ludovic Pietre-Cambacedes; Claude Chaudet

2009-08-01T23:59:59.000Z

487

High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.  

SciTech Connect

The impact associated with energy generation and utilization is immeasurable due to the immense, widespread, and myriad effects it has on the world and its inhabitants. The polar extremes are demonstrated on the one hand, by the high quality of life enjoyed by individuals with access to abundant reliable energy sources, and on the other hand by the global-scale environmental degradation attributed to the affects of energy production and use. Thus, nations strive to increase their energy generation, but are faced with the challenge of doing so with a minimal impact on the environment and in a manner that is self-reliant. Consequently, a revival of interest in nuclear energy has followed, with much focus placed on technologies for transmuting nuclear spent fuel. The performed research investigates nuclear energy systems that optimize the destruction of nuclear waste. In the context of this effort, nuclear energy system is defined as a configuration of nuclear reactors and corresponding fuel cycle components. The proposed system has unique characteristics that set it apart from other systems. Most notably the dedicated High-Energy External Source Transmuter (HEST), which is envisioned as an advanced incinerator used in combination with thermal reactors. The system is configured for examining environmentally benign fuel cycle options by focusing on minimization or elimination of high level waste inventories. Detailed high-fidelity exact-geometry models were developed for representative reactor configurations. They were used in preliminary calculations with Monte Carlo N-Particle eXtented (MCNPX) and Standardized Computer Analysis for Licensing Evaluation (SCALE) code systems. The reactor models have been benchmarked against existing experimental data and design data. Simulink{reg_sign}, an extension of MATLAB{reg_sign}, is envisioned as the interface environment for constructing the nuclear energy system model by linking the individual reactor and fuel component sub-models for overall analysis of the system. It also provides control over key user input parameters and the ability to effectively consolidate vital output results for uncertainty/sensitivity analysis and optimization procedures. The preliminary analysis has shown promising advanced fuel cycle scenarios that include Pressure Water Reactors Pressurized Water Reactors (PWRs), Very High Temperature Reactors (VHTRs) and dedicated HEST waste incineration facilities. If deployed, these scenarios may substantially reduce nuclear waste inventories approaching environmentally benign nuclear energy system characteristics. Additionally, a spent fuel database of the isotopic compositions for multiple design and control parameters has been created for the VHTR-HEST input fuel streams. Computational approaches, analysis metrics, and benchmark strategies have been established for future detailed studies.

Tsvetkov, Pavel Valeryevich (Texas A& M University, College Station, TX); Rodriguez, Salvador B.; Ames, David E., II (Texas A& M University, College Station, TX); Rochau, Gary Eugene

2009-09-01T23:59:59.000Z

488

Binder, a Logic-Based Security Language  

Science Conference Proceedings (OSTI)

We introduce the concept of a security language, used to expresssecurity statements in a distributed system. Most existing securitylanguages encode security statements as schematized data structures,such as ACLs and X.509 certificates. In contrast, Binder ...

John DeTreville

2002-05-01T23:59:59.000Z

489

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

490

Security assessment of power systems including energy storage. Progress report, January 1--March 31, 1978  

DOE Green Energy (OSTI)

Based on system response data provided by the Bonneville Power Administration, it has been confirmed that 10 MW is an adequate capacity for the IC unit which is proposed for supplementary damping of the West Coast intertie, for the degree of damping which BPA considers as adequate. Some preliminary investigations have shown that IC units, with appropriate controls, should be capable of preventing the buildup of torsional oscillations in turbogenerators connected to series compensated transmission lines (subsynchronous resonance). The implementation of an adequate ''white noise'' generator has allowed confirmation of an analog simulation of a power system with load variations. Autocorrelation estimates of signals measured on this simulation indicate that machine rotor angle dynamics should be readily identifiable, but dynamics due to exciters and governors are probably not identifiable. Likelihood functions (as a weighted sum of squares of residuals produced by a Kalman filter) appear to attain maximum value for the ''true'' parameters of the system, but the computational burden of doing dynamic estimation in a point estimation problem is prohibitive. The use of canonical forms for system linearized dynamics is being investigated, with the prospect of formulating point estimation type algorithms.

Carroll, D.P.; Triezenberg, D.M.

1978-04-01T23:59:59.000Z

491

Dynamic data sharing and security in a collaborative product definition management system  

Science Conference Proceedings (OSTI)

Product definition management (PDM) is a system that supports management of both engineering data and the product development process during the total product life cycle. The formation of a virtual enterprise is becoming a growing trend, and vendors ... Keywords: CPDM, Common workspace, Concurrent engineering, PDM, Parameter-based collaboration, Virtual engineering community, Web-based application

Kamel Rouibah; Samia Ould-Ali

2007-04-01T23:59:59.000Z

492

Safety and Security Enforcement Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

493

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

494

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

495

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

496

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

497

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

498

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

499

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

500

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z