Powered by Deep Web Technologies
Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Future directions for behavioral information security research  

Science Journals Connector (OSTI)

Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness ... Keywords: Behavioral information security, Deviant security behavior, Future research, Information security, Research challenges

Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard Baskerville

2013-02-01T23:59:59.000Z

2

Modeling behavioral considerations related to information security.  

SciTech Connect

The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral study of upcoming threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F. (Decision and Information Sciences); (SNL); (Univ. at Albany)

2011-01-01T23:59:59.000Z

3

Information security knowledge sharing inorganizations: Investigating the effect ofbehavioral information security governance andnational culture  

Science Journals Connector (OSTI)

Abstract This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries namely, USA and Sweden allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledge sharing differs based on national culture. The study followed a mixed methods research design, wherein qualitative data was collected to both establish the study's research model and develop a survey instrument that was distributed to 578 information security executives. The results suggest that processes to coordinate implemented security knowledge sharing mechanisms have a major direct influence on the establishment of security knowledge sharing in organizations; the effect of organizational structure (e.g., centralized security function to develop and deploy uniform firm-wide policies, and use of steering committees to facilitate information security planning) is slightly weaker, while business-based information security management has no significant direct effect on security knowledge sharing. A mediation analysis revealed that the reason for the nonsignificant direct relation between business-based information security management and security knowledge sharing is the fully mediating effect of coordinating information security processes. Thus, the results disentangles the interrelated influences of behavioral information security governance factors on security knowledge sharing by showing that information security governance sets the platform to establish security knowledge sharing, and coordinating processes realize the effect of both the structure of the information security function and the alignment of information security management with business needs. A multigroup analysis identified that national culture had a significant moderating effect on the association between four of the six proposed relations. In Sweden which is seen as a less individualist, feminine country managers tend to focus their efforts on implementing controls that are aligned with business activities and employees' need; monitoring the effectiveness of the implemented controls, and assuring that the controls are not too obtrusive to the end-user. On the contrary, US organizations establish security knowledge sharing in their organization through formal arrangements and structures. These results imply that Swedish managers perceive it to be important to involve, or at least know how their employees cope with the decisions that have been made, thus favoring local participation in information security management, while US managers may feel the need to have more central control when running their information security function. The findings suggest that national culture should be taken into consideration in future studies in particular when investigating organizations operating in a global environment and understand how it affects behaviors and decision-making.

Waldo Rocha Flores; Egil Antonsen; Mathias Ekstedt

2014-01-01T23:59:59.000Z

4

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

5

Simulating human behavior for national security human interactions.  

SciTech Connect

This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

2007-01-01T23:59:59.000Z

6

Raising Caterpillars  

NLE Websites -- All DOE Office Websites (Extended Search)

Raising Caterpillars Raising Caterpillars Name: PALS II Classroom Location: N/A Country: N/A Date: N/A Question: We were wondering if we could catch caterpillars in jars, provide some kind of food source, and watch them turn into butterflies. I know you can order those kits, but there are lots of caterpillars everywhere right now! PLEASE answer our questions. Thanks Replies: Hi PALS II When I catch catterpillars I put them in shoeboxes with some leaves from the tree that I got them from. I change the leaves avery day and check on them twice a day to make sure that they are OK (because when they turn into butterflies they have to be let go so that they can go and find a mate). I poke holes inthe top of the shoebox with a pair of scissors so that the catterpillars have plenty of air.

7

A Grid Security Infrastructure Based on Behaviors and Trusts  

Science Journals Connector (OSTI)

Computational Grids need support the distributed high performance computing with security and reliability. While the fact is when ... destroy the whole system. For solving these security problems in Grids, a Grid

Xiaolin Gui; Bing Xie; Yinan Li; Depei Qian

2004-01-01T23:59:59.000Z

8

Security  

Energy.gov (U.S. Department of Energy (DOE))

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

9

Meeting security and user behavior requirements in Grid scheduling  

Science Journals Connector (OSTI)

Most of current research in Grid computing is still focused on the improvement of the performance of Grid schedulers. However, unlike traditional scheduling, in Grid systems there are other important requirements to be taken into account. One such a requirement is the secure scheduling, namely achieving an efficient allocation of tasks to reasonable trustful resources. In this paper we formalize the Grid scheduling problem as a non-cooperative non-zero sum game of the Grid users in order to address the security requirements. The premise of this model is that in a large-scale Grid, the cooperation among all users in the system is unlikely to happen. The users cost of playing the game is interpreted as a total cost of the secure job execution in Grid. The game cost function is minimized, at global (Grid) and local (users) levels, by using four genetic-based hybrid meta-heuristics. We have evaluated the proposed model under the heterogeneity, the large-scale and dynamics conditions using a Grid simulator. The relative performance of four hybrid schedulers is measured by the makespan and flowtime metrics. The obtained results suggested that it is more resilient for the Grid users to pay some additional scheduling cost, due to verification of the security conditions, instead of taking the risk of assigning their tasks to unreliable resources.

Joanna Ko?odziej; Fatos Xhafa

2011-01-01T23:59:59.000Z

10

SRS employees raise funds for American Heart Association | National...  

NLE Websites -- All DOE Office Websites (Extended Search)

raise funds for American Heart Association | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

11

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

12

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

13

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

14

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 14, 2012 PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented su November 13, 2012 PSH-12-0092 - In the Matter of Personnel Security Hearing On September 24, 2012, an OHA Hearing Officer issued a decision in which he

15

PSH-13-0020 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 - In the Matter of Personnel Security 0 - In the Matter of Personnel Security PSH-13-0020 - In the Matter of Personnel Security On May 31, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In August 2012, the individual attempted to commit suicide, and was subsequently admitted to a local hospital for treatment and observation. Because these events raised security concerns, the local security office (LSO) summoned the individual for a Personnel Security Interview (PSI). During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation. The individual's behavior raised security concerns under the Bond Amendment and Criteria H, J, K and L. After conducting a hearing and evaluating the

16

PSH-13-0020 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20 - In the Matter of Personnel Security 20 - In the Matter of Personnel Security PSH-13-0020 - In the Matter of Personnel Security On May 31, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In August 2012, the individual attempted to commit suicide, and was subsequently admitted to a local hospital for treatment and observation. Because these events raised security concerns, the local security office (LSO) summoned the individual for a Personnel Security Interview (PSI). During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation. The individual's behavior raised security concerns under the Bond Amendment and Criteria H, J, K and L. After conducting a hearing and evaluating the

17

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

18

PSH-12-0076 - Personnel Security Hearing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - Personnel Security Hearing 6 - Personnel Security Hearing PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted . A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's falsification and financial irresponsibility. His behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the requisite element of "deliberateness" was met under Criterion F. She further found that

19

PSH-13-0057 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 - In the Matter of Personnel Security 7 - In the Matter of Personnel Security PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual had been diagnosed with alcohol dependence, opioid abuse, and major depression. His behavior-taking as many as 12 hydrocodone pills with 18 to 24 beers on weekend days to cope with his depression-raised security concerns under Criteria H (mental conditions that cause or may cause a significant defect in judgment or reliability), J (alcohol dependence) and K (misuse of a controlled substance), as well as raising the concern that he was an unlawful user of

20

PSH-12-0081 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0081 - In the Matter of Personnel Security Hearing PSH-12-0081 - In the Matter of Personnel Security Hearing PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve these security concerns. Specifically, he

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

PSH-12-0120 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0120 - In the Matter of Personnel Security Hearing PSH-12-0120 - In the Matter of Personnel Security Hearing PSH-12-0120 - In the Matter of Personnel Security Hearing On February 4, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about falsification and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve these security concerns. Specifically, with respect to the individual's omissions on security forms, she found that the requisite element of "deliberateness" was

22

PSH-13-0040 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 - In the Matter of Personnel Security 0 - In the Matter of Personnel Security PSH-13-0040 - In the Matter of Personnel Security On July 25, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual' falsifications and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve the security concerns associated with her falsifications on three security forms as well

23

PSH-12-0122 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0122 - In the Matter of Personnel Security Hearing PSH-12-0122 - In the Matter of Personnel Security Hearing PSH-12-0122 - In the Matter of Personnel Security Hearing On February 15, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about falsification and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve the security concerns associated with his marijuana use while in high school. However, she found that the individual had not sufficiently mitigated the security

24

PSH-12-0101 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01 - In the Matter of Personnel Security Hearing 01 - In the Matter of Personnel Security Hearing PSH-12-0101 - In the Matter of Personnel Security Hearing On November 21, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that it was too early to determine whether the individual had demonstrated a sustained pattern of financial responsibility for a

25

PSH-12-0104 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

104 - In the Matter of Personnel Security Hearing 104 - In the Matter of Personnel Security Hearing PSH-12-0104 - In the Matter of Personnel Security Hearing On December 13, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's alcohol use. A DOE psychiatrist examined the individual and concluded that the individual suffers from Alcohol Dependence. His behavior raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual had

26

PSH-13-0060 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60 - In the Matter of Personnel Security 60 - In the Matter of Personnel Security PSH-13-0060 - In the Matter of Personnel Security On August 22, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January and March 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented adequate evidence to mitigate the security concerns associated with his two charges of Driving Under the Influence and his involvement in

27

PSH-12-0134 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0134 - In the Matter of Personnel Security Hearing PSH-12-0134 - In the Matter of Personnel Security Hearing PSH-12-0134 - In the Matter of Personnel Security Hearing On April 2, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual demonstrated financial irresponsibility through his two bankruptcies within ten years, his current debts, and his inability or unwillingness to live within his means. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security

28

PSH-12-0133 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33 - In the Matter of Personnel Security Hearing 33 - In the Matter of Personnel Security Hearing PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated with his misuse of information technology. However, she found that the individual had not sufficiently mitigated the

29

PSH-12-0073 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73 - In the Matter of Personnel Security Hearing 73 - In the Matter of Personnel Security Hearing PSH-12-0073 - In the Matter of Personnel Security Hearing On November 8, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. A Local Security Office (LSO) conducted a Personnel Security Interview of the individual to address concerns about the individual's alcohol use. A DOE consultant psychologist found that the individual suffers from Alcohol Dependence, in early full remission. His behavior raised security concerns under Criteria H, J and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual demonstrated adequate evidence of rehabilitation and thus mitigated the security concerns under Criteria H and J. She

30

PSH-13-0044 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-13-0044 - In the Matter of Personnel Security Hearing On July 26 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. In November and December 2012, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate the security concerns associated with his three charges of Driving

31

PSH-12-0134 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0134 - In the Matter of Personnel Security Hearing On April 2, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual demonstrated financial irresponsibility through his two bankruptcies within ten years, his current debts, and his inability or unwillingness to live within his means. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security

32

PSH-13-0060 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60 - In the Matter of Personnel Security 60 - In the Matter of Personnel Security PSH-13-0060 - In the Matter of Personnel Security On August 22, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January and March 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented adequate evidence to mitigate the security concerns associated with his two charges of Driving Under the Influence and his involvement in

33

PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83 - In the Matter of In the Matter of Personnel Security 83 - In the Matter of In the Matter of Personnel Security Hearing PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve these security

34

PSH-12-0074 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual's recent efforts to resolve his debt have not yet withstood the test of time. Given the

35

PSH-12-0059 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

59 - In the Matter of Personnel Security Hearing 59 - In the Matter of Personnel Security Hearing PSH-12-0059 - In the Matter of Personnel Security Hearing On September 13, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. The Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's falsifications and financial irresponsibility. The individual's behavior raised concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. Specifically, she found that despite the individual's acknowledgment of his financially

36

PSH-13-0094 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-13-0094 - In the Matter of Personnel Security Hearing On November 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. In April 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use. During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation who concluded that the individual suffers from Alcohol Dependence. The individual's behavior raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the

37

PSH-12-0063 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63 - In the Matter of Personnel Security Hearing 63 - In the Matter of Personnel Security Hearing PSH-12-0063 - In the Matter of Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office (LSO) suspended the individual's security clearance because (1) a DOE consultant psychiatrist diagnosed the individual as suffering from Alcohol Abuse/Dependence, (2) the individual had been arrested four times on alcohol-related charges and had received substance abuse treatment, and (3) the individual had a history of criminal behavior, of financial irresponsibility, and of failing to keep commitments made to the LSO. This derogatory information raised security concerns under Criteria H, J, and L. After conducting a hearing and evaluating the

38

PSH-13-0069 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 - In the Matter of Personnel Security Hearing 9 - In the Matter of Personnel Security Hearing PSH-13-0069 - In the Matter of Personnel Security Hearing On October 11, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In April 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his positive drug test. The individual's behavior raised security concerns under the Bond Amendment and Criteria K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer concluded the individual's use of his wife's prescription medication happened under unusual circumstances that are unlikely to recur in the future, and to the

39

PSH-13-0071 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 - In the Matter of Personnel Security Hearing 1 - In the Matter of Personnel Security Hearing PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation who concluded that the individual suffers from Alcohol Abuse. The individual's behavior raised security concerns Criteria H, J and L. After conducting a hearing and evaluating the documentary and testimonial

40

PSH-13-0038 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 - In the Matter of Personnel Security Hearing 8 - In the Matter of Personnel Security Hearing PSH-13-0038 - In the Matter of Personnel Security Hearing On June 26, 2013, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns arising from an opinion of a licensed medical professional that he has a mental condition which causes or may cause a significant defect in judgment and reliability and the Individual's past unreliable behavior. A DOE psychologist opined that the Individual has a mental trait that makes him unreliable. The Local Security Office (LSO) raised the DOE psychologist's opinion as a security concern under Criterion H of the Part 710 regulations. The LSO

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

PSH-12-0093 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-12-0093 - In the Matter of Personnel Security Hearing On November 15, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual should be granted authorization access. A Local Security Office denied the individual a security clearance because (1) during the five-year period that the individual attended a university his use of alcohol regularly resulted in his intoxication, including at least 100 instances in which the individual either passed-out or blacked-out and two instances in which law enforcement officers were involved and (2) the individual had been diagnosed with Alcohol-Related Disorder, Not Otherwise Specified, by a DOE psychologist. The individual's behavior raised security concerns under Criteria H and J.

42

Vibrations of raised access floors  

Science Journals Connector (OSTI)

Raised access floors play a critical role in modern cleanroom design. They have unique mechanical properties that make them respond to dynamic loading in a manner quite different from conventional floors. For example an unbraced floor is much more flexible horizontally than in the vertical direction. Horizontal vibration amplitudes with walker excitation may exceed 100??m/s in an unbraced floor exceeding the sensitivity of 1000 inspection microscopes by as much as an order of magnitude. Issues such as these become important when moderately vibration?sensitive instruments such as optical microscopes are supported on access floors typically the case in cleanrooms. This paper presents results of experimental studies involving a 3?m3?m segment of floor and a large floor installed in a cleanroom both of which were subjected to dynamic loads using a shaker. Both drive?point and propagation properties were examined. In addition data are presented for variations in bracing and bolting using the 3?m3?m segment.

2002-01-01T23:59:59.000Z

43

PSH-12-0103 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0103 - In the Matter of Personnel Security Hearing PSH-12-0103 - In the Matter of Personnel Security Hearing PSH-12-0103 - In the Matter of Personnel Security Hearing On November 5, 2012, an OHA Hearing Officer issued a decision in which he concluded that access authorization should not be granted to an individual. A Local Security Office denied access authorization to the individual because she demonstrated financial irresponsibility through (1) failing to file federal and state income taxes for seven years, Tax Year (TY) 2004 through TY 2010; (2) accruing unpaid federal tax liability of $37,619.37 and unpaid state tax liability of $6,885.00; and (3) claiming nine tax withholding allowances when she knew she should only claim one. Her behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the

44

Y-12 team raises more than $20,000 for Light the Night event | Y-12  

NLE Websites -- All DOE Office Websites (Extended Search)

team raises more than ... team raises more than ... Y-12 team raises more than $20,000 for Light the Night event Posted: November 8, 2013 - 12:00pm More than 86 Y-12 employees and family members participated at this year's Leukemia and Lymphoma Society's Light the Night walk held Oct. 24 at the University of Tennessee. The B&W Y 12 team, recognized as the largest corporate team at the event, raised more than $20,000. Participating in the Leukemia and Lymphoma Society's Light The Night Walk funds therapies and treatment advances for blood cancer patients. Follow Y-12 on Facebook, Twitter, YouTube and Flickr. B&W Y-12, a limited liability enterprise of The Babcock and Wilcox Company and Bechtel National Inc., operates the Y-12 National Security Complex for the National Nuclear Security Administration.

45

Recommendations to Address Power Reliability Concerns Raised...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations More Documents & Publications DOE Response to EAC Recommendations - March 2012...

46

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

47

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network (OSTI)

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

48

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

49

Neg-raising : polarity and presupposition  

E-Print Network (OSTI)

In this thesis, I advance a semantic theory of Neg-Raising rooted in the work of Bartsch (1973) and Heim (2000) and defend it against syntactic and pragmatic alternatives. The primary source of support for my position on ...

Gajewski, Jon Robert

2005-01-01T23:59:59.000Z

50

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

51

LANL raises record $3.1 million in contributions | National Nuclear  

National Nuclear Security Administration (NNSA)

raises record $3.1 million in contributions | National Nuclear raises record $3.1 million in contributions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > LANL raises record $3.1 million in contributions LANL raises record $3.1 million in contributions Posted By Office of Public Affairs NNSA Blog LANL employees pledged a record $2.13 million this year to United Way and

52

Y-12 team raises more than $20,000 for Light the Night event | National  

National Nuclear Security Administration (NNSA)

team raises more than $20,000 for Light the Night event | National team raises more than $20,000 for Light the Night event | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Y-12 team raises more than $20,000 for ... Y-12 team raises more than $20,000 for Light the Night event Posted By Office of Public Affairs More than 86 Y-12 employees and family members participated at this

53

Lawrence Livermore charitable campaign raises $3.3 million for local  

National Nuclear Security Administration (NNSA)

charitable campaign raises $3.3 million for local charitable campaign raises $3.3 million for local organizations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Lawrence Livermore charitable campaign raises $3.3 million ... Lawrence Livermore charitable campaign raises $3.3 million for local organizations Posted By Office of Public Affairs

54

Transformers Transformer device used to raise (for  

E-Print Network (OSTI)

Transformers Transformer ­ device used to raise (for transmission) and lower (for use) the ac with different #s of turns #12;Transformers Alternating primary current induces alternating magnetic flux in iron dt d NV B PP -= dt d NV B SS -= S S P P N V N V = #12;Transformers Transformation of voltage

Bertulani, Carlos A. - Department of Physics and Astronomy, Texas A&M University

55

Raising Investment Funds for Clean Energy Programs & Working...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Raising Investment Funds for Clean Energy Programs & Working with Financial Institutions Raising Investment Funds for Clean Energy Programs & Working with Financial Institutions...

56

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

57

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

58

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

59

Raising a Money Smart Kid Anita McKinney, Duval County Extension Service  

E-Print Network (OSTI)

Raising a Money Smart Kid Anita McKinney, Duval County Extension Service Kate Fogarty, University. Add to the list ­ how to be money-smart. "Don't they learn how to manage money from just watching me money attitudes and skills. So it's good to review your behaviors and how they influence what they learn

Hill, Jeffrey E.

60

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Raising Investment Funds for Clean Energy Programs & Working...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Design Options - December * Finance 101 briefs - December & January EE Finance Primer Finance Program Structure Options Raising Investment Funds & Working with...

62

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

63

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

64

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

65

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

66

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

67

City of Longwood - Raising Energy Efficiency Program (Florida) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Longwood - Raising Energy Efficiency Program (Florida) Longwood - Raising Energy Efficiency Program (Florida) City of Longwood - Raising Energy Efficiency Program (Florida) < Back Eligibility Residential Savings Category Home Weatherization Commercial Weatherization Sealing Your Home Design & Remodeling Windows, Doors, & Skylights Insulation Appliances & Electronics Water Heating Solar Buying & Making Electricity Heating & Cooling Swimming Pool Heaters Maximum Rebate $500 a year Program Info Start Date 01/18/2012 State Florida Program Type Local Rebate Program Rebate Amount Varies; 10% of project cost for solar panels or photovoltaic systems (including pools) The City of Longwood offers the Raising Energy Efficiency Program (REEP) to owner occupied residences within the City of Longwood for making energy

68

Recombinant DNA research: private actions raise public eyebrows  

Science Journals Connector (OSTI)

... high commercial expectations have helped raise the value (on paper) of the five small private companies most deeply involved to a figure estimated at more than $150 million.

David Dickson

1979-04-05T23:59:59.000Z

69

Security Specialist  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

70

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

71

Global security  

SciTech Connect

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

72

Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

73

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

74

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

75

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

76

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2012 29, 2012 PSH-12-0097 - In the Matter of Personnel Security Hearing On November 29, 2012, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be restored. The Individual had been charged with committing a sexual battery. Although the Individual had testified that a jury had acquitted him of this charge, the Individual did not provide any documentation that he had been acquitted. Nor had the Individual presented sufficient evidence to resolve the concerns raised by his conduct. The Individual had also intentionally provided misleading information during a personnel security interview. November 29, 2012 PSH-12-0080 - In the Matter of Personnel Security Hearing On November 29, 2012, an OHA Hearing Officer issued a Decision in which she

77

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 23, 2013 May 23, 2013 PSH-13-0018 - In the Matter of Personnel Security Hearing On May 23, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be granted. The Individual had a history of six arrests, five of which were alcohol-related and two of which were marijuana-related. In addition, A DOE Psychologist diagnosed the individual with Alcohol Dependence. The Hearing Officer found that the Individual had not mitigated any the security concerns raised by his alcohol abuse and history of criminal conduct at the hearing, because he was only in the early stages of his recovery from his alcohol d May 22, 2013 PSH-13-0022 - In the Matter of Personnel Security On May 22, 2013, an OHA Hearing Officer issued a decision in which he

78

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

79

Los Alamos Employees' Scholarship Fund raises record amount  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos Employees' Scholarship Fund raises record amount Los Alamos Employees' Scholarship Fund raises record amount Community Connections: Our link to Northern New Mexico Communities Latest Issue:Dec. 2013 - Jan. 2014 All Issues » submit Los Alamos Employees' Scholarship Fund raises record amount $555,625 will fund regional students' post-secondary education July 1, 2013 Students from Valarde Middle School won the video competition in the Best in Show and Middle School categories. They are shown here with sixth-grade teacher Jimmy Lara. Lab Director Charlie McMillan throws out the first pitch at an Isotopes game that helped raise funds for Los Alamos National Laboratory Foundation scholarship program Contact Editor Linda Anderman Email Community Programs Office Kurt Steinhaus Email Los Alamos Employees' Scholarship Fund raises record amount

80

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 19, 2011 July 19, 2011 TSO-1013 - In the Matter of Personnel Security The individual works for a Department of Energy (DOE) contractor and is an applicant for a DOE access authorization. In the report of a background investigation, the Office of Personnel Management noted that the individual had a history of anger, unusual behaviors, animal abuse, illegal drug use, court-ordered anger management, and counseling. The Local Security Office (LSO) interviewed the individual on June 9, 2010, regarding these concerns in a Personnel Security Interview (PSI). July 15, 2011 TSO-1003 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 2010. His employer requested that DOE grant the individual a clearance. The individual completed a Questionnaire for National Security

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

82

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

83

Security In Information Systems  

E-Print Network (OSTI)

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

84

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

85

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

86

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

87

Personnel Security  

Directives, Delegations, and Requirements

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

88

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

89

Personnel Security  

Directives, Delegations, and Requirements

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

90

Verb-Raising and Numeral Classifiers in Japanese: Incompatible Bedfellows  

Science Journals Connector (OSTI)

The status of verb-raising in Japanese (or in other languages where such an operation would be string vacuous) has been and still is quite controversial. Recently, Koizumi (2000) has put forward direct evidence f...

Kazuhiko Fukushima

2003-10-01T23:59:59.000Z

91

Los Alamos Employees' Scholarship Fund raises record amount  

NLE Websites -- All DOE Office Websites (Extended Search)

with sixth-grade teacher Jimmy Lara. Lab Director Charlie McMillan throws out the first pitch at an Isotopes game that helped raise funds for Los Alamos National Laboratory...

92

Securing linked transportation systems: economic implications and investment strategies  

E-Print Network (OSTI)

implications and investment strategies Adib Kanafani &research explores agency investment behavior in multi-agencysystems develops guidelines for investments in security. The

Kanafani, Adib; Huang, Jiangchuan

2010-01-01T23:59:59.000Z

93

PSH-12-0021 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - In the Matter of Personnel Security Hearing 21 - In the Matter of Personnel Security Hearing PSH-12-0021 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. The Local Security Office (LSO) received information that the Individual had not filed a state income tax return for the year 2007. Exhibit (Ex.) 3 at 1. Consequently, LSO conducted a personnel security interview (PSI) with the Individual in October 2011. Ex. 7. Because the 2011 PSI failed to resolve the security concerns raised by the Individual's failure to file tax returns, the LSO informed the Individual, in a February 2012 notification letter (Notification Letter), that derogatory information existed which raised security concerns under 10 C.F.R. § 710.8 (l) (Criterion L) and that her security clearance was suspended. Ex. 1. The Notification Letter

94

PSH-12-0003 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-12-0003 - In the Matter of Personnel Security Hearing In September 2011, the Individual, a security clearance holder, was arrested for Driving While Intoxicated (DWI) and subsequently reported the arrest to the Local Security Office (LSO) at the DOE Facility where he worked. DOE Exhibit (Ex.) 19. Neither a September 2011 personnel security interview (PSI) nor a DOE-Contractor Psychologist's (DOE Psychologist) examination and evaluative report of the Individual resolved the security concerns raised by his 2011 DWI arrest. Consequently, the LSO informed the Individual, in a January 2011 notification letter (Notification Letter), that derogatory information existed which raised security concerns under 10

95

PSH-12-0003 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-12-0003 - In the Matter of Personnel Security Hearing In September 2011, the Individual, a security clearance holder, was arrested for Driving While Intoxicated (DWI) and subsequently reported the arrest to the Local Security Office (LSO) at the DOE Facility where he worked. DOE Exhibit (Ex.) 19. Neither a September 2011 personnel security interview (PSI) nor a DOE-Contractor Psychologist's (DOE Psychologist) examination and evaluative report of the Individual resolved the security concerns raised by his 2011 DWI arrest. Consequently, the LSO informed the Individual, in a January 2011 notification letter (Notification Letter), that derogatory information existed which raised security concerns under 10

96

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

97

Energy Security Council  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

98

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

99

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

100

Information Security  

Directives, Delegations, and Requirements

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Information Security  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

102

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network (OSTI)

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

103

Tag: Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

104

Remarkable Teacher Raises Bar for Building Students | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Remarkable Teacher Raises Bar for Building Students Remarkable Teacher Raises Bar for Building Students Remarkable Teacher Raises Bar for Building Students January 7, 2010 - 2:58pm Addthis Eric Barendsen Energy Technology Program Specialist, Office of Energy Efficiency and Renewable Energy For 13 years, Tony Grahame has inspired students to pursue careers building sustainable, energy-efficient houses or to find other niches in the green-building industry. His Residential Building Technology program at Yavapai College in Prescott, Ariz., gets students out of the classroom and constructing real homes in a nearby subdivision. On the jobsite, they learn the skills and knowledge essential to launch their careers as the next generation of energy-efficient builders. Tony's expertise draws from technologies and strategies in residential efficiency and renewable energy developed through

105

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

106

Security Conditions  

Directives, Delegations, and Requirements

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

107

Personnel Security  

Directives, Delegations, and Requirements

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

108

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

109

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

110

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

111

PSH-13-0013 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security 3 - In the Matter of Personnel Security PSH-13-0013 - In the Matter of Personnel Security On May 30, 2013, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns arising from his alcohol use. A DOE psychologist diagnosed the Individual as suffering from alcohol abuse. In addition, the Individual had a number of alcohol-related arrests. The Local Security Office (LSO) raised security concerns related to the diagnosis and arrests under Criteria H and J of the Part 710 regulations. It also raised security concerns related to the arrests under Criterion L of the regulations. The Individual showed that

112

Franklin Fuel Cells raises $3m in new funding  

Science Journals Connector (OSTI)

Pennsylvania-based Franklin Fuel Cells has raised $3m in additional funding from existing investors, including EnerTech Capital, The Reinvestment Fund's Sustainable Development Fund, Hunt Power LP and individual investors, and brings the company's total funding to date to $7.4m.

2005-01-01T23:59:59.000Z

113

Global biofuel drive raises risk of eviction for African farmers  

E-Print Network (OSTI)

Global biofuel drive raises risk of eviction for African farmers African farmers risk being forced from their lands by investors or government projects as global demand for biofuels encourages changes at risk if African farmland is turned over to growing crops for biofuel. With growing pressure to find

114

RAISE THE STANDING AND VISIBILITY OF THE BUSH SCHOOL  

E-Print Network (OSTI)

­ RAISE THE STANDING AND VISIBILITY OF THE BUSH SCHOOL LEVERAGE OUR ENVIRONMENT TO MEET THE NEEDS integrity, freedom and responsibility; respect and consideration for others; ethical and principled conduct within an increasingly diverse, multi-ethnic and multi-cultural environment; to foster national

Mukhtar, Saqib

115

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

116

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

117

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

118

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

119

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

120

Transportation Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

TSO-1104 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1104 - In the Matter of Personnel Security Hearing TSO-1104 - In the Matter of Personnel Security Hearing TSO-1104 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. During the process of applying for a higherlevel security clearance, the individual provided information to the DOE that is inconsistent with information that he previously provided. Because these inconsistencies raised security concerns, the local security office (LSO) summoned the individual for an interview with a personnel security specialist in March 2011. After this Personnel Security Interview (PSI), the LSO referred the individual to a local psychiatrist (hereinafter referred to as "the DOE

122

TSO-1105 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

105 - In the Matter of Personnel Security Hearing 105 - In the Matter of Personnel Security Hearing TSO-1105 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and has held a DOE security clearance for several years. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in June 2011. PSI, DOE Ex. 6. In August 2011, the LSO suspended the individual's DOE security clearance and issued her a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about the individual's eligibility to hold a DOE security clearance. (DOE Ex. 1). Specifically, the LSO alleges that the individual has raised a concern under 10 C.F.R. § 710.8(f) (Criterion F)

123

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

124

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

125

Security for grids  

SciTech Connect

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

126

SPPEAR: security & privacy-preserving architecture for participatory-sensing applications  

Science Journals Connector (OSTI)

Recent advances in sensing, computing, and networking have paved the way for the emerging paradigm of participatory sensing (PS). The openness of such systems and the richness of user data they entail raise significant concerns for their security, privacy ... Keywords: anonymity, participatory sensing, privacy, security

Stylianos Gisdakis; Thanassis Giannetsos; Panos Papadimitratos

2014-07-01T23:59:59.000Z

127

PSH-12-0085 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

85 - In the Matter of Personnel Security Hearing 85 - In the Matter of Personnel Security Hearing PSH-12-0085 - In the Matter of Personnel Security Hearing On November 8, 2012, an OHA Hearing Officer issued a decision in which he concluded the DOE should not grant an individual an access authorization. A Local Security Office (LSO) raised certain concerns regarding (1) false statements by the individual during the security clearance process; (2) the individual's problematic use of alcohol; (3) his use past use of illegal drugs. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to mitigate the security concerns raised by his use of illegal drugs, but not those stemming from his false statements and problematic use of alcohol.

128

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

129

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

130

Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin, Gregor v. Bochmann,  

E-Print Network (OSTI)

Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin (RIAs), using technologies such as Ajax, Flex, or Silverlight, break away from the traditional approach and servers. RIAs introduce new challenges, new security vulnerabilities, and their behavior makes

Jourdan, Guy-Vincent

131

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

132

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

133

Personnel Security Activities  

Directives, Delegations, and Requirements

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

134

Security | Department of Energy  

Energy Savers (EERE)

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

135

Security & Privacy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

136

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

137

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

138

PSH-12-0048 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48 - In the Matter of Personnel Security Hearing 48 - In the Matter of Personnel Security Hearing PSH-12-0048 - In the Matter of Personnel Security Hearing On August 17, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual drank to intoxication once a week and had been diagnosed as suffering from Alcohol Disorder, Not Otherwise Specified, which raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, he found that the individual's continued use of alcohol, in particular, his consumption

139

PSH-12-0053 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53 - In the Matter of Personnel Security Hearing 53 - In the Matter of Personnel Security Hearing PSH-12-0053 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held a DOE access authorization since 1980. DOE Exhibit (Ex.) 6. In October 2006, after reviewing the Individual's credit report during a routine reinvestigation in connection with her security clearance, the Local Security Office (LSO) requested that the Individual participate in a Personnel Security Interview (PSI) in order to discuss concerns raised by the Individual's finances. DOE Ex. 14. The Individual's security clearance was continued at that time. DOE Ex. 6. During a subsequent routine reinvestigation of the Individual's security clearance in 2011, concerns regarding the Individual's delinquent accounts and outstanding judgments surfaced. The

140

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

142

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

143

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

144

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

145

Personnel Security Program Manual  

Directives, Delegations, and Requirements

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

146

Personnel Security Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

147

Office of Security Assistance  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

148

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

149

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

150

Cyber Security & Smart Grid  

E-Print Network (OSTI)

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

151

NETL: News Release - DOE Study Raises Estimates of Coalbed Methane  

NLE Websites -- All DOE Office Websites (Extended Search)

December 16, 2002 December 16, 2002 DOE Study Raises Estimates of Coalbed Methane Potential in Powder River Basin Actual Production Will Hinge on Water Disposal Method WASHINGTON, DC - The Powder River Basin, a vast region of high plains in Wyoming and Montana known for producing low-sulfur coal, is also becoming a primary source of America's fastest growing natural gas resource, coalbed methane. Now, a new Department of Energy report projects that the region may hold more coalbed methane than previously estimated but the amount that will actually be produced will depend largely on the choice of the water disposal method. MORE INFO Download report [7.35MB PDF] The study, Powder River Basin Coalbed Methane Development and Produced Water Management Study, was prepared by Advanced Resources International of

152

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

153

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

154

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

155

Raising H2 and Fuel Cell Awareness in Ohio | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Raising H2 and Fuel Cell Awareness in Ohio Raising H2 and Fuel Cell Awareness in Ohio 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer...

156

Mitigating the Insider Threat Using Behavioral Science Workshop  

SciTech Connect

PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

Landers, John; De Castro, Kara

2012-11-26T23:59:59.000Z

157

Threats to financial system security  

SciTech Connect

The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

McGovern, D.E.

1997-06-01T23:59:59.000Z

158

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

159

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

160

Security Policy, Guidance & Reports  

Energy.gov (U.S. Department of Energy (DOE))

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

PSH-12-0130 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 - In the Matter of Personnel Security Hearing 0 - In the Matter of Personnel Security Hearing PSH-12-0130 - In the Matter of Personnel Security Hearing On April 1, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's 2001 indictment for violation of a federal criminal statute governing conduct of federal employees, and security infractions that she committed in 2010 and 2011, while in her current position, when she brought a cell phone into a Controlled Access Area. The Hearing Officer found that the individual had resolved the concern raised by the 2010 and 2011 security infractions, given her lack of intent, the isolated nature of the events, the fact that she received

162

PSH-11-0037 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0037 - In the Matter of Personnel Security Hearing 1-0037 - In the Matter of Personnel Security Hearing PSH-11-0037 - In the Matter of Personnel Security Hearing This case involves an Individual with a pattern of failing to meet his financial obligations dating back to 1993. A Local Security Office (LSO) has been monitoring the Individual's financial situation since his original application for a security clearance in 2000. In 2006, the LSO received information indicating that the Individual had a large number of delinquent debts. The LSO subsequently conducted a series of five Personal Security Interviews (PSI) of the Individual, the most recent on September 29, 2011. Unable to resolve the security concerns raised by the Individual's continuing financial issues, and by the sometimes inconsistent and contradictory information provided by the Individual, the

163

PSH-13-0097 - In the matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 - In the matter of Personnel Security Hearing 7 - In the matter of Personnel Security Hearing PSH-13-0097 - In the matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. A Local Security Office (LSO) summoned the individual for a Personnel Security Interview (PSI), with a personnel security specialist on June 4, 2013, in order to address issues raised by an information report that he had failed to meet his income tax obligations and had his wages garnished by the Internal Revenue Service (IRS) as a result. Exhibits 5, 8. After the PSI, the LSO determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth the DOE's security concerns

164

Information Security Policy Policy Title Information Security Policy  

E-Print Network (OSTI)

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

165

Raising the acceptance of the AP2-line  

SciTech Connect

The 120 GeV Main Ring proton beam collides with the target at the end of the AP-1 line and creates antiprotons and other secondary particles. The AP-2 line transfers the negative particles from the target to the Debuncher. To provide a bigger antiproton stack size in the Accumulator, both the Debuncher as well as the AP-2 line acceptance have to be raised. This is a proposal for the improvement of the AP-2 line acceptance. The first part of the memo presents an acceptance examination of the existing AP-2 line by computer simulation, while the second presents a short proposal for aperture corrections. The computer program TURTLE was used to trace antiprotons through the AP-2 line without taking into account other negative charged particles. Betatron functions were obtained from the output of the SYNCH computer program. The SYNCH program was also used to check the dispersion match between the AP-2 line and the Debuncher. 3 refs., 6 figs., 5 tabs.

Trbojevic, D.

1989-04-05T23:59:59.000Z

166

Personal Security Assistance for Secure Internet Commerce  

E-Print Network (OSTI)

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

167

Economic Man'' Dominate Social Behavior?  

E-Print Network (OSTI)

When Does `` Economic Man'' Dominate Social Behavior? Colin F. Camerer1 * and Ernst Fehr2,3 The canonical model in economics considers people to be rational and self-regarding. However, much evidence challenges this view, raising the question of when `` Economic Man'' dominates the outcome of social

Greer, Julia R.

168

Recommendations to Address Power Reliability Concerns Raised as a Result of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Address Power Reliability Concerns Raised as a to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Memorandum from the Electricity Advisory Committee to Secretary Chu and Assistant Secretary Patricia Hoffman on recommendations to address power reliability concerns raised as a result of pending environmental regulations for electric generation stations. Recommendations to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations More Documents & Publications DOE Response to EAC Recommendations - March 2012 Interdependence of Electricity System Infrastructure and Natural Gas

169

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

170

Office of Security Policy  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

171

Office of Information Security  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

172

Data Security ROCKVILLE, MD  

E-Print Network (OSTI)

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

173

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

174

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

175

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

176

Emergent Behavior in Cybersecurity Shouhuai Xu  

E-Print Network (OSTI)

Emergent Behavior in Cybersecurity Shouhuai Xu Department of Computer Science, University of Texas at San Antonio ABSTRACT We argue that emergent behavior is inherent to cybersecurity. Keywords Emergent behavior, cybersecurity, security properties 1. INTRODUCTION The human-created cyberspace is a very large

Xu, Shouhuai

177

Personnel Security Program Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

178

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

179

What is Security? A perspective on achieving security  

SciTech Connect

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

180

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

182

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

183

PSH-13-0064 - In the matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the matter of Personnel Security Hearing 4 - In the matter of Personnel Security Hearing PSH-13-0064 - In the matter of Personnel Security Hearing On October 11, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol habitually to excess and an opinion of a DOE consultant psychologist (DOE psychologist) that the individual's lack of maturity leaves significant questions as to his judgment and reliability. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer did not find that the individual had an "illness or mental condition" that would raise a concern under the DOE regulations, but concluded that the individual had

184

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

185

PSH-13-0039 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 - In the Matter of Personnel Security 9 - In the Matter of Personnel Security PSH-13-0039 - In the Matter of Personnel Security On July 3, 2013, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns raised by the Local Security Office (LSO) under Criterion L arising from his six alcohol-related arrests, multiple traffic citations, and false statement during a Personnel Security Interview (PSI). The most recent alcohol-related arrest was Aggravated Driving While Intoxicated arrest, which occurred in October 2012. At the hearing, the Individual denied having consumed alcohol prior to the arrest, yet he refused to take a

186

PSH-11-0036 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0036 - In the Matter of Personnel Security Hearing 1-0036 - In the Matter of Personnel Security Hearing PSH-11-0036 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held an access authorization for several years. DOE Exhibit (Ex.) 6 at 1. Pursuant to an investigation, it was discovered that the Individual, for a second period of time, had not filed state or federal tax returns. Ex. 4 at 1-2. This discovery prompted the Local Security Office (LSO) to conduct a Personnel Security Interview (PSI) with the Individual in October 2011. Ex. 5. After conducting the October 2011 PSI with the Individual, the LSO informed the Individual in a November 2011 notification letter (Notification Letter) that derogatory information existed that raised security concerns under 10

187

PSH-12-0088 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-0088 - In the Matter of Personnel Security Hearing 2-0088 - In the Matter of Personnel Security Hearing PSH-12-0088 - In the Matter of Personnel Security Hearing On November 15, 2012, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should be restored. In reaching this determination, the Hearing Officer found that the Individual had resolved the security concerns arising from his alcohol use. The Individual was diagnosed by a DOE psychologist with Alcohol-Related Disorder, Not Otherwise Specified. In addition, the Individual had five alcohol-related incidents in his past, including a positive Breath Alchol Test (BAT) in March 2012. The hearing officer found that the Local Security Office (LSO) properly raised security concerns under Criteria H, J, and L.

188

PSH-12-0046 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-12-0046 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and holds a DOE access authorization, now in suspension. During 2009 through 2011, the individual used hydrocodone other than as directed and was consuming increasing amounts of alcohol. In October 2011, he voluntarily admitted himself into a substance abuse program at a local hospital. Upon discharge from the hospital, a psychologist diagnosed the individual with alcohol and opioid dependence. Because this information raised concerns about the individual's continued eligibility for access authorization, the local security office (LSO) called him in for an interview with a personnel security specialist. After the Personnel Security Interview (PSI) failed to

189

PSH-12-0042 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42 - In the Matter of Personnel Security Hearing 42 - In the Matter of Personnel Security Hearing PSH-12-0042 - In the Matter of Personnel Security Hearing This case involves an Individual who failed to meet his financial obligations during the final years of his first marriage. The Individual reported the repossession of his motor vehicle and a home foreclosure to the Local Security Office (LSO) in 2008. The LSO subsequently conducted a series of three Personal Security Interviews (PSI) of the Individual, the most recent on February 1, 2012. Unable to resolve the security concerns raised by the Individual's failure to resolve his financial issues, the LSO initiated administrative review proceedings by issuing a letter (Notification Letter) advising the Individual that it possessed reliable information that created a substantial doubt regarding his eligibility to

190

Raising Investment Funds for Clean Energy Programs & Working with Financial Institutions  

Energy.gov (U.S. Department of Energy (DOE))

PowerPoint presentation of a Techincal Assistance Program webinar entitled, Raising Investment Funds for Clean Energy Programs & Working with Financial Institutions

191

E-Print Network 3.0 - amendment issues raised Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

sequester contaminants. For treatments traditionally used to raise the p... .6.6.375 Mineral-Based Amendments for Remediation INTRODUCTION The ... Source: Lawrence Berkeley...

192

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

193

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

194

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

195

SECURITY TERMINATION STATEMENT | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

196

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

197

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

198

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

199

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

200

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

202

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

203

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

204

Office of Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

205

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

206

Office of Security Enforcement | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

207

Industrial Security Specialst  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

208

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE))

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

209

Industrial and Grid Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

210

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

211

Securing Cloud Storage Service.  

E-Print Network (OSTI)

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

212

Cyber Security Architecture Guidelines  

Directives, Delegations, and Requirements

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

213

TEC Information Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

214

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

215

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

216

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

217

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

218

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

219

Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

220

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

222

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

223

Incidents of Security Concern  

SciTech Connect

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

224

Information Security Program  

Directives, Delegations, and Requirements

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

225

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

226

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

227

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

228

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

229

Detecting and Mitigating Security Risks  

E-Print Network (OSTI)

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

230

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network (OSTI)

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

231

Energy Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

232

January 2007 SECURITY CONTROLS FOR  

E-Print Network (OSTI)

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

233

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

234

Security and Privacy Notices | NREL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

235

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

236

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

237

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

238

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

239

PSH-12-0136 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0136 - In the Matter of Personnel Security Hearing PSH-12-0136 - In the Matter of Personnel Security Hearing PSH-12-0136 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. In June 2012, the individual was arrested and charged with Aggravated Driving While Intoxicated (DWI). Exhibits 7, 8. Because of the concern this arrest raised, a Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on July 30, 2012. Exhibit 16 (PSI Transcript). After the PSI, the LSO referred the individual to a local psychologist (hereinafter referred to as "the DOE Psychologist") for an agency-sponsored evaluation. The DOE Psychologist prepared a written report, setting forth the results of that

240

PSH-12-0100 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

100 - In the Matter of Personnel Security Hearing 100 - In the Matter of Personnel Security Hearing PSH-12-0100 - In the Matter of Personnel Security Hearing On November 15, 2012, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) raised certain concerns regarding the individual's use of alcohol, citing a recent arrest for Aggravated Driving Under the Influence (DUI) and a diagnosis by a DOE consultant psychologist (DOE Psychologist) that the individual suffered from Alcohol Dependence. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. The individual had abstained from the use of alcohol in the

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

PSH-12-0077 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

77 - In the Matter of Personnel Security Hearing 77 - In the Matter of Personnel Security Hearing PSH-12-0077 - In the Matter of Personnel Security Hearing On October 25, 2012, an OHA Hearing Officer issued a decision in which he concluded the DOE should not grant an individual an access authorization. A Local Security Office (LSO) raised certain concerns regarding (1) diagnoses by a DOE consultant psychologist (DOE Psychologist) that the individual suffered from Alcohol Dependence and Personality Disorder NOS; (2) the individual's history of problematic alcohol use; (3) prior criminal conduct of the individual; (4) evidence of the individual's financial irresponsibility; and (5) inconsistent information provided to DOE during the security clearance process. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer

242

PSH-12-0097 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 - In the Matter of Personnel Security Hearing 7 - In the Matter of Personnel Security Hearing PSH-12-0097 - In the Matter of Personnel Security Hearing On November 29, 2012, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be restored. The Individual had been charged with committing a sexual battery. Although the Individual had testified that a jury had acquitted him of this charge, the Individual did not provide any documentation that he had been acquitted. Nor had the Individual presented sufficient evidence to resolve the concerns raised by his conduct. The Individual had also intentionally provided misleading information during a personnel security interview. The Hearing Officer found that the Individual had not mitigated any of these security concerns at the hearing.

243

PSH-13-0073 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security 3 - In the Matter of Personnel Security PSH-13-0073 - In the Matter of Personnel Security On September 27, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol habitually to excess and a diagnosis by a DOE consultant psychologist (DOE psychologist) that the individual met criteria found in the Diagnostic and Statistical Manual of Mental Disorders IV-TR (DSM-IV-TR) for Posttraumatic Stress Disorder (PTSD). After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. The individual

244

PSH-13-0107 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 - In the Matter of Personnel Security 7 - In the Matter of Personnel Security PSH-13-0107 - In the Matter of Personnel Security On November 29, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol habitually to excess and an opinion by a DOE consultant psychologist (DOE psychologist) that the individual's excessive use of alcohol was an illness or mental conditions that causes or may cause a significant defect in judgment and reliability. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. The individual

245

PSH-13-0006 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-13-0006 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. The Hearing Officer found that (1) the individual had not resolved the concerns raised by his problematic use of alcohol, as he had received no treatment in the six

246

PSH-13-0006 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. The Hearing Officer found that (1) the individual had not resolved the concerns raised by his problematic use of alcohol, as he had received no treatment in the six months since being arrested for DWI, and had previously relapsed after

247

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

248

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

249

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

250

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

251

The radial velocity signature of tides raised in stars hosting exoplanets  

E-Print Network (OSTI)

Close-in, massive exoplanets raise significant tides in their stellar hosts. We compute the radial velocity (RV) signal due to this fluid motion in the equilibrium tide approximation. The predicted RVs in the observed ...

Arras, Phil

252

Nexus Energy Center Raises Funds for Energy-Saving Tiny Home  

Energy.gov (U.S. Department of Energy (DOE))

Nexus Energy Center, a Huntsville, Alabama-based Better Buildings Residential Network member, is trying to raise $5,000 through a crowd-funding effort to build the citys first tiny, energy...

253

A hedge fund business plan : investment theory, operations, and capital raising for Broadgates Capital Management  

E-Print Network (OSTI)

Launching a start-up hedge fund is a complex, multifaceted endeavor that requires an understanding of the interconnectivity between capital raising, investment strategy, regulation, and fund operations. The purpose of this ...

Mills, Jeffrey David

2014-01-01T23:59:59.000Z

254

Using finite element structural analysis to study retroreflective raised pavement markers  

E-Print Network (OSTI)

This thesis investigates the stress inside Retroreflective Raised Pavement Markers (RRPMs) under tire-marker impact and laboratory testing scenarios. Many RRPMs have poor durability although they meet certain standards of the existing laboratory...

Tong, Jiaxin

2009-06-02T23:59:59.000Z

255

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

256

Headquarters Security Quick Reference Book  

Energy.gov (U.S. Department of Energy (DOE))

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

257

November 2003 NETWORK SECURITY TESTING  

E-Print Network (OSTI)

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

258

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network (OSTI)

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

259

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

260

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Requirements for security signalling  

SciTech Connect

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

262

Safeguards and Security Program  

Directives, Delegations, and Requirements

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

263

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

264

Operations Security Program  

Directives, Delegations, and Requirements

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

265

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

266

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

267

Safeguards and Security Program  

Directives, Delegations, and Requirements

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

268

Safety, Security & Fire Report  

E-Print Network (OSTI)

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

269

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

270

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

271

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

272

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

273

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

274

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

275

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

276

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

277

Incidents of Security Concern  

Directives, Delegations, and Requirements

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

278

Security systems engineering overview  

SciTech Connect

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

279

Raising Minnows.  

E-Print Network (OSTI)

, phosphorus and potassium seem to give highest plankton production most economica lly . An ap plication rate of 10 pounds of phosphorus per Fig. 4. Fertilization allows for a larger poundage per acre of pond. surface acre is recommended. An example ap...

Johnson, Ken S.; Davis, James T.

1981-01-01T23:59:59.000Z

280

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Lemnos Interoperable Security Program  

SciTech Connect

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

282

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

283

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

284

Tag: GTRI | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

285

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

286

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

287

Sandia National Laboratories: Water Security Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

288

Integrated safeguards and security management plan  

E-Print Network (OSTI)

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

289

Sandia National Laboratories: National Security Missions: Internationa...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

290

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network (OSTI)

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

291

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

292

Security, Emergency Planning & Safety Records | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

293

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

294

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

295

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

296

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

297

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

298

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

299

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

300

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

302

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

303

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

304

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

305

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

306

A Barn Raising For the 21st Century | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Barn Raising For the 21st Century A Barn Raising For the 21st Century A Barn Raising For the 21st Century October 14, 2011 - 3:02pm Addthis Bob Repine, Oregon Department of Energy director, presents the Benton County Fairgrounds solar barn built with American Recovery and Reinvestment Act funds. The rooftop solar array will produce nearly a quarter of the energy used at the fairgrounds and the 12,000-square-foot space will house livestock and the Solar Education Center. | Photo courtesy of the Oregon Department of Energy Bob Repine, Oregon Department of Energy director, presents the Benton County Fairgrounds solar barn built with American Recovery and Reinvestment Act funds. The rooftop solar array will produce nearly a quarter of the energy used at the fairgrounds and the 12,000-square-foot space will house

307

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

308

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

309

Engineering secure software  

E-Print Network (OSTI)

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

310

Quantum-secured imaging  

E-Print Network (OSTI)

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

311

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network (OSTI)

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

312

Security in grid computing: A review and synthesis  

Science Journals Connector (OSTI)

This paper provides an extensive survey of the different methods of addressing security issues in the grid computing environment, and specifically contributes to the research environment by developing a comprehensive framework for classification of these research endeavors. The framework presented classifies security literature into System Solutions, Behavioral Solutions, Hybrid Solutions and Related Technologies. Each one of these categories is explained in detail in the paper to provide insight as to their unique methods of accomplishing grid security, the types of grid and security situations they apply best to, and the pros and cons for each type of solution. Further, several areas of research were identified in the course of the literature survey where more study is warranted. These avenues for future research are also discussed in this paper. Several types of grid systems exist currently, and the security needs and solutions to address those needs for each type vary as much as the types of systems themselves. This research framework will aid in future research efforts to define, analyze, and address grid security problems for the many varied types of grid setups, as well as the many security situations that each grid may face.

Erin Cody; Raj Sharman; Raghav H. Rao; Shambhu Upadhyaya

2008-01-01T23:59:59.000Z

313

Case Study: Interactive Visualization for Internet Security Soon Tee Teoh  

E-Print Network (OSTI)

] to communicate. A good way to un- derstand the behaviors and performance of the Internet is thus to collectCase Study: Interactive Visualization for Internet Security Soon Tee Teoh Kwan-Liu Ma S. Felix Wu North Carolina State University ABSTRACT Internet connectivity is defined by a set of routing protocols

California at Davis, University of

314

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network (OSTI)

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

315

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network (OSTI)

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

316

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

317

A study on a systematic method for evaluating values of raised concerns  

Science Journals Connector (OSTI)

The objective of this study is to develop a methodology that can externalise potential concerns and evaluate the values of the concerns raised in corporations. By implementing this methodology into corporate governance, it is expected to improve the work environment and enhance the capability for the corporate governance through supporting the internal autonomic purification. This study comprises of: case studies of past wrongdoings in corporations such as JCO and Tokyo Electric Power Company (TEPCO); identifying the viewpoints for evaluating values of raised concerns; developing a model to evaluate the values.

T. Sawada; T. Morimoto; N. Iida; T. Nishimura; Y. Soda; K. Itoh; H. Tanaka

2006-01-01T23:59:59.000Z

318

16 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 1, MARCH 2008 Color Image Watermarking Using Multidimensional  

E-Print Network (OSTI)

data extremely easy and convenient. However, this raises a big concern in how to secure these data--Color, data hiding, digital image watermarking, quaternion Fourier transform (QFT), spatiochromatic discrete are with the Department of Electrical and Computer Engineering, Ryerson University, Toronto, ON M5B 2K3, Canada (e

Zhang, Xiao-Ping

319

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

320

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Automated analysis of security APIs  

E-Print Network (OSTI)

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

322

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network (OSTI)

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

323

Architectural support for enhancing security in clusters  

E-Print Network (OSTI)

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

324

PSH-13-0018 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 - In the Matter of Personnel Security Hearing 8 - In the Matter of Personnel Security Hearing PSH-13-0018 - In the Matter of Personnel Security Hearing On May 23, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be granted. The Individual had a history of six arrests, five of which were alcohol-related and two of which were marijuana-related. In addition, A DOE Psychologist diagnosed the individual with Alcohol Dependence. The Hearing Officer found that the Individual had not mitigated any the security concerns raised by his alcohol abuse and history of criminal conduct at the hearing, because he was only in the early stages of his recovery from his alcohol dependence, and his alcohol dependence was a contributing factor to much of his criminal conduct. The Hearing Officer

325

PSH-13-0083 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-13-0083 - In the Matter of Personnel Security Hearing On October 21, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be restored. The Record showed that the individual had a history of three alcohol-related arrests. A DOE Psychologist also diagnosed the individual with Alcohol-Abuse. The Hearing Officer found that the Individual had not shown that he was reformed or rehabilitated from his Alcohol-Abuse. Nor had the individual mitigated the security concerns raised by his criminal activity since that activity was symptomatic of his Alcohol Abuse. Steven Fine - Hearing Officer PSH-13-0083.pdf More Documents & Publications

326

PSH-13-0088 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 - In the Matter of Personnel Security 8 - In the Matter of Personnel Security PSH-13-0088 - In the Matter of Personnel Security On October 10, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be restored. The Record showed that the individual had a DWI, an arrest for an outstanding warrant for arrest, and an alcohol-related termination of employment. A DOE Psychologist also diagnosed the individual with Alcohol-Abuse. The Hearing Officer found that the Individual had not shown that he was reformed or rehabilitated from his Alcohol-Abuse. Nor had the individual mitigated the security concerns raised by his criminal activity since that activity was symptomatic of his Alcohol Abuse. The Hearing officer also found that the LSO's allegation that the individual

327

PSH-13-0086 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-13-0086 - In the Matter of Personnel Security Hearing On October 29, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should be restored. The Record showed that the individual had two DUIs and that a DOE Psychologist also diagnosed him with Alcohol-Abuse. After hearing the testimony of a DOE Psychiatrist that, in his expert opinion, the Individual was far enough along in his recovery to be reformed or rehabilitated from his Alcohol Abuse, the Hearing Officer found that the Individual had shown that he was reformed or rehabilitated from his Alcohol-Abuse, and had therefore mitigated the security concerns raised by his Alcohol Abuse and criminal activity since that activity was symptomatic

328

PSH-13-0063 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-13-0063 - In the Matter of Personnel Security Hearing On September 12, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) raised certain concerns regarding the individual's use of alcohol, citing a diagnosis by a DOE consultant psychologist (DOE psychologist) that the individual had suffered from Alcohol Dependence, which since had attenuated to Alcohol Abuse; the recommendation of the individual's primary care physician that the individual stop consuming alcohol and the physician's diagnoses of alcoholism, alcoholic hepatitis, liver damage, and type 2 diabetes; and statements by the individual regarding his use of alcohol and efforts at

329

PSH-13-0065 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 - In the Matter of Personnel Security Hearing 5 - In the Matter of Personnel Security Hearing PSH-13-0065 - In the Matter of Personnel Security Hearing On September 12, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) raised certain concerns regarding the individual's use of alcohol, citing a diagnosis by a DOE consultant psychologist (DOE psychologist) that the individual had suffered from Alcohol Dependence, which since had attenuated to Alcohol Abuse; the recommendation of the individual's primary care physician that the individual stop consuming alcohol and the physician's diagnoses of alcoholism, alcoholic hepatitis, liver damage, and type 2 diabetes; and statements by the individual regarding his use of alcohol and efforts at

330

PSH-13-0108 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-13-0108 - In the Matter of Personnel Security PSH-13-0108 - In the Matter of Personnel Security PSH-13-0108 - In the Matter of Personnel Security On December 6, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol and an opinion by a DOE consultant psychiatrist (DOE psychiatrist) that the individual met criteria for a diagnosis of Alcohol Abuse under the Diagnostic and Statistical Manual of Mental Disorders (DSM), Fourth Edition, Text Revision, and Alcohol Use Disorder, Mild, under the DSM, Fifth Edition, and that both disorders are illnesses or mental conditions that cause or may cause a significant defect in judgment and reliability. After conducting a hearing and evaluating

331

PSH-13-0063 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-13-0063 - In the Matter of Personnel Security Hearing PSH-13-0063 - In the Matter of Personnel Security Hearing PSH-13-0063 - In the Matter of Personnel Security Hearing On September 12, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) raised certain concerns regarding the individual's use of alcohol, citing a diagnosis by a DOE consultant psychologist (DOE psychologist) that the individual had suffered from Alcohol Dependence, which since had attenuated to Alcohol Abuse; the recommendation of the individual's primary care physician that the individual stop consuming alcohol and the physician's diagnoses of alcoholism, alcoholic hepatitis, liver damage, and type 2 diabetes; and statements by the individual regarding his use of alcohol and efforts at

332

East Asian Security in 2025  

E-Print Network (OSTI)

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

333

About SRNL - Directorates - National Security  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

334

Safeguard Security and Awareness Program  

Directives, Delegations, and Requirements

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

335

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

336

Safeguards and Security Program References  

Directives, Delegations, and Requirements

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

337

Transmission Line Security Monitor  

SciTech Connect

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

338

Safeguards and Security Program  

Directives, Delegations, and Requirements

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

339

Information Security Manual  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

340

Information Security Manual  

Directives, Delegations, and Requirements

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

342

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

343

National Security System Manual  

Directives, Delegations, and Requirements

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

344

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

345

Headquarters Security Operations  

Energy.gov (U.S. Department of Energy (DOE))

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

346

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

347

Security Science & Technology | Nuclear Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

348

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

349

Security Control Assessor | Department of Energy  

Energy Savers (EERE)

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

350

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

351

Deep-Sea Salvage: Did CIA Use Mohole Techniques to Raise Sub?  

Science Journals Connector (OSTI)

...Pacific would not contain real warheads, or anything resem-bling...an object reaching the ocean intact. * Hydrophones. Hydrophone...Russian submarine was raised intact from the ocean floor some 750...midship sec-tion is fairly intact. The Thresher broke in-to...

Nicholas Wade

1975-05-16T23:59:59.000Z

352

The HapMap project has raised high hopes for mapping genetic determinants of complex human  

E-Print Network (OSTI)

The HapMap project has raised high hopes for mapping genetic determinants of complex human disease for mapping studies in human populations around the world. The HapMap project has characterized haplotype structures across the genome for four human populations with the goal of enabling genome-wide sets of SNPs

Rosenberg, Noah

353

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

354

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

355

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

356

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

357

Headquarters Facilities Master Security Plan  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

358

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

359

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

360

Chapter_3_Personnel_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

362

Security, Safety and Health  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

363

Security Administration Production Office,  

NLE Websites -- All DOE Office Websites (Extended Search)

JUNE/JULY 2013 JUNE/JULY 2013 inside this issue ... Reaching the summit - Big hitters talk economic development Page 3 Saving yesterday's knowledge today Page 5 What's a fellow to do? Page 6 ... and other Y-12 news On June 3 newly appointed Secretary of Energy Ernest Moniz (right) made Oak Ridge the site of his first official visit since being sworn in as head of the U.S. Department of Energy. Secretary Moniz met earlier in the day with national lab directors at Oak Ridge National Laboratory, then came to Y-12 for tours and a meeting with the National Nuclear Security Administration Production Office, B&W Y-12 and ORNL employees. He was joined by Rep. Chuck Fleischmann. The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental

364

HEADQUARTERS SECURITY OFFICERS  

NLE Websites -- All DOE Office Websites (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

365

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

366

The Cyber Security Crisis  

SciTech Connect

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

367

TSO-1013 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1013 - In the Matter of Personnel Security TSO-1013 - In the Matter of Personnel Security TSO-1013 - In the Matter of Personnel Security The individual works for a Department of Energy (DOE) contractor and is an applicant for a DOE access authorization. In the report of a background investigation, the Office of Personnel Management noted that the individual had a history of anger, unusual behaviors, animal abuse, illegal drug use, court-ordered anger management, and counseling. The Local Security Office (LSO) interviewed the individual on June 9, 2010, regarding these concerns in a Personnel Security Interview (PSI). Because the LSO could not resolve these issues to its satisfaction, it referred the individual to a DOE consultant psychiatrist (the DOE psychiatrist) for evaluation. Based on that evaluation and her review of the individual's personnel security

368

2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

369

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

370

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

371

OSTI raises $2,400 for Norwood, Dutch Valley, Andersonville, Briceville,  

Office of Scientific and Technical Information (OSTI)

FOR IMMEDIATE RELEASE February 1, 2006 OSTI raises $2,400 for Norwood, Dutch Valley, Andersonville, Briceville, and Fairview Elementary Schools Oak Ridge, TN - The U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI) raised $2,400 during its recent annual Adopt-A-School auction featuring auctioneer Bear Stevenson. The auction was held at Kern Methodist Church in Oak Ridge and benefits Norwood, Andersonville, Briceville, Dutch Valley, and Fairview Elementary Schools. Supplies were delivered to the schools January 27, and included construction paper, markers, pencils, pens, staplers, paper clips, magic tape, video tape, post-it-notes, tissues, file folders, copy paper, and more. OSTI has been Adopt-a-School partner of Norwood Elementary School for

372

OSTI raises $2,400 for Norwood, Dutch Valley, Andersonville, Briceville,  

Office of Scientific and Technical Information (OSTI)

FOR IMMEDIATE RELEASE FOR IMMEDIATE RELEASE February 1, 2006 OSTI raises $2,400 for Norwood, Dutch Valley, Andersonville, Briceville, and Fairview Elementary Schools Oak Ridge, TN - The U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI) raised $2,400 during its recent annual Adopt-A-School auction featuring auctioneer Bear Stevenson. The auction was held at Kern Methodist Church in Oak Ridge and benefits Norwood, Andersonville, Briceville, Dutch Valley, and Fairview Elementary Schools. Supplies were delivered to the schools January 27, and included construction paper, markers, pencils, pens, staplers, paper clips, magic tape, video tape, post-it-notes, tissues, file folders, copy paper, and more. OSTI has been Adopt-a-School partner of Norwood Elementary School for

373

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

SciTech Connect

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

374

Intermountain CFC Raises $2,502,457 for Charity in 2007  

NLE Websites -- All DOE Office Websites (Extended Search)

22, 2008 22, 2008 Intermountain CFC Raises $2,502,457 for Charity in 2007 DOE-Idaho Employees Contributed $74,000 to the Campaign ODGEN, UTAH - Intermountain CFC, the charitable fundraising vehicle for federal employees throughout Utah, western Colorado, southeastern Idaho and Wyoming, raised an all-time high of $2,502,457 for charitable causes in 2007, the organization today reported. Thanks to generous federal employees and a creative "2-Minute Hero" theme, the 2007 total exceeded the 2006 record by more than $193,000, with an average gift of $270 per federal employee. "Our goal for 2007 was to raise $2,450,000, but the generous federal workers in our region sailed right past that mark and exceeded everyone's expectations," said COL Anne Davis, commander at Tooele Army Depot and the 2007 Chair of the Local Federal Coordinating Committee (LFCC) for the Intermountain CFC. "Thanks to the efforts of countless volunteers and generous donors, we're making a difference by supporting hundreds of local, national and international charitable organizations."

375

Solar Decathlon 2013: Raising More Than Just Walls | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Decathlon 2013: Raising More Than Just Walls Solar Decathlon 2013: Raising More Than Just Walls Solar Decathlon 2013: Raising More Than Just Walls September 10, 2013 - 1:36pm Addthis Key to the University of North Carolina at Charlotte's fundraising success was involving the local community. To celebrate the groundbreaking of their Solar Decathlon house, the team invited all of their sponsors to the event. | Photo courtesy of the University of North Carolina at Charlotte. Key to the University of North Carolina at Charlotte's fundraising success was involving the local community. To celebrate the groundbreaking of their Solar Decathlon house, the team invited all of their sponsors to the event. | Photo courtesy of the University of North Carolina at Charlotte. To fund their Solar Decathlon house, Team Ontario took an “all hands on deck” approach rather than leave the daunting task of fundraising to a few team members. | Photo courtesy of the Energy Department.

376

Moorland pools as refugia for endangered species characteristic of raised bog gradients  

Science Journals Connector (OSTI)

In intact raised bog landscapes transitions from ombrotrophic into minerotrophic conditions occur. These gradients are lost from many bogs due to peat harvesting and drainage, and are difficult to restore. To determine which endangered species are characteristic of pristine raised bog gradients and their current status in degraded bogs, plants and macroinvertebrates were surveyed in Estonian intact raised bogs and Dutch degraded bog remnants. Dutch national distribution data were used to determine whether communities with these species occurred outside bog habitats. Water chemistry data were used to describe associated environmental conditions. Intact bog gradients were the preferred habitat for six plant species and fifteen macroinvertebrate species, all of which are endangered. In degraded bogs these species were scarce or not recorded. In intact bogs these species lived at sites where runoff from the bog massif came into contact with regional ground water resulting in a gradient in pH, alkalinity, Ca, Fe and ionic ratio. Analysis of Dutch national distribution data revealed aggregations of these endangered species in moorland pools. These pools contained water chemistry gradients similar to those found in pristine bogs, which occurred at sites were groundwater seepage and stream water came in contact. In the past, stream water has been used to increase pH and trophic status of moorland pools facilitating fisheries. Today, this practice offers a conservation strategy for the protection of endangered species for which no short-term alternatives are available.

Hein H. van Kleef; Gert-Jan A. van Duinen; Wilco C.E.P. Verberk; Rob S.E.W. Leuven; Gerard van der Velde; Hans Esselink

2012-01-01T23:59:59.000Z

377

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

378

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

379

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

380

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 30, 2013 August 30, 2013 PSH-13-0049 - In the Matter of Personnel Security On August 30, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns under Criterion L regarding the Individual's failure to report an arrest for failure to appear at an arraignment concerning traffic tickets and a citation for failing to have a controlled prescription medication in its proper container. August 29, 2013 PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 22, 2012 August 22, 2012 PSH-12-0065 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. Exhibit (Ex.) 10 at 3. The Local Security Office (LSO) discovered that the Individual failed to list a 2004 Driving Under the Influence (DUI) arrest in a Questionnaire for National Security Positions form completed in October 2011. Ex. 10 at 10. August 22, 2012 PSH-12-0045 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he determined that an Individual's DOE security clearance should be restored. The Individual had been caught viewing pornography on a DOE workplace computer. August 17, 2012 PSH-12-0048 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he concluded that an

382

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 20, 2012 June 20, 2012 PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. June 13, 2012 PSH-12-0010 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and is an applicant for DOE access authorization. In August 2010, the individual completed a Questionnaire for National Security Positions (QNSP) and was

383

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

384

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

385

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Energy Savers (EERE)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

386

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

387

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

388

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

389

PIA - WEB Physical Security Major Application | Department of...  

Energy Savers (EERE)

Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application More...

390

ETTP Security Access Control System (ESACS) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

391

Safeguards and security progress report, January-December 1985  

SciTech Connect

From January to December 1985, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Safeguards Operations, Security Development and Support, Safeguards Technology Development, and International Support. Part 1 covers efforts of direct assistance to the Department of Energy and Nuclear Regulatory Commission licensee facilities. This assistance includes consultation on materials accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and evaluation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards makes the technology more accessible to those who must apply it. Part 2 treats activities aimed at the security of information and computer systems. Our focus this period was on continuing the activities of the Center for Computer Security, which provides the basis for encouraging and disseminating this emerging technology, and on the development and demonstration of secure computer systems. Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards and international safeguards for reprocessing plants required a significant portion of our resources. All of these efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in our benefiting from field experiences in operating environments.

Not Available

1987-03-01T23:59:59.000Z

392

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

393

Newsletters | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

394

Speeches | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

395

Safety and Security Enforcement Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

396

Climate Change and National Security  

E-Print Network (OSTI)

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

397

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Wind Generator Modeling On June 26, 2014, in Computational Modeling & Simulation, Energy, Energy Surety, Grid Integration, Infrastructure Security, Modeling, Modeling & Analysis,...

398

Hardware Security through Design Obfuscation.  

E-Print Network (OSTI)

??Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs (more)

Chakraborty, Rajat Subhra

2010-01-01T23:59:59.000Z

399

Jordan | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Jordan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

400

Personnel Security Corner- PERSEC Corner  

Energy.gov (U.S. Department of Energy (DOE))

Welcome to the Departmental Personnel Security PERSEC Corner document collection. If you have not yet registered for access to this information, please complete our Registration form.

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

russia | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

russia | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

402

Energy Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber-physical solutions Cybersecurity for energy delivery systems outreach AMI smart metering upgradeability test framework Practical quantum security for grid automation...

403

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News & Events, Photovoltaic, Renewable...

404

David Telles wins NNSA Security  

NLE Websites -- All DOE Office Websites (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

405

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

406

Secure Data Center (Fact Sheet)  

SciTech Connect

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

407

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Sandia Study Shows Large LNG Fires Hotter but Smaller Than Expected On December 6, 2011, in Analysis, Energy Assurance, Infrastructure Security, Modeling, Modeling & Analysis,...

408

National Nuclear Security Administration Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2011 - 1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role: Ensuring our Nation's Security * Maintaining the safety, security and effectiveness of the nuclear weapons stockpile without nuclear testing * Reducing the global danger from the proliferation of nuclear weapons and materials * Provide safe and effective nuclear propulsion for the

409

Speeches | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

410

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

require authoization be obtained throught the SNL Foreign National Request (FNR) Security Plan (SP) electronic process. The Contractor and Subcontractor must notify their...

411

Information Technology Management ((Information Security))  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as an Information Technology Specialist (Information Security) with responsibility for the implementation of a wide range of technically complex...

412

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

the potential danger associated with an item is questionable, consult the physical security contact for additional information. Illegal drugs (does not include controlled...

413

National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology

414

Cyberspace security system  

SciTech Connect

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

415

A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS  

E-Print Network (OSTI)

A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS Thomas Neubauer Secure Business Austria of security safeguards is often a result of current needs or influ- enced by security problems that may go decision makers with an overview of common methods for the evaluation and selection of security safeguards

416

Computer Security Division 2009 Annual Report  

E-Print Network (OSTI)

Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

417

Access control models and security labelling  

Science Journals Connector (OSTI)

Security labels convey information that is utilised to perform access control decisions, specify protective measures, and aid in the determination of additional handling restrictions required by security policies. In discussing security labelling, one ... Keywords: access control, assurance, dynamic labelling model, open system, security label, security policy

Chuchang Liu; Angela Billard; Maris Ozols; Nikifor Jeremic

2007-01-01T23:59:59.000Z

418

Vietnam Vet Runs to Raise Money for USCBL Mike Felker served as a medic with the First Marine Division in  

E-Print Network (OSTI)

June 2008 Vietnam Vet Runs to Raise Money for USCBL Mike Felker served as a medic with the First money for the U.S. Campaign to Ban Landmines. Participating in the Philadelphia Vietnam Veterans #12;Over 100 students gathered at Zot Restaurant in dowtown Philadelphia to raise money for demining

Plotkin, Joshua B.

419

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network (OSTI)

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

420

Army Energy Security Considerations  

NLE Websites -- All DOE Office Websites (Extended Search)

ARMY Energy Security ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703)-601-0374 E-mail: don.juhasz@hqda.army.mil FUEL CELL OPPORTUNITIES 26 April 2007 1 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy * * * * FOREIGN OIL 2 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 World Energy Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11% of installations' budget US ARMY IS DEPENDENT ON 1 ¾ ¾ ¾ ¾ ¾ In ¾ 3 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Challenges To Managing The Future World population growing: 6.5 B in 2006, 2030 estimate 7.9 B

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Safeguards and Security Program  

Directives, Delegations, and Requirements

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

422

Safety, security and safeguard  

Science Journals Connector (OSTI)

Abstract A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion based on the use of sensors, signal lines and alarm systems is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks.

Nasiru Imam Zakariya; M.T.E. Kahn

2015-01-01T23:59:59.000Z

423

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 National Security Complex Y-12 National Security Complex Home > About Us > Our Operations > Acquisition and Project Management > M & O Support Department > Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 09/30/2013 BASIC Contract (Official) Modifications (Official) Funding Mods Available Upon Request Conformed Contract (Unofficial) Basic Contract dated 8/31/2000 (pdf, 13,886KB) Y-12 A001 (9/15/00) (pdf, 60KB) Y-12 Conformed Contract (Conformed to Mod 297 dated 09/30/2013 (pdf, 4201 KB) Y-12 A002 (10/15/00) (pdf, 130KB) Y-12 M003 (10/26/00) (pdf, 77KB) Y-12 M004 (10/31/00) (pdf, 865KB) Y-12 M006 (10/31/00) (pdf, 191KB)

424

Office of Security Policy - Safeguards and Security Frequently Asked  

NLE Websites -- All DOE Office Websites (Extended Search)

Safeguards and Security Safeguards and Security New Frequently Asked Questions The following frequently asked questions (FAQs) are organized by the topical areas and offer answers to recurring questions or policy clarification requests. These entries represent the newest additions to the collection of S&S FAQs. 1. General 2. Program Planning and Management 3. Protection Program Operations 4. Information Security 5. Nuclear Material Control and Accountability General Q: Where can I find the national policies that may affect security programs I am responsible for? A: The national policies affecting DOE's safeguards and security programs are located on the Policy Information Resource tool at http://pir.pnl.gov. This collection is comprised of the most current version of each policy

425

Safeguards and security progress report, January-December 1984  

SciTech Connect

From January to December 1984, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Nuclear Facility Support, Security Development and Support, Safeguards Technology Development, and International Safeguards. Part 1 covers efforts of direct assistance to the Department of Energy (DOE) and Nuclear Regulatory Commission (NRC) licensee facilities. Part 2 treats activities aimed at the security of information and computer systems. was Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards, especially those concerning the Gas Centrifuge Enrichment Plant, required a significant portion of our resources. These efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in benefiting from field experiences in operating environments.

Smith, D.B. (comp.)

1986-01-01T23:59:59.000Z

426

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

427

Departmental Personnel Security- Policy and Procedures  

Energy.gov (U.S. Department of Energy (DOE))

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

428

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

O 470.4B, Safeguards and Security Program by Mary Gallion Functional areas: Safety, Safety and Security, Security, Work Processes, To establish responsibilities for the U.S....

429

Building America Case Study: Raised Ceiling Interior Duct System, New Smyrna, Florida (Fact Sheet)  

SciTech Connect

One of BA-PIRC's longtime Habitat for Humanity partners, S.E. Volusia CO (SEVHFH), was interested in building a home to the new Challenge Home standards. SEVHFH routinely builds ENERGY STAR V3.1 homes. The only modification to their design needed to comply with the Challenge Home criteria was the interior duct requirement. Unwilling to incur the added costs of a foam roof deck or wall heights above 8 feet to accommodate a fur-down chase SEVHFH opted to build a fur-up or raised ceiling chase.

Not Available

2014-09-01T23:59:59.000Z

430

SUBJECT: National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Sandia Site Ofce P. 0. Box 5400 Albuquerque, NM 87185 JAN O=P= ONP= Annual National Environmental Policy Act Planning Sumary 2013 Attached is: the Annual National Environmental Policy Act (NEPA) Planning Summary for the National Nuclear Security Administation, Sandia Site Ofce (SSO). Currently, there are two environmental assessments planned and one environmental impact statement in progess for the

431

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network (OSTI)

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

432

Distributed Internet Security and Measurement  

E-Print Network (OSTI)

BGP (the Internet's interdomain routing protocol). It introduces Pretty Good BGP, an anomaly detection#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science Internet Security and Measurement by Josh Karlin ABSTRACT OF DISSERTATION Submitted in Partial Fulfillment

Forrest, Stephanie

433

Pricing Security L. Jean Camp  

E-Print Network (OSTI)

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

434

Reporting Incidents Of Security Concern  

Directives, Delegations, and Requirements

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

435

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

436

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

437

Fluid Mechanics and Homeland Security  

E-Print Network (OSTI)

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department and sampling, explosive detection, microfluidics and labs-on-a-chip, chem- ical plume dispersal in urban security combines established fluids topics like plume dispersion with others that are new

Settles, Gary S.

438

Dinosaur behavior  

NLE Websites -- All DOE Office Websites (Extended Search)

Dinosaur behavior Dinosaur behavior Name: kevv Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: Did the movie Jurassic Park accurately reflect the known behavior of dinosaurs? Replies: Well, since we do not have an accurate record of that time period (Man showed up about ten million years after T-rex thundered across the plains of Antarctica *grin*) so we cannot say for certain WHAT the dinosaurs did. However, since they were wild animals, we can extrapolate from their modern contemporaries and from our knowledge of their individual anatomies what kind of behaviors they exhibited. A predator with large claws probably hunts by slashing and by piercing and holding on to prey. An herbivore with large spikes growing on its tail probably used them to fend off attackers like a spiked club -- I do not think it was much of a fashion statement

439

The impact of urban form on older adults : focusing on neighborhood design and baby boomers' local behavior  

E-Print Network (OSTI)

The growing share of older adults across the globe raises concern about active and safe aging. This dissertation examines aging baby boomers' travel and social behavior resulting from neighborhood design. The body of the ...

Lee, Jae Seung, Ph. D. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

440

Office of Secure Transportation Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16th, 2012 16th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct other missions supporting the national security of the United States of America. 3 5 OST's Commitment to Transportation Safety and Security Over three decades of safe, secure transport of nuclear weapons and special nuclear material to and from military locations and DOE facilities More than 140 million miles traveled Over three decades and 240,000 flight hours of accident-free flying Professionalism We conduct ourselves and our operations with the highest standards of professionalism and integrity.

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Chapter_1_Physical_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

442

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 8, 2012 May 8, 2012 PSH-12-0004 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and holds a DOE access authorization, now in suspension. In September of 2011, the individual informed his contractor, which in turn informed the local DOE security office (LSO), that he had been hospitalized for treatment of his depression and suicidal thoughts. Exhibit 15. The LSO summoned the individual for an interview with a personnel security specialist on September 20, 2011. Exhibit 22 (Transcript of Personnel Security Interview). May 4, 2012 PSH-12-0007 - In the Matter of Personnel Security Hearing The individual began working at a DOE site in March 1992. Tr. at 87. In September 1999, his employer requested an access authorization for him. Ex.

443

Security and You, May 2013  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Incidents Headquarters Security Incidents The Department of Energy depends on its employees to protect sensitive and classified information. You are the first line of defense. Your failure to properly protect classified information and controlled unclassified information not only endangers our national security, it can also subject you to criminal, civil, or administrative penalties. Unfortunately, DOE Headquarters (HQ) had over fifty security incidents in 2012. The majority of Security Incidents are easily preventable. Let's take an actual case that happened at HQ. A new employee wrote down the combination to a classified container so that they could easily access the combination without having to memorize it. So it would be within reach, the person put the combination

444

Innovations for a secure nation  

NLE Websites -- All DOE Office Websites (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

445

Safety and Security Directives Reform  

NLE Websites -- All DOE Office Websites (Extended Search)

Reforming a "Mountain" of Policy Reforming a "Mountain" of Policy Beginning with his confirmation hearings in January 2009, Energy Secretary Steven Chu challenged the Department of Energy to take a fresh look at how we conduct business. This challenge provided the opportunity for DOE to put in place the most effective and efficient strategies to accomplish the Department's missions safely and securely. In response to the Secretary's challenge and building on the results of Deputy Secretary Poneman's Safety and Security Reform studies, the Office of Health, Safety and Security (HSS) broadened its directives review activities during 2009. By November 2009 HSS had initiated a disciplined review of all health, safety, and security directives, which included a systematic review of the Department's safety and security regulatory model.

446

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 19, 2013 April 19, 2013 PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. April 17, 2013 PSH-12-0143 - In the Matter of Personnel Security On April 17, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individual's access authorization. As security concerns under Criteria H, J, and L of 10 CFR

447

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 23, 2013 January 23, 2013 PSH-12-0121 - In the Matter of Personnel Security Hearing This Decision concerns the eligibility of XXXXXXXX (hereinafter referred to as "the individual") to hold an access authorization under the Department of Energy's (DOE) regulations set forth at 10 C.F.R. January 17, 2013 PSH-12-0118 - In the Matter of Personnel Security Hearing On January 17, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance after the individual had incurred $20,000 in charges while patronizing a "gentleman's club" on a single evening; approximately $17,000 of that amount was charged to his corporate credit card. His

448

Quantum Enabled Security (QES) for Optical Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled Security (QES), a revolutionary new cybersecurity capability using quantum (single-photon) communications integrated with optical communications to provide a strong, innate, security foundation at the photonic layer for optical fiber networks. July 10, 2013 Quantum Enabled Security (QES) for Optical Communications Available for thumbnail of Feynman Center (505) 665-9090 Email Quantum Enabled Security (QES) for Optical Communications Applications: Secure communication over optical or free space networks Financial networks Transparent access networks: fiber to the home (FTTH); fiber to the

449

Lemnos Interoperable Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Lemnos Interoperable Security The Lemnos Interoperable Security Program began with one logical concept: If vendors develop control systems security products using an agreed-upon set of capability and operational requirements, energy asset owners can better evaluate product functions and purchase products from different vendors knowing they will be interoperable. Three years later, the Lemnos team developed those specifications-called interoperable configuration profiles-and one of the first products built to those profiles is in the market. Lemnos Interoperable Security More Documents & Publications Lemnos Interoperable Security Program SECURITY CORE FUNCTION AND DEFINITION REPORT Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

450

Evergreen Securities formerly Ethanol Investments | Open Energy...  

Open Energy Info (EERE)

Securities formerly Ethanol Investments Jump to: navigation, search Name Evergreen Securities (formerly Ethanol Investments) Place London, England, United Kingdom Zip EC2V 5DE...

451

first responders | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Blog Home first responders first responders Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

452

render safe | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

at NNSA Blog Home render safe render safe Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

453

consequence management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

consequence management consequence management Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

454

Solutia: Massachusetts Chemical Manufacturer Uses SECURE Methodology...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURE Methodology to Identify Potential Reductions in Utility and Process Energy Consumption Solutia: Massachusetts Chemical Manufacturer Uses SECURE Methodology to Identify...

455

July 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Jul 1, 2014 Transition for Pantex and Y-12 Contract Completed The National Nuclear Security Administration Production Office and Consolidated Nuclear Security...

456

EU Energy Situations and Supply Security.  

E-Print Network (OSTI)

?? Energy supply security is a hot topic today. It highly influences energy market, national security and also residents daily lives. However, due to different (more)

Xu, Chen

2008-01-01T23:59:59.000Z

457

January 2014 Cybersecurity Awareness Campaign - Secure Online...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping The primary cyber theme for the...

458

Independent Oversight Inspection, Office of Secure Transportation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection, Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency...

459

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

460

Independent Activity Report, Office of Secure Transportation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

October 4, 2010: Robot on Security Patrol  

Energy.gov (U.S. Department of Energy (DOE))

October 4, 2010The Department's National Nuclear Security Administration (NNSA) announces that the Nevada National Security Site (NNSS) has brought the first of three Mobile Detection Assessment...

462

2014 Headquarters Facilities Master Security Plan- Acronyms  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Acronyms A list of the acronyms contained in the 2014 Headquarters Facilities Master Security Plan (HQFMSP).

463

Safeguards and Security Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Safeguards and Security Systems SHARE Safeguards and Security Systems Safeguards training class. ORNL is a leader in providing technologies and services for the global safeguards...

464

Transportation Safeguards & Security Test Bed (TSSTB) | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Safeguards and Security Test Bed May 30, 2013 The Transportation Safeguards and Security Test Bed consists of a test-bed vehicle and a monitoringlaboratorytraining...

465

Deriving Policies from Grid Security Requirements Model  

Science Journals Connector (OSTI)

The emerging Grid applications require rigorous approaches to handle security management issues as their scale, heterogeneity, ... , we propose a rigorous method of deriving security policies for grid application...

Syed Naqvi; Alvaro E. Arenas

2008-01-01T23:59:59.000Z

466

Security Enforcement Reporting Criteria | Department of Energy  

Energy Savers (EERE)

can be found in the Office of Health, Safety and Security's Enforcement Coordinator Handbook. Security Enforcement Reporting Criteria More Documents & Publications Safety and...

467

National Securities Technologies _NSTec_ Livermore Operations...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

468

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

469

Partnering with Utilities for Energy Efficiency & Security |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Partnering with Utilities for Energy Efficiency & Security Partnering with Utilities for Energy Efficiency & Security Presentation covers partnering with utilities for energy...

470

Automated Security Compliance Tool for the Cloud.  

E-Print Network (OSTI)

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

471

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

intrusion detection and security management for a networked energy control systems architecture Integrated Security System More Documents & Publications Cybersecurity for Energy...

472

Security demo at Sunport October 13  

NLE Websites -- All DOE Office Websites (Extended Search)

Security demo at Sunport Security demo at Sunport October 13 The tool distinguishes potential-threat liquids from the harmless shampoos and sodas a regular traveler might take...

473

Recommended Security Controls for Federal Information Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

NIST 800-53 Revision 3 + Draft Revision 4 Recommended Security Controls for Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines...

474

Privacy, Security, & Legal Disclaimer Notice - Hanford Site  

NLE Websites -- All DOE Office Websites (Extended Search)

About Us > Privacy, Security, & Legal Disclaimer Notice About Us Hanford Overview and History Hanford Cleanup Hanford Site Wide Programs Privacy, Security, & Legal Disclaimer...

475

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

0.4B Admin Chg 1, Safeguards and Security Program by Mary Gallion Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and...

476

Chapter_10_Security_Awareness_Program  

Office of Environmental Management (EM)

0 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: * Title 32, CFR, Part 2001, Classified National...

477

Visitor Security Requirements | Savannah River Ecology Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Visitor Security Requirements NOTE: These requirements do not apply to events held at the SREL Conference Center, which is located outside the security barricade. Before you...

478

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23744 23744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch Communication  Idea Moderation  Adjust by KPIs 4. Close  Idea Evaluation  Debrief with Sponsor  Communicate Impacts Target Impacts  Program Development  Cost Reduction  Operational Improvement Value Propositions  Speed Collaboration

479

The Security Epidemic  

NLE Websites -- All DOE Office Websites (Extended Search)

5-1130 5-1130 A different version of this appeared in Security Management 50, pp. 88-94 (2006). Turnkey Turnover Solutions: Powerful Tools and Experts are Available! Eddie G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory Introduction It's early in World War II, and the US is scrambling to put together an effective fighting force. But how to you select and place millions of former civilians into military positions that will suit their abilities and temperament? The Army turned to industrial/organizational (I/O) psychologists. To solve this problem, the I/O psychologists developed the Army General Classification Test (AGCT), which later evolved into the Armed Services Vocational Aptitude Battery (ASVAB) still used

480

NATIONAL NUCLEAR SECURITY ADMINISTRATION  

National Nuclear Security Administration (NNSA)

NNSA Policy Letter: NAP-5 NNSA Policy Letter: NAP-5 (DOE P 450.3) Date: October 16, 2002 TITLE: Policy Letter for Standards Management I. OBJECTIVE: Establish NNSA expectations for Standards Management Programs used to select and maintain applicable standards for work performed at NNSA Headquarters and field sites. II. APPLICABILITY: NNSA federal staff and NNSA management and operating contractors, and other prime contractors as determined by NNSA Headquarters and/or field site management, shall use a defined formal process to tailor environment, safety, and health; project management; safeguards and security; quality assurance; business; and administrative standards and, as determined by NNSA management, other standards used to perform federal and contractor work. Here, the term standard encompasses federal,

Note: This page contains sample records for the topic "behavior raised security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Safeguards and Security Program  

Directives, Delegations, and Requirements

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

482

PSH-12-0094 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94 - In the Matter of Personnel Security Hearing 94 - In the Matter of Personnel Security Hearing PSH-12-0094 - In the Matter of Personnel Security Hearing On November 6, 2012, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding his abuse of alcohol. The Hearing Officer further concluded that the individual's six months of responsible behavior regarding alcohol were insufficient to demonstrate a sustained pattern of responsible use. This was because of the brevity of the period of time involved, the individual's failure to admit that he had a drinking problem, and his failure to take steps to address the problem other than abstinence. The Hearing officer also concluded that

483

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

SciTech Connect

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

484

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network (OSTI)

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

485

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network (OSTI)

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

486

Chapter_10_Security_Awareness_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: * Title 32, CFR, Part 2001, Classified National Security Information * Executive Order 13526, Classified National Security Information * DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 * DOE Order 475.2A, Identifying Classified Information * DOE Order 475.1, Counterintelligence Program The Security Awareness Program Manager, within HS-92, manages the HQ security awareness program. The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, and security procedures specific to HQ. This goal is accomplished by providing HQ employees

487

Edinburgh Research Explorer Scotland, NATO, and transatlantic security  

E-Print Network (OSTI)

Edinburgh Research Explorer Scotland, NATO, and transatlantic security Citation for published version: Fleming, C & Gebhard, C 2014, 'Scotland, NATO, and transatlantic security' European Security, vol Statement: �Fleming, C., & Gebhard, C. (2014). Scotland, NATO, and transatlantic security. European Security

Schnaufer, Achim

488

Security for Radioactive Sources: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

for Radioactive Sources: Fact Sheet | National Nuclear Security for Radioactive Sources: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Security for Radioactive Sources: Fact Sheet Fact Sheet Security for Radioactive Sources: Fact Sheet Mar 23, 2012 Radioactive materials are a critical and beneficial component of global

489

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

490

Nuclear Forensics | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Initiatives Cyber Security Nuclear Forensics Bioinformatics National Security Home | Science & Discovery | National Security | Initiatives | Nuclear Forensics SHARE Nuclear Forensics image Tools, techniques, and expertise in nuclear fuel cycle research gained over seven decades help ORNL scientists control and track nuclear bomb-grade materials to be sure they don't fall into the wrong hands. Among the leading-edge technologies used by researchers are high-resolution techniques that allow analysis of radiation detector data in stunning detail. Researchers are also developing aerosol sampling systems to collect airborne particulates and instantly send an alert if radiation is detected. For more information, please contact: nuclearforensicsinitiative

491

Meeting Federal Energy Security Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Markel Markel SRA International Lawrence_Markel@sra.com Federal Utility Partnership Working Group Fall 2012 - October 16-17 Mobile, AL Sponsored by Alabama Power Theme Meeting energy security requirements in federal facilities provides opportunities for additional types of cooperation between utilities and the federal agencies. However, there are significant barriers to pursuing these opportunities - constraints on utilities and on federal agencies, as well as sometimes-competing objectives. Energy security encompasses sufficiency, surety, and sustainability.  Above all, energy security means having adequate power to conduct critical operations for the duration required (sufficiency).  Secondarily, and leading to sufficiency, is ensuring resilient energy supplies that are accessible when

492

Announcements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Announcements | National Nuclear Security Administration Announcements | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Announcements Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Announcements

493

Supercomputers | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Supercomputers | National Nuclear Security Administration Supercomputers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Supercomputers Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Supercomputers

494

AP1000 Design for Security  

SciTech Connect

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

495

Saudi National Security. Research report  

SciTech Connect

The purpose of this research paper is to focus on Saudi National Security. The author highlights geographic and historic factors that impact on threats to Saudi Arabia, and the objectives for providing security. He discusses how to achieve these objectives, including military readiness and cooperation with other countries to guarantee Saudi security. This is to ensure interests which are vital to the industrial world as the result of a continued flow of oil with a reasonable price. Given is the author`s opinion about U.S. political strategy in the region to achieve stability in the Gulf Region.

Al-Ayed, I.

1996-05-01T23:59:59.000Z

496

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

International | National Nuclear Security Administration International | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > International International U.S. Department of Energy / U.S. Nuclear Regulatory Commission

497

Raising agents strongly influence acrylamide and HMF formation in cookies and conditions for asparaginase activity in dough  

Science Journals Connector (OSTI)

The impact of raising agents on formation of heat-induced contaminants, acrylamide and 5-hydroxymethylfurfural (HMF), with focus on the efficiency...4HCO3), observing 6 times higher level in comparison with contr...

Kristna Kukurov; Zuzana Ciesarov

2013-07-01T23:59:59.000Z

498

Building America Technology Solutions for New and Existing Homes: Raised Ceiling Interior Duct System, New Smyrna, Florida (Fact Sheet)  

Energy.gov (U.S. Department of Energy (DOE))

This project describes a Habitat for Humanity builders efforts to construct a home to new DOE Zero Energy Ready Home standards, and use a fur-up or raised ceiling chase.

499

Grid Security: Expecting the Mingchao Ma  

E-Print Network (OSTI)

Grid Security: Expecting the Unexpected Mingchao Ma STFC � Rutherford Appleton Laboratory, UK #12;Slide 2 Overview � Security Service Challenges (SSC) Review � Grid Security Incident � What had happened of the LCG/EGEE Grid Sites (Dec 2008) http://www.gridpp.ac.uk/security/ssc/ https

University College London

500

06 DEC 2013 1 Information Security Guideline  

E-Print Network (OSTI)

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine