National Library of Energy BETA

Sample records for doe cyber security

  1. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  2. DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA

    Broader source: Energy.gov [DOE]

    DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber Security Role: Certification Agent (CA)

  3. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-06

    This Notice extends DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, dated 3-18-02, until 7-6-05.

  4. DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS |

    Office of Environmental Management (EM)

    Department of Energy CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS puzzle-693870_960_720.jpg PDF icon DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS More Documents & Publications DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA Authorizing Official Designated Representative (AODR)

  5. Cyber Fed Model Application in support of DOE Cyber Security Initiatives -

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ames Participation | The Ames Laboratory Cyber Fed Model Application in support of DOE Cyber Security Initiatives - Ames Participation FWP/Project Description: The Cyber Fed Model (CFM) is a communication and coordination framework focused on the reduction and mitigation of cyber security risk across a large distributed organization like the Department of Energy. The CFM framework can be used to help integrate various cyber security systems and capabilities spanning the DOE enterprise, the

  6. Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  7. Chapter_14_Cyber_Security

    Office of Environmental Management (EM)

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  8. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  9. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  10. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  11. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  12. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  13. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that ...

  14. Safeguards and Security and Cyber Security RM | Department of Energy

    Energy Savers [EERE]

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. PDF icon Safeguards and Security and Cyber Security RM More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 Standard Review Plan -

  15. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  16. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  17. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  18. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  19. Cyber and Security Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber and Security Assessments Cyber and Security Assessments Cyber and Security Assessments within the Office of Independent Enterprise Assessments implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight

  20. Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-03-18

    To establish Department of Energy (DOE) requirements and responsibilities for reporting cyber security incidents involving classified and unclassified systems and responding to cyber security alerts and advisories; and to implement requirements of DOE N 205.1, Unclassified Cyber Security Program, and DOE M 471.2-2, Classified Information Systems Security Manual. DOE N 205.13, dated 7-6-04, extends this notice until 7-6-05. Cancels DOE M 471.2-2, Chapter III, section 8.

  1. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  2. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  3. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber ...

  4. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nationís cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested Ė both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  5. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  6. Cyber Security Evaluations Appraisal Process Guide - April 2008 |

    Office of Environmental Management (EM)

    Department of Energy Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. This process guide provides information about the Department of Energy's (DOE) Independent Oversight

  7. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector ...

  8. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  9. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

  10. Cyber Securing Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industrial Control Systems Integration into the DoD Networks A Briefing in Response to House Report 113-102, Accompanying the FY14 National Defense Authorization Act Unclassified - Distribution Statement A August, 2015 Cyber Securing Control Systems Acquisition, Technology and Logistics 2 DoD Scope of Platform IT & Control Systems * Acquisitions / Weapon Systems - H,M & E (ships / subs, missiles, UVs, etc.) - Training Simulators, 3D printing, etc. * EI&E - Buildings & linear

  11. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization√?¬Ę√?¬?√?¬?s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  12. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization√ɬÉ√ā¬Ę√ɬā√ā¬Ä√ɬā√ā¬ôs ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore¬†¬Ľ enhance cybersecurity controls.¬ę¬†less

  13. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  14. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in ...

  15. Tom Harper receives cyber security award

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Harper receives cyber security award Tom Harper receives cyber security award The Charlene Douglass Memorial Award recognizes an individual's expertise, dedication, and significant...

  16. The Department's Cyber Security Incident Management Program,...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Department's Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous...

  17. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-06

    Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint Cybersecurity Coordination Center and transfer of responsibility for communications security and TEMPEST to the Office of Health, Safety and Security.

  18. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security & Cyber Evaluations ¬Ľ Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Performance Testing Guidance & Information Composite Adversary Team Brochure - April 9, 2008 Limited-Notice Performance Test Inspectors Guide

  19. Office of Cyber and Security Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments Office of Cyber and Security Assessments MISSION The Office of Cyber and Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security and classified and unclassified cyber security policies and programs throughout the Department, including protection of special nuclear material, and classified and sensitive information. The Office has established and maintains a continuous program for assessing the security of DOE facilities

  20. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  1. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

  2. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

  3. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  4. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  5. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  6. Visualizing Cyber Security: Usable Workspaces

    SciTech Connect (OSTI)

    Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

    2009-10-11

    An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

  7. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, supersedes Chg 2.

  8. DOE Issues Energy Sector Cyber Organization NOI

    Office of Environmental Management (EM)

    Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security

  9. Cyber Security Standards.PDF

    Office of Environmental Management (EM)

    1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal

  10. Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  11. DOE Cyber Strategy | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Strategy DOE Cyber Strategy The Office of the Chief Information Officer is pleased to announce publication of the U.S. Department of Energy (DOE) Cyber Strategy. 151228-doe-cyber-strategy123.png To meet the challenges of today's rapidly evolving cyber landscape, the Department has crafted a comprehensive cyber strategy rooted in enterprise-wide collaboration, accountability, and transparency. The underlying principles and strategic goals that form the Strategy's foundation attest to DOE's

  12. Information Security: Coordination of Federal Cyber Security Research and

    Energy Savers [EERE]

    Development | Department of Energy Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In

  13. Collaborative Utility Task Force Partners with DOE to Develop Cyber

    Energy Savers [EERE]

    Security Requirements for Advanced Metering Infrastructure | Department of Energy Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the

  14. Evaluation Report on The Department's Unclassified Cyber Security Program

    Office of Environmental Management (EM)

    2002, DOE/IG-0567 | Department of Energy Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and

  15. Strengthening Cyber Security

    Energy Savers [EERE]

    E n E rgyB i z November/December 2008 ¬Ľ TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption

  16. cyber | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cyber | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  17. Microgrid cyber security reference architecture.

    SciTech Connect (OSTI)

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  18. Obama's Call for Public-Private Cyber Security Collaboration Reflected in

    Energy Savers [EERE]

    DOE's Priorities | Department of Energy Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical

  19. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks

  20. NNSA Seeking Comments on Consolidated IT and Cyber Security Support...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 ...

  1. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  2. NNSA Seeking Comments on Consolidated IT and Cyber Security Support...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013...

  3. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This ...

  4. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  5. Evaluation Report on The Department's Unclassified Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 As...

  6. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  7. The Department's Unclassified Cyber Security Program - 2012, IG-0877

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information

  8. of Western Area Power Administration's Cyber Security Program

    Broader source: Energy.gov (indexed) [DOE]

    Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's

  9. Transmission and Distribution World March 2007: DOE Focuses on Cyber Security

    Broader source: Energy.gov [DOE]

    Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed. 

  10. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. Camp Smith Microgrid Controls and Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADVANCING THE POWER OF ENERGY Camp Smith Microgrid Controls and Cyber Security Darrell D. Massie, PhD, PE Aura Lee Keating, CISSP SPIDERS Industry Day - Camp Smith, HI 27 August 2015 Microgrid Resiliency and Cyber Security ÔāĄ Distributed Controls ÔāĄ Communications ÔāĄ Interface with other microgrids ÔāĄ User Interface ÔāĄ Energy Surety ÔāĄ Comprehensive Security Strategy 2 3 Camp Smith - Distributed Controller NOT THIS THIS ÔÉĽ Reflects outdated mainframe mentality ÔÉĽ A central CPU is a

  12. Cyber Assessment Methods for SCADA Security

    Office of Environmental Management (EM)

    5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition,

  13. Realizing Scientific Methods for Cyber Security

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  14. Embracing the Cloud for Better Cyber Security

    SciTech Connect (OSTI)

    Shue, Craig A; Lagesse, Brent J

    2011-01-01

    The future of cyber security is inextricably tied to the future of computing. Organizational needs and economic factors will drive computing outcomes. Cyber security researchers and practitioners must recognize the path of computing evolution and position themselves to influence the process to incorporate security as an inherent property. The best way to predict future computing trends is to look at recent developments and their motivations. Organizations are moving towards outsourcing their data storage, computation, and even user desktop environments. This trend toward cloud computing has a direct impact on cyber security: rather than securing user machines, preventing malware access, and managing removable media, a cloud-based security scheme must focus on enabling secure communication with remote systems. This change in approach will have profound implications for cyber security research efforts. In this work, we highlight existing and emerging technologies and the limitations of cloud computing systems. We then discuss the cyber security efforts that would support these applications. Finally, we discuss the implications of these computing architecture changes, in particular with respect to malware and social engineering.

  15. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Securityís Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPís current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  16. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  17. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  18. SPIDERS JCTD Smart Cyber-Secure Microgrids

    Broader source: Energy.gov [DOE]

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Joint Capability Technology Demonstration (JCTD) is a groundbreaking program to bolster the cyber security and energy efficiency of U.S. military installations and transfer the knowhow to non-military critical infrastructure.

  19. Strategy for Improvements in Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strategy for Improvements in Cyber Security Strategy for Improvements in Cyber Security PDF icon Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Lessons Learned by Lawrence...

  20. Office of Cyber Security Evaluations Appraisal Process Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Cyber Security Evaluations Appraisal Process Guide Table of Contents April 2008 ii Table of Contents Acronyms......

  1. Before the House Subcommittee on Emerging Threats, Cyber Security and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Science and Technology Committee on Homeland Security | Department of Energy Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity

  2. DOE Cyber Distinguished Speaker Series

    Broader source: Energy.gov [DOE]

    Join us at the Department of Energy’s Cyber Distinguished Speaker Series on Wednesday, 13 January 2016, for an opportunity to expand your knowledge and awareness of today’s most pressing cyber issues.

  3. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Energy Savers [EERE]

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. PDF icon Lessons Learned from Cyber

  4. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE-CIRC NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Department of Energy Cyber Incident Response Capability Department of Energy Cyber Incident Response Capability (DOE-CIRC) provides the U.S. Department of Energy with incident response, reporting, and tracking, along with other computer security support. DOE-CIRC is a member of GFIRST, the Government Forum of Incident Responders and Security Teams and FIRST an international incident response and security organization. RELATED

  5. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Office of Environmental Management (EM)

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber ...

  6. Lab hosts multi-lab cyber security games

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab hosts multi-lab cyber security games Lab hosts multi-lab cyber security games Eventide brought together cyber and IT leaders from 20 sites to develop recommendations on resources they need from the Joint Cyber Coordination Center. April 12, 2012 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and

  7. Towards Efficient Collaboration in Cyber Security

    SciTech Connect (OSTI)

    Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

    2010-06-03

    Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independentlyó for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

  8. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Environmental Management (EM)

    Portaledge, March 2010 | Department of Energy Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection

  9. NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |

    Office of Environmental Management (EM)

    Department of Energy Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for

  10. Using Operational Security (OPSEC) to Support a Cyber Security Culture in

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control Systems Environments | Department of Energy Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments This document reviews several key operational cyber security elements that are important for control systems and industrial networks and how those elements can drive the creation of a cyber security-sensitive culture. PDF icon Using

  11. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  12. Mathematical and Statistical Opportunities in Cyber Security (Technical

    Office of Scientific and Technical Information (OSTI)

    Report) | SciTech Connect Mathematical and Statistical Opportunities in Cyber Security Citation Details In-Document Search Title: Mathematical and Statistical Opportunities in Cyber Security The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist

  13. Foreign National Access to DOE Cyber Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-01

    DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

  14. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    2014-09-30

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closely related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.

  15. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  16. Obama's Call for Public-Private Cyber Security Collaboration...

    Energy Savers [EERE]

    companies, equipment vendors, and government agencies to create a Control Systems Roadmap to secure the sector's computer control systems against cyber attack. As a result of...

  17. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language ... subway systems, dams, telecommunication systems, natural gas pipelines, and many others. ...

  18. Continuous Monitoring And Cyber Security For High Performance...

    Office of Scientific and Technical Information (OSTI)

    Continuous Monitoring And Cyber Security For High Performance Computing Malin, Alex B. Los Alamos National Laboratory; Van Heule, Graham K. Los Alamos National Laboratory...

  19. Department of Energy's July 2013 Cyber Security Breach

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Department of Energy's July 2013 Cyber Security Breach DOEIG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections ...

  20. Management of Naval Reactors' Cyber Security Program, OIG-0884

    Broader source: Energy.gov (indexed) [DOE]

    FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval...

  1. UVI Cyber-security Workshop Workshop Analysis.

    SciTech Connect (OSTI)

    Kuykendall, Tommie G.; Allsop, Jacob Lee; Anderson, Benjamin Robert; Boumedine, Marc; Carter, Cedric; Galvin, Seanmichael Yurko; Gonzalez, Oscar; Lee, Wellington K.; Lin, Han Wei; Morris, Tyler Jake; Nauer, Kevin S.; Potts, Beth A.; Ta, Kim Thanh; Trasti, Jennifer; White, David R.

    2015-07-08

    The cybersecurity consortium, which was established by DOE/NNSAís Minority Serving Institutions Partnerships Program (MSIPP), allows students from any of the partner schools (13 HBCUs, two national laboratories, and a public school district) to have all consortia options available to them, to create career paths and to open doors to DOE sites and facilities to student members of the consortium. As a part of this year consortium activities, Sandia National Laboratories and the University of Virgin Islands conducted a week long cyber workshop that consisted of three courses; Digital Forensics and Malware Analysis, Python Programming, and ThunderBird Cup. These courses are designed to enhance cyber defense skills and promote learning within STEM related fields.

  2. Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878

    Office of Environmental Management (EM)

    Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates

  3. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment at National SCADA Test Bed | Department of Energy and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE)

  4. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  5. Cyber security best practices for the nuclear industry

    SciTech Connect (OSTI)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  6. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect (OSTI)

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  7. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  8. Cyber Security Protection for Small Businesses Flyer | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    PDF icon Cyber-Security-Flyer.pdf More Documents & Publications Facility Management Contractors and other Contractors Directory Small Business Program Manager Directory National Electric Transmission Congestion Study 2012 Workshops

  9. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  10. Common Cyber Security Vulnerabilities Observed in Control System

    Energy Savers [EERE]

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  11. The Department's Unclassified Cyber Security Program 2002, IG-0567

    Energy Savers [EERE]

    DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to

  12. Office of Electricity Delivery and Energy Reliability Cyber Security

    Energy Savers [EERE]

    Project Selections | Department of Energy Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise Global Forum, U.S. Energy Secretary Steven Chu today announced the investment of more than $30 million for ten projects that will address cybersecurity issues facing the nation's electric grid. Together, these projects

  13. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  14. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect (OSTI)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  15. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  16. Rocky Mountain Electrical League (RMEL) Physical and Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conference - January 26-27, 2016 | Department of Energy Rocky Mountain Electrical League (RMEL) Physical and Cyber Security Conference - January 26-27, 2016 Rocky Mountain Electrical League (RMEL) Physical and Cyber Security Conference - January 26-27, 2016 January 4, 2016 - 11:22am Addthis Power SURGE is joint project between the DOE√ʬĬôs Office of Security Assistance and the Department√ʬĬôs Power Marketing Administrations, led by the Western Area Power Marketing Administration. Power

  17. Cyber Assessment Methods for SCADA Security | Department of Energy

    Energy Savers [EERE]

    Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure

  18. GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development

    Office of Environmental Management (EM)

    the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House

  19. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry

    SciTech Connect (OSTI)

    Akyol, Bora A.

    2012-09-01

    This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

  20. Report of the Cyber Security Research Needs for Open Science Workshop |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while maintaining ease of access, represents the "perfect storm" of challenges in the area of cyber security. PDF icon Report of the Cyber Security Research Needs for Open Science Workshop More Documents & Publications Networking and Information Technology Research and Development Supplement to the

  1. Towards A Network-of-Networks Framework for Cyber Security

    SciTech Connect (OSTI)

    Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

    2013-06-07

    Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

  2. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industryís template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  3. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Environmental Management (EM)

    Cyber Security Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to

  4. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  5. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008

    Broader source: Energy.gov [DOE]

    This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers

  6. NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft

    Broader source: Energy.gov [DOE]

    The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services.

  7. A Comparison of Cross-Sector Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01

    This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

  8. DOE Cyber Distinguished Speaker Series | Department of Energy

    Energy Savers [EERE]

    DOE Cyber Distinguished Speaker Series DOE Cyber Distinguished Speaker Series Save the Date: March 24, 2016 - Transforming Digital Technologies Across Government Transforming Digital Technologies Across Government Thursday, March 24, 2016 1:00 pm - 2:00 pm Forrestal Large Auditorium Built in the spirit of America's leading tech startups, 18F is made up of top-notch designers, developers, and product specialists inside the General Services Administration, build world-class software products and

  9. Automatic Labeling for Entity Extraction in Cyber Security

    SciTech Connect (OSTI)

    Bridges, Robert A; Jones, Corinne L; Iannacone, Michael D; Testa, Kelly M; Goodall, John R

    2014-01-01

    Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often not a viable solution. In response, we develop a very precise method to automatically label text from several data sources by leveraging related, domain-specific, structured data and provide public access to a corpus annotated with cyber-security entities. Next, we implement a Maximum Entropy Model trained with the average perceptron on a portion of our corpus (~750,000 words) and achieve near perfect precision, recall, and accuracy, with training times under 17 seconds.

  10. Cyber Security Research Frameworks For Coevolutionary Network Defense

    SciTech Connect (OSTI)

    Rush, George D.; Tauritz, Daniel Remy

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  11. Validating Cyber Security Requirements: A Case Study

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  12. GridStat Ė Cyber Security and Regional Deployment Project Report

    SciTech Connect (OSTI)

    Clements, Samuel L.

    2009-02-18

    GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStatís cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

  13. Bio-Inspired Cyber Security for Smart Grid Deployments

    SciTech Connect (OSTI)

    McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.; Fink, Glenn A.; Fulp, Errin W.

    2013-05-01

    mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants framework is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.

  14. cyber security | OpenEI Community

    Open Energy Info (EERE)

    and discussion of smart grid technologies, tools, and techniques. The Smart Grid Investment Grant (SGIG) program is authorized by the Energy Independence and Security Act of...

  15. Mathematical and Statistical Opportunities in Cyber Security

    Office of Scientific and Technical Information (OSTI)

    ... Some problems in sanitizing network data. In 15th IEEE International Workshops on Enabling ... Semantics-aware malware detection. In IEEE Symposium on Security and Privacy, June 2005. ...

  16. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  17. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  18. Tensions in collaborative cyber security and how they affect incident detection and response

    SciTech Connect (OSTI)

    Fink, Glenn A.; McKinnon, Archibald D.; Clements, Samuel L.; Frincke, Deborah A.

    2009-12-01

    Security often requires collaboration, but when multiple stakeholders are involved, it is typical for their priorities to differ or even conflict with one another. In todayís increasingly networked world, cyber security collaborations may span organizations and countries. In this chapter, we address collaboration tensions, their effects on incident detection and response, and how these tensions may potentially be resolved. We present three case studies of collaborative cyber security within the U.S. government and discuss technical, social, and regulatory challenges to collaborative cyber security. We suggest possible solutions, and present lessons learned from conflicts. Finally, we compare collaborative solutions from other domains and apply them to cyber security collaboration. Although we concentrate our analysis on collaborations whose purpose is to achieve cyber security, we believe that this work applies readily to security tensions found in collaborations of a general nature as well.

  19. DOE to Provide Nearly $8 Million to Safeguard the Nationís Energy Infrastructure from Cyber Attacks

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically-advanced controls and cyber-security devices into our electric grid and energy infrastructure.

  20. Probabilistic Characterization of Adversary Behavior in Cyber Security

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  1. Rocky Mountain Electrical League (RMEL) Physical and Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    January 4, 2016 - 11:22am Addthis Power SURGE is joint project between the DOEs Office of Security Assistance and the Departments Power Marketing Administrations, led ...

  2. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Environmental Management (EM)

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  3. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect (OSTI)

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  4. Cyber Friendly Fire: Research Challenges for Security Informatics

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2013-06-06

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a systemís topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FFó including both training concepts and suggestions for decision aids and visualization approachesóare discussed.

  5. Cyber-Security Considerations for the Smart Grid

    SciTech Connect (OSTI)

    Clements, Samuel L.; Kirkham, Harold

    2010-07-26

    The electrical power grid is evolving into the ďsmart gridĒ. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

  6. Towards an Experimental Testbed Facility for Cyber-Physical Security Research

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

    2012-01-07

    Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

  7. Cyber Science and Security - An R&D Partnership at LLNL

    SciTech Connect (OSTI)

    Brase, J; Henson, V

    2011-03-11

    Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

  8. The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01

    Energy Savers [EERE]

    Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011 OAS-M-12-01 November 2011 Department of Energy Washington, DC 20585 November 15, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011"

  9. The Federal Energy Regulatory Commission's Unclassified Cyber Security Program ¬Ö 2013

    Energy Savers [EERE]

    Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program -

  10. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in

  11. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    SciTech Connect (OSTI)

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.; Endicott-Popovsky, Barbara E.

    2011-04-11

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus on our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.

  12. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  13. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

  14. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

    2011-04-01

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

  15. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the requirements listed in the Framework and in the various industry standards are due, in part, to differences in the level and purpose of the standards. While the requir

  16. Good Things in Small Packages: Micro Worlds and Cyber Security

    SciTech Connect (OSTI)

    David I Gertman

    2013-11-01

    Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

  17. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary

    SciTech Connect (OSTI)

    Hu, Tan Chang; Robinson, David G.

    2011-09-08

    As the national focus on cyber security increases, there is an evolving need for a capability to provide for high-speed sensing of events, correlation of events, and decision-making based on the adverse events seen across multiple independent large-scale network environments. The purpose of this Shared Vision project, Cyber Security Indications and Warning System, was to combine both Sandia's and LMC's expertise to discover new solutions to the challenge of protecting our nation's infrastructure assets. The objectives and scope of the proposal was limited to algorithm and High Performance Computing (HPC) model assessment in the unclassified environment within funding and schedule constraints. The interest is the identification, scalability assessment, and applicability of current utilized cyber security algorithms as applied in an HPC environment.

  18. Office of Cyber Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Assessments Office of Cyber Assessments MISSION The Office of Cyber Assessments is responsible for the independent evaluation of the effectiveness of classified and unclassified computer security policies and programs throughout the Department. The Office has established and maintains a continuous program for assessing the security of DOE classified and unclassified networks through expert program and technical analysis, including detailed network penetration testing to detect

  19. Modeling and simulation for cyber-physical system security research, development and applications.

    SciTech Connect (OSTI)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  20. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.

    2010-09-01

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, so as to move from an insider threat detection stance to one that enables prediction of potential insider presence. Two distinctive aspects of the approach are the objective of predicting or anticipating potential risks and the use of organizational data in addition to cyber data to support the analysis. The chapter describes the challenges of this endeavor and progress in defining a usable set of predictive indicators, developing a framework for integrating the analysis of organizational and cyber security data to yield predictions about possible insider exploits, and developing the knowledge base and reasoning capability of the system. We also outline the types of errors that one expects in a predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  1. Cyber

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  2. Chapter 3: Enabling Modernization of the Electric Power System Technology Assessment | Cyber and Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber and Physical Security Chapter 3: Technology Assessments Introduction As understanding of the threats facing the operation, components, and subsystems of the electric power system is gained, a need has emerged for improvements in grid security and resilience. The focus on resiliency implies that threats will not go away and that some attacks, in addition to natural events, will be carried out successfully. The objective is for the system and associated subsystems to be designed and operated

  3. cyber

    National Nuclear Security Administration (NNSA)

    and the review of information prior to public release or posting to publicly available web sites to assure it does not contain data that would assist an adversary.

  4. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  5. Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)Cyber Experimentation Overview Brief

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Experimentation Overview Brief Mr. Ross Roley PACOM Energy Innovation Office Lead SPIDERS Operational Manager August 2015 UNCLASSIFIED/Distribution A SPIDERS Summary The ability of today's warfighter to command, control, deploy, and sustain forces is adversely impacted by a fragile, aging, and fossil fuel dependent electricity grid, posing a significant threat to national security. The SPIDERS JCTD addresses four critical requirements: - Protect task critical assets from loss of power due

  6. The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01

    Energy Savers [EERE]

    2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent

  7. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  8. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  9. Before the House Subcommittee on Emerging Threats, Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability PDF icon 7-21-09FinalTestimonyHoffman.pdf More Documents & ...

  10. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM ...

  11. Sandia Cyber Omni Tracker

    Energy Science and Technology Software Center (OSTI)

    2014-07-02

    SCOT cyber security team enhancement tool that coordinates activities, captures knowledge, and serves as a platform to automate time-consuming tasks that a cyber security team needs to perform in its daily operations.

  12. Towards a Relation Extraction Framework for Cyber-Security Concepts

    SciTech Connect (OSTI)

    Jones, Corinne L; Bridges, Robert A; Huffer, Kelly M; Goodall, John R

    2015-01-01

    In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised NLP and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.

  13. Cyber Security Summer School: Lessons for the Modern Grid

    Broader source: Energy.gov [DOE]

    The Energy Department has partnered with a university-based project performing cutting-edge research to improve the way electric infrastructure is built, increasing the security and reliability of the grid.

  14. Defining and Computing a Valued Based Cyber Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  15. Technical Security Program - DOE Directives, Delegations, and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    470.6, Technical Security Program by Sam Soley Functional areas: Security, Counterintelligence This order implements the Department of Energy (DOE) Technical Security Program...

  16. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  17. IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop

    SciTech Connect (OSTI)

    Clements, Samuel L.; Edgar, Thomas W.; Manz, David O.

    2012-04-01

    The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.

  18. Senior Technical Advisor (Cyber Security) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Locations Washington DC, District of Columbia Announcement Number DOE-HQ-OE-16-44444-EXC Job Summary The mission of the Office of Electricity and Delivery and Energy Reliability (OE) is to lead national efforts to modernize the electric grid; increase grid capacity and reliability; improve energy infrastructure; deter, mitigate, or neutralize potential attacks against the enemy infrastructure; and lead Federal efforts to recover from disruptions in the energy infrastructure,

  19. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect (OSTI)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    AbstractóThis paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  20. Shopping For Danger: E-commerce techniques applied to collaboration in cyber security

    SciTech Connect (OSTI)

    Bruce, Joseph R.; Fink, Glenn A.

    2012-05-24

    Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

  1. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect (OSTI)

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  2. Comprehensive, Multi-Source Cyber-Security Data Set

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Kent, Alexander D. [Los Alamos National Laboratory

    2015-05-21

    This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratoryís corporate, internal computer network. The data sources include Windows-based authentication events from both individual computers and centralized Active Directory domain controller servers; process start and stop events from individual Windows computers; Domain Name Service (DNS) lookups as collected on internal DNS servers; network flow data as collected on at several key router locations; and a set of well-defined red teaming events that present bad behavior within the 58 days. In total, the data set is approximately 12 gigabytes compressed across the five data elements and presents 1,648,275,307 events in total for 12,425 users, 17,684 computers, and 62,974 processes. Specific users that are well known system related (SYSTEM, Local Service) were not de-identified though any well-known administrators account were still de-identified. In the network flow data, well-known ports (e.g. 80, 443, etc) were not de-identified. All other users, computers, process, ports, times, and other details were de-identified as a unified set across all the data elements (e.g. U1 is the same U1 in all of the data). The specific timeframe used is not disclosed for security purposes. In addition, no data that allows association outside of LANLís network is included. All data starts with a time epoch of 1 using a time resolution of 1 second. In the authentication data, failed authentication events are only included for users that had a successful authentication event somewhere within the data set.

  3. Comprehensive, Multi-Source Cyber-Security Data Set

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Kent, Alexander D. [Los Alamos National Laboratory

    This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratoryís corporate, internal computer network. The data sources include Windows-based authentication events from both individual computers and centralized Active Directory domain controller servers; process start and stop events from individual Windows computers; Domain Name Service (DNS) lookups as collected on internal DNS servers; network flow data as collected on at several key router locations; and a set of well-defined red teaming events that present bad behavior within the 58 days. In total, the data set is approximately 12 gigabytes compressed across the five data elements and presents 1,648,275,307 events in total for 12,425 users, 17,684 computers, and 62,974 processes. Specific users that are well known system related (SYSTEM, Local Service) were not de-identified though any well-known administrators account were still de-identified. In the network flow data, well-known ports (e.g. 80, 443, etc) were not de-identified. All other users, computers, process, ports, times, and other details were de-identified as a unified set across all the data elements (e.g. U1 is the same U1 in all of the data). The specific timeframe used is not disclosed for security purposes. In addition, no data that allows association outside of LANLís network is included. All data starts with a time epoch of 1 using a time resolution of 1 second. In the authentication data, failed authentication events are only included for users that had a successful authentication event somewhere within the data set.

  4. Information System Security Manager (ISSM) | Department of Energy

    Office of Environmental Management (EM)

    Manager (ISSM) Information System Security Manager (ISSM) macbook-925595_960_720.jpg The Information Security System Manager (ISSM) is designated by an operating unit's (DOE organization or site) Senior Manager to manage the unit's cyber security program. The ISSM establishes, documents, and monitors an operating unit's cyber security program implementation plan, and ensures compliance with DOE management policies. Candidates must possess a working knowledge of cyber security policies and

  5. Control Systems Security Publications Library | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transmission and Distribution World article: "DOE Focuses on Cyber Security" - March 2007 Back to Top ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION Roadmap to Achieve Energy ...

  6. DOE | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / DOE

  7. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  8. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  9. DOE Issues Energy Sector Cyber Organization NOI, Feb 2010

    Broader source: Energy.gov [DOE]

    The Department of Energyís (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector...

  10. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland Security > First Responder Training NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office First Responder Training The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), Nevada National Security Site (NNSS), is designated by the U.S. Department of Homeland Security (DHS), as the National Center for Combating Terrorism in responder preparation. The Nevada Test Site's technical strengths and scientific infrastructure make it an important part of a

  11. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1....

  12. Los Alamos National Security, LLC

    National Nuclear Security Administration (NNSA)

    following Directives are added: NUMBER DATE TITLE DOE O 205.1B Change 3 042914 Department of Energy Cyber Security Program DOE O 484.1 Change 2 063014 Reimbursable Work for ...

  13. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    SciTech Connect (OSTI)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.

  14. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore¬†¬Ľ established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.¬ę¬†less

  15. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland Security NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Homeland Security The U.S. Department of Energy (DOE) National Nuclear Security Administration (NNSA) works hand-in-hand with the U.S. Department of Homeland Security in ensuring the safety of the United States and its people. Nuclear or radiological terrorism is a serious and deadly problem that threatens the vital interests of the United States and abroad. The Nevada National Security Site is a primary training

  16. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security > Homeland Security > NEST NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Nuclear Emergency Support Team (NEST) The Nuclear Emergency Support Team (NEST) is the National Nuclear Security Administration's program for preparing and equipping specialized response teams to deal with the technical aspects of nuclear or radiological terrorism. NEST capabilities include search and identification of nuclear materials, diagnostics and assessment of suspected nuclear devices,

  17. DOE - NNSA/NFO -- National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office With its long-standing partnerships with the defense weapons National Laboratories and the U.S. Department of Defense, the Nevada National Security Site has been an active participant in maintaining our nation's security. Our technical heritage began in the Atomic Age with atmospheric tests, continuing with underground testing and weapons systems experiments. Our skills and technologies for fielding complex experiments

  18. Office of Cyber Assessments | Department of Energy

    Energy Savers [EERE]

    The Office analyzes cyber security trends and studies complex-wide issues in order to ... Performs on-going analyses to identify trends and emerging issues in the cyber security ...

  19. DOE Undersecretary for Nuclear Security and NNSA Administrator...

    National Nuclear Security Administration (NNSA)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog DOE Undersecretary for Nuclear Security and NNSA ... DOE Undersecretary for Nuclear Security and NNSA ...

  20. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Delivery Systems Cybersecurity Control Systems Security News Archive DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and ...

  1. Extension of DOE Directives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-03-18

    The following directives are extended until 3-18-06: DOE N 205.8, Cyber Security Requirements for Wireless Devices and Information Systems, dated 2-11-04; DOE N 205.9, Certification and Accreditation Process for Information Systems Including National Security Systems, dated 02-19-04; DOE N 205.10, Cyber Security Requirements for Risk Management, dated 02-19-04; DOE N 205.11, Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems, dated 2-19-04. DOE N 205.12, Clearing, Sanitizing, and Destroying Information System Storage Media, Memory Devices, and Other Related Hardware, dated 2-19-04.

  2. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future ...

  3. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security> Homeland Security > Nonproliferation Test and Evaluation Complex NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Nonproliferation Test and Evaluation Complex (NPTEC) Photo of NPTEC Training The Nonproliferation Test and Evaluation Complex (NPTEC) is a unique, one-of-a-kind facility built to conduct hazardous materials testing and training under controlled conditions. The NPTEC can accommodate both large-scale and small-scale testing. It is ideally suited for

  4. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Readiness NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Test Readiness The President directed the U.S. Department of Energy to maintain an underground test readiness program in the event that resumption of nuclear weapons testing becomes necessary. Overall readiness is supported by experimental programs conducted at the Nevada National Security Site. In particular, test readiness at the Nevada National Security Site is critically dependent on laboratory-based experiments

  5. Microsoft Word - Blue Cover Report - DOE FISMA

    Office of Environmental Management (EM)

    Evaluation Report The Department's Unclassified Cyber Security Program - 2010 DOE/IG-0843 October 2010 Department of Energy Washington, DC 20585 October 22, 2010 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2010" BACKGROUND Federal information systems are routinely confronted with increasingly sustained cyber attacks - many of which involve targeted and serious

  6. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Emergency Response NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office National Emergency Response The Department of Energy (DOE) National Nuclear Security Administration (NNSA) has the world's leading scientists, engineers, and technicians with more than 50 years of managing the nation's nuclear weapons program. When the need arises, NNSA is prepared to respond immediately to any type of radiological accident or incident anywhere in the world. The professional scientists,

  7. Safeguards and Security Program, acronyms and abbereviations - DOE M

    Office of Environmental Management (EM)

    470.4-7 | Department of Energy Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security Program acronyms and abbereviations Canceled -7 Section C Safeguards and Security Program acronyms and abbereviations PDF icon Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 More Documents & Publications Safeguards and Security Glossary - DOE M 470.4-7

  8. DOE EBK January 2013 Revision_NICEv01_SCRM_clean_v04

    Office of Environmental Management (EM)

    Essential Body of Knowledge (EBK) January 2013 1 U.S. DEPARTMENT OF ENERGY Essential Body of Knowledge (EBK) A Competency and Functional Framework For Cyber Security Workforce Development Office of the Chief Information Officer Office of the Associate CIO for Cyber Security January 2013 DOE Essential Body of Knowledge (EBK) January 2013 2 Table of Contents Executive Summary .......................................................................................................... 4 DOE Essential

  9. Extension of DOE Directives on Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-12-31

    This Notice extends 15 Office of Security and Emergency Operation directives that have expired or will expire until December 31, 2001. This Notice will remain in effect until its expiration date or until new/revised directives are published. The following statement will be added to the summary of the extended directives-DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01.

  10. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland Security > FRMAC NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Federal Radiological Monitoring and Assessment Center (FRMAC) FRMAC Exercise Photo The Federal Radiological Monitoring and Assessment Center (FRMAC) gathers radiological information such as plume and deposition predictions, air and ground concentrations, exposure rates and dose projections, assurance of data quality, and current meteorological conditions and weather forecasts. FRMAC provides the results of

  11. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Big Explosives Experimental Facility NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Big Explosives Experimental Facility (BEEF) Photograph of BEEF Facility The Big Explosives Experimental Facility (BEEF) is a hydrodynamic testing facility, located at the Nevada National Security Site. BEEF provides data, through explosive experiments, to support the Stockpile Stewardship Program, along with a variety of new experimental programs that expand the nation's non-nuclear experiment

  12. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Device Assembly Facility (DAF) NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Device Assembly Facility (DAF) DAF Facility Photograph Construction began on the Device Assembly Facility (DAF) in the mid-1980s during underground nuclear weapons testing. DAF's original purpose was to consolidate all nuclear explosive assembly functions, to provide safe structures for high explosive and nuclear explosive assembly operations, and to provide a state-of-the-art safeguards and security

  13. July 2013 Cyber Incident

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information ...

  14. January 2013 Cyber Incident

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) has confirmed a recent cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of...

  15. An inter-realm, cyber-security infrastructure for virtual supercomputing

    SciTech Connect (OSTI)

    Al-Muhtadi, J.; Feng, W. C.; Fisk, M. E.

    2001-01-01

    Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

  16. Environment, Health, Safety & Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environment, Health, Safety & Security Rocky Mountain Electrical League (RMEL) Physical and Cyber Security Conference - January 26-27, 2016 Rocky Mountain Electrical League (RMEL) Physical and Cyber Security Conference - January 26-27, 2016 Power SURGE is joint project between the DOE's Office of Security Assistance and the Department's Power Marketing Administrations, led by the Western Area Power Marketing Administration, to develop a fiscally responsible and effective protection strategy

  17. PACIFIC NORTHWEST CYBER SUMMIT

    SciTech Connect (OSTI)

    Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

    2013-08-07

    On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energyís (DOEís) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEís Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

  18. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4B Admin Chg 1, Safeguards and Security Program by Marc Brooks Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and Security,...

  19. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rad/NucCTEC NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Radiological/Nuclear Countermeasures Test and Evaluation Complex (Rad/NucCTEC) The Radiological/Nuclear Countermeasures Test and Evaluation Complex (Rad/NucCTEC) will allow crucial security research to prevent radiological or nuclear materials that could be used as dirty bombs, from entering the country. The evaluation of radiation sensors and detection systems are a few of the activities the complex will support. The

  20. Live Broadcast on Cyber Distinguished Speaker Series | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Live Broadcast on Cyber Distinguished Speaker Series Live Broadcast on Cyber Distinguished Speaker Series Live streaming video by Ustream Evan D. Wolff, a partner with Crowell & Moring, will discuss data breaches, risk management, and incident response plans as part of the DOE Cyber Distinguished Series. DETAILS: February 16, 2016 at 1:00pm EST Learn More About Evan Wolff DOE Cyber Strategy

  1. Secretary Moniz visits the Office of Cyber Assessments

    Broader source: Energy.gov [DOE]

    Cyber Security is becoming increasingly important in today’s technologically anchored society. Advances in information technology have made our lives easier in countless ways, but these same advances have brought us a key-stroke away from our enemies. This remains true for the Department of Energy (DOE), whose mission is to ensure America’s security and prosperity by addressing its energy, environmental and nuclear challenges.

  2. Graded Security Protection (GSP) Policy - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CURRENT DOE O 470.3B, Graded Security Protection (GSP) Policy by Gary White Functional areas: Security This Order is classified as (Secret RD NOFORN) and will not be...

  3. 2016 DOE Safety and Security Enforcement Workshop | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2016 DOE Safety and Security Enforcement Workshop 2016 DOE Safety and Security Enforcement Workshop WHEN: May 10 and 11, 2016 (EFCOG Meeting for contractors on May 12) WHERE: Nevada Support Facility / Nevada Field Office - 232 Energy Way, North Las Vegas, NV REGISTRATION FEE: None EVENT ID#: 33884 LOCK DATE (DOE Conference Management System): January 8, 2016 Pending Departmental approval, the DOE Office of Enterprise Assessments' (EA) Office of Enforcement will host the 2016 DOE Safety and

  4. Matrix, Drug Testing for DOE Security Clearance - September 1, 2011 |

    Office of Environmental Management (EM)

    Department of Energy Matrix, Drug Testing for DOE Security Clearance - September 1, 2011 Matrix, Drug Testing for DOE Security Clearance - September 1, 2011 September 1, 2011 The following matrix identifies those individuals required to have a current negative drug test as a prerequisite for being processed for a security clearance The following matrix identifies those individuals required to have a current negative drug test as a prerequisite for being processed for a security clearance. A

  5. "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM...

    Office of Environmental Management (EM)

    "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM, DOE O 471.6, INFORMATION SECURITY, DOE O 473.3 "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM, DOE O...

  6. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    O 470.4B, Safeguards and Security Program by Mary Gallion Functional areas: Safety, Safety and Security, Security, Work Processes, To establish responsibilities for the U.S....

  7. The DOE Security Plan for the Energy Employees Occupational Illness

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compensation Program | Department of Energy The DOE Security Plan for the Energy Employees Occupational Illness Compensation Program The DOE Security Plan for the Energy Employees Occupational Illness Compensation Program January 23, 2009 DOE Security Plan for the Energy Employees Occupational Illness Compensation Program The U.S. Congress passed the Energy Employees Occupational Illness Compensation Program Act (EEOICPA) in 2000. The purpose of EEOICPA is to compensate eligible employees

  8. DOE - NNSA/NFO -- National Security Technologies Contract Award

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Technologies, LLC Contract Award NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office National Security Technologies, LLC Contract Award National Security Technologies, LLC is the Management and Operating contractor for the Nevada National Security Site and satellite facilities of the Department of Energy's National Nuclear Security Administration Nevada Field Office. The contract valued at approximately $2,500,000,000 was awarded on March 28, 2006. The contract period

  9. Extension of DOE Directives on Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-05-06

    The Notice extends the following directives until 12/31/02. DOE N 205.1, DOE N 205.2, DOE 205.3, DOE N 471.3, and DOE 473.6.

  10. DOE O 205.1B Reference List | Department of Energy

    Office of Environmental Management (EM)

    DOE O 205.1B Reference List Includes a list of sources cited in the directive and additional information sources to assist in implementing DOE Order 205.1B, Cyber Security Program. ...

  11. Extension of DOE Directives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-08-12

    The following directives are extended until 8-12-05: DOE N 205.2, Foreign National Access to DOE Cyber Security Systems, dated 11-1-99 and DOE N 205.3, Password Generation, Protection, and Use, dated 11-23-99. No cancellations.

  12. DOE secretary stresses energy security during Los Alamos visit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE secretary stresses energy security during visit DOE secretary stresses energy security during Los Alamos visit U.S. Secretary of Energy Ernest Moniz said that Los Alamos and all the DOE labs have a major role in addressing two key initiatives of the President. September 3, 2013 Dick Sayre, left of Los Alamos National Laboratory's Bioscience Division and the New Mexico Consortium, briefs DOE Secretary Ernie Moniz, New Mexico Institute of Mining and Technology President Daniel Lopez, New

  13. DOE Safety and Security Reform Meeting | Department of Energy

    Office of Environmental Management (EM)

    Safety and Security Reform Meeting DOE Safety and Security Reform Meeting Meeting Date: August 13, 2010 HSS senior managers with lead responsibilities in DOE's safety and security reform activities met with labor union representatives to discuss approach and process for the engagement of worker stakeholders in the reform efforts. Documents Available for Download PDF icon Meeting Agenda PDF icon Meeting Summary More Documents & Publications Work Group Telecom (Draft Charters) Focus Group

  14. Sandia National Laboratories: The Center for Cyber Defenders...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at Sandia National Laboratories for high school and college students interested in Computer Science and Cyber Security. A typical Cyber Boot Camp lasts from 9:00am until 3pm...

  15. Electronic DOE Information Security System (eDISS) PIA, Office of Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety and Security | Department of Energy DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security PDF icon Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security More Documents & Publications Integrated Safety Management Workshop

  16. "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM, DOE O 471.6,

    Office of Environmental Management (EM)

    INFORMATION SECURITY, DOE O 473.3 | Department of Energy "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM, DOE O 471.6, INFORMATION SECURITY, DOE O 473.3 "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM, DOE O 471.6, INFORMATION SECURITY, DOE O 473.3 The familiar level of this module is divided into four sections. In the first section, we will discuss the DOE security programs and design basis threat included in DOE O 470.4B, Safeguards and Security Program.

  17. SECURING HARDWARE, SOFTWARE AND DATA

    Energy Savers [EERE]

    Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability i PNNL-16971 Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability iii Acknowledgements The workshop chairs wish to thank Joree O'Neal and Rachel Smith for all

  18. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  19. Extension of DOE Directives on Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-05-14

    The following directives are extended until 5/14/04. DOE O 470.1, DOE O 471.2A. DOE N 142.1 was originally approved without an expiration date and will, therefore, remain in effect until canceled.

  20. DOE - NNSA/NFO -- National Security Technologies Contract Award

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Award NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office TechSource, Inc. Contract Award TechSource, Inc. is the security support contractor responsible for operating the Badge Office, managing the Vulnerability Assessment lab, maintaining OPSEC and security awareness programs, security clearances, and classified matter protection. The contract valued at approximately $12,383,205 was awarded on 5/28/2015. The contract period of performance is July 1, 2015 through June 30, 2016

  1. DOE - NNSA/NFO -- Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Nevada National Security Site Photograph of NNSS A unique national resource, the Nevada National Security Site is a massive outdoor laboratory and national experimental center that cannot be duplicated. Larger than the state of Rhode Island, approximately 1,375 square miles, the Nevada National Security Site is one of the largest restricted access areas in the United States. The remote site is surrounded by thousands of

  2. DOE - NNSA/NFO -- Nevada National Security Site Tours

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nevada National Security Site Tours NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Photograph of Nevada National Security Site Tour The Nevada Field Office provides free general interest tours of the Nevada National Security Site on a monthly basis. Groups, civic or technical organizations, and private clubs may request specially-arranged tours (minimum of 25 people) by calling 702-295-0944. Below you will find information on tour logistics, points of interest on the tour,

  3. DOE - NNSA/NFO -- Photo Library Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Library > Nevada National Security Site NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Photo Library - Nevada National Security Site A unique national resource, the Nevada National Security Site is a massive outdoor laboratory and national experimental center that cannot be duplicated. Larger than the state of Rhode Island, approximately 1,375 square miles, the NTS is one of the largest restricted access areas in the United States. The remote site is surrounded by thousands of

  4. DOE and Industry Showcase New Control Systems Security Technologies at

    Office of Environmental Management (EM)

    DistribuTECH | Department of Energy and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH March 25, 2010 - 1:20pm Addthis DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy

  5. NEW - DOE O 470.6, Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives.

  6. WIPP Security Contractor Receives DOE Voluntary Protection Program Award |

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Department of Energy Carlsbad Field Site Operations Director Casey Gadbury (right) and Farok Sharif, President and Project Manager for Nuclear Waste Partnership LLC, the management and operating contractor at the Waste Isolation Pilot Plant, present the DOE's Voluntary Protection Program Legacy Star Award to Richard De Los Santos, protective force manager for Security Walls, the security contractor at the Waste Isolation Pilot Plant. The DOE-VPP legacy star award is the

  7. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE

  8. DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks

    Broader source: Energy.gov [DOE]

    WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for...

  9. Cyber Friendly Fire

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2011-09-01

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.

  10. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Criticality Experiments Facility NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Criticality Experiments Facility (CEF) The Criticality Experiments Facility is the only site in the entire U.S. Department of Energy (DOE) complex where general research and hands-on training can be conducted into nuclear safeguards, criticality safety and emergency response using Category I level nuclear materials. This research and training is conducted at the Device Assembly Facility, located at the

  11. DOE Turns 25 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Turns 25 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  12. 7 Key Challenges for Visualization in Cyber Network Defense

    SciTech Connect (OSTI)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    2014-12-02

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and ďpretty pictureĒ visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  13. The NIAC Convergence of Physical and Cyber Technbologies and Related

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Management Challenges Working Group Final Report and Recommendations | Department of Energy The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate

  14. Deception used for Cyber Defense of Control Systems

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  15. The NIAC Convergence of Physical and Cyber Technbologies and...

    Broader source: Energy.gov (indexed) [DOE]

    PDF icon The NIAC Convergence of Physical and Cyber Technbologies and Related Security ... Energy Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan

  16. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  17. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  18. Cyber Train Videos | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Train Videos Cyber Train Overview Cyber Train Opt-Out Process Cyber Train Complete Training Submitting Course Completion Materials...

  19. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stockpile Stewardship NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Stockpile Stewardship The Stockpile Stewardship Program was established in response to the Fiscal Year 1994 National Defense Authorization Act (Public Law 103-160), which requires, in the absence of nuclear testing, a program to: Support a focused, multifaceted program to increase the understanding of the enduring stockpile; Predict, detect, and evaluate potential problems of the aging of the stockpile; Refurbish

  20. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JASPER NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Joint Actinide Shock Physics Experimental Research (JASPER) Photo of JASPER The Joint Actinide Shock Physics Experimental Research (JASPER) Facility plays an integral role in the testing of the nation's nuclear weapons stockpile by providing a method to generate and measure data pertaining to the properties of materials (radioactive chemical elements) at high shock pressures, temperatures and strain rates. These extreme

  1. Cyber Threats to Nuclear Infrastructures

    SciTech Connect (OSTI)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  2. DOE - NNSA/NFO -- Disclaimer, Privacy and Security Notice

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disclaimer, Privacy and Security Notice NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Privacy and Security Notice Information from this server resides on a computer system funded by the U.S. Department of Energy -- an agency of the United States Government. The U.S. Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are

  3. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Subcritical Experiments/U1a NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Subcritical Experiments/U1a Complex Photograph of U1a facility The underground U1a Complex is the location for subcritical experiments. Subcritical experiments are physics experiments that obtain technical information to help the National Laboratories maintain the safety and reliability of the U.S. nuclear weapons stockpile. The U1a Complex is an underground laboratory consisting of horizontal tunnels, each

  4. Cyber Incidents Involving Control Systems

    SciTech Connect (OSTI)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

  5. Solar power purchase for DOE laboratories | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Solar power purchase for DOE laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs

  6. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  7. Cyber Train Videos | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Train Videos Cyber Train Overview Cyber Train Opt-Out Process Cyber Train Complete Training Submitting Course Completion Materials Click here for information on accessing Cyber Train.

  8. DOE Cybersecurity Awareness Program | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Awareness Program DOE Cybersecurity Awareness Program security-265130_960_720.jpg The Cybersecurity Awareness and Training (CSAT) Program team coordinates cybersecurity awareness campaigns and publishes materials that examine current cyber themes, address emerging threats, and describe new security practices, including: Organized activities (seminars, guest speakers, etc.) Posters Newsletters DOECAST Informational Flyers Blue box media messages Blogs Games Videos Specific campaign material

  9. Sandia Energy Ľ Cyber

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sandia-cyber-engineering-research-laboratory-cerl-formally-opensfeed 0 Sandia Builds Android-Based Network to Study Cyber Disruptions http:energy.sandia.gov...

  10. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  11. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  12. DOE - NNSA/NFO -- Site Map

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SiteMap NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office NATIONAL SECURITY ENVIRONMENTAL PROGRAMS National Security Stockpile Stewardship ¬ē BEEF ¬ē CEF ¬ē DAF ¬ē JASPER ¬ē Subcritical Experiments/U1a ¬ē Test Readiness Homeland Security ¬ē National Emergency Response ¬ē FRMAC - Program Support ¬ē NEST ¬ē NPTEC ¬ē Rad/NucCTEC First Responder Training ¬ē Registration Department of Energy - Cyber Incident Response Capability (DOE-CIRC) OPSEC Environmental Programs ¬ē Groundwater

  13. DOE - NNSA/NFO -- Nevada National Security Site History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site History NNSA/NFO Language Options U.S. DOE/NNSA - Nevada Field Office Nevada National Security Site History Photo of NTS Following the Trinity test and the bombings of Hiroshima and Nagasaki, military officials still knew very little about the effects, especially on naval targets, of nuclear weapons. Accordingly, the Joint Chiefs of Staff requested and received Presidential approval to conduct a test series during the summer of 1946. The test series, named Crossroads, was conducted at

  14. NNSA employees recognized at DOE CFC ceremony | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration recognized at DOE CFC ceremony | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for

  15. NNSS does it again! | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    does it again! | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  16. DOe/EA 2024 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    DOe/EA 2024 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  17. EAC Recommendations for DOE Action Regarding Implementing Effective Enterprise Security Governance- March 2014

    Broader source: Energy.gov [DOE]

    EAC Recommendations for DOE Action Regarding Implementing Effective Enterprise Security Governance, approved at the March 12-13, 2014 meeting.

  18. National Security & Safety Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    IG-0787 The Department's Cyber Security Incident Management Program January 2, 2008 Inspection Report: IG-0785 Incident of Security Concern at the Y-12 National Security Complex...

  19. Notice of Intent to Develop DOE O 470.6, Integrating Existing Technical Security Program Requirements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-21

    This memorandum provides justification for the development of one integrated and consolidated set of requirements for the Department of Energy (DOE) Technical Security Program (TSP). This Order will combine the existing necessary requirements from DOE Manual (M) 205.1-3, Telecommunications Security Manual, dated 4-17-2006 and DOE M 470.4-4A chg.1, Information Security Manual, dated 10-12-2010; Section D -Technical Surveillance Countermeasures, into a single DOE Order defining the DOE TSP.

  20. Los Alamos director echoes cyber concerns

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP.

  1. Los Alamos National Security, LLC

    National Nuclear Security Administration (NNSA)

    Alamos National Security, LLC Contract No. DE-AC52-06NA25396 Modification No. 299 Page 2 of 2 Prime Contract Section J, Appendix G, List of Applicable Directives, is modified as follows: The following Directives are added: NUMBER DATE TITLE DOE O 205.1B Change 3 04/29/14 Department of Energy Cyber Security Program DOE O 484.1 Change 2 06/30/14 Reimbursable Work for Department of Homeland Security NNSA SD 473 09/10/14 Enterprise Mission Essential Task List-Based Protective Force Training Program

  2. Transforming CyberSecurity R&D within the Department of Energy: Getting Ahead of The Threat

    SciTech Connect (OSTI)

    Frincke, Deborah A.; Catlett, Charlie; Siebenlist, Frank; Strelitz, Richard; Talbot, Ed; Worley, Brian

    2008-01-01

    This report outlines a preliminary response from DOE researchers to the following three questions: a) what are the key priorities w.r.t. cybersecurity R&D over the next decade? b) what would we recommend, in terms of a program, to address those priorities c) how would a DOE Office of Science program in this area complement other cybersecurity R&D initiatives such as NSF's or other agency programs?

  3. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  4. OCIO Technology Summit: Cyber Innovation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Innovation OCIO Technology Summit: Cyber Innovation November 26, 2013 - 4:52pm Addthis OCIO Technology Summit: Cyber Innovation Robert G. Green (Acting) Robert G. Green (Acting) Principal Deputy CIO for Enterprise Information Resources Management | Deputy CIO for Architecture Engineering, Technology & Innovation Many people are aware of Energy's mission and how our Laboratories contribute to the Nation's economic prosperity and security through scientific discovery. Our transformative

  5. Innovating to Meet the Evolving Cyber Challenge | Department of Energy

    Office of Environmental Management (EM)

    Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department.

  6. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ‚?? tunnels‚?Ě, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  7. U.S. Department of Energy Cyber Strategy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CYBER STRATEGY | 1 U.S. DEPARTMENT OF ENERGY CYBER STRATEGY DOE CYBER STRATEGY | 2 TABLE OF CONTENTS Message from the Deputy Secretary Message from the CIO Introduction Vision Principles Strategic Goals and Objectives The Way Forward Appendix: Applicable Mandates p. 3 p. 4 p. 5 p. 7 p. 8 p. 9 p. 15 p. 16 DOE CYBER STRATEGY | 3 Across the Department of Energy, our diverse missions are enabled by digital technolo- gies. We rely on these technologies to gather, share, store, and use information.

  8. Cyber-Intrusion Auto-Response Policy and Management System (CAPMS)

    Office of Environmental Management (EM)

    Cyber-Intrusion Auto-Response Policy and Management System (CAPMS) A managed security system that integrates advanced cybersecurity algorithms with energy delivery systems to respond autonomously to cyber intrusions while sustaining critical energy delivery functions Background Cyber attacks are becoming more sophisticated every day. Electric utilities are faced with the challenge of detecting, analyzing, and responding to cyber incidents to protect public safety and preserve the integrity of

  9. DOE Statement on UK Government's "Road to 2010" Report on Nuclear Security

    Energy Savers [EERE]

    | Department of Energy Statement on UK Government's "Road to 2010" Report on Nuclear Security DOE Statement on UK Government's "Road to 2010" Report on Nuclear Security July 17, 2009 - 12:00am Addthis WASHINGTON, DC - Thomas P. D'Agostino, the Department of Energy's Under Secretary for Nuclear Security and Administrator of the National Nuclear Security Administration, today applauded the British government's new report on advancing the global nuclear security agenda.

  10. DOE/NNSA Strategic Performance Evaluation Plan (PEP) FOR Consolidated Nuclear Security, LLC

    National Nuclear Security Administration (NNSA)

    5 DOE/NNSA Strategic Performance Evaluation Plan (PEP) FOR Consolidated Nuclear Security, LLC MANAGEMENT AND OPERATION OF THE Pantex Plant and the Y-12 National Security Complex Contract Number: DE-NA0001942 Performance Period: October 01, 2014 through September 30, 2015 3'5tfr.*>~t Date President and Chief Executive Officer Consolidated Nuclear Security, LLC Date Director, Contracts Consolidated Nuclear Security, LLC FY 2015 Perfonnance Evaluation Plan (PEP) 1 Consolidated Nuclear Security,

  11. Microsoft PowerPoint - 5_SCOTT_SLAVENS_Power Point PSA presentation-DOE Lakewood - IEEA Nuclear Security Conf Slavens 05 13 201

    National Nuclear Security Administration (NNSA)

    Homeland Security Investigations SSA Greg Slavens CPIC Colorado Springs Counter-Proliferation Investigations 2 Homeland Security Investigations HSI Jurisdictional Authorities Ôāß Export Enforcement / Weapons Smuggling Ôāß Financial Crimes / Money Laundering Ôāß Narcotics Smuggling / Trafficking Ôāß Human Smuggling / Human Trafficking Ôāß Commercial Trade and Fraud Ôāß Cyber Crimes Ôāß Worksite Enforcement Ôāß Intellectual Property Rights Ôāß Human Rights Violations Ôāß Transnational Gangs Ôāß

  12. Order DOE O 205.1B | Department of Energy

    Office of Environmental Management (EM)

    Order DOE O 205.1B Order DOE O 205.1B To set forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE) PDF icon DOE O 205.1B Chg 2.pdf More Documents & Publications DOE O 205.1B Reference List Part I, DAA Overview ; AODR Role-Based Training Information Management Governance Council

  13. DOE Selects Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Laboratory

    Broader source: Energy.gov [DOE]

    WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced that Lawrence Livermore National Security, LLC (LLNS) has been selected to be the management and operating contractor for DOE's...

  14. DOE Undersecretary for Nuclear Security and NNSA Administrator Frank Klotz

    National Nuclear Security Administration (NNSA)

    visits Y-12 National Security Complex | National Nuclear Security Administration Undersecretary for Nuclear Security and NNSA Administrator Frank Klotz visits Y-12 National Security Complex | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership

  15. Data Intensive Architecture for Scalable Cyber Analytics

    SciTech Connect (OSTI)

    Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

    2011-12-19

    Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a monthís worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFinģ for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a monthís worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

  16. Protecting the Nation's Electric Grid from Cyber Threats | Department of

    Energy Savers [EERE]

    Energy Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States√ʬĬô world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable

  17. Cyber-Physical Modeling and Simulation for Situational Awareness (CYMSA)

    Office of Environmental Management (EM)

    Cyber-Physical Modeling and Simulation for Situational Awareness (CYMSA) Cyber-physical security state estimation for power grid intrusion detection and control command validation and assessment Background The power grid is an energy delivery system comprising of individual power components and a geographically dispersed communications system. Power grid communications systems, components, and protocols must be secured from unauthorized access because adversarial manipulation could disrupt

  18. INL Cyber Security Research (2008)

    Broader source: Energy.gov [DOE]

    Cybersecurity research at INL will help protect critical infrastructure control system computers against worms and other viruses.

  19. DOE-STD-1171-2003; Safeguards and Security Functional Area Standard

    Office of Environmental Management (EM)

    DOE-STD-1171-2003 December 2003 DOE STANDARD SAFEGUARDS AND SECURITY FUNCTIONAL AREA STANDARD DOE Defense Nuclear Facilities Technical Personnel U.S. Department of Energy AREA TRNG Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1171-2003 This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800)

  20. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLís ďdefense in depthĒ approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability Ė and your last line of defense.

  1. Savannah River Site Team Wins Carolina Challenge at 2012 DOE Security Protection Officer Competition

    Office of Energy Efficiency and Renewable Energy (EERE)

    Savannah River Site, Aiken, S.C. ‚Äď Security Protection Officers from Savannah River Site‚Äôs (SRS) security contractor WSI-SRS, today won the Department of Energy (DOE) Secretary‚Äôs Trophy as the top DOE team in the 2012 Security Protection Officer Team Competition (SPOTC)- 2012 Carolina Challenge, held here, April 22-26. It was the 40th anniversary of the SPOTC competition.

  2. DOE recognizes Nevada National Security Site contractor for safety |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration recognizes Nevada National Security Site contractor for safety | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets

  3. Cyber sleuths face off

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber sleuths face off Cyber sleuths face off Computer specialists will meet for a grueling week that combines state-of-the-art training with opportunities to team up, solve relevant cyber problems, and attack one another. February 10, 2010 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new

  4. Delegation of Authority for Safeguards and Security (EM) - DOE...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Current Effective Date: Apr 09, 2010 Re-delegation Allowed: No Authorities: DOE O 151.1C, DOE O 470.2B Related History Related to: DOE O 470.2B, Independent Oversight and...

  5. DOE - NNSA/NFO -- News & Views Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Played Crucial Role Photo - Badge inspection Guards Milton Miller (left) and John Metcalf inspect the badge of Frank Waters of the Joint AEC Department of Defense Information Office. DOD photo. Before Wackenhut Services Inc. (WSI) won the contract in 1965, Federal Services, Inc. provided security for the Nevada Test Site. Although the mission of the security forces has not changed over the last 42 years, uniforms, communication equipment and vehicles are substantially different. ^ TOP ^

  6. Security is Not an Option | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    is Not an Option Security is Not an Option A 10-year roadmap for achieving control system cyber security in the energy industry has been hailed as a model for other industries. Here's a look at progress to date. PDF icon Security is Not an Option More Documents & Publications Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE National SCADA Test Bed Program Multi-Year Plan National SCADA Test Bed - Enhancing control systems security

  7. DOE-ORO buildings | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE-ORO buildings known as the "Castle on the Hill."

  8. DOE-ORO buildings | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    View of Oak Ridge with the DOE-ORO buildings in foreground

  9. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing Department of Energy (DOE), including National Nuclear Security Administration (NNSA), Federal workers with a safe and healthful workplace. Cancels DOE O 440.1A. Certified 6/17/2011. Canceled by DOE O 440.1B Chg 1.

  10. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  11. DOE completes environmental assessment on INL National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at 1955 Fremont Ave., mailstop 1170, Idaho Falls, Idaho, 83415, or by email at Michaeds@id.doe.gov. Media contact(s): Tim Jackson, (208) 526-8484 Inspector General | DOE Directives...

  12. Notice of Intent to Revise DOE Order 470.3B, Graded Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    adversary numbers and capabilities to reflect the intent of the policy and the inherent risk management considerations. 15 NOV 23 - DOE O 470.3B Graded Security Protection (GSP)...

  13. NSTec Los Alamos Earns DOE-VPP STAR For Safety National Security Technologies (NSTec) Los

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NSTec Los Alamos Earns DOE-VPP STAR For Safety National Security Technologies (NSTec) Los Alamos Operations office has been recognized as one of the safest contractors in the National Nuclear Security Administration (NNSA) complex with the announcement that the U.S. Department of Energy Voluntary Protection Program (DOE-VPP) has recognized them at the STAR level, its highest rating. Los Alamos Operations (LAO) is a New Mexico operation of NSTec, the managing and operational contractor for the

  14. Reducing Cyber Risk to Critical Infrastructure: NIST Framework | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Reducing Cyber Risk to Critical Infrastructure: NIST Framework Reducing Cyber Risk to Critical Infrastructure: NIST Framework Recognizing that the national and economic security of the United States depends on the reliable functioning of critical infrastructure, the President under Executive Order (EO) 13636 "Improving Critical Infrastructure Cybersecurity" of February 2013 directed the National Institute of Standards and Technology (NIST) to work with stakeholders to

  15. A cognitive and economic decision theory for examining cyber defense strategies.

    SciTech Connect (OSTI)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  16. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Energy Savers [EERE]

    Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

  17. DOE Announces Plans for WIPP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Announces Plans for WIPP | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  18. DOE Celebrates LGBT Pride Month | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Celebrates LGBT Pride Month | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs

  19. DOE celebrates Earth Day | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    celebrates Earth Day | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  20. DOE honors PECASE recipients | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    honors PECASE recipients | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  1. DOE/NRC Forms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC Forms | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  2. DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy

    Energy Savers [EERE]

    National SCADA Test Bed Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan This document presents the National SCADA Test Bed Program Multi-Year Plan, a coherent strategy for improving the cyber security of control systems in the energy sector. The NSTB Program is conducted within DOE's Office of Electricity Delivery and Energy Reliability (OE), which leads national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure,

  3. Towards a Research Agenda for Cyber Friendly Fire

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.; Fluckiger, Jerry D.

    2009-11-18

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is to examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.

  4. Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition

    SciTech Connect (OSTI)

    Troy Hiltbrand; Daniel Jones

    2012-12-01

    As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

  5. DOE | Office of Health, Safety and Security | Health and Safety

    Office of Environmental Management (EM)

    | Office of Environment, Health, Safety and Security | Health and Safety Rule 851 FAQs - Updated October 19, 2010 10 CFR 851 "Worker Safety and Health Program" Frequently Asked Questions Updated October 19, 2010 Please Note: The responses to the following Frequently Asked Questions are not Official interpretations, only the Office of General Counsel may issue and interpretive ruling. Please see 10 CFR 851.7 and 851.8 for more information. Subpart A-General Provisions 851.1Scope and

  6. Certification for DOE O 472.2 Chg 1, Personnel Security - DOE...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    guidelines, regulations, standards, OMB guidance, relevant memoranda of understanding and public laws. Certification - O 472.2 Chg 1, Personnel Security - Approved 7-15-16.pdf --...

  7. A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance: Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Grimaila, Michael R

    2010-01-01

    In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we discuss how this infrastructure can be used in the subject domain of mission assurance as defined as the full life-cycle engineering process to identify and mitigate design, production, test, and field support deficiencies of mission success. We address the opportunity to apply the Cyberspace Security Econometrics System (CSES) to Carnegie Mellon University and Software Engineering Institute s Mission Assurance Analysis Protocol (MAAP) in this context.

  8. DOE's Nuclear Weapons Complex: Challenges to Safety, Security, and Taxpayer Stewardship

    Energy Savers [EERE]

    Oversight and Investigations Committee on Energy and Commerce U.S. House of Representatives "DOE's Nuclear Weapons Complex: Challenges to Safety, Security, and Taxpayer Stewardship" FOR RELEASE ON DELIVERY 10:00 AM September 12, 2012 1 Mr. Chairman and Members of the Subcommittee, I am pleased to be here at your request to testify on matters relating to the Department of Energy's oversight of the nuclear weapons complex. 1 The National Nuclear Security Administration (NNSA) was

  9. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  10. Materials Informatics for the ICME CyberInfrastructure | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Informatics for the ICME CyberInfrastructure Materials Informatics for the ICME CyberInfrastructure 2011 DOE Hydrogen and Fuel Cells Program, and Vehicle Technologies Program Annual Merit Review and Peer Evaluation PDF icon lm038_paxton_2011_o.pdf More Documents & Publications Integrated Computational Materials Engineering (ICME) for Mg: International Pilot Project (Part 1) Vehicle Technologies Office: 2010 Lightweight Materials R&D Annual Progress Report Integrated

  11. Y-12 now a DOE-VPP Star site | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    now a DOE-VPP Star ... Y-12 now a DOE-VPP Star site Posted: June 6, 2012 - 2:00pm B&W Y-12 Senior Vice President and Deputy General Manager of Operations Bill Klemm (center) and Atomic Trades and Labor Council President Steve Jones (right) raise the DOE-VPP Star flag as Dan Hoag, NNSA acting site manager, looks on. The Y-12 National Security Complex now flies the VPP Star flag after a ceremony held Tuesday morning, June 5. The flag signifies Y-12's recent achievement of DOE-VPP Star status,

  12. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  13. Cyber threat metrics.

    SciTech Connect (OSTI)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  14. FY 2013 DOE Agency Financial Report | Department of Energy

    Energy Savers [EERE]

    Agency Financial Reports ¬Ľ FY 2013 DOE Agency Financial Report FY 2013 DOE Agency Financial Report Notable accomplishments in FY 2013: Investments in energy transformation have resulted in testing of greenhouse gas storage, the first grid-connected offshore wind prototype, cost competitive advances in cellulosic ethanol, the first commercial geothermal system to deliver power to the electric grid, improved efficiency and cyber security for the electric grid, new appliance efficiency standards,

  15. Office Inspector General DOE Annual Performance Report FY 2008, Annual

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance Plan FY 2009 | Department of Energy Inspector General DOE Annual Performance Report FY 2008, Annual Performance Plan FY 2009 Office Inspector General DOE Annual Performance Report FY 2008, Annual Performance Plan FY 2009 During Fiscal Year (FY) 2008, we reviewed a variety of critical areas relevant to the Department's mission priorities. One of our goals, for example, was to examine possible programmatic improvements in Department operations relating to cyber security and

  16. On June 24, 2011, the U.S. Department of Energy (DOE), National Nuclear Security

    National Nuclear Security Administration (NNSA)

    On June 24, 2011, the U.S. Department of Energy (DOE), National Nuclear Security Administration Sandia Site Office (NNSA/SSO) announced its intent to prepare a Site-Wide Environmental Impact Statement (SWEIS) for the operation of facilities and activities at Sandia National Laboratories (SNL) and other DOE operations in Albuquerque, New Mexico, for a 5- to 10-year period commencing in 2011. The National Environmental Policy Act (NEPA) requires federal agencies to integrate environmental values

  17. DOE, NREL Help DoD Enhance Energy Security (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-10-01

    This fact sheet gives an overview of the technical assistance provided by DOE/NREL to the Department of Defense to advance energy security. Specifically, the fact sheet describes the net zero energy project at the U.S. Marine Corps Air Station (MCAS) Miramar.

  18. Certification for DOE O 472.2 Chg 1, Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-07-16

    DOE O 472.2 Chg 1, Personnel Security, dated 07-09-2014, has been reviewed by my organization and deemed to be in compliance with related Departmental Directives, Secretarial Delegations, organizational structure, budget guidelines, regulations, standards, OMB guidance, relevant memoranda of understanding and public laws.

  19. What is the current state of the science of Cyber defense?

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-10-09

    My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward this end are emerging.

  20. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Environmental Management (EM)

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  1. Errata Sheet for Nevada National Security Site Environmental Report Summary 2011, DOE/NV/25946--1604-SUM

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Errata Sheet for Nevada National Security Site Environmental Report Summary 2011, DOE/NV/25946--1604-SUM Errata issued July 2013 ERRATA SHEET Issue Date: July 2013 The Following Corrections Apply to: Nevada National Security Site Environmental Report Summary 2011 DOE Document Number: DOE/NV/25946--1604-SUM Document Date: September 2012 The corrections shown below have been made in the subject document. Page 18, middle column, first complete paragraph, first sentence: 117.427 changed to 121.427

  2. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Cybersecurity Programs Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering to protect cyber systems from malicious attacks Cyber worker inspecting supercomputer Protecting cyberspace An expert team, passionate about defending the nation's critical infrastructure Computer Annex "The cyber threat to our nation is one of the most serious

  3. CNS, Y-12 honored as DOE Mentor of the Year | Y-12 National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Complex Y-12 honored as DOE ... CNS, Y-12 honored as DOE Mentor of the Year Posted: August 6, 2015 - 3:59pm From left: CNS Supply Chain Management Director Skip Skelton, Y-12 Small Business Program Manager Lisa Copeland, Y-12 mentor Sam Easterling and CNS Senior Supply Chain Manager Mike Vermeulen Consolidated Nuclear Security LLC and Y-12 recently received the Department of Energy's Small Business Mentor of the Year award. Small Business Program Manager Lisa Copeland said, "It makes me

  4. CNS, Y-12 named DOE mentor of the year | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration CNS, Y-12 named DOE mentor of the year | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs

  5. SUPPLEMENT ANALYSIS DETERMINATION The Department of Energy (DOE), National Nuclear Security Administration (NNSA) Production Office

    Energy Savers [EERE]

    DETERMINATION The Department of Energy (DOE), National Nuclear Security Administration (NNSA) Production Office Pantex (NPO) has prepared a Supplement Analysis (SA) to determine whether the Final Environmental Impact Statement for the Continued Operation of the Pantex Plant and Associated Storage of Nuclear Weapon Components, also known as the Site-Wide Environmental Impact Statement (SWEIS), adequately addresses the environmental impacts of continued Pantex Plant operations, or if additional

  6. Notice of Intent to Revise DOE Order 470.3B, Graded Security Protection (GSP) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    Request approval to revise the subject Order to make significant changes which are required for the Order to be consistent with threat information received from the intelligence community. Information provided by the joint DOE/IN and Defense Intelligence Agency, Nuclear Security Threat Capabilities Assessment, revealed the need to adjust adversary numbers and capabilities to reflect the intent of the policy and the inherent risk management considerations.

  7. Notice of Intent to Revise DOE Order 470.3B, Graded Security Protection (GSP) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-11-23

    Request approval to revise the subject Order to make significant changes which are required for the Order to be consistent with threat information received from the intelligence community. Information provided by the joint DOE/IN and Defense Intelligence Agency, Nuclear Security Threat Capabilities Assessment, revealed the need to adjust adversary numbers and capabilities to reflect the intent of the policy and the inherent risk management considerations.

  8. Autonomic Intelligent Cyber Sensor (AICS) Version 1.0.1

    Energy Science and Technology Software Center (OSTI)

    2015-03-01

    The Autonomic Intelligent Cyber Sensor (AICS) provides cyber security and industrial network state awareness for Ethernet based control network implementations. The AICS utilizes collaborative mechanisms based on Autonomic Research and a Service Oriented Architecture (SOA) to: 1) identify anomalous network traffic; 2) discover network entity information; 3) deploy deceptive virtual hosts; and 4) implement self-configuring modules. AICS achieves these goals by dynamically reacting to the industrial human-digital ecosystem in which it resides. Information is transportedmore¬†¬Ľ internally and externally on a standards based, flexible two-level communication structure.¬ę¬†less

  9. DOE/ID-Number

    Office of Environmental Management (EM)

    INL/EXT-08-13979 U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB National SCADA Test Bed Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program November 2008 November 2008 INL/EXT-08-13979 Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program November 2008 Idaho National Laboratory Idaho Falls, Idaho 83415

  10. Sandia Cyber Engineering Research Laboratory (CERL) Formally Opens

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Engineering Research Laboratory (CERL) Formally Opens - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense

  11. How ORISE is Making a Difference: Homeland Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    In order to do that, experts from a wide-range of disciplines-such as cyber security, border security, or even airline security-must work together for the prevention of...

  12. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  13. Nuclear Instrumentation and Control Cyber Testbed Considerations Ė Lessons Learned

    SciTech Connect (OSTI)

    Jonathan Gray; Robert Anderson; Julio G. Rodriguez; Cheol-Kwon Lee

    2014-08-01

    Abstract: Identifying and understanding digital instrumentation and control (I&C) cyber vulnerabilities within nuclear power plants and other nuclear facilities, is critical if nation states desire to operate nuclear facilities safely, reliably, and securely. In order to demonstrate objective evidence that cyber vulnerabilities have been adequately identified and mitigated, a testbed representing a facilityís critical nuclear equipment must be replicated. Idaho National Laboratory (INL) has built and operated similar testbeds for common critical infrastructure I&C for over ten years. This experience developing, operating, and maintaining an I&C testbed in support of research identifying cyber vulnerabilities has led the Korean Atomic Energy Research Institute of the Republic of Korea to solicit the experiences of INL to help mitigate problems early in the design, development, operation, and maintenance of a similar testbed. The following information will discuss I&C testbed lessons learned and the impact of these experiences to KAERI.

  14. Microsoft Word - OE Cyber Release 10 18 07.doc

    Office of Environmental Management (EM)

    FOR IMMEDIATE RELEASE Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and

  15. DOE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Department of Energy PLEASE KEEP THIS PAHPHLET WITH YOU DURING YOUR VISIT Welcome to the Hanford Site Visitor Orientation 2 We take safety, security, and environmental protection seriously The safety and health of our employ- ees, the public, and those who visit the Hanford Site, in addition to site security and protection of the envi- ronment, are fundamental values of the U.S. Department of Energy (DOE) and its contractors. We strive to achieve and sustain a worksite that is free of

  16. Cyber and physical infrastructure interdependencies.

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  17. New - DOE O 452.4C, Security and Use Control of Nuclear Explosives and Nuclear Weapons

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    The order establishes requirements to implement the nuclear explosive security and use control elements of DOE O 452.1E to ensure authorized use, when directed by proper authority, and protect against deliberate unauthorized acts, deliberate unauthorized use, and denial of authorized use. Cancels DOE O 452.4B, dated 1-22-10.

  18. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  19. PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical

    Energy Savers [EERE]

    Systems Security for the Smart Grid - February 7, 2012 | Department of Energy Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of

  20. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOE Patents [OSTI]

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  1. Microsoft Word - Cyber Security flyer.docx

    Broader source: Energy.gov (indexed) [DOE]

    Protection for Small Businesses When: Tuesday, December 8 th , 2015 Time: 1:00pm to 4:00pm (allow extra time for badging at the main gate) Cost: FREE Where: Brookhaven Science Associates LLC/Brookhaven National Laboratory Berkner Hall, Upton, Long Island, NY 11973 Directions: https://www.bnl.gov/maps/index.php Panelists: Prashanth Mekala Supervisory Special Agent, New York Field Office Federal Bureau of Investigation Paul Rubell, Esq. Meltzer, Lippe, Goldstein & Breitstone, LLP Invited: TBA

  2. Information Technology Specialist (Cyber Security) | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apply on USAJOBS Who May Apply All qualified U.S. Citizens. This position will be filled through OPM's Direct Hire Authority. Veterans' preference and traditional rating and ...

  3. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    SciTech Connect (OSTI)

    Eric Cornelius; Mark Fabro

    2008-08-01

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

  4. Human dimensions in cyber operations research and development priorities.

    SciTech Connect (OSTI)

    Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey

    2012-11-01

    Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

  5. Notice of Intent to Revise DOE O 470.4B, Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-08-06

    The directive is proposed for revision to reflect the establishment by the Secretary of Energy of the Office of Environment, Health, Safety and Security (AU), and the Office of Security Officer positions and the Security Committee. The responsibilities section of the Order will be revised to include the Chief Security Officers and the Security Committee and to better reflect current Departmental structure.

  6. Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5954 Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis H. Cassidy Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract

  7. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    SciTech Connect (OSTI)

    Greene, David L; Leiby, Paul Newsome

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described in this report has been specifically developed to estimate the prospective oil security benefits of DOE's R&D programs, it is also applicable to other strategies and policies aimed at changing U.S. petroleum demand.

  8. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  9. Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  10. DOE, NREL Help DoD Enhance Energy Security (Fact Sheet), Integrated Deployment: Military, Energy Efficiency & Renewable Energy (EERE)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE, NREL Help DoD Enhance Energy Security The U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL) are helping the U.S. government, including the U.S. Department of Defense (DoD), deploy large-scale energy efficiency measures and renewable energy technologies to reduce costs, increase energy security, and meet federal mandates. As the largest energy consumer within the U.S. federal government, DoD has long recognized the strategic impor- tance of energy to its

  11. Security Control Assessor | Department of Energy

    Energy Savers [EERE]

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, assurance, and technical security controls implemented on an information system via security testing and evaluation (ST&E) methods. The SOA must be independent of system development, operation, and deficiency mitigation. PDF icon Security Control Assessor Core Competency Training Worksheet More Documents &

  12. Microsoft Word - SmartGrid - NRC Input to DOE Requestrvjcomments.docx

    Office of Environmental Management (EM)

    Nuclear Regulatory Commission Input to DOE Request for Information/RFI (Federal Register / Vol. 75, No. 180 / Friday, September 17, 2010/Pages 57006-57011 / Notices) / Smart Grid Implementation Input - NRC Contact: Kenn A. Miller, Office of Nuclear Reactor Regulation, 301-415-3152 Comments relevant to the following two sections of the RFI: "Long Term Issues: Managing a Grid with High Penetration of New Technologies" and "Reliability and Cyber-Security," Page 57010. Nuclear

  13. The Office of Independent Enterprise Assessments’ Office of Enforcement convened the 2014 DOE Safety and Security Enforcement Workshop May 13 and 14, 2014

    Broader source: Energy.gov [DOE]

    The Office of Independent Enterprise Assessments’ Office of Enforcement convened the 2014 DOE Safety and Security Enforcement Workshop May 13 and 14, 2014. The workshop was attended by 75 Federal and contractor enforcement coordinators from across the DOE complex.

  14. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energyís Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OEís Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  15. DRAFT - DOE O 452.2C, Security and Use Control of Nuclear Explosives and Nuclear Weapons

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    The Order establishes requirements to implement the nuclear explosive security and use control (UC) elements of DOE O 452.1D, Nuclear Explosive and Weapon Surety (NEWS) Program, to ensure authorized use, when directed by proper authority, and protect against deliberate unauthorized acts (DUAs), deliberate unauthorized use (DUU), and denial of authorized use (DAU).

  16. fy10 | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    0 Archive Fiscal Year 2010 Solicitations POSTED DATE SOLICITATION/ FUNDING OPPORTUNITY ANNOUNCEMENT NUMBER SOLICITATION/FUNDING OPPORTUNITY ANNOUNCEMENT SUBJECT TITLE CLOSING DATE(S) DOE CONTACT 06/30/10 RC-CEDS-2010 Technical Support for Cybersecurity for Energy Delivery Systems 07/30/10 J. Briones 06/25/10 DE-FOA-0000334 Solid-State Lighting U.S. Manufacturing - Round 2 08/18/10 B. Robbins 06/11/10 DE-FOA-0000359 Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)

  17. BROOKHAVEN NATIONAL LABORATORYS CAPABILITIES FOR ADVANCED ANALYSES OF CYBER THREATS

    SciTech Connect (OSTI)

    DePhillips M. P.

    2014-06-06

    BNL has several ongoing, mature, and successful programs and areas of core scientific expertise that readily could be modified to address problems facing national security and efforts by the IC related to securing our nation’s computer networks. In supporting these programs, BNL houses an expansive, scalable infrastructure built exclusively for transporting, storing, and analyzing large disparate data-sets. Our ongoing research projects on various infrastructural issues in computer science undoubtedly would be relevant to national security. Furthermore, BNL frequently partners with researchers in academia and industry worldwide to foster unique and innovative ideas for expanding research opportunities and extending our insights. Because the basic science conducted at BNL is unique, such projects have led to advanced techniques, unlike any others, to support our mission of discovery. Many of them are modular techniques, thus making them ideal for abstraction and retrofitting to other uses including those facing national security, specifically the safety of the nation’s cyber space.

  18. DOE Issues Energy Sector Cyber Organization NOI

    Energy Savers [EERE]

    between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the...

  19. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  20. Safeguards & Security (S&S) Program | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    Safeguards & Security (S&S) Program Operations Program Management (OPM) OPM Home About Science Laboratories Infrastructure (SLI) Program Safeguards & Security (S&S) Program Sustainability Contact Information Operations Program Management U.S. Department of Energy SC-33/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-8429 F: (301) 903-7047 More Information ¬Ľ Safeguards & Security (S&S) Program Print Text Size: A A A FeedbackShare Page

  1. Safeguards and Security Glossary - DOE M 470.4-7 | Department...

    Office of Environmental Management (EM)

    in most dictionaries have been intentionally omitted from the Glossary. Although a Manual including the Safeguards and Security Glossary would be considered a requirements...

  2. Second Draft - DOE O 461.1C, Packaging and Transportation for Offsite Shipment of Materials of National Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    The Order establishes requirements and responsibilities for ensuring the safety of packaging and transportation for offsite shipments of Materials of National Security Interest. DOE Order 461.1C received a significant number of major and suggested comments the first time it was reviewed in RevCom. As a result of the number of comments received, the OPI have a second RevCom review. This revision of DOE O 461.1C incorporates changes which resulted from the comment resolution process of the initial draft.

  3. Sandia Energy - Cyber Research Facility Opens at Sandia's California...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Home Energy Assurance Cyber Energy Surety Facilities News News & Events Cybersecurity Technologies Research Laboratory Cyber Research Facility Opens at Sandia's...

  4. Ms. Elizabeth Withers, EIS Document Manager U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (NNSA)

    August 14, 2002 Ms. Elizabeth Withers, EIS Document Manager U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) Office of Los Alamos Site Operations (OLASO) 528 35 th Street Los Alamos, NM 87544 Re: Comments regarding the scope of the Environmental Impact Statement (EIS) for the proposed Chemistry and Metallurgy Research (CMR) Building Replacement (CMRR) Project (CMRRP) at Los Alamos National Laboratory (LANL) (the "CMRRP EIS") Dear Elizabeth - I won't be

  5. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackerís payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systemís state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  6. Sandia Energy Ľ Cyber Engineering Research Laboratory (CERL...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wins-funding-for-programming-in-situ-data-analysisvisualizationfeed 0 Sandia Cyber Engineering Research Laboratory (CERL) Formally Opens http:energy.sandia.gov...

  7. Top 9 tips on how to prevent cyber "break-ins" | Argonne National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratory This article was published in the spring 2016 issue of Argonne Now, the laboratory science magazine. Click for the rest of the issue. Top 9 tips on how to prevent cyber "break-ins" By Diana Anderson * March 7, 2016 Tweet EmailPrint This article was originally published in the spring 2016 issue of Argonne Now, the laboratory's science magazine. Mike Skwarek, Argonne's Cyber Security Officer, is an expert on how to protect yourself today in the information age. He's shared

  8. Safeguards & Security | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    Safeguards & Security Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act NEPA Documents Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Don F. Thress, Jr. U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-4444 Services Safeguards & Security Print Text Size: A A A FeedbackShare Page Security and Emergency

  9. Roadmap to Secure Control Systems in the Energy Sector- January 2006

    Broader source: Energy.gov [DOE]

    This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented...

  10. National SCADA Test Bed- Enhancing control systems security in the energy sector (September 2009)

    Broader source: Energy.gov [DOE]

    Improving the security of energy control systems has become a national priority. Since the mid-1990ís, security experts have become increasingly concerned about the threat of malicious cyber...

  11. DOE Extends Comment Period on Notice of Inquiry Under the Energy Independence and Security Act

    Broader source: Energy.gov [DOE]

    Today, in response to a formal request, General Counsel Scott Blake Harris approved a second and final extension of the public comment period to November 30, 2010 on DOEís Notice of Inquiry (75 FR...

  12. Notice of Intent to Revise DOE P 470.1A, Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-08-06

    The proposed revision of this directive will realign this policy to create an integrated security enterprise that effectively protects the Department's assets to institute enterprise-wide solutions to common challenges across the complex.

  13. Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  14. Extension of DOE Directives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-12

    The following directives are extended until 8-12-04. DOE N 205.2, Foreign National Access to DOE Cyber Systems, dated 11/1/99. DOE N 205.3, Password Generation, Protection, and Use, dated 11/23/99.

  15. Extension of DOE Directives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-02-24

    This Notice extends the following directives until 2/16/04: DOE N 205.2, Foreign National Access to DOE Cyber Systems, and DOE N 205.3, Password Generation, Protection, and Use, dated 11/23/99-7/1/00.

  16. Extension of DOE Directives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-09-15

    Effective immediately, DOE N 205.2, Foreign National Access to DOE Cyber Systems, dated 11-1-99, and DOE N 205.3, Password Generation, Protection, and Use, dated 11-23-99, are extended until 9-30-06, unless sooner rescinded.

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  18. Safeguards and Security appointments made | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a student and then working in areas of IT including desktop support, server support, and cyber security program as a P&S staff member. He is also pursuing a Ph.D. degree in...

  19. B&W Y-12 garners DOE Sustainability Awards | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    garners DOE ... B&W Y-12 garners DOE Sustainability Awards Posted: October 10, 2012 - 4:45pm B&W Y-12 recently received two Department of Energy Sustainability Awards at a ceremony during the 2012 GreenGov Symposium in Washington, D.C. The award recognizes innovation and excellence in sustainability, pollution prevention and environmental sustainability stewardship efforts within DOE. An independent panel chose Y-12 from approximately 137 nominations for two of this year's 20 awards.

  20. DOE Takes Steps to Fulfill Obligation Under the Energy Independence and Security Act

    Broader source: Energy.gov [DOE]

    Today, as required by Congress, the Department of Energy (DOE) issued a Notice of Inquiry (NOI) soliciting comments from nuclear suppliers, nuclear insurance providers, and other stakeholders on...

  1. New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award

    Office of Environmental Management (EM)

    TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award November 5, 2009 A new award of nearly $18.8 million over a five-year period from the Department of Energy (DOE) and contributions from the Department of Homeland Security (DHS) will fund the new Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project, an expanded effort of the current project TCIP. The new TCIPG research program will develop and integrate information technologies with properties-such

  2. DOE Issues Final Site-Wide Environmental Impact Statement for the Nevada National Security Site

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy, National Nuclear Security Administration (NNSA) has issued the Final Site-Wide Environmental Impact Statement (EIS) for the Nevada National Security Site (NNSS) and Off-Site Locations in Nevada. This document presents an analysis of the potential environmental impacts of continued management and operation of the NNSS (formerly known as the Nevada Test Site), the Tonopah Test Range, and two locations in Las Vegas, Nevada. The Site-Wide EIS analyzes reasonably foreseeable missions, programs, capabilities, and projects for a 10-year period.

  3. Cyber Dynamic Impact Modeling Engine

    Energy Science and Technology Software Center (OSTI)

    2014-07-01

    As the rate, sophistication, and potential damage of cyber attacks continue to grow, the latency of human-speed analysis and response is becoming increasingly costly. Intelligent response to detected attacks and other malicious activity requires both knowledge of the characteristics of the attack as well as how resources involved in the attack related to the mission of the organization. Cydime fills this need by estimating a key component of intrusion detection and response automation: the relationshipmore¬†¬Ľ type and strength between the target organization and the potential attacker.¬ę¬†less

  4. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12. Cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13.

  5. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Supersedes DOE O 440.1B Chg 1.

  6. Headquarters Facilities Master Security Plan

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, ...

  7. Y-12 now a DOE-VPP Star site | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Deputy General Manager of Operations Bill Klemm (center) and Atomic Trades and Labor Council President Steve Jones (right) raise the DOE-VPP Star flag as Dan Hoag, NNSA acting...

  8. DOE Extends Comment Period on Notice of Inquiry Under the Energy Independence and Security Act

    Broader source: Energy.gov [DOE]

    Today, in response to a formal request, General Counsel Scott Blake Harris approved a 30-day extension of the public comment period on DOE's Notice of Inquiry (75 FR 43945) soliciting comment on...

  9. Potential application of the Motorola MSR-20 Radar to DOE site security

    SciTech Connect (OSTI)

    Arlowe, D.; Rebeil, P.; Vigil, R.

    1993-09-01

    This paper describes the results of testing the MSR-20 radar and provides guidance on how this radar may be used to provide early detection and warning of approaching intruders beyond DOE facility site boundaries.

  10. DOE Encourages Utility Sector Nominations to the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council

    Broader source: Energy.gov [DOE]

    Because of the role communications technologies will play in the evolution toward a smarter national grid, DOE recommended in its October 2010 report, The Communications Requirements of Smart Grid...

  11. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  12. DOE's Tribal Energy Program Pathways to Energy Development & Energy Security

    Office of Environmental Management (EM)

    Pathways to Energy Development & Energy Security May 4, 2015 Lizana Pierce, Project Manager Pathway to Project Development Strategic Energy Planning * Creating a roadmap Feasibility Study * Possible roads to the future Organizational Development * Vehicles of change Project Development * Where the rubber meets the road Strategic Energy Planning Begins with an Energy Vision " The Energy Vision of the Penobscot Nation is to maximize the efficiency of energy usage and develop energy

  13. Mitigations for Security Vulnerabilities Found in Control System Networks |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  15. DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy

    Energy Savers [EERE]

    Infrastructure from Cyber Attacks | Department of Energy to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to

  16. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  17. Nohemi Brewer Transportation Program Manager U.S. Department of Energy (DOE), National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Working Group Meeting November 16, 2012 Welcome! Page 2 Page 2Title ID 411- 11/16/2012 - Page 2 Meeting Purpose Provide forum for information exchange related to the Site-Wide Environmental Impact Statement (SWEIS) analysis of low-level/mixed low-level radioactive waste (LLW/MLLW) transportation to the Nevada National Security Site (NNSS) Page 3 Page 3Title ID 411- 11/16/2012 - Page 3 Transportation Working Group Members * State of Nevada * Counties * Cities * Tribal * Nevada

  18. Nohemi Brewer Transportation Program Manager U.S. Department of Energy (DOE), National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    November 16, 2012 Nevada National Security Site (NNSS) Radioactive Waste Shipment Update Page 2 Page 2Title ID 412- 11/16/2012 - Page 2 Log No 2012-263 Updated Generator Forecasts for Disposal at the NNSS in FY 2012 (cubic feet*) * Currently, there are 25 approved generator programs at 19 sites that can send low-level waste (LLW) and mixed low level waste (MLLW) to the NNSS * Based on actual disposal volumes received, total FY 2012 disposal was less than the April forecast update *Rounded to the

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individualsí eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nationís security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  2. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  3. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Broader source: Energy.gov (indexed) [DOE]

    of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in ... Security Assessment at National SCADA Test Bed More Documents & Publications Security ...

  4. Chapter_3_Personnel_Security

    Office of Environmental Management (EM)

    Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is

  5. Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems

    SciTech Connect (OSTI)

    Ferragut, Erik M; Laska, Jason A; Melin, Alexander M; Czejdo, Bogdan

    2013-01-01

    The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

  6. Approaches for scalable modeling and emulation of cyber systems : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.; Rudish, Don W.

    2009-09-01

    The goal of this research was to combine theoretical and computational approaches to better understand the potential emergent behaviors of large-scale cyber systems, such as networks of {approx} 10{sup 6} computers. The scale and sophistication of modern computer software, hardware, and deployed networked systems have significantly exceeded the computational research community's ability to understand, model, and predict current and future behaviors. This predictive understanding, however, is critical to the development of new approaches for proactively designing new systems or enhancing existing systems with robustness to current and future cyber threats, including distributed malware such as botnets. We have developed preliminary theoretical and modeling capabilities that can ultimately answer questions such as: How would we reboot the Internet if it were taken down? Can we change network protocols to make them more secure without disrupting existing Internet connectivity and traffic flow? We have begun to address these issues by developing new capabilities for understanding and modeling Internet systems at scale. Specifically, we have addressed the need for scalable network simulation by carrying out emulations of a network with {approx} 10{sup 6} virtualized operating system instances on a high-performance computing cluster - a 'virtual Internet'. We have also explored mappings between previously studied emergent behaviors of complex systems and their potential cyber counterparts. Our results provide foundational capabilities for further research toward understanding the effects of complexity in cyber systems, to allow anticipating and thwarting hackers.

  7. Introduction SCADA Security for Managers and Operators | Department of

    Energy Savers [EERE]

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector PDF icon Introduction SCADA Security for Managers and Operators More Documents & Publications Intermediate SCADA Security Training Course Slides

  8. August 2012 CIP Report Focuses on Smart Grid Security

    Broader source: Energy.gov [DOE]

    The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience.

  9. Secretary Moniz visits the Office of Cyber Assessments | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Secretary Moniz visits the Office of Cyber Assessments Secretary Moniz visits the Office of Cyber Assessments May 5, 2014 - 10:59am Addthis Secretary Moniz visits the Office of Cyber Assessments for hands-on experience with the tools and techniques that are used by sophisticated adversaries to attack modern IT systems. Secretary Moniz visits the Office of Cyber Assessments for hands-on experience with the tools and techniques that are used by sophisticated adversaries to attack modern

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  11. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  12. Audit of Selected Aspects of the Unclassified Computer Security Program at a DOE Headquarters Computing Facility, AP-B-95-02

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OFFICE OF INSPECTOR GENERAL AUDIT OF SELECTED ASPECTS OF THE UNCLASSIFIED COMPUTER SECURITY PROGRAM AT A DOE HEADQUARTERS COMPUTING FACILITY The Office of Inspector General wants to make the distribution of its reports as customer friendly and cost effective as possible. Therefore, this report will be available electronically through the Internet five to seven days after publication at the alternative addresses: Department of Energy Headquarters Gopher gopher.hr.doe.gov Department of Energy

  13. Headquarters Security Quick Reference Book

    Broader source: Energy.gov [DOE]

    This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

  14. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  15. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Energy Savers [EERE]

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. PDF icon Guide to Critical Infrastructure

  16. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  17. US Nuclear Regulatory Commission Input to DOE Request for Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Comments relevant to the following two sections of the RFI: "Long Term Issues: Managing a Grid with High Penetration of New Technologies" and "Reliability and Cyber-Security," US...

  18. Quantifying the Impact of Unavailability in Cyber-Physical Environments

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Federick T.; Mili, Ali

    2014-01-01

    The Supervisory Control and Data Acquisition (SCADA) system discussed in this work manages a distributed control network for the Tunisian Electric & Gas Utility. The network is dispersed over a large geographic area that monitors and controls the flow of electricity/gas from both remote and centralized locations. The availability of the SCADA system in this context is critical to ensuring the uninterrupted delivery of energy, including safety, security, continuity of operations and revenue. Such SCADA systems are the backbone of national critical cyber-physical infrastructures. Herein, we propose adapting the Mean Failure Cost (MFC) metric for quantifying the cost of unavailability. This new metric combines the classic availability formulation with MFC. The resulting metric, so-called Econometric Availability (EA), offers a computational basis to evaluate a system in terms of the gain/loss ($/hour of operation) that affects each stakeholder due to unavailability.

  19. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    0-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Ôā∑ Title 32, CFR, Part 2001, Classified National Security Information Ôā∑ Executive Order 13526, Classified National Security Information Ôā∑ DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 Ôā∑ DOE Order 475.2A, Identifying Classified Information Ôā∑ DOE Order 475.1, Counterintelligence Program The Security Awareness

  20. Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011.

    SciTech Connect (OSTI)

    Wheeler, Kyle Bruce; Naegle, John Hunt; Wright, Brian J.; Benner, Robert E., Jr.; Shelburg, Jeffrey Scott; Pearson, David Benjamin; Johnson, Joshua Alan; Onunkwo, Uzoma A.; Zage, David John; Patel, Jay S.

    2011-09-01

    This report documents our first year efforts to address the use of many-core processors for high performance cyber protection. As the demands grow for higher bandwidth (beyond 1 Gbits/sec) on network connections, the need to provide faster and more efficient solution to cyber security grows. Fortunately, in recent years, the development of many-core network processors have seen increased interest. Prior working experiences with many-core processors have led us to investigate its effectiveness for cyber protection tools, with particular emphasis on high performance firewalls. Although advanced algorithms for smarter cyber protection of high-speed network traffic are being developed, these advanced analysis techniques require significantly more computational capabilities than static techniques. Moreover, many locations where cyber protections are deployed have limited power, space and cooling resources. This makes the use of traditionally large computing systems impractical for the front-end systems that process large network streams; hence, the drive for this study which could potentially yield a highly reconfigurable and rapidly scalable solution.

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nationís security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  4. Introduction to Cyber Technologies exercise environment

    Energy Science and Technology Software Center (OSTI)

    2014-12-17

    Exercise environment for Introduction to Cyber Technologies class. This software is essentially a collection of short scripts, configuration files, and small executables that form the exercise component of the Sandia Cyber Technologies Academy¬ís Introduction to Cyber Technologies class. It builds upon other open-source technologies, such as Debian Linux and minimega, to provide comprehensive Linux and networking exercises that make learning these topics exciting and fun. Sample exercises: a pre-built set of home directories the studentmore¬†¬Ľ must navigate through to learn about privilege escalation, the creation of a virtual network playground designed to teach the student about the resiliency of the Internet, and a two-hour Capture the Flag challenge for the final lesson. There are approximately thirty (30) exercises included for the students to complete as part of the course.¬ę¬†less

  5. Introduction to Cyber Technologies exercise environment

    SciTech Connect (OSTI)

    2014-12-17

    Exercise environment for Introduction to Cyber Technologies class. This software is essentially a collection of short scripts, configuration files, and small executables that form the exercise component of the Sandia Cyber Technologies Academy?s Introduction to Cyber Technologies class. It builds upon other open-source technologies, such as Debian Linux and minimega, to provide comprehensive Linux and networking exercises that make learning these topics exciting and fun. Sample exercises: a pre-built set of home directories the student must navigate through to learn about privilege escalation, the creation of a virtual network playground designed to teach the student about the resiliency of the Internet, and a two-hour Capture the Flag challenge for the final lesson. There are approximately thirty (30) exercises included for the students to complete as part of the course.

  6. Cyber Engineering Research Laboratory (CERL)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Research Laboratory (CERL) - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  7. A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems

    SciTech Connect (OSTI)

    Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Fugate, David L; Kisner, Roger

    2013-01-01

    The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

  8. Worker Protection Program for DOE (including the National Nuclear Security Administration) Federal Employees Guide for Use with DOE O 440.1B

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-04

    The Guide provides suggestions and alternative approaches that DOE elements may consider in implementing their worker protection program. Cancels DOE G 440.1-1.

  9. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nationís critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  11. Incidents of Security Concern

    Office of Environmental Management (EM)

    NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY

  12. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  13. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    the investment of more than 30 million for ten projects that will address cybersecurity issues facing the nation's electric grid. Together, these projects represent a...

  14. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then...

  15. Cyber Security Protection for Small Businesses | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    8, 2015 1:00PM to 4:00PM EST Upton, Long Island

  16. Management of Los Alamos National Laboratory's Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Los Alamos National Laboratory (OAS-SR-07-01, November ... management process consistent with Federal requirements. ... used to support office automation and general productivity. ...

  17. Continuous Monitoring And Cyber Security For High Performance...

    Office of Scientific and Technical Information (OSTI)

    Have feedback or suggestions for a way to improve these results? Save Share this Record Citation Formats MLA APA Chicago Bibtex Export Metadata Endnote Excel CSV XML Save to My ...

  18. Alliance Project: Cyber-Physical Security Unified Access Solution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... access control system to withstand the IEEE 1613 and IEC 61850-3 environmental ... management and log system Substation-ready IEEE 1613- and IEC 61850-3-compliant hardware ...

  19. DRAFT - DOE O 461.1C, Packaging and Transportation for Offsite Shipment of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    The Order establishes requirements and responsibilities for ensuring the safety of packaging and transportation for offsite shipments of Materials of National Security Interest.

  20. Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energy's corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  2. Secure Policy-Based Configuration Framework (PBCONF)

    Energy Savers [EERE]

    Policy-Based Configuration Framework (PBCONF) Interoperable, open-source framework for secure remote configuration of modern and legacy devices Background Energy delivery devices are dispersed throughout the electric grid and are an integral part of real-time power transmission and distribution. As today's cyber threats continue to advance, ensuring the security and resiliency of these digital devices is critical to ensuring the continuous delivery of power to consumers. Incorrect or

  3. Training and Mentoring the Next Generation of Scientists and Engineers to Secure Continuity and Successes of the US DOE's Environmental Remediation Efforts - 13387

    SciTech Connect (OSTI)

    Lagos, L.

    2013-07-01

    The DOE Office of Environmental Management (DOE-EM) oversees one of the largest and most technically challenging cleanup programs in the world. The mission of DOE-EM is to complete the safe cleanup of the environmental legacy from five decades of nuclear weapons development and government-sponsored nuclear energy research. Since 1995, Florida International University's Applied Research Center (FIU-ARC) has supported the DOE-EM mission and provided unique research capabilities to address some of these highly technical and difficult challenges. This partnership has allowed FIU-ARC to create a unique infrastructure that is critical for the training and mentoring of science, technology, engineering, and math (STEM) students and has exposed many STEM students to 'hands-on' DOE-EM applied research, supervised by the scientists and engineers at ARC. As a result of this successful partnership between DOE and FIU, DOE requested FIU-ARC to create the DOE-FIU Science and Technology Workforce Development Initiative in 2007. This innovative program was established to create a 'pipeline' of minority STEM students trained and mentored to enter DOE's environmental cleanup workforce. The program was designed to help address DOE's future workforce needs by partnering with academic, government and private companies (DOE contractors) to mentor future minority scientists and engineers in the research, development, and deployment of new technologies and processes addressing DOE's environmental cleanup challenges. Since its inception in 2007, the program has trained and mentored 78 FIU STEM minority students. Although, the program has been in existence for only five years, a total of 75 internships have been conducted at DOE National Laboratories, DOE sites, DOE Headquarters and field offices, and DOE contractors. Over 85 DOE Fellows have participated in the Waste Management Symposia since 2008 with a total of 68 student posters and 7 oral presentations given at WM. The DOE Fellows participation at WM has resulted in three Best Student Poster Awards (WM09, WM10, and WM11) and one Best Professional Poster Award (WM09). DOE Fellows have also presented their research at ANS DD and R and ANS Robotics Topical meetings. Moreover, several of our DOE Fellows have already obtained employment with DOE-EM, other federal agencies, DOE contractors. This paper will discuss how DOE Fellows program is training and mentoring FIU STEM students in Department of Energy's Office of Environmental Management technical challenges and research. This training and mentoring has resulted in the development of well trained and polished young scientists and engineers that will become the future workforce in charge of carrying on DOE-EM's environmental cleanup mission. The paper will showcase FIU's DOE Fellows model and highlight some of the applied research the DOE Fellows have conducted at FIU's Applied Research Center and across the Complex by participating in summer internship assignments. This paper will also present and highlight other Fellowships and internships programs sponsored by National Nuclear Security Agency (NNSA), DOE-EM, NRC, Energy (NE), and other federal agencies targeting workforce development. (authors)

  4. Securing the United States' power infrastructure

    SciTech Connect (OSTI)

    Happenny, Sean F.

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  5. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  6. SuperIdentity: Fusion of Identity across Real and Cyber Domains

    SciTech Connect (OSTI)

    Black, Sue; Creese, Sadie; Guest, Richard; Pike, William A.; Saxby, Steven; Stanton Fraser, Danae; Stevenage, Sarah; Whitty, Monica

    2012-04-23

    Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.

  7. The NIAC Convergence of Physical and Cyber Technbologies and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working...

  8. Picture of the Week: Cyber-imaging the cosmos

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5 Cyber-imaging the cosmos A team of astrophysicists and computer scientists, including Los Alamos National Laboratory researchers, completed the first-ever complete...

  9. Reducing Cyber Risk to Critical Infrastructure: NIST Framework...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    directed the National Institute of Standards and Technology (NIST) to work with stakeholders to develop a voluntary Framework for reducing cyber risks to critical...

  10. Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  11. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  13. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13.

  14. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Supersedes DOE G 440.1-1A and DOE G 440.1-8.

  15. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  16. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  17. Securing Wide Area Measurement Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wide Area Measurement Systems Securing Wide Area Measurement Systems This report documents an assessment of wide area measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the Department of Energy's Transmission Reliability Program. With emphasis on cyber security, this report also addresses other categories of risk and vulnerability including equipment reliability, data quality

  18. Security Metricsfor Process Control Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Metricsfor Process Control Systems Security Metricsfor Process Control Systems This document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics to achieve operational excellence. PDF icon Security Metrics for Process Control Systems More Documents & Publications Report of the Cyber Security Research Needs for Open Science Workshop Visualization & Controls Program Peer

  19. Roadmap to Secure Control Systems in the Energy: Executive Summary

    Energy Savers [EERE]

    Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision

  20. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  1. Chapter_11_Incidents_of_Security_Concern

    Office of Environmental Management (EM)

    1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. AU-42 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individualsí eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  3. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  5. Microsoft Word - IG-0662 REPORT.rtf

    Office of Environmental Management (EM)

    Evaluation Report The Department's Unclassified Cyber Security Program - 2004 DOE/IG-0662 SEPTEMBER 2004 EVALUATION REPORT ON THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM - 2004 TABLE OF CONTENTS Cyber Security Program Details of Finding ...................................................1 Recommendations and Comments ........................7 Appendices 1. Objective, Scope, and Methodology..................8 2. Related Reports ...............................................10 CYBER

  6. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelleís National Security & Defense objective is, ďapplying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe futureĒ. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratoryís (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  7. Headquarters Facilities Master Security Plan- Chapter 9, Technical Surveillance Countermeasures

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 9, Technical Surveillance Countermeasures Describes the DOE Headquarters Technical Security Countermeasures (TSCM) Program.

  8. Modeling Cyber Conflicts Using an Extended Petri Net Formalism

    SciTech Connect (OSTI)

    Zakrzewska, Anita N; Ferragut, Erik M

    2011-01-01

    When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way that is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.

  9. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  10. Agent-based Cyber Control Strategy Design for Resilient Control Systems: Concepts, Architecture and Methodologies

    SciTech Connect (OSTI)

    Craig Rieger; Milos Manic; Miles McQueen

    2012-08-01

    The implementation of automated regulatory control has been around since the middle of the last century through analog means. It has allowed engineers to operate the plant more consistently by focusing on overall operations and settings instead of individual monitoring of local instruments (inside and outside of a control room). A similar approach is proposed for cyber security, where current border-protection designs have been inherited from information technology developments that lack consideration of the high-reliability, high consequence nature of industrial control systems. Instead of an independent development, however, an integrated approach is taken to develop a holistic understanding of performance. This performance takes shape inside a multiagent design, which provides a notional context to model highly decentralized and complex industrial process control systems, the nervous system of critical infrastructure. The resulting strategy will provide a framework for researching solutions to security and unrecognized interdependency concerns with industrial control systems.

  11. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  13. Roadmap to Secure Control Systems in the Energy Sector - January 2006 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Energy Sector - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years.

  14. Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten

  15. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    SciTech Connect (OSTI)

    Not Listed

    2011-09-01

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  16. Headquarters Facilities Master Security Plan- Chapter 16, Equivalencies and Exemptions

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 16, Equivalencies and Exemptions Describes DOE Headquarters procedures for requesting Equivalencies and Exemptions to DOE security directives.

  17. Elaine Santantonio-Creating an efficient cyber workplace

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Elaine Santantonio Elaine Santantonio-Creating an efficient cyber workplace She improved communication and increased efficiency by helping put mobile devices into the hands of Lab employees. March 11, 2014 Elaine Santantonio A recipient of the Lab's 2014 Women Who Inspire awards, as the Network and Infrastructure Engineering (NIE) Division Leader, Santantonio helps provide technical communication and workplace infrastructure and services for the "desktop to teraflops" cyber workplace.

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individualsí eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  20. DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    energy disruptions due to cyber incidents on control systems. SRI International of Menlo Park, CA - selected for an award of up to 1.8 million from DOE (total DOEindustry shared...