Powered by Deep Web Technologies
Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

2

Recommended Security Controls for Federal Information Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

NIST 800-53 Revision 3 + Draft Revision 4 Recommended Security Controls for Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines...

3

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

4

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

5

AT&TSecurity Consulting Information Assurance Federal Information Security  

E-Print Network (OSTI)

and procedures include: · Interviews with agency personnel associated with the security aspects of the system, firmware and operations · Conducting demonstrations and exercises If needed, we will create tailored agency's information systems are implemented correctly, operating as intended and producing the desired

Fisher, Kathleen

6

Security Certification & Accreditation of Federal Information Systems A Tutorial  

E-Print Network (OSTI)

& Accreditation ? Certification Accreditation Information + Evidence Risk Thresholds 1. Security Plan 2. C Output of C&A Process Security Plan Risk Assessments Contingency Plans Incident Response Plans Security Does the potential risk to the agency operations, assets or individuals described in the Security Plan

Madisetti, Vijay K.

7

FEDERAL INFORMATION PROCESSING STANDARD  

E-Print Network (OSTI)

March 2004 FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 199, STANDARDS FOR SECURITY Information Technology Laboratory National Institute of Standards and Technology A new Federal Information Processing Standard (FIPS), recently approved by the Secretary of Commerce, will help federal agencies

8

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

9

SP 800-37 Rev. 1. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach  

Science Journals Connector (OSTI)

The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to federal information systems to include conducting the activities of security categorization, security control selection and implementation, security ... Keywords: FISMA, Risk management framework, categorize, common controls, continuous monitoring, information systems, roles and responsibilities, security authorization, security controls

Joint Task Force Transformation Initiative

2010-02-01T23:59:59.000Z

10

Meeting Federal Energy Security Requirements  

Energy.gov (U.S. Department of Energy (DOE))

Presentationgiven at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meetingdiscusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

11

Meeting Federal Energy Security Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Markel Markel SRA International Lawrence_Markel@sra.com Federal Utility Partnership Working Group Fall 2012 - October 16-17 Mobile, AL Sponsored by Alabama Power Theme Meeting energy security requirements in federal facilities provides opportunities for additional types of cooperation between utilities and the federal agencies. However, there are significant barriers to pursuing these opportunities - constraints on utilities and on federal agencies, as well as sometimes-competing objectives. Energy security encompasses sufficiency, surety, and sustainability.  Above all, energy security means having adequate power to conduct critical operations for the duration required (sufficiency).  Secondarily, and leading to sufficiency, is ensuring resilient energy supplies that are accessible when

12

FIPS PUB 188 Federal Information  

E-Print Network (OSTI)

FIPS PUB 188 Federal Information Processing Standards Publication 1994 September 6 U.S. DEPARTMENT OF COMMERCE / National Institute of Standards and Technology Standard Security Label for Information Transfer Foreword The Federal Information Processing Standards Publication Series of the National Institute

13

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

14

Information Security  

Directives, Delegations, and Requirements

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

15

Information Security  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

16

Federal Employment | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Employment | National Nuclear Security Administration Employment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Federal Employment Home > Federal Employment Federal Employment NNSA offers exciting opportunities for professionals with diverse educational backgrounds and experience. You may have a college degree in

17

Federal Employment | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Employment | National Nuclear Security Administration Employment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Federal Employment Home > Federal Employment Federal Employment NNSA offers exciting opportunities for professionals with diverse educational backgrounds and experience. You may have a college degree in

18

FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) | Department...  

Office of Environmental Management (EM)

FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) Form provides information on the federal assistance budget for...

19

Information Security Policy Policy Title Information Security Policy  

E-Print Network (OSTI)

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

20

Information Technology Management ((Information Security))  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as an Information Technology Specialist (Information Security) with responsibility for the implementation of a wide range of technically complex...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Federal Energy Management Program: Energy Independence & Security Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence & Security Act to someone by E-mail Share Federal Energy Management Program: Energy Independence & Security Act on Facebook Tweet about Federal Energy Management Program: Energy Independence & Security Act on Twitter Bookmark Federal Energy Management Program: Energy Independence & Security Act on Google Bookmark Federal Energy Management Program: Energy Independence & Security Act on Delicious Rank Federal Energy Management Program: Energy Independence & Security Act on Digg Find More places to share Federal Energy Management Program: Energy Independence & Security Act on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act

22

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

23

Federal Energy Management Program: Energy Independence and Security Act,  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements to someone by E-mail Share Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Facebook Tweet about Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Twitter Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Google Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Delicious

24

Office of Information Security  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

25

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

26

Information Security Program  

Directives, Delegations, and Requirements

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

27

TEC Information Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

28

Federal Register | Open Energy Information  

Open Energy Info (EERE)

Register Register Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Reference Material: Federal Register Details Activities (0) Areas (0) Regions (0) Abstract: The Office of the Federal Register informs citizens of their rights and obligations, documents the actions of Federal agencies, and provides a forum for public participation in the democratic process. The publications provide access to a wide range of Federal benefits and opportunities for funding and contain comprehensive information about the various activities of the United States Government. The Federal Register is updated daily by 6 a.m. and is published Monday through Friday, except Federal holidays, and consists of four types of entries. Presidential Documents, including Executive orders and proclamations.

29

Energy Independence and Security Act, Section 432: Federal Facility  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Independence and Security Act, Section 432: Federal Facility Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements October 8, 2013 - 2:02pm Addthis Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. The Federal Energy Management Program (FEMP) is responsible for tracking Federal agency progress toward meeting Section 432 of the Energy Independence and Security Act (EISA) of 2007 for Federal facility energy and water management and benchmarking. The EISA 432 Compliance Tracking System (EISA 432 CTS) tracks agency

30

Emergency Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Emergency Information Home > Field Offices > Welcome to the Sandia Field Office > Emergency Information Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to

31

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

32

Security Forms and Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » New Employee Orientation » Security Forms and Services » New Employee Orientation » Security Forms and Information Security Forms and Information Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees assigned to the DOE Headquarters complex are required to present two identity source documents (i.e., U.S. Passport, driver's license, identification card with photograph issued by a Federal, state, or local government agency, etc.), have their fingerprints taken, and undergo a background investigation (the identity proofing process) prior to reporting for duty or being issued a DOE standard badge (identity or PIV badge). Most likely, your HR representative and/or administrative personnel have

33

Federated Grids and their Security Geoffrey Fox and Marlon Pierce  

E-Print Network (OSTI)

Federated Grids and their Security Geoffrey Fox and Marlon Pierce Draft 0.4 Introduction We examine the consequences, requirements, and possible implementation issues needed to support security in federated grids that user identity in current Grid security implementations has two major shortcomings: it does not scale

34

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

35

Energy Independence and Security Act, Section 432: Federal Facility  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facility Reporting » Energy Independence and Facility Reporting » Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements October 8, 2013 - 2:02pm Addthis Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. The Federal Energy Management Program (FEMP) is responsible for tracking Federal agency progress toward meeting Section 432 of the Energy Independence and Security Act (EISA) of 2007 for Federal facility energy and water management and benchmarking.

36

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contact Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Contact Information Contact Information At each of NNSA's eight sites, leading-edge research and development is

37

Federal Reporting Recipient Information | Department of Energy  

Energy Savers (EERE)

Federal Reporting Recipient Information Federal Reporting Recipient Information Recovery Act Recipient Reporting details as of February 13, 2013. ARRA870A Recovery Act - Recip...

38

Federal Reporting Recipient Information | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Federal Reporting Recipient Information Federal Reporting Recipient Information Recovery Act Recipient Reporting details as of March 6, 2012. ARRA870A Recovery Act - Recip Details...

39

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network (OSTI)

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

40

Security In Information Systems  

E-Print Network (OSTI)

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network (OSTI)

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

42

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

43

SP 800-128. Guide for Security-Focused Configuration Management of Information Systems  

Science Journals Connector (OSTI)

The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems ... Keywords: Configuration management, SecCM, control, information systems, monitoring, risk management framework, security content automation protocol (SCAP), security program, security-focused continuous monitoring

L. Arnold Johnson; Kelley L. Dempsey; Ronald S. Ross; Sarbari Gupta; Dennis Bailey

2011-08-01T23:59:59.000Z

44

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security, 1st edition  

Science Journals Connector (OSTI)

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security ...

Stephen D. Gantz; Daniel R. Philpott

2012-12-01T23:59:59.000Z

45

Site Information | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

46

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

47

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 OAS-M-12-01 November 2011 Department of Energy Washington, DC 20585 November 15, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011" INTRODUCTION AND OBJECTIVE The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for regulating the Nation's oil pipeline, natural gas, hydroelectric and wholesale electric industries. The Commission relies on a wide range of information technology (IT) resources in achieving its mission of assisting consumers in

48

Federal Register Notice: National Nuclear Security Administration Site-Wide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Register Notice: National Nuclear Security Administration Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM) Federal Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM) Federal Register / Vol. 76, No. 156 / Friday, August 12, 2011 / Notices. National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM). NNSA.SWEIS_.SNL_.NM_.pdf More Documents & Publications EIS-0466: Re-opening of Public Scoping Period and Announcement of Additional Public Scoping Meetings EIS-0466: Notice of Intent to Prepare an Environmental Impact Statement EIS-0281: Notice of Intent to Prepare a Site-Wide Environmental Impact

49

UC DAVIS -FEDERAL GRANT FINANCIAL REPORTING INFORMATION INFORMATION  

E-Print Network (OSTI)

UC DAVIS - FEDERAL GRANT FINANCIAL REPORTING INFORMATION GENERAL INFORMATION · The University is required by Federal sponsors to submit Financial Status Reports (FSRs) on all federal awards no later than.) o Extension of final budget period of a project period without additional Federal funds. o Change

Schladow, S. Geoffrey

50

NMMSS Information, Reports & Forms | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information, Reports & Forms | National Nuclear Security Information, Reports & Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Information, Reports & Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms NMMSS Information, Reports & Forms

51

Proposed Agency Information Collection: Federal Register Notice...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54 - Aug. 10, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 The Department of Energy (DOE) invites public comment on DOE's...

52

Proposed Agency Information Collection: Federal Register Notice...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95 - Oct. 7, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 The Department of Energy (DOE) invites public comment on DOE's...

53

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for, among other things, regulating interstate transmission of the Nation's electricity, natural gas and oil. In addition, the Commission licenses and inspects private, municipal and state hydroelectric projects. To achieve its mission, the Commission relies

54

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

55

Information Security Manual  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

56

Information Security Manual  

Directives, Delegations, and Requirements

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

57

Future directions for behavioral information security research  

Science Journals Connector (OSTI)

Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness ... Keywords: Behavioral information security, Deviant security behavior, Future research, Information security, Research challenges

Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard Baskerville

2013-02-01T23:59:59.000Z

58

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

59

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

60

Federal Energy Management Program: Energy Security Planning for Sustainable  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

NLE Websites -- All DOE Office Websites (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

62

EEO Complaints Information for Managers | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information for Managers | National Nuclear Security Information for Managers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Complaints Information for Managers Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Complaints Information for Managers EEO Complaints Information for Managers

63

The Economics of Information Security  

Science Journals Connector (OSTI)

...with wide variation in consumer valuation for services, where personalized...complex networks is an emerging tool for analyzing information security...theory, and in turn provides tools for modeling and investigating such...The causes of insurgency, and tools for understanding and dealing...

Ross Anderson; Tyler Moore

2006-10-27T23:59:59.000Z

64

06 DEC 2013 1 Information Security Guideline  

E-Print Network (OSTI)

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

65

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues  

NLE Websites -- All DOE Office Websites (Extended Search)

Request for Information Request for Information Federal Government Power Purchase Agreements (PPA) Issues BACKGROUND: In order to respond to increasing demand for long term renewable energy, stemming from renewable goals established in the Energy Policy Act of 2005, Executive Order 13423, and the Energy Independence and Security Act of 2007, federal agencies are attempting to facilitate project development and the purchase of electricity from renewable sources on federal facilities. One means of execution is through the use of long term Power Purchase Agreements (PPAs), whereby a third party funds, develops, operates, maintains and owns a renewable energy project, and the Government commits to purchase the renewable power from the project owner. This method reduces the overall risk to the Government, since it will avoid having to build, own and

66

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information Request for Information Federal Government Power Purchase Agreements (PPA) Issues BACKGROUND: In order to respond to increasing demand for long term renewable energy, stemming from renewable goals established in the Energy Policy Act of 2005, Executive Order 13423, and the Energy Independence and Security Act of 2007, federal agencies are attempting to facilitate project development and the purchase of electricity from renewable sources on federal facilities. One means of execution is through the use of long term Power Purchase Agreements (PPAs), whereby a third party funds, develops, operates, maintains and owns a renewable energy project, and the Government commits to purchase the renewable power from the project owner. This method reduces the overall risk to the Government, since it will avoid having to build, own and

67

TEPS/BPA Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

TEPS/BPA Information | National Nuclear Security Administration TEPS/BPA Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog TEPS/BPA Information Home > About Us > Our Operations > Acquisition and Project Management > Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs) > TEPS/BPA Information

68

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy Savers (EERE)

SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

69

Request for Information: Federal Government Power Purchase Agreements...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues Request for Information: Federal Government Power Purchase Agreements (PPA) Issues Document...

70

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network (OSTI)

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

71

Federal Spectrum Management at the National Telecommunications and Information Administration  

Energy.gov (U.S. Department of Energy (DOE))

Slides from National Telecommunications and Information Administration's presentation on Federal spectrum management.

72

Security Federation in the Vehicular Networks Submitted to SAR-SSI 2011 1  

E-Print Network (OSTI)

Security Federation in the Vehicular Networks Submitted to SAR-SSI 2011 1 Federated claims based authentication and access control in the vehicular networks Ramzi Debab (r_debab@esi.dz)* Yacine Challal in order to federate the existing techniques and even future ones. WS-Federation is one of the keys aiming

Paris-Sud XI, Université de

73

Nuclear dependence| The Russian Federation's future reliance on nuclear weapons for national security.  

E-Print Network (OSTI)

?? The Russian Federation's reliance on nuclear weapons for national security will steadily increase over time. Based on current evidence and historical data, the Russian (more)

Lukszo, Adam J.

2011-01-01T23:59:59.000Z

74

Building an Information Technology Security Awareness  

E-Print Network (OSTI)

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

75

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

76

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

77

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

NLE Websites -- All DOE Office Websites (Extended Search)

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

78

Request for Information on Improving Performance of Federal Permitting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of...

79

Federal Energy Management Program: Best Management Practice: Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

80

Certification and Accreditation Process for Information Systems Including National Security Systems  

Directives, Delegations, and Requirements

The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

2004-02-19T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security in the Telecommunications Information Networking Architecture --the CrySTINA Approach \\Lambda  

E-Print Network (OSTI)

Security in the Telecommunications Information Networking Architecture -- the CrySTINA Approach Butty??an Jean­Pierre Hubaux Swiss Federal Institute of Technology Telecommunications Laboratory EPFL for the Telecommunication Information Networking Architecture (TINA) is security. TINA is intended to provide

Bencsáth, Boldizsár

82

Enterprise Information Security Management Framework [EISMF  

E-Print Network (OSTI)

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

83

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

84

University of Connecticut Information Technology Security  

E-Print Network (OSTI)

University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision, including the University of Connecticut. Furthermore, as more personally identifiable information which University of Connecticut incident handlers can work to ensure a complete and consistent approach

Alpay, S. Pamir

85

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

86

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network (OSTI)

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security Planning and Policy Committee Policy Statement The Information Resources Planning, and Policy a security plan to protect information identified as confidential, sensitive or both. 3. Assign management

O'Toole, Alice J.

87

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING  

E-Print Network (OSTI)

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST METHOD SELECTION LIST ­ CRYPTOGRAPHIC AND SECURITY TESTING NVLAP CRYPTOGRAPHIC AND SECURITY TESTING APPLICATION FORM (REV. 2013 and Security (BCS)" testing and is considered the foundation of all scopes of accreditation

88

Classified Automated Information System Security Program  

Directives, Delegations, and Requirements

To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

1994-07-15T23:59:59.000Z

89

Federal Funding Sources of Information Sources for Automatic Funding Notices  

E-Print Network (OSTI)

;Federal Funding Sources of Information r Grant Programs & Deadlines q World Health Organization - GrantFederal Funding Sources of Information Sources for Automatic Funding Notices q Catalogue of Federal Domestic Assistance q Grants.Gov q FedBizOpps q The Foundation Center r RFP Bulletin r Philanthropy News

90

Federal Business Opportunities website | Open Energy Information  

Open Energy Info (EERE)

Opportunities website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Federal Business Opportunities website Abstract This website lists federal...

91

Freedom of Information Act (FOIA) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

(FOIA) | National Nuclear Security (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information Act (FOIA) Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The FOIA establishes the premise that people should have access to

92

Port security and information technology  

E-Print Network (OSTI)

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

93

Performing Energy Security Assessments- A How-To Guide for Federal Facility Managers  

Energy.gov (U.S. Department of Energy (DOE))

Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facilitys energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

94

Federal Register Notice: Proposed Agency Information Collection |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 11, 2011 - 10:57am October 11, 2011 - 10:57am Addthis Federal Register Notice (PDF Version) on the DOE's invitation for public comment on its request to the Office of Management and Budget (OMB) to extend for three years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before November 7, 2011. OMB Form 83-I (PDF 70 KB). ICR Supporting Statement (PDF 85 KB). SGIG Reporting Guidance (PDF 99 KB). SUMMARY: The Department of Energy (DOE) invites public comment on DOE's request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act

95

Federal Register Notice: Proposed Agency Information Collection |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 10, 2011 - 2:21pm August 10, 2011 - 2:21pm Addthis Federal Register Notice (PDF Version) on the DOE's invitation for public comment on its intent to request the Office of Management and Budget (OMB) to extend for four years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before October 11, 2011. SUMMARY: The Department of Energy (DOE) invites public comment on DOE's intent to request OMB to renew Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 for an additional four years that DOE is developing for submission to the Office of Management and Budget (OMB) pursuant to the Paperwork Reduction

96

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

97

Definition: Federal Register | Open Energy Information  

Open Energy Info (EERE)

Definition Definition Edit with form History Facebook icon Twitter icon » Definition: Federal Register Jump to: navigation, search Dictionary.png Federal Register The official journal of the federal government of the United States that contains most routine publications and public notices of government agencies. It is a daily (except holidays) publication.[1] View on Wikipedia Wikipedia Definition The Federal Register (since March 14, 1936), abbreviated FR, or sometimes Fed. Reg. , is the official journal of the federal government of the United States that contains most routine publications and public notices of government agencies. It is a daily publication. The Federal Register is compiled by the Office of the Federal Register and is printed by the Government Printing Office. The final rules promulgated by a federal

98

RAPID/Geothermal/Land Use/Federal | Open Energy Information  

Open Energy Info (EERE)

GeothermalLand UseFederal < RAPID | Geothermal | Land Use Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA RAPID Toolkit About...

99

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

2009-01-05T23:59:59.000Z

100

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

102

Request for Information on Improving Performance of Federal Permitting and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information on Improving Performance of Federal Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 The Department of Energy's Office of Electricity Delivery and Energy Reliability, in collaboration with the Member Agencies of the Steering Committee (Member Agencies) created under Executive Order 13604 of March 22, 2012, and pursuant to the June 7, 2013 Transmission Presidential Memorandum, is seeking information on a draft Integrated, Interagency Pre-Application (IIP) Process for significant onshore electric transmission projects requiring Federal Authorization(s).

103

Principles of Secure Information Flow Analysis Geoffrey Smith  

E-Print Network (OSTI)

Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

Smith, Geoffrey

104

Federal Power Act | Open Energy Information  

Open Energy Info (EERE)

Federal Power Act Federal Power Act Year 1920 Url [[File:|160px|link=http://www.fws.gov/laws/lawsdigest/FEDPOWR.HTML]] Description References Federal Power Act[1] The original Federal Power Act provides for cooperation between the Federal Energy Regulatory Commission (Commission) and other Federal agencies, including resource agencies, in licensing and relicensing power projects. The President is required to appoint the five commissioners with the advice and consent of the Senate (16 U.S.C. 792). The President is also authorized, at the request of the Commission, to detail engineers from the Departments of Agriculture or Interior for field work (16 U.S.C. 793). "Navigable waters" (for which the Commission has jurisdiction under the Commerce Clause) are defined to include "streams or other bodies of water

105

An ontology-based approach to information systems security management  

Science Journals Connector (OSTI)

Complexity of modern information systems (IS), impose novel security requirements. On the other hand, the ontology paradigm aims to support knowledge sharing and reuse in an explicit and mutually agreed manner. Therefore, in this paper we set the foundations ... Keywords: IS security, security management, security ontology, security policy

Bill Tsoumas; Stelios Dritsas; Dimitris Gritzalis

2005-09-01T23:59:59.000Z

106

Classified Information Systems Security Manual  

Directives, Delegations, and Requirements

This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

1999-08-03T23:59:59.000Z

107

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network (OSTI)

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

108

Optimal Information Security Investment with Penetration Testing  

E-Print Network (OSTI)

gathering prior to investing into protection against so-identified threats. Penetration testing is alsoOptimal Information Security Investment with Penetration Testing Rainer B¨ohme and M´ark F´elegyh´azi International Computer Science Institute, Berkeley, California {rainer.boehme|mark}@icsi.berkeley.edu Abstract

Bencsáth, Boldizsár

109

SIA: Secure information aggregation in sensor networks  

Science Journals Connector (OSTI)

In sensor networks, data aggregation is a vital primitive enabling efficient data queries. An on-site aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the off-site querier, thus reducing the communication ... Keywords: Sensor networks, approximate interactive proofs, information aggregation, security

Haowen Chan; Adrian Perrig; Bartosz Przydatek; Dawn Song

2007-01-01T23:59:59.000Z

110

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network (OSTI)

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security it is confidential, sensitive, both or neither. 2. Prepare a security plan to protect information identified as confidential, sensitive or both. 3. Assign management responsibility for implementing the security plan. 4

O'Toole, Alice J.

111

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senate Homeland Security and Governmental Affairs Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen

112

Federated Wind Farm | Open Energy Information  

Open Energy Info (EERE)

Wind Farm Wind Farm Jump to: navigation, search Name Federated Wind Farm Facility Federated Sector Wind energy Facility Type Commercial Scale Wind Facility Status In Service Owner Federated Developer Federated Location MN Coordinates 46.729553°, -94.6858998° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":46.729553,"lon":-94.6858998,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

113

Federal Energy Subsidies | Open Energy Information  

Open Energy Info (EERE)

Federal Energy Subsidies Federal Energy Subsidies Jump to: navigation, search Does wind energy receive federal subsidies, and if so how much? Do other forms of energy receive subsidies? Do fossil fuels receive more subsidies than renewables? Anyone engaged in stakeholder education and outreach will be asked these questions. According to a study by the Environmental Law Institute, the federal government's subsidies to fossil fuels totaled approximately $72 billion during 2002-2008, while subsidies for renewable fuels totaled $29 billion over the same period.[1] The Production Tax Credit (PTC) has been a major driver of wind power development over the past decade. It provides a 2.2 cent per kilowatt-hour tax credit for the first 10 years of electricity production from utility-scale turbines. Congress has allowed the PTC to lapse five times

114

Information System Security Manager (ISSM) | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

ISSM Core Competency Training Worksheet More Documents & Publications Information System Security Officer (ISSO) Cybersecurity Program Manager (CSPM) Authorizing Official (AO)...

115

Department of Energy Proposed Agency Information Collection: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

00 - May 25, 2010 00 - May 25, 2010 Department of Energy Proposed Agency Information Collection: Federal Register Notice Volume 75, No. 100 - May 25, 2010 Department of Energy Proposed Agency Information Collection. The Department of Energy (DOE) invites public comments on DOE's intent to request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Federal Register Volume 75 No 100. Federal Register notice for the Department of Energy Proposed Agency Information Collection, May 25, 2010. More Documents & Publications Department of Energy Proposed Agency Information Collection: Federal

116

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

117

Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees  

Directives, Delegations, and Requirements

The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing Department of Energy (DOE), including National Nuclear Security Administration (NNSA), Federal workers with a safe and healthful workplace. Cancels DOE O 440.1A. Certified 6/17/2011. Canceled by DOE O 440.1B Chg 1.

2007-05-17T23:59:59.000Z

118

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network (OSTI)

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

119

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network (OSTI)

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

120

Federal Loan Program | Open Energy Information  

Open Energy Info (EERE)

Federal Loan Program Federal Loan Program Jump to: navigation, search Loan programs provide financing for the purchase of renewable energy or energy efficiency systems or equipment. Low-interest or zero-interest loans for energy efficiency projects are a common demand-side management (DSM) strategy for electric utilities. State governments also offer low-interest loans for a broad range of renewable energy and energy efficiency measures. These programs are commonly available to the residential, commercial, industrial, transportation, public and nonprofit sectors. Loan rates and terms vary by program; in some cases, they are determined on an individual project basis. Loan terms are generally 10 years or less. In recent years, the federal government has offered loans for renewables and energy

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

National Security Information Classification Guidance Fundamental Review, June 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Information Fundamental Classification Guidance Review Report to the Information Security Oversight Office June 2012 United States Department of Energy Washington, DC 20585 Department of Energy | June 2012 National Security Information Fundamental Classification Guidance Review | Page iii Executive Summary Section 1.9 of Executive Order (E.O.) 13526, Classified National Security Information, dated December 29, 2009, directs agency heads to complete a comprehensive review of agency classification guides to ensure they reflect current circumstances and to identify classified information that no longer requires protection and can be declassified. To meet this requirement, the Department of Energy (DOE), under the direction of the Senior Agency Official, devoted

122

Federated Rural Electric Assn | Open Energy Information  

Open Energy Info (EERE)

Federated Rural Electric Assn Federated Rural Electric Assn Place Minnesota Utility Id 6258 Utility Location Yes Ownership C NERC Location MRO NERC MRO Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png General Service (Multiphase) - Commercial Commercial General Service (Multiphase)- Residential Residential General Service (Multiphase)-Commercial-Wind Energy Electric Service Commercial General Service (Multiphase)-Residential-Wind Energy Electric Service Residential General Service - Commercial Commercial General Service - Residential Residential General Service(Multiphase)- Commercial-Temporary Service Commercial

123

Federal Aviation Administration | Open Energy Information  

Open Energy Info (EERE)

Aviation Administration Aviation Administration Jump to: navigation, search Logo: Federal Aviation Administration Name Federal Aviation Administration Address 800 Independence Ave., SW Place Washington, District of Columbia Zip 20591 Year founded 1958 Website http://www.faa.gov/ Coordinates 38.8872756°, -77.0230138° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8872756,"lon":-77.0230138,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

124

Federal Energy Regulatory Commission | Open Energy Information  

Open Energy Info (EERE)

Energy Regulatory Commission Energy Regulatory Commission Jump to: navigation, search Logo: Federal Energy Regulatory Commission Name Federal Energy Regulatory Commission Address 888 First Street, N.E. Place Washington, District of Columbia Zip 20426 Phone number 1-866-208-3676 Website http://www.ferc.gov/contact-us Coordinates 38.90145°, -77.006248° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.90145,"lon":-77.006248,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

125

Federal Emergency Management Agency | Open Energy Information  

Open Energy Info (EERE)

Emergency Management Agency Emergency Management Agency Jump to: navigation, search Logo: Federal Emergency Management Agency Name Federal Emergency Management Agency Address 500 C Street SW Place Washington, District of Columbia Zip 20472 Year founded 1979 Website http://www.fema.gov/ Coordinates 38.8858427°, -77.0182049° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8858427,"lon":-77.0182049,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

126

Information security knowledge sharing inorganizations: Investigating the effect ofbehavioral information security governance andnational culture  

Science Journals Connector (OSTI)

Abstract This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries namely, USA and Sweden allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledge sharing differs based on national culture. The study followed a mixed methods research design, wherein qualitative data was collected to both establish the study's research model and develop a survey instrument that was distributed to 578 information security executives. The results suggest that processes to coordinate implemented security knowledge sharing mechanisms have a major direct influence on the establishment of security knowledge sharing in organizations; the effect of organizational structure (e.g., centralized security function to develop and deploy uniform firm-wide policies, and use of steering committees to facilitate information security planning) is slightly weaker, while business-based information security management has no significant direct effect on security knowledge sharing. A mediation analysis revealed that the reason for the nonsignificant direct relation between business-based information security management and security knowledge sharing is the fully mediating effect of coordinating information security processes. Thus, the results disentangles the interrelated influences of behavioral information security governance factors on security knowledge sharing by showing that information security governance sets the platform to establish security knowledge sharing, and coordinating processes realize the effect of both the structure of the information security function and the alignment of information security management with business needs. A multigroup analysis identified that national culture had a significant moderating effect on the association between four of the six proposed relations. In Sweden which is seen as a less individualist, feminine country managers tend to focus their efforts on implementing controls that are aligned with business activities and employees' need; monitoring the effectiveness of the implemented controls, and assuring that the controls are not too obtrusive to the end-user. On the contrary, US organizations establish security knowledge sharing in their organization through formal arrangements and structures. These results imply that Swedish managers perceive it to be important to involve, or at least know how their employees cope with the decisions that have been made, thus favoring local participation in information security management, while US managers may feel the need to have more central control when running their information security function. The findings suggest that national culture should be taken into consideration in future studies in particular when investigating organizations operating in a global environment and understand how it affects behaviors and decision-making.

Waldo Rocha Flores; Egil Antonsen; Mathias Ekstedt

2014-01-01T23:59:59.000Z

127

Proposed Agency Information Collection: Federal Register Notice Volume 76,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54 - Aug. 10, 2011 54 - Aug. 10, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 The Department of Energy (DOE) invites public comment on DOE's intent to request OMB to renew Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 for an additional four years that DOE is developing for submission to the Office of Management and Budget (OMB) pursuant to the Paperwork Reduction Act of 1995. Comments regarding this proposed information collection must be received on or before October 11, 2011. ICR, OMB1910.5149.pdf More Documents & Publications Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 Department of Energy Proposed Agency Information Collection: Federal

128

Proposed Agency Information Collection: Federal Register Notice Volume 76,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95 - Oct. 7, 2011 95 - Oct. 7, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 The Department of Energy (DOE) invites public comment on DOE's request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is submitting to OMB pursuant to the Paperwork Reduction Act of 1995. Comments regarding this proposed information collection must be received on or before November 7, 2011 2011-26061 OE FRN ARRA ICR 30.pdf More Documents & Publications Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 Department of Energy Proposed Agency Information Collection: Federal

129

The Relationship Between Information Security and Fraud Risk Management  

E-Print Network (OSTI)

of Regional Security & Fraud Risk HSBC THE CHINESE UNIVERSITY OF HONG KONG Department of Information current role in HSBC, as the Head of Regional Security & Fraud for Asia Pacific involves financial crime

Huang, Jianwei

130

List of Major Information Systems,National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

131

Rethinking information privacy-security: does it really matter?  

Science Journals Connector (OSTI)

This paper reports some of the findings of a bigger study that examined the role of technological, individual, cultural, and informational traits in shaping the intention to buy and sell online. The focus of this paper is on information privacy-security ... Keywords: culture, information privacy, information security, online buying and selling, structural equation modeling

Waseem Afzal

2013-11-01T23:59:59.000Z

132

Notices FOR FURTHER INFORMATION CONTACT: Jessica Trice, Office of Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

309 Federal Register 309 Federal Register / Vol. 78, No. 36 / Friday, February 22, 2013 / Notices FOR FURTHER INFORMATION CONTACT: Jessica Trice, Office of Federal Activities, Mail Code 2252A, Environmental Protection Agency, 1200 Pennsylvania Ave., NW., Washington, DC 20460; telephone number: (202) 564-6646; fax number: (202) 564-0072; email address: trice.jessica@epa.gov. SUPPLEMENTARY INFORMATION: Supporting documents which explain in detail the information that the EPA will be collecting are available in the public docket for this ICR. The docket can be viewed online at www.regulations.gov or in person at the EPA Docket Center, EPA West, Room 3334, 1301 Constitution Ave., NW., Washington, DC. The telephone number for the Docket Center is 202-566-1744. For additional information about EPA's

133

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

134

Federal Grant Program | Open Energy Information  

Open Energy Info (EERE)

Grant Program Grant Program Jump to: navigation, search States offer a variety of grant programs to encourage the use and development of renewable energy technologies and energy efficiency measures. Most programs offer support for a broad range of technologies, while a few programs focus on promoting one particular technology, such as photovoltaic (PV) systems. Grants are available primarily to the commercial, industrial, utility, education and government sectors. Most grant programs are designed to pay down the cost of eligible systems or equipment. Others focus on research and development, or support project commercialization. In recent years, the federal government has offered grants for renewables and energy efficiency projects for end-users. Grants are typically available on a competitive basis. [1]

135

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network (OSTI)

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

136

Acceptable Information Technology Devices | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Acceptable Information Technology Devices Within Y-12's Limited Areas, Exclusion Areas, Material Access Areas, and Protected Areas (security areas designated by DOE for the...

137

Federal Regulations | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Regulations Federal Regulations Federal Regulations NOTE: Adobe Acrobat Reader may be necessary to view PDF documents listed below. Accessibility Section 508 of the Rehabilitation Act - Electronic and Information Technology Accessibility Standards Section 504 of the Rehabilitation Act - Nondiscrimination Under Federal Grants and Programs Federal Records Act Freedom of Information Act (as amended) Freedom of Information Act Updates Privacy Act of 1974 (as amended) Privacy Act Overview Cyber Security Atomic Energy Act of 1954 (PDF) Computer Fraud and Abuse Act of 1986 (PDF) Electronic Communications Privacy Act of 1986 Federal Information Security Management of 2002 ( Title III of E-Gov) Homeland Security Act of 2002 ( includes Cyber Security Act of 2002 and Critical Infrastructure Act of 2002)

138

DyKnow Federations: Distributing and Merging Information Among UAVs  

E-Print Network (OSTI)

DyKnow Federations: Distributing and Merging Information Among UAVs Fredrik Heintz and Patrick, patdo}@ida.liu.se Abstract--As unmanned aerial vehicle (UAV) applications be- come more complex and versatile there is an increasing need to allow multiple UAVs to cooperate to solve problems which are beyond

Doherty, Patrick

139

DRAFT DRAFT Peer Production of Privacy and Security Information  

E-Print Network (OSTI)

DRAFT DRAFT Peer Production of Privacy and Security Information L Jean Camp* Informatics Indiana_Friedman@ksgphd.harvard.edu #12;2 L. Jean Camp and Allan Friedman, "Peer Production of Privacy and Security Information" Ethical operators in the model of the turn of the twentieth century, as it required at the turn of the nineteenth

Camp, L. Jean

140

Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY  

E-Print Network (OSTI)

to the advancement of higher education through the effective use of information technology. Members include representatives from institutions of higher education, higher education technology companiesPolicy 3505 ­ Information Technology Security 1 OLD DOMINION UNIVERSITY University Policy Policy

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

142

Index of Energy Security Risk | Open Energy Information  

Open Energy Info (EERE)

Index of Energy Security Risk Index of Energy Security Risk Jump to: navigation, search Tool Summary Name: Index of Energy Security Risk Agency/Company /Organization: United States Chamber of Commerce, Institute for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.energyxxi.org/images/Energy_Index_2011_FINAL.pdf Cost: Free Index of Energy Security Risk Screenshot References: Index of Energy Security Risk[1] "This 2011 edition of the Index incorporates the most current energy data, including the Energy Information Administration's (EIA) Annual Energy Outlook 2011 (AEO 2011), to provide an up-to-date assessment of the trends having the greatest impact on energy security since the first Index was

143

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

144

RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS  

E-Print Network (OSTI)

organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

145

Information security: where computer science, economics and psychology meet  

Science Journals Connector (OSTI)

...trade became too hazardous. Camp Wolfram (2000) built on this...vulnerabilities There has been debate for centuries about whether security is helped...Cambridge, UK, 26-28 June 2006. Camp, J. Wolfram, C. 2000 Pricing...information security L.J. Camp and S. Lewis2004pp. 1-15...

2009-01-01T23:59:59.000Z

146

Transcript: NUIT Information Security News Podcast, August 2, 2012  

E-Print Network (OSTI)

is Thursday, August 2 and you're listening to the information security news podcast brought to you, I don't think this is any surprise to anybody who is listening to this here. People despise having when it comes to some computer security is having a password on the device that you're trying

Shahriar, Selim

147

Interpreting Deep Structures of Information Systems Security  

Science Journals Connector (OSTI)

......network, infrastructure and regulatory) of the organization...adopting stringent regulatory review of the security policies...present ways to deal with regulatory actions such as developing contingency plans (disaster recovery in......

Manoj Thomas; Gurpreet Dhillon

2012-10-01T23:59:59.000Z

148

Farmland Security Zone | Open Energy Information  

Open Energy Info (EERE)

Zone Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Farmland Security ZoneLegal Abstract California Department of Conservation,...

149

Information Security Framework for Small and Medium Sized Businesses  

E-Print Network (OSTI)

Information security issues are a challenge to everyone who uses computers. The rise of the personal computer as a common business tool and the Internet as a common means of business communication and commerce have also created an environment...

Michnick, Steven M.

2009-06-17T23:59:59.000Z

150

PARS II New Contractor Information for Interconnection Security Agreement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Contractor Information for Interconnection Security Agreement New Contractor Information for Interconnection Security Agreement V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System (PARS) II System Owner and the contractor sign an Interconnection Security Agreement (ISA). The requirement for an Interconnection Security Agreement can be found on page 182 of the PCSP. The ISA template is available for review on the PARS II portal (http://management.energy.gov/online_resources/pars2.htm) under Contractor Documents. Before the contractor begins sending data to PARS II, DOE will send the ISA to the contractor for review and signature. In order to prepare the ISA for review and signature, the PARS II Support Team needs

151

Federal Facility Reporting | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Facility Reporting Federal Facility Reporting Federal Facility Reporting October 8, 2013 - 1:59pm Addthis Various legal authorities require agencies to report data on energy and water consumption and resource management efforts within Federal facilities. The Federal Energy Management Program collects this data to assess agency performance toward mandated goals on agency Energy/Sustainability Scorecards and presents it in annual reports to Congress. Find Federal facility reporting information related to: Energy Independence and Security Act (EISA) of 2007, Section 432, Federal Facility Management and Benchmarking Requirements: View information about requirements and data collected to track Federal facility compliance with requirements for performing facility evaluations, implementing and

152

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

153

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

154

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

155

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network (OSTI)

security 1. PROBLEM STATEMENT Software engineers used standard software engineering processes to develop of software are annoying, but delays of an hour are not catastrophic. But in certain environments (notably to use techniques, and--more importantly--how to analyze social, political, and cultural environments

156

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network (OSTI)

security 1. PROBLEM S A EMEN Software engineers used standard software engineering processes to develop and scenarios drawn from political science, history, and other humanities to force students to apply or derive the process enjoyable, stimulating, and effective. Key words: environment, judgment, instruction, computer

Bishop, Matt

157

The Need for Effective Information Security Awareness  

E-Print Network (OSTI)

, the high internet penetration growth rate in the Middle East and the limited security awareness among users internet penetration rates in the Middle East as of June 30, 2010 with rates equivalent to 88%, 75 had the highest e-commerce penetration rate in 2008. Specifically, 21.5% of UAE, 14.3% of Saudi Arabia

Aloul, Fadi

158

Modeling behavioral considerations related to information security.  

SciTech Connect

The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral study of upcoming threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F. (Decision and Information Sciences); (SNL); (Univ. at Albany)

2011-01-01T23:59:59.000Z

159

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services, and International Security Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications Major Management Challenges and Program Risks : Department of Energy GAO/OCG-99-6 GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects

160

Manual of Security Requirements for the Classified Automated Information System Security Program  

Directives, Delegations, and Requirements

This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

1994-07-15T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Property Accountability and Protection of Federal Sensitive Unclassified Information Under the Cooperative Agreement with the Incorporated County of Los Alamos, IG-0859  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection Report Property Accountability and Protection of Federal Sensitive Unclassified Information Under the Cooperative Agreement with the Incorporated County of Los Alamos DOE/IG-0859 February 2012 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 17, 2012 MEMORANDUM FOR THE SECRETARY FROM Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Inspection Report on "Property Accountability and Protection of Federal Sensitive Unclassified Information Under the Cooperative Agreement with the Incorporated County of Los Alamos" BACKGROUND On September 30, 2008, the National Nuclear Security Administration entered into a 5-year

162

Information Flow for Secure Distributed Applications  

E-Print Network (OSTI)

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-08-27T23:59:59.000Z

163

Information flow for secure distributed applications  

E-Print Network (OSTI)

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-01-01T23:59:59.000Z

164

Securing Dynamic Membership Information in Multicast Communications  

E-Print Network (OSTI)

insiders and outsiders. We collectively refer to groiq~rl!namics information (GDI) as information performs group management and has the knowledge of GDI. Although the service provider may release some

Liu, K. J. Ray

165

Securing Dynamic Membership Information in Multicast Communications  

E-Print Network (OSTI)

insiders and outsiders. We collectively refer to group dynamics information (GDI) as information describing performs group management and has the knowledge of GDI. Although the service provider may release some

Sun, Yan Lindsay

166

Information Security Risk Modeling Using Bayesian Index  

Science Journals Connector (OSTI)

......not allowed to access the intranet and the information equipment...1 Banking 3 1 2 1 2 0 High technology 5 2 3 2 1 2 Information technology 8 3 5 4 2 2 Manufacture 11...banking industry, 5 from the technology industry, 8 from the information......

Chien-Lung Chan

2011-04-01T23:59:59.000Z

167

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

168

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

SciTech Connect

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

169

Research and Practice in Federated Information Systems Report of the EFIS '2000 International Workshop  

E-Print Network (OSTI)

for federated system integration, and the use of meta- directories in building federations. DetailsResearch and Practice in Federated Information Systems Report of the EFIS '2000 International Workshop W. Hasselbring W.-J. van den Heuvel y G.J. Houben z R.-D. Kutsche x B. Rieger M. Roantree k K

Houben, Geert-Jan

170

Category:Federal Oil and Gas Regulations | Open Energy Information  

Open Energy Info (EERE)

Add a new Federal Oil and Gas Regulation This category currently contains no pages or media. Retrieved from "http:en.openei.orgwindex.php?titleCategory:FederalOilandGasReg...

171

Form:Federal Oil and Gas Statute | Open Energy Information  

Open Energy Info (EERE)

Oil and Gas Statute Jump to: navigation, search Federal Oil and Gas Statute This is the "Federal Oil and Gas Statute" form. To create a page with this form, enter the page name...

172

Form:Federal Oil and Gas Regulation | Open Energy Information  

Open Energy Info (EERE)

Regulation Jump to: navigation, search Federal Oil and Gas Regulation This is the "Federal Oil and Gas Regulation" form. To create a page with this form, enter the page name below;...

173

OFFICE OF HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE  

NLE Websites -- All DOE Office Websites (Extended Search)

HEALH, SAFETY AND SECURITY HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE OMB 1910-0300: ES&H Reporting Systems Description of Collections April 10, 2012 The information obtained from DOE contractors by this information collection is used by Department management at the appropriate levels to manage the work pertaining to environment, safety and health throughout DOE and will include automated reporting of information into the following systems: Computerized Accident/Incident Reporting System (CAIRS) - The CAIRS is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE operations as described in DOE O 231.1B, Environment, Safety and Health Reporting. This system contains information from reporting contractors and

174

Federal Advisory Committee Act of 1972 | Open Energy Information  

Open Energy Info (EERE)

Act of 1972 Act of 1972 Jump to: navigation, search Statute Name Federal Advisory Committee Act of 1972 Year 1972 Url [[File:|160px|link=http://www.gsa.gov/portal/content/100916]] Description The Federal Advisory Committee Act became law in 1972 and is the legal foundation defining how federal advisory committees operate. The law has special emphasis on open meetings, chartering, public involvement, and reporting. References Federal Advisory Committee Act of 1972 (annotated and un-annotated)[1] The Federal Advisory Committee Act became law in 1972 and is the legal foundation defining how federal advisory committees operate. The law has special emphasis on open meetings, chartering, public involvement, and reporting. References ↑ "Federal Advisory Committee Act of 1972 (annotated and

175

CrySTINA: Security in the Telecommunications Information  

E-Print Network (OSTI)

CrySTINA: Security in the Telecommunications Information Networking Architecture L.Butty'an, S.Wilhelmg@epfl.ch Abstract TINA specifies an open architecture for telecommunication services in the broadband, multimedia are increasingly used for the control of telecommunication systems. The use of computers enables more flexibility

Bencsáth, Boldizsár

176

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING  

E-Print Network (OSTI)

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST PROCEDURE SELECTION LIST ­ HEALTHCARE IT TESTING NVLAP HEALTHCARE IT TESTING APPLICATION (2013-01-02) PAGE 1 OF 3 Instructions: Please check the method for which you are requesting accreditation. NVLAP Code Test Procedure Description 2011

177

Office of the CISO, December 2010 Information Security Risk Advisory  

E-Print Network (OSTI)

Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

Queitsch, Christine

178

Area Information | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Visiting Us / Area Information Visiting Us / Area Information Area Information Guides, Area Maps, Airport... Airport, About: McGhee Tyson Airport Airport: map to Oak Ridge/Knoxville Oak Ridge: City Guide for City of Oak Ridge, Tennessee Knoxville: maps for visitors Oak Ridge: area map with location of Y-12 Visitor's Center Oak Ridge: map of city streets Roane County: Roane County Guide Resources: News, History... Knoxville: Knoxville, Tennessee Knoxville: Museums Knoxville: Knoxville News-Sentinel Oak Ridge: City of Oak Ridge Oak Ridge: Chamber of Commerce Oak Ridge: Convention and Visitors Bureau Oak Ridge: Oak Ridger Oak Ridge: Secret City History Area Attractions: To Do and See Knoxville: Clarence Brown Theater Knoxville: Frank H. McClung Museum Knoxville: Knoxville Opera Company, Francis Graffeo, General

179

CLASS DEVIATION FINDINGS AND DETERMINATION Federal Awardee Performance and Integrity Information Systems (FAPIIS) Requirement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Awardee Performance and Integrity Information Systems (FAPIIS) Requirement Federal Awardee Performance and Integrity Information Systems (FAPIIS) Requirement at Federal Acquisition Regulation (FAR) 9.406-3(f)(1) and 9.407-3(e)(1) Findings 1. On March 23,2010, the FAR Council published a final rule in the Federal Register (75FR 14058), which amended FAR 9.4 to implement section 872 of the Duncan Hunter National Defense Authorization Act for FISCAL Year 2009. Section 872 requires the establishment of a data system containing specific information on the integrity and performance of covered Federal agency contractors and grantees. The data system created for this purpose is entitled Federal Awardee Performance and Integrity Information Systems (FAPIIS), and it can be located at www.ppirs.gov and www.cpars.csd.disa.mil.

180

Study on security based on PKI for e-commerce of statistics information system  

Science Journals Connector (OSTI)

In this paper, issues about the trend of statistics information merchandizing, and the present situation of statistics information network and statistics information system security, are analyzed. Security construction scheme is put forward, which is ... Keywords: PKI, e-commerce, security, statistics information

Min Liu; Shudong Sun; Miaotiao Xing

2005-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Federal Renewable Energy Screening Assistant | Open Energy Information  

Open Energy Info (EERE)

Federal Renewable Energy Screening Assistant Federal Renewable Energy Screening Assistant Jump to: navigation, search Tool Summary Name: Federal Renewable Energy Screening Assistant (FRESA) Agency/Company /Organization: NREL Sector: Energy Focus Area: Biomass, Solar, Wind Topics: Implementation Resource Type: Software/modeling tools Website: analysis.nrel.gov/fresa/ OpenEI Keyword(s): EERE tool, FRESA, Federal Renewable Energy Screening Assistant References: FRESA homepage [1] Logo: Federal Renewable Energy Screening Assistant (FRESA) FRESA, is designed to help identify which renewable energy technologies are appropriate for implementation at both the facility and building scale. The Federal Renewable Energy Screening Assistant, or FRESA, is designed to help identify which renewable energy technologies are appropriate for

182

Federating Distributed and Heterogeneous Information Sources in Neuroimaging: The NeuroBase Project Federating Distributed and Heterogeneous In-  

E-Print Network (OSTI)

Federating Distributed and Heterogeneous Information Sources in Neuroimaging: The NeuroBase ProjectBase Project C. Barillot1 , H. Benali2 , M. Dojat4 , A. Gaignard1 , B. Gibaud1 , S. Kinkingnéhun2 , J Sources in Neuroimaging: The NeuroBase Project C. Barillot1 , H. Benali2 , M. Dojat3 , A. Gaignard1 , B

Boyer, Edmond

183

US DOE Federal Energy Management Program (FEMP) | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Jump to: navigation, search Logo: Federal Energy Management Program (FEMP) Name Federal Energy Management Program (FEMP) Agency/Company /Organization U.S. Department of Energy Sector Energy Focus Area Energy Efficiency Topics Pathways analysis, Resource assessment Website http://www1.eere.energy.gov/fe Country United States Northern America References FEMP homepage[1] Abstract The U.S. Department of Energy (DOE) Federal Energy Management Program (FEMP) provides services, tools, and expertise to Federal agencies to help them achieve their legislated and executive-ordered energy, greenhouse gas, and water goals. These are delivered through project, technical, and program services. The U.S. Department of Energy (DOE) Federal Energy Management Program

184

The 5 Waves of Information Security From Kristian Beckman to the Present  

E-Print Network (OSTI)

The 5 Waves of Information Security ­ From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security ­ the Third Wave (von Solms, 2000) and Information Security ­ the Fourth Wave (von Solms, 2006), as well as a paper

Boyer, Edmond

185

Security  

Energy.gov (U.S. Department of Energy (DOE))

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

186

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

187

Category:Federal Oil and Gas Statutes | Open Energy Information  

Open Energy Info (EERE)

Statutes Statutes Jump to: navigation, search Add a new Federal Oil and Gas Statute You need to have JavaScript enabled to view the interactive timeline. Further results for this query.DECADEFederal Oil and Gas Royalty Simplification and Fairness Act of 19961996-01-010Year: 1996 Federal Onshore Oil and Gas Leasing Reform Act of 1987 (FOOGLRA)1987-01-010Year: 1987 Federal Oil and Gas Royalty Management Act of 19821982-01-010Year: 1982 Indian Mineral Development Act of 19821982-01-010Year: 1982 Federal Land Policy and Management Act of 19761976-01-010Year: 1976 Mining and Minerals Policy Act of 19701970-01-010Year: 1970 Mineral Leasing Act for Acquired Lands of 19471947-01-010Year: 1947 Indian Mineral Leasing Act of 19381938-01-010Year: 1938 Mineral Leasing Act of 19201920-01-010Year: 1920

188

2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN- CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION  

Energy.gov (U.S. Department of Energy (DOE))

2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

189

Chapter_3_Personnel_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

190

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

191

Category:Regulatory Roadmap Federal Sections | Open Energy Information  

Open Energy Info (EERE)

Category Category Edit History Facebook icon Twitter icon » Category:Regulatory Roadmap Federal Sections Jump to: navigation, search GRR-logo.png Looking for the Geothermal Regulatory Roadmap? Click here for a user-friendly list of Geothermal Regulatory Roadmap pages. This is the Regulatory Roadmap Federal Sections category. Add.png Add an Section Pages in category "Regulatory Roadmap Federal Sections" The following 48 pages are in this category, out of 48 total. G GRR/Section 1-FD-a - Land Use Planning Process GRR/Section 1-FD-b - Land Use Plan Amendment Process GRR/Section 11-FD-a - NHPA Section 106 - Resource Survey GRR/Section 11-FD-b - Tribal Consultation GRR/Section 11-FD-c - NHPA Section 106 - Effects Assessment GRR/Section 11-FD-d - NHPA Section 106 - Consultation

192

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY  

E-Print Network (OSTI)

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

Adali, Tulay

193

Technical Services | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Technical Services Technical Services Technical services spans Y-12 disciplines that support manufacturing at Y-12. Information Systems (National Security Systems Development) Provide solutions for information security, including the protection of national security, proprietary and any other class of highly sensitive information. Develop highly integrated, enterprise level software applications for use within the federal space and adaptable to commercial application. Leverage the transformative information technology capabilities of the NNSA to a broad spectrum of federal applications for rapidly deployed, cost effective and reproducible technical solutions. Develop virtual collaborative networks for cluster manufacturing. Develop, test, and implement operational cyber security strategies

194

Federated States of Micronesia: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Federated States of Micronesia: Energy Resources Federated States of Micronesia: Energy Resources Jump to: navigation, search Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"TERRAIN","zoom":5,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"390px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":5,"lon":152,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

195

FOIA 10CFR, Code of Federal Regulations for the Freedom of Information Act  

Office of Energy Efficiency and Renewable Energy (EERE)

FOIA 10CFR, Code of Federal Regulations (CFR) for the Freedom of Information Act is 10 CFR 1004, as posted on the U.S. Department of Energy website.

196

A multidimensional approach to information security risk management using FMEA and fuzzy theory  

Science Journals Connector (OSTI)

Abstract Because of the evolution and widespread use of the Internet, organisations are becoming more susceptible to attacks on Information Technology Systems. These attacks result in data losses and alterations, and impact services and business operations. Therefore, to minimise these potential failures, this paper presents an approach to information security risk management, encompassing Failure Mode and Effects Analysis (FMEA) and fuzzy theory. This approach analyses five dimensions of information security: access to information and systems, communication security, infrastructure, security management and secure information systems development. To illustrate the proposed model, it was applied to a University Research Group project. The results show that the most important aspects of information security risk are communication security, followed by infrastructure.

Maisa Mendona Silva; Ana Paula Henriques de Gusmo; Thiago Poleto; Lcio Camara e Silva; Ana Paula Cabral Seixas Costa

2014-01-01T23:59:59.000Z

197

3-Year Renewal Request of OMB 1910-0818, Security, Information Request  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Topical Areas HSS Topical Areas Quality Assurance Enforcement / Oversight Environment HSS Outreach and Communications HSPD-12 Nuclear Materials Management & Safeguards System (NMMSS) HSS Internal Operations Council on Environmental Quality (CEQ) Office of Health, Safety and Security Collection Package Human Reliability Program OMB 1910-5122 Description of Collections 1. Human Reliability Program Certification (DOE F 470.3). Under the Department of Energy Human Reliability Program (HRP), individuals who are applicants for or incumbents in designated positions must be evaluated to ensure that they meet the requirements for certification in the program. This form documents that each part of the evaluation has been completed and records the determination by the HRP Certifying Official. The collection and documentation of this information is required by the HRP regulation found in the Code of Federal Regulations at 10 CFR 712. Form may be viewed at: http://energy.gov/cio/downloads/doe-f-4703

198

Fidelity: Federated Identity Management Security based on Liberty Alliance on European Ambit  

Science Journals Connector (OSTI)

On the Federated Digital Identity ambit, the Fidelity project will put in practice a system defined by Liberty Alliance specifications into a pan-European context, ... s boundaries. To solve this problem, the Liberty

Manel Medina; Miquel Colomer

2006-01-01T23:59:59.000Z

199

University of Connecticut / Jason Pufahl, CISSP, CISM 1 INFORMATION SECURITY STRATEGIC  

E-Print Network (OSTI)

University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 #12;University of Connecticut / Jason Pufahl of Connecticut recognizes that information is a critical asset and that how information is managed, controlled

Alpay, S. Pamir

200

For Profit Audits - Information Related to 12/21/11 Federal Register Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

For Profit Audits - Information Related to 12/21/11 Federal For Profit Audits - Information Related to 12/21/11 Federal Register Notice For Profit Audits - Information Related to 12/21/11 Federal Register Notice Attached are copies of the 7 comments received to Federal Register notice Document Number 2011-32622, a copy of the matrix of the comments, a copy of DOE's responses to the comments, and marked up versions of the draft guidance showing the content changes to Parts I and II of guidance which were made as a result of the comments received. There were no changes to Parts III and IV of the guidance as a result of the comments received. For-profit comments and responses_final april 2012.pdf For-Profit_Audit_Guidance_(Part_I)_2011 editted 042612_1.pdf For-Profit_Audit_General_Compliance_Supplement_(Part_II)_2011 editted

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Category:Federal Environmental Statutes | Open Energy Information  

Open Energy Info (EERE)

Statutes Statutes Jump to: navigation, search Add a new Federal Environmental Statute You need to have JavaScript enabled to view the interactive timeline. Further results for this query.DECADEPaleontological Resources Preservation Act2007-01-010Year: 2007 Healthy Forests Restoration Act of 20032003-01-010Year: 2003 Oil Pollution Act1990-01-010Year: 1990 Native American Graves Protection Act1990-01-010Year: 1990 Federal Cave Resources Protection Act1988-01-010Year: 1988 Sole Source Aquifer Demonstration Program1986-01-010Year: 1986 Coastal Barrier Resources Act1982-01-010Year: 1982 Farmland Protection Policy Act1981-01-010Year: 1981 CERCLA1980-01-010Year: 1980 Archaeological Resources Protection Act1979-01-010Year: 1979 Archaeological Resource Protection Act1979-01-010Year: 1979

202

Federal Way, Washington: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

(Redirected from Federal Way, WA) (Redirected from Federal Way, WA) Jump to: navigation, search Equivalent URI DBpedia Coordinates 47.3223221°, -122.3126222° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.3223221,"lon":-122.3126222,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

203

Denver Federal Center Solar Park | Open Energy Information  

Open Energy Info (EERE)

Center Solar Park Center Solar Park Jump to: navigation, search Name Denver Federal Center Solar Park Facility Denver Federal Center Sector Solar Facility Type Photovoltaic Owner SunEdison Solar Developer SunEdison Solar Energy Purchaser Xcel Energy Address West 6th Ave & Kipling Street Location Lakewood, Colorado Zip 80225 Coordinates 39.7247982353°, -105.118432045° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.7247982353,"lon":-105.118432045,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

204

EcoSecurities Brasil Ltd | Open Energy Information  

Open Energy Info (EERE)

EcoSecurities Brasil Ltd Jump to: navigation, search Name: EcoSecurities Brasil Ltd. Place: Rio de Janeiro, Rio de Janeiro, Brazil Sector: Carbon Product: Brazilian subsidiary...

205

New_Contractor_Information_for_Interconnection_Security_Agreement...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NewContractorInformationforInterconnectionSecurityAgreement.pdf NewContractorInformationforInterconnectionSecurityAgreement.pdf NewContractorInformationforIntercon...

206

Chapter_10_Security_Awareness_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: * Title 32, CFR, Part 2001, Classified National Security Information * Executive Order 13526, Classified National Security Information * DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 * DOE Order 475.2A, Identifying Classified Information * DOE Order 475.1, Counterintelligence Program The Security Awareness Program Manager, within HS-92, manages the HQ security awareness program. The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, and security procedures specific to HQ. This goal is accomplished by providing HQ employees

207

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Practices: Best Practices: Elements of a Federal Privacy Program Version 1.0 Sponsored By: Federal CIO Council Privacy Committee June 2010 Best Practices: Elements of a Federal Privacy Program June 2010 Page i Contents Acknowledgements __________________________________________________________________ ii Purpose ____________________________________________________________________________ 1 Introduction: Privacy Stewardship and Governance _________________________________________ 3 Element 1 -Leadership ________________________________________________________________ 6 Element 2 - Privacy Risk Management and Compliance Documentation _________________________ 9 Element 3 - Information Security _______________________________________________________ 14

208

Comments on the Request for Information on Improving Performance of Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the Request for Information on Improving Performance of on the Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects Comments on the Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects On August 29, 2013, the U.S. Department of Energy (DOE) published a Request for Information seeking information on a draft Integrated, Interagency Pre-Application (IIP) Process for significant onshore electric transmission projects requiring Federal authorizations. On September 25, the public comment period was extended to October 31, 2013. Comments received are available below. Comments from Lee Cunningham, sent September 23, 2013 Comments from Patrick Ledger of Arizona's G&T Cooperatives, sent September 25, 2013

209

Information Flow Control for Secure Web Sites Maxwell Norman Krohn  

E-Print Network (OSTI)

smaller, and configure the Web site's security policies. They need only change when the policy changes

210

Information-Theoretically Secure Communication Under Channel Uncertainty  

E-Print Network (OSTI)

. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We...

Ly, Hung Dinh

2012-07-16T23:59:59.000Z

211

THE UNIVERSITY OF TEXAS AT DALLAS INFORMATION SECURITY  

E-Print Network (OSTI)

. Instead, these requirements should be integrated into a comprehensive system security plan. II. Scope

O'Toole, Alice J.

212

Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees  

Directives, Delegations, and Requirements

The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12. Cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13.

2007-05-17T23:59:59.000Z

213

How information resources are used by federal agencies in risk assessment application: Rapporteur summary  

SciTech Connect

The application of information available for risk assessment from the federal perspective is described. Different federal agencies conduct varying degrees of hazard evaluation, and some also generate empirical data. The role of the Agency for Toxic Substances and Disease Registry in hazard assessments of potential public health impacts of Superfund sites includes identification of the 275 most significant substances. ATSDR is responsible for preparing toxicological profiles. ATSDR also identifies data gaps and needs critical to adequately assessing human health impacts.

Fenner-Crisp, P. [Environmental Protection Agency, Washington, DC (United States)

1990-12-31T23:59:59.000Z

214

Security and Privacy Notices | NREL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

215

Headquarters Personnel Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Personnel Security Operations Headquarters Personnel Security Operations Headquarters Personnel Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems. Functions The primary function of the Office of Headquarters Personnel

216

Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees  

Directives, Delegations, and Requirements

The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12, cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13, cancels DOE O 440.1B Chg 1.

2007-05-17T23:59:59.000Z

217

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

218

Information security: where computer science, economics and psychology meet  

Science Journals Connector (OSTI)

...Gilbert 2006). Since 2004, computer crime has become organized...Commemoration Commission and by NSF grant DGE-0636782 (T.M...In Proc. Seventeenth Annual Computer Security Applications Conf...Schechter, S. E. 2004 Computer security strength and risk...

2009-01-01T23:59:59.000Z

219

Cutting the Federal Governments Energy Bill: An Examination of the Sustainable Federal Government Executive Order  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RICHARD KIDD PROGRAM MANAGER FEDERAL ENERGY MANAGEMENT PROGRAM OFFICE OF ENERGY EFFICIENCY AND RENEWABLE ENERGY U.S. DEPARTMENT OF ENERGY BEFORE THE SUBCOMMITTEE ON FEDERAL FINANCIAL MANAGEMENT, GOVERNMENT INFORMATION, FEDERAL SERVICES AND INTERNATIONAL SECURITY COMMITTEE ON HOMELAND SECURITY AND GOVERNMENT AFFAIRS U.S. SENATE JANUARY 27, 2010 INTRODUCTION Good afternoon Chairman Carper, Ranking Member McCain, and other distinguished members of the subcommittee. I lead the Department of Energy's (DOE) Federal Energy Management Program (FEMP), which is part of the Office of Energy Efficiency and Renewable Energy. FEMP's mission is to facilitate the Federal Government's implementation of sound, cost-effective, energy management and investment practices to

220

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT  

E-Print Network (OSTI)

and the decision of acceptable risk; · Monitor security controls in the information system on an ongoing1 basis that organization-wide operations remain within an acceptable level of risk when changes are made, and that timelyCONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley

222

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

223

PKI-based security for peer-to-peer information sharing  

SciTech Connect

The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

2004-05-02T23:59:59.000Z

224

Headquarters Facilities Master Security Plan  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

225

Federated DyKnow, a Distributed Information Fusion System for Collaborative UAVs  

E-Print Network (OSTI)

Federated DyKnow, a Distributed Information Fusion System for Collaborative UAVs Fredrik Heintz {frehe, patdo}@ida.liu.se Abstract--As unmanned aerial vehicle (UAV) applications are becoming more complex and covering larger physical areas there is an increasing need for multiple UAVs to cooperatively

Doherty, Patrick

226

Stewardship and Access: Activities of the Federation of Earth Science Information Partners  

E-Print Network (OSTI)

) · Nonprofit 501(c)(3) corporation · The Federation's secretariat #12;Vision Pillars ( 20110712 DRAFT) · ESIP the development of the science data information profession · ESIP achieves sustainability through diversification that is ready to go · Principles and practices organized into three sections: · Data Creators · Data

Colorado at Boulder, University of

227

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

228

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

229

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

230

Nuclear safety information sharing agreement between NRC and DOEs Office of Environment, Health, Safety and Security  

Energy.gov (U.S. Department of Energy (DOE))

Nuclear safety information sharing agreement between NRC and DOEs Office of Environment, Health, Safety and Security.

231

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE))

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

232

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

233

Chapter_1_Physical_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

234

Federal Register notice for the Department of Energy Proposed Agency Information Collection, July 22, 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

726 Federal Register 726 Federal Register / Vol. 75, No. 140 / Thursday, July 22, 2010 / Notices e.g. new, revision, extension, existing or reinstatement; (2) Title; (3) Summary of the collection; (4) Description of the need for, and proposed use of, the information; (5) Respondents and frequency of collection; and (6) Reporting and/or Recordkeeping burden. OMB invites public comment. The Department of Education is especially interested in public comment addressing the following issues: (1) Is this collection necessary to the proper functions of the Department; (2) will this information be processed and used in a timely manner; (3) is the estimate of burden accurate; (4) how might the Department enhance the quality, utility, and clarity of the information to be collected; and (5) how might the

235

Nevada National Security Site Cleanup Information Is Just a Click Away with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Cleanup Information Is Just a Click Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public December 27, 2012 - 12:00pm Addthis Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. LAS VEGAS, NV - For decades, the Nevada Site Office (NSO) has been investigating, characterizing, identifying, and performing corrective

236

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network (OSTI)

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

237

DOE Order Self Study Modules - DOE O 440.1B, Worker Protection Management for DOE (Including the National Nuclear Security Administration) Federal Employees  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0.1B 0.1B WORKER PROTECTION PROGRAM FOR DOE (INCLUDING THE NATIONAL NUCLEAR SECURITY ADMINISTRATION) FEDERAL EMPLOYEES DOE O 440.1B Familiar Level June 2011 1 DOE O 440.1B WORKER PROTECTION MANAGEMENT FOR DOE (INCLUDING THE NATIONAL NUCLEAR SECURITY ADMINISTRATION) FEDERAL EMPLOYEES FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to answer the following questions: 1. What are the objectives of DOE O 440.1B? 2. What are the requirements that DOE elements must meet according to DOE O 440.1B? 3. What is the hazard prevention/abatement process that must be implemented according to DOE O 440.1B? 4. What are three responsibilities assigned by DOE O 440.1B for heads of field elements?

238

U-200: Red Hat Directory Server Information Disclosure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Passwords to Remote Authenticated and Local Users V-041: Red Hat CloudForms Multiple Vulnerabilities T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

239

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgw...

240

Cyber Security Requirements for Wireless Devices and Information Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Incorporating hacking projects in computer and information security education: an empirical study  

Science Journals Connector (OSTI)

Incorporating hacking projects in information security education is controversial. However, several studies discussed the benefits of including offensive exercises (e.g., hacking) in information security courses. In this paper, we present our experiment in incorporating hacking projects in the laboratory exercises for an undergraduate-level Computer and Information Security (CIS) course at King Abdulaziz University (KAU), Saudi Arabia. We conducted a survey to measure the effectiveness of incorporating hacking projects from the students' perspective. We also questioned the ethical aspects of these projects. The results strongly suggest that hacking projects have helped the students better understanding computer and information security principles. Furthermore, the majority of the students stated that they do not intend to misuse the learned skills, mainly for religious and ethical reasons. We also present the precautions that we took to avoid legal or ethical consequences that may be connected with these activities.

Eman Alashwali

2014-01-01T23:59:59.000Z

242

An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions  

E-Print Network (OSTI)

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

2006-01-01T23:59:59.000Z

243

J. Douglas Streit, Information Security Officer Office of Computing and Communications Services  

E-Print Network (OSTI)

Last updated February 6, 2012 Old Dominion University Information Technology Security Program #12;J and collaborative network environment required for higher education institutions to foster scholarly activity II delegated authority from the Commonwealth under the Virginia Restructured Higher Education

244

I have reviewed your Request for Information published in the Federal Register o  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

have reviewed your Request for Information published in the Federal Register on February 27, 2012. I have reviewed your Request for Information published in the Federal Register on February 27, 2012. I would suggest that these are very difficult questions to answer and really vary by the developer, the region and the type of project. There are no canned answers that would fit for responses to the questions raised. I would suggest that a joint workshop be set up with a cross section of industry representatives to meet with members of the Rapid Response Team and explore these questions and the range of answers together. I think it is more important that the RRT understand what developers must go through for generation and transmission projects. It is clear that RRT does understand the variation in schedules between transmission and certain forms of generation. This schedule difference

245

September 27 29, 2010, Baltimore Convention Center Focusing on Emerging Automation Specifications and Use Cases, Software Assurance, Healthcare IT, Cyber Security, and Regulatory Compliance  

E-Print Network (OSTI)

the technical burdens of policy compliance, and innovated uses of automation across the enterprise in both, Vulnerability Identification, and Remediation Federal Information Security Management Act (FISMA) Federal Validated Tools Content Validation Innovative Case Studies Highlights Beautiful Baltimore Inner Harbor

246

Y-12 National Security Complex's Waste Diversion Efforts, OAS-L-12-08  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex's Y-12 National Security Complex's Waste Diversion Efforts OAS-L-12-08 July 2012 Department of Energy Washington, DC 20585 July 20, 2012 MEMORANDUM FOR THE MANAGER, NATIONAL NUCLEAR SECURITY ADMINISTRATION PRODUCTION OFFICE FROM: Daniel M. Weeber, Director Eastern Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "Y-12 National Security Complex's Waste Diversion Efforts" BACKGROUND Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management, mandates that each Federal facility maintain a cost-effective waste prevention and recycling program. Further, Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance, requires that Federal agencies achieve a 50 percent

247

GAO-11-879T Federal Real Property: Overreliance on Leasing Contributed to High-Risk Designation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Financial Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Government Affairs, U.S. Senate FEDERAL REAL PROPERTY Overreliance on Leasing Contributed to High-Risk Designation Statement of David J. Wise, Director Physical Infrastructure Issues For Release on Delivery Expected at 2:30 p.m. EDT Thursday, August 4, 2011 GAO-11-879T United States Government Accountability Office Highlights of GAO-11-879T, a testimony before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate August 4, 2011 FEDERAL REAL PROPERTY Overreliance on Leasing Contributed to High-Risk

248

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

249

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

250

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

251

DOE Issues Agency Information Collection Extension for OE-417 Form in the Federal Register  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has issued an Agency Information Collection Extension in the Federal Register, notifying the public of an information collection extension and requesting public comments on the revised Form OE-417 "Electric Emergency Incident and Disturbance Report" which is used to report electric emergency incidents and disturbances to DOE. The OE-417 reports enable the DOE to monitor electric emergency incidents and disturbances in the United States so that the Government may help prevent the physical or virtual disruption of the operation of any critical infrastructure.

252

Toward sensitive information redaction in a collaborative, multilevel security environment  

Science Journals Connector (OSTI)

Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, government, and research environments it is often necessary to control access ... Keywords: collaboration, multilevel security, redaction

Peter Gehres; Nathan Singleton; George Louthan; John Hale

2010-07-01T23:59:59.000Z

253

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

254

All Other Editions Are Obsolete U.S. DEPARTMENT OF ENERGY FEDERAL ASSISTANCE BUDGET INFORMATION  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0.2 0.2 (08-93) All Other Editions Are Obsolete U.S. DEPARTMENT OF ENERGY FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) OMB Control No. 1910-0400 OMB Burden Disclosure on Last Page SECTION A - GENERAL 1. PROGRAM/PROJECT IDENTIFICATION NO. 2. PROGRAM/PROJECT TITLE 3. NAME AND ADDRESS SECTION B - CALCULATION OF FEDERAL AWARD Cost Classification Use Only for Revisions Latest Approved Amount Adjustment + or (-) Total Amount Required 1. Administration Expense 2. Preliminary Expense 3. Land, Structures, Right-of-way 4. Architectural Engineering Basic Fees 5. Other Architectural Engineering Fees 6. Project Inspection Fees 7. Land Development 8. Relocation Expenses 9. Relocation Payments to Individuals and Businesses 10. Demolition and Removal 11. Construction and Project Improvement

255

Security of Information Flow in the Electric Power Grid  

Science Journals Connector (OSTI)

The confidentiality of information in a system can be breached through unrestricted information flow. The formal properties of non-deducibility and non-inference are often used to assess information flow in purel...

Han Tang; Bruce McMillin

2008-01-01T23:59:59.000Z

256

Security-Widefield, Colorado: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Security-Widefield, Colorado: Energy Resources Security-Widefield, Colorado: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 38.7640957°, -104.7404269° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.7640957,"lon":-104.7404269,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

257

National Security Studies Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security Studies Program National Security Studies Program National Security Studies Program Objective The National Security Studies Program (NSSP) is designed to prepare future leaders of civilian agencies for high-level policy, command, and staff responsibilities. The NSSP focuses on international environments and commercial partnerships. All students successfully completing the program are awarded a Master's degree. The program does not involve a promotion or a change in position. Benefits to the Organization The program prepares federal civilian employees for high-level policy, command, and staff responsibilities. Participants will gain valuable experience in leadership, information strategy, national security studies, military strategy, logistics, economics, industry studies, and more. The

258

Implementing Information Security and Its Technology: A LineManagement Perspective  

SciTech Connect

Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

Barletta, William A.

2005-08-22T23:59:59.000Z

259

DOE/EA-1471: Environmental Assessment for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex and Finding of No Significant Impact (January 2004)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EA for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex EA for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex i FINDING OF NO SIGNIFICANT IMPACT FOR THE TRANSPORTATION OF HIGHLY ENRICHED URANIUM FROM THE RUSSIAN FEDERATION TO THE Y-12 NATIONAL SECURITY COMPLEX ISSUED BY: United States Department of Energy ACTION: Finding of No Significant Impact SUMMARY: The United States (U.S.) Department of Energy (DOE) proposes to transport highly enriched uranium (HEU) from Russia to a secure storage facility in Oak Ridge, TN. This proposed action would allow the United States and Russia to accelerate the disposition of excess nuclear weapons materials in the interest of promoting nuclear disarmament, strengthening nonproliferation, and combating terrorism. The HEU

260

Security Policy, CMPC Marking Resource | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy, CMPC Marking Resource Policy, CMPC Marking Resource Security Policy, CMPC Marking Resource June 2012 Examples illustrate markings for matter that contains classified information. A strong and cohesive information security program is integral to national security. The U.S. Government requires certain information to be maintained in confidence to protect our citizens, democratic institutions, and activities within the international security community. Marking notifies holders of classified matter of the protection requirements for the information. Markings and designations serve two primary purposes: Alert holders to the presence of classified information. Warn holders of special access or safeguarding requirements. This resource was developed to assist Federal and contractor employees by

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

File:08-FD-a - FederalTransmission.pdf | Open Energy Information  

Open Energy Info (EERE)

FederalTransmission.pdf FederalTransmission.pdf Jump to: navigation, search File File history File usage File:08-FD-a - FederalTransmission.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 20 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 16:30, 25 October 2012 Thumbnail for version as of 16:30, 25 October 2012 1,275 × 1,650 (20 KB) Dklein2012 (Talk | contribs) 09:55, 8 June 2012 Thumbnail for version as of 09:55, 8 June 2012 1,275 × 1,650 (49 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information)

262

Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.2  

SciTech Connect

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS system package. System administrators, database administrators, and general users can use this guide to install, configure, and maintain the FEMIS client software package. This document provides a description of the FEMIS environment; distribution media; data, communications, and electronic mail servers; user workstations; and system management.

Burford, M.J.; Burnett, R.A.; Curtis, L.M. [and others

1996-05-01T23:59:59.000Z

263

Microsoft Word - Social Media Security Guidelines-v01-A.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidelines for Secure Use of Social Media by Guidelines for Secure Use of Social Media by Federal Departments and Agencies Information Security and Identity Management Committee (ISIMC) Network and Infrastructure Security Subcommittee (NISSC) Web 2.0 Security Working Group (W20SWG) Version 1.0 September 2009 This document is publicly releasable Guidelines for Secure Use of Social Media by Federal Departments and Agencies Page 2 Intended Audience This document is intended as guidance for any federal agency that uses social media services to collaborate and communicate among employees, partners, other federal agencies, and the public. Note: The Federal CIO Council does not endorse the use or imply preference for any vendor commercial products or services mentioned in this document.

264

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network (OSTI)

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing resource records, and organizational accounting information. Recent cases of industrial espionage all point addressed if both technological and organizational issues are considered simultaneously. How should

Sadeh, Norman M.

265

E-Print Network 3.0 - automated federal information Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

vehicles to pass through the federal inspection processes. In response... facilitate trade while permitting the federal and state agencies to maintain their inspection Source:...

266

Office of Headquarters Personnel Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Personnel Headquarters Personnel Director's Perspective Welcome to the Office of Headquarters Personnel Security Operations Stephanie Scott Grimes, Director The Office of Headquarters Personnel Security Operations serves the Department by providing a comprehensive Personnel Security Program for the DOE Headquarters complex. Our goal is to ensure that DOE classified information and materials are safeguarded from compromise by assuring that only trustworthy individuals are granted security clearances. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes aimed at ensuring only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information and materials.

267

DOE Cites Battelle Energy Alliance, LLC for Classified Information Security Violations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 25,2011 February 25,2011 CERTIFIED MAIL RETURN RECEIPT REQUESTED Mr. John 1. Grossenbacher Director, Idaho National Laboratory and President, Battelle Energy Alliance, LLC P. O. Box 1625 Idaho Falls, Idaho 83415-3695 SEA-20ll-01 Dear Mr. Grossenbacher: The Office of Health, Safety and Security's Office of Enforcement has completed its investigation into the facts and circumstances associated with an incident of security concern regarding the introduction of classified information into unapproved information systems (security event) at the U.S. Department of Energy's (DOE) Idaho National Laboratory (INL). Based on the on-site investigation and evaluation of the evidence in this matter, and in consideration of information presented by you and other Battelle Energy Alliance, LLC (BEA)

268

Service oriented architecture governance tools within information security .  

E-Print Network (OSTI)

??Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for (more)

Mokgosi, Letlhogonolo

2012-01-01T23:59:59.000Z

269

Freedom of Information Act Related Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

of Defense scientific and technical information. Radiation Effects Research Foundation A Cooperative Japan-United States Research Organization, conducts research and...

270

Federal Emergency Management Information system (FEMIS) data management guide. Version 1.2  

SciTech Connect

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of FEMIS. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, how it is loaded, and how it is managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Johnson, S.M.; Loveall, R.M.; Winters, C.

1996-05-01T23:59:59.000Z

271

Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3  

SciTech Connect

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.

Burford, M.J.; Burnett, R.A.; Downing, T.R. [and others

1996-12-01T23:59:59.000Z

272

2011 DOE Safety and Security Enforcement Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

2011 DOE Safety and Security Workshop 2011 DOE Safety and Security Workshop Enforcement Home Registration - CLOSED Agendas Day 1 Agenda and Presentations Day 2 Agenda and Presentations Hotel Information Enforcement Home 2011 DOE Safety and Security Enforcement Workshop Office of Enforcement and Oversight The Office of Health, Safety and Security's (HSS) Office of Enforcement will be hosting its 2011 DOE Safety and Security Enforcement Workshop on the dates and location provided below. When: April 5 - 7, 2011 April 5 and 6 are open to Federal employees and contractors (8 am - 5 pm) April 7 is a half-day session for Federal participants only (8 - 11:30 am) The Energy Facility Contractors Group (EFCOG) Enforcement Coordination Working Group will be holding a meeting on April 7 at the Nevada Support Facility. For more information about that meeting, click here.

273

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

274

Privacy & Security Notice | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

275

Exploiting adversary's risk profiles in imperfect information security games  

Science Journals Connector (OSTI)

At present much of the research which proposes to provide solutions to Imperfect Information Non-Cooperative games provides superficial analysis which then requires a priori knowledge of the game to be played. We propose that High Card, a simple Multiplayer ... Keywords: adversarial game theory, high card, imperfect information

Gabriel Fortunato Stocco; George Cybenko

2011-11-01T23:59:59.000Z

276

Disable Automatic Login, Cyber Security, Information Technology Division,  

NLE Websites -- All DOE Office Websites (Extended Search)

Disable Automatic Login Disable Automatic Login Automatic Login MUST be disabled... Follow the steps below to verify that auto login is disabled. Verify Security Settings Select Personal Section: Click Make sure the following required boxes are checked. - Require password to wake this computer from sleep or screen saver - Disable automatic login If so, close panel. If not, continue... Note: Mac users should have the panel locked at all times. Click the lock image to lock the panel if its open to prevent further changes. To unlock the above panel, click the lock image to bring up the login box. Insert your username & password, click . You should now be able to make changes to the panel.

277

Comprehensive program and plan for federal energy education, extension, and information activities: Fiscal Year 1981. Fifth report to congress  

SciTech Connect

The activities conducted solely in Fiscal Year (FY) 1981 in the areas of Federal energy education, extension service, and information dissemination are reported. The broad purpose of the FY 1981 activities addressed has been to inform governmental and private sectors about the methods and technologies to conserve energy and to utilize renewable energy sources. With the increase in awareness on the part of energy users and decisionmakers, as well as additional information sources available from the private sector, the emphasis of the various Federal energy information activities is being focused on reporting results of Federal programs. The course of activities related to conservation and renewable energy information has been one of consolidation, both in terms of programmatic substance and methods. The practical impetus has been the redirection of Federal progrms and related budgetary revisions for FY 1981 and FY 1982. Further, products conveying information on conservation and renewable energy technologies have been examined extensively, pursuant to the Administration's directive in April 1981 on elimination of wasteful spending on periodicals, audiovisuals and similar materials. Efforts in coordination of conservation and renewable energy information activities of the Department of Energy (DOE) as well as other Federal agencies have adjusted to timetables for review and redirection of programs initially planned for FY 1981. Mechanisms to coordinate existing Federal energy information activities employed in previous fiscal years were continued in FY 1981 to the extent applicable under current Administration policy and the above-noted circumstances of redirection. Coordinating actions requiring convening of groups were held in abeyance pending resolution of programmatic issues.

Not Available

1981-12-01T23:59:59.000Z

278

Federal Spectrum Management at the National Telecommunications...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Spectrum Management at the National Telecommunications and Information Administration Federal Spectrum Management at the National Telecommunications and Information...

279

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network (OSTI)

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing), CASOS ­ the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon network and knowledge management approach to discovering organizational vulnerabilities within companies

Sadeh, Norman M.

280

CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations  

E-Print Network (OSTI)

permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

Locasto, Michael E.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy  

E-Print Network (OSTI)

Lucas Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT controls Supported by the Zurich Information Security Center. Work done while at ETH Zurich, Switzerland

Maurer, Ueli

282

HybridSecure MPC: Trading InformationTheoretic Robustness for Computational Privacy  

E-Print Network (OSTI)

Lucas # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT--- Cryptographic controls # Supported by the Zurich Information Security Center. + Work done while at ETH Zurich

Maurer, Ueli

283

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided ...

Claire Elliott

2010-08-01T23:59:59.000Z

284

Federal Energy Management Program: Sustainable Federal Fleets  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Fleets Federal Fleets The Federal Fleet Program Overview outlines FEMP services and assistance available to Federal fleet managers to increase the use of alternative fuels and advanced vehicles. FEMP's Sustainable Federal Fleets website provides guidance and assistance to help implement Federal legislative and regulatory requirements mandating reduced petroleum consumption and increased alternative fuel use. FEMP's efforts include assisting agencies with implementing and managing energy-efficient and alternative fuel vehicles and facilitating a coordinated effort to reduce petroleum consumption and increase alternative fuel use annually. Content on Sustainable Federal Fleets spans Federal requirements and reporting compliance, alternative fuels and advanced vehicles, fleet performance data, analysis services, information resources, and FEMP contacts.

285

Security in Information Systems: New Challenges and Opportunities  

E-Print Network (OSTI)

systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

Jurjens, Jan

286

Securing Dynamic Group Membership Information over Multicast: Attacks and Immunization  

E-Print Network (OSTI)

(GDI) as information describing the dynamic membership of a group application, such as the number the service during a time interval. In many multicast applications, GDI is confidential and should of the GDI to competitors could enable them to analyze the statistical behavior of the audience and help them

Sun, Yan Lindsay

287

Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}  

SciTech Connect

The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

NONE

1998-05-01T23:59:59.000Z

288

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09 09 Federal Register / Vol. 62, No. 99 / Thursday, May 22, 1997 / Notices collection on the respondents, including through the use of information technology. Dated: May 16, 1997. Gloria Parker, Director, Information Resources Management Group. Office of Management Type of Review: New. Title: Department of Education Federal Cash Award Certification Statement and Department of Education Federal Cash Quarterly Confirmation Statement. Frequency: Annually. Affected Public: Business or other for- profit; Not for Profit institutions; Federal Government; State, Local or Tribal Government, SEAs or LEAs. Annual Reporting and Recordkeeping Hour Burden: Responses: 12,000. Burden Hours: 38,160. Abstract: The collection of the Federal Cash Award Statement is necessary for the Agency to monitor cash advanced to

289

Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees  

Directives, Delegations, and Requirements

This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13.

2011-10-20T23:59:59.000Z

290

Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees  

Directives, Delegations, and Requirements

This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13, cancels DOE G 440.1-1B.

2011-10-20T23:59:59.000Z

291

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up, 1st edition  

Science Journals Connector (OSTI)

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap ...

Evan Wheeler

2011-05-01T23:59:59.000Z

292

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information  

SciTech Connect

To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the analysts world knowledge that puts these attributes in context. What known exploits or new vulnerabilities might an anomalous traffic pattern suggest? What organizational, social, or geopolitical events help forecast or explain attacks and anomalies? Few visualization tools support creating, maintaining, and applying this knowledge of the threat landscape. Through a series of formative workshops with practicing security analysts, we have developed a visualization approach inspired by the human process of contextualization; this system, called NUANCE, creates evolving behavioral models of network actors at organizational and regional levels, continuously monitors external textual information sources for themes that indicate security threats, and automatically determines if behavior indicative of those threats is present on a network.

Pike, William A.; Scherrer, Chad; Zabriskie, Sean J.

2008-06-04T23:59:59.000Z

293

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA Briefings on Physical Security of Electricity Substations The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations. The session for FEMA Region IX will be held in San Jose, CA and hosted by

294

Federal Digital Strategy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Digital Strategy Federal Digital Strategy Federal Digital Strategy New expectations require the Federal Government to be ready to deliver and receive digital information and services anytime, anywhere and on any device. It must do so safely, securely, and with fewer resources. To build for the future, the Federal Government has developed a Digital Strategy that embraces the opportunity to innovate more with less, and enables entrepreneurs to better leverage government data to improve the quality of services to the American people. The Energy Department has responded to this challenge through key initiatives that make high-value data sets available through API's that allow programmers to use data to reveal new opportunities and trends, websites that follow best practices for mobile design, and applications

295

Federal Digital Strategy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Digital Strategy Federal Digital Strategy Federal Digital Strategy New expectations require the Federal Government to be ready to deliver and receive digital information and services anytime, anywhere and on any device. It must do so safely, securely, and with fewer resources. To build for the future, the Federal Government has developed a Digital Strategy that embraces the opportunity to innovate more with less, and enables entrepreneurs to better leverage government data to improve the quality of services to the American people. The Energy Department has responded to this challenge through key initiatives that make high-value data sets available through API's that allow programmers to use data to reveal new opportunities and trends, websites that follow best practices for mobile design, and applications

296

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

297

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

298

Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6  

SciTech Connect

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.

Arp, J.A.; Bower, J.C.; Burnett, R.A.; Carter, R.J.; Downing, T.R.; Fangman, P.M.; Gerhardstein, L.H.; Homer, B.J.; Johnson, D.M.; Johnson, R.L.; Johnson, S.M.; Loveall, R.M.; Martin, T.J.; Millard, W.D.; Schulze, S.A.; Stoops, L.R.; Tzemos, S.; Wood, B.M.

1999-06-29T23:59:59.000Z

299

Reliability and the Federal Energy Regulatory Commission  

Energy.gov (U.S. Department of Energy (DOE))

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingcovers the Federal Energy Regulatory Commission (FERC) strategic plan, the Federal Power Act (FPA), current energy security posture, and more.

300

Federal Emergency Management Information System (FEMIS). Data Management Guide, FEMIS: Phase 1, Version 1.1u  

SciTech Connect

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the U.S. Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system.

Burnett, R.A.; Johnson, D.M.; Johnson, S.M. [and others

1995-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Office of Headquarters Personnel Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

302

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

303

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

304

Federal Emergency Management Information System (FEMIS) system administration guide, version 1.4.5  

SciTech Connect

The Federal Emergency Management Information Systems (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication, data distribution, and notification functionality necessary to operate FEMIS in a networked, client/server environment. The UNIX server provides an Oracle relational database management system (RDBMS) services, ARC/INFO GIS (optional) capabilities, and basic file management services. PNNL developed utilities that reside on the server include the Notification Service, the Command Service that executes the evacuation model, and AutoRecovery. To operate FEMIS, the Application Software must have access to a site specific FEMIS emergency management database. Data that pertains to an individual EOC`s jurisdiction is stored on the EOC`s local server. Information that needs to be accessible to all EOCs is automatically distributed by the FEMIS database to the other EOCs at the site.

Arp, J.A.; Burnett, R.A.; Carter, R.J. [and others

1998-06-26T23:59:59.000Z

305

Federal Land Policy and Management Act of 1976 | Open Energy Information  

Open Energy Info (EERE)

Land Policy and Management Act of 1976 Land Policy and Management Act of 1976 Jump to: navigation, search Statute Name Federal Land Policy and Management Act of 1976 Year 1976 Url Landpolicy1976.jpg Description FLPMA, also called the BLM Organic Act, consolidated and articulated BLM management responsibilities and delegated many management responsibilities pertaining to federal land from the Secretary of the Interior to the Director of the BLM, including oversight of oil and gas leases. References Federal Land Policy and Management Act of 1976[1] The Federal Land Policy and Management Act of 1976 (43 U.S.C. §1701 et seq.) - FLPMA, also called the BLM Organic Act, consolidated and articulated BLM management responsibilities and delegated many management responsibilities pertaining to federal land from the Secretary of the

306

GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according  

E-Print Network (OSTI)

GLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used listening agent. A favored method of stealing passwords. Malware · a general term and malware in order to infiltrate, compromise, exploit and disable any device

Brinkmann, Peter

307

International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5, No. 2, August 2013 Badr Benmammar1,  

E-Print Network (OSTI)

68 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5, No. 2 and other mobile devices. Due to the emergence of application domains, such as sensor networks, smart grid

308

Federal Market Information Technology in the Post Flash Crash Era: Roles for Supercomputing  

SciTech Connect

This paper describes collaborative work between active traders, regulators, economists, and supercomputing researchers to replicate and extend investigations of the Flash Crash and other market anomalies in a National Laboratory HPC environment. Our work suggests that supercomputing tools and methods will be valuable to market regulators in achieving the goal of market safety, stability, and security. Research results using high frequency data and analytics are described, and directions for future development are discussed. Currently the key mechanism for preventing catastrophic market action are circuit breakers. We believe a more graduated approach, similar to the yellow light approach in motorsports to slow down traffic, might be a better way to achieve the same goal. To enable this objective, we study a number of indicators that could foresee hazards in market conditions and explore options to confirm such predictions. Our tests confirm that Volume Synchronized Probability of Informed Trading (VPIN) and a version of volume Herfindahl-Hirschman Index (HHI) for measuring market fragmentation can indeed give strong signals ahead of the Flash Crash event on May 6 2010. This is a preliminary step toward a full-fledged early-warning system for unusual market conditions.

Bethel, E. Wes; Leinweber, David; Ruebel, Oliver; Wu, Kesheng

2011-09-16T23:59:59.000Z

309

Federal Railroad Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation Transportation Federal Railroad Administration Overview of Proposed Rail Safety & Security Rulemakings Kevin R. Blackwell FRA Hazmat Division Washington, DC Federal Authority DOT Authority to regulate safety and security of hazardous materials transportation Hazardous Materials Transportation Law (49 U.S.C. 5101 et.seq.) Federal Railroad Safety Act (49 U.S.C. 20101 et.seq.) TSA Authority to regulate security of hazardous material transportation Aviation Transportation Security Act (Pub. L. 107-71, 115 Stat. 597) Routing as a Part of the Transportation Cycle Routing decisions are continually made as a part of the transportation cycle for a variety of reasons. E c o n o m i c s Security S a f e t y Routing Decision Pyramid DOT NPRM HM-232E NPRM published on December 21, 2006.

310

INFORMATION SECURITY:  

Science Journals Connector (OSTI)

......of the top four risks to the UK. The...used as a form of political protest. The UK...the 650 million investment through the National...the considerable investment by the government...and development, risk analysis, policy...attacks, as a form of political protest, has become......

Cyber Security Skill Shortages

2012-01-01T23:59:59.000Z

311

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

312

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

313

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

314

Federal Railroad Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety & Security Safety & Security Rulemakings Kevin R. Blackwell FRA Hazmat Division Washington, DC Federal Authority DOT Authority to regulate safety and security of hazardous materials transportation Hazardous Materials Transportation Law (49 U.S.C. 5101 et.seq.) Federal Railroad Safety Act (49 U.S.C. 20101 et.seq.) TSA Authority to regulate security of hazardous material transportation Aviation Transportation Security Act (Pub. L. 107-71, 115 Stat. 597) Routing as a Part of the Transportation Cycle Routing decisions are continually made as a part of the transportation cycle for a variety of reasons. Security Routing Decision Pyramid DOT NPRM HM-232E NPRM published on December 21, 2006. Seeks to clarify and enhance existing regulations. Rail Carriers who transport carloads of more than 5000 lbs of 1.1, 1.2, or 1.3

315

Office of Security Enforcement | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

316

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided in order to equip the reader with an understanding of the context for the remaining chapters. The motives for using botnets and the methods in which they are used are outlined. The methods of botnet attack are then analysed in terms of their potential impact on information security and a conclusion is drawn that botnets are indeed a threat to information security in general terms. Chapter 2 then goes on to examine the extent of the threat from the three different perspectives of governments, corporate and the general public. The threats from each perspective and their impacts are identified, and each threat type for each perspective is then categorised in terms of probability and potential impact. The extent of the threat of each botnet-related attack from each perspective is then assessed using a model recommended by ISO/IEC 27005:2008, and the conclusion is drawn that the extent of the threat that botnets pose to governments, corporates and the general public is High. In Chapter 3, we look at how law enforcement agencies investigate botnets and the criminals behind them, and establish the challenges they face in doing so. It is clear that law enforcement face an uphill struggle due to technical tricks employed by the botherders to remain untraceable, lack of resources with the necessary skillset, the legal complexity of working with multiple jurisdictions, and procedural delays working with foreign law enforcement agencies. The conclusion is drawn that botnets are here to stay and that for the time being the botherders will have the upper hand.

Claire Elliott

2010-01-01T23:59:59.000Z

317

Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0  

SciTech Connect

This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plans purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programsthe Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

Farnham, Irene; Marutzky, Sam

2014-12-01T23:59:59.000Z

318

Procurement | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement | National Nuclear Security Administration Procurement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Procurement Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Procurement Procurement NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

319

EISA Section 432: Federal Facility Management and Benchmarking Requirements  

Energy.gov (U.S. Department of Energy (DOE))

The Federal Energy Management Program is responsible for tracking Federal agency progress toward meeting Section 432 of the Energy Independence and Security Act of 2007.

320

Countering Nuclear Terrorism | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Countering Nuclear Terrorism | National Nuclear Security Administration Countering Nuclear Terrorism | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Countering Nuclear Terrorism Home > Our Mission > Countering Nuclear Terrorism Countering Nuclear Terrorism NNSA provides expertise, practical tools, and technically informed policy

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Change Request Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Change Request Forms | National Nuclear Security Administration Change Request Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Change Request Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Change Request Forms Change Request Forms

322

NMMSS Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reports | National Nuclear Security Administration Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Reports Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > NMMSS Reports NMMSS Reports U.S. Department of Energy / U.S. Nuclear Regulatory Commission

323

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Action Codes Table | National Nuclear Security Administration Action Codes Table | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Action Codes Table Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Code Tables > Action Codes Table

324

Security Control Assessor | Department of Energy  

Energy Savers (EERE)

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

325

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

326

This paper, copyright the IEEE, appears in IEEE Symposium on Security and Privacy 2004. IEEE Computer Society Press, May 2004. This paper previously appeared as Johns Hopkins University Information Security  

E-Print Network (OSTI)

This paper, copyright the IEEE, appears in IEEE Symposium on Security and Privacy 2004. IEEE U.S. federal funds now available to replace outdated punch-card and mechanical voting systems being detected by any mechanisms within the voting terminal software. Furthermore, we show that even

Kohno, Tadayoshi

327

GRR/Section 3-FD-a - Federal Land Leasing | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 3-FD-a - Federal Land Leasing GRR/Section 3-FD-a - Federal Land Leasing < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-FD-a - Federal Land Leasing 03FDAFederalLandLeasing.pdf Click to View Fullscreen Contact Agencies Bureau of Land Management United States Forest Service Regulations & Policies National Environmental Policy Act Energy Policy Act of 2005 Geothermal Steam Act of 1970 Federal Power Act Mineral Leasing Act of 1920 Outer Continental Shelf Lands Act 40 CFR 1506.1 43 CFR 1610.5-3 43 CFR 1610.5-5 43 CFR 3000.12 43 CFR 3200 43 CFR 3201.10 43 CFR 3201.11 43 CFR 3202.10 43 CFR 3203 43 CFR 3203.12 43 CFR 3206.12 10 U.S.C. 2917 Triggers None specified Click "Edit With Form" above to add content 03FDAFederalLandLeasing.pdf 03FDAFederalLandLeasing.pdf

328

Security & Privacy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

329

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09 09 Federal Register / Vol. 64, No. 93 / Friday, May 14, 1999 / Notices technological collection techniques or other forms of information technology, e.g., permitting electronic submission of responses. Burden Statement: The annual public reporting and recordkeeping burden for this collection of information is estimated to average 3.03 hours per response. It is estimated that any individual may respond to synopses or market research questions 5 times per year. EPA anticipates publicizing approximately 260 contract actions per year, and conducting 3790 market research inquiries. Burden means the total time, effort, or financial resources expended by persons to generate, maintain, retain, or disclose or provide information to or for a Federal agency. This includes the time needed to review

330

Federal Technical Capability Program (FTCP) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Illness Compensation Program Pamphlet Federal Technical Capability Program (FTCP) Accident Investigation Reports Nuclear Safety Facility Safety Security Classification...

331

Federal Employee Training Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements to supplement DOE O 360.1B, FEDERAL EMPLOYEE TRAINING. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Cancels DOE M 360.1A-1. Canceled by DOE O 360.1C.

2001-10-11T23:59:59.000Z

332

Federal Employee Training Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements to supplement DOE O 360.1A, Federal Employee Training, dated 9-21-99. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Canceled by DOE M 360.1-1B.

1999-09-21T23:59:59.000Z

333

January 2007 SECURITY CONTROLS FOR  

E-Print Network (OSTI)

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

334

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

146 146 Federal Register / Vol. 65, No. 122 / Friday, June 23, 2000 / Notices instructions; develop, acquire, install, and utilize technology and systems for the purposes of collecting, validating, and verifying information, processing and maintaining information, and disclosing and providing information; adjust the existing ways to comply with any previously applicable instructions and requirements; train personnel to be able to respond to a collection of information; search data sources; complete and review the collection of information; and transmit or otherwise disclose the information. EPA estimates that the changes discussed today, when implemented, will reduce burden by 23,000 hours and an insignificant number of dollars. Dated: June 14, 2000. Elizabeth Cotsworth, Director, Office of Solid Waste.

335

November 2003 NETWORK SECURITY TESTING  

E-Print Network (OSTI)

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

336

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27  

E-Print Network (OSTI)

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines for all Texas Veterinary Medical Diagnostic Laboratory (TVMDL) positions. Reason for Procedure Under

337

Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets  

E-Print Network (OSTI)

to any customer. The Safeguards require each of the agenciesseries of regulations pursuant to the Safeguards, which theycall the Safeguards Rule. 143 The OCC, the Federal

Thaw, David Bernard

2011-01-01T23:59:59.000Z

338

Federal Acquisition Regulation; Federal Acquisition Circular  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Federal Acquisition Circular (FAC) 2005-40 Federal Register /Vol. 75, No. 55 /Tuesday, March 23, 2010 /page 14059 A summary for the FAR rule follows. Federal Awardee Performance and Integrity Information System (FAPIIS) (FAR case 2008-027) Effective Date: April 22, 2010. This final rule amends the FAR to implement section 872 of the Duncan Hunter National Defense Authorization Act for Fiscal Year 2009. Section 872 requires the establishment of a data system, Federal Awardee Performance and Integrity Information System (FAPIIS), containing specific information on the integrity and performance of covered Federal agency contractors and grantees. FAPIIS is available for use in award decisions at www.ppirs.gov. Government input to FAPIIS is accomplished at www.cpars.csd.disa.mil.

339

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13 13 Federal Register / Vol. 64, No. 223 / Friday, November 19, 1999 / Notices numbers for EPA's regulations are listed in 40 CFR part 9 and 48 CFR Chapter 15. The EPA would like to solicit comments to: (i) Evaluate whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (ii) Evaluate the accuracy of the agency's estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; (iii) Enhance the quality, utility, and clarity of the information to be collected; and (iv) Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated electronic,

340

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09 09 Federal Register / Vol. 62, No. 182 / Friday, September 19, 1997 / Notices Information Officer, publishes this notice containing proposed information collection requests at the beginning of the Departmental review of the information collection. Each proposed information collection, grouped by office, contains the following: (1) Type of review requested, e.g., new, revision, extension, existing or reinstatement; (2) Title; (3) Summary of the collection; (4) Description of the need for, and proposed use of, the information; (5) Respondents and frequency of collection; and (6) Reporting and/or Recordkeeping burden. ED invites public comment at the address specified above. Copies of the requests are available from Patrick J. Sherrill at the address specified above. The Department of Education is

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Recent development of transparency and access to information at the federal level in Mexico.  

E-Print Network (OSTI)

??Transparency and access to information have become important elements of the Mexican political transition. The goal of this study is to contribute to the debate (more)

Arteaga Cano, Issac Armando.

2007-01-01T23:59:59.000Z

342

Energy Security and Restoration Exercise Program/Best Practices and Information Sharing  

SciTech Connect

The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

Barbara McCabe; John Kovach

2009-03-30T23:59:59.000Z

343

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

344

PSH-12-0044 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44 - In the Matter of Personnel Security Hearing 44 - In the Matter of Personnel Security Hearing PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. Because the PSI and further investigation indicated that the Individual had not filed state and federal tax returns for several years and had a number of delinquent financial accounts, the LSO informed the Individual in a March 2012 notification

345

Safety and Security Enforcement Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Security Enforcement Program Safety and Security Enforcement Program Safety and Security Enforcement Program About Us The Office of Health, Safety and Security's Office of Enforcement and Oversight is responsible for enforcing Federal regulatory requirements pertaining to worker safety and health, nuclear safety, and classified information security programs at Department of Energy (DOE) sites. The United States Congress mandated that the Secretary of Energy promulgate these requirements in order to provide assurance that workers are protected from hazards in the workplace, the potential danger to life and property from the operation of DOE nuclear facilities is minimized, and classified matter is protected from disclosure to sustain our national security. These mandates are reflected in amendments to the Atomic Energy Act of 1954 in

346

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

347

TSO-1116 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing The individual is an employee of a Department of Energy (DOE) contractor who has held a security clearance for several years. During a routine reinvestigation, the local security office (LSO) discovered that the individual had not filed federal taxes for the tax years 2008 and 2009. In July 2011, the LSO interviewed the individual during a Personnel Security Interview (PSI), but that interview did not resolve the security concerns. The LSO suspended his clearance and, in August 2011, the LSO informed the individual that it had received derogatory information that created a doubt regarding his continued eligibility for access authorization. See

348

January 2012 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

2 | National Nuclear Security Administration 2 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > January 2012 January 2012 NNSA Blog Bob Osborn selected as 2012 Federal 100 Award winner Posted By Office of Public Affairs Bob Osborn Bob Osborn, NNSA Associate Administrator for Information Management and Chief Information Officer, has been selected as one of

349

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

350

Reasonable Accommodations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reasonable Accommodations | National Nuclear Security Administration Reasonable Accommodations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Reasonable Accommodations Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > Reasonable Accommodations Reasonable Accommodations For information and guidance on Reasonable Accommodations, contact the

351

Small Business | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Home > About Us > Our Operations > Acquisition and Project Management > Small Business Small Business NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

352

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

353

Users Frequently Asked Questions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Users Frequently Asked Questions | National Nuclear Security Administration Users Frequently Asked Questions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Users Frequently Asked Questions Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Frequently Asked Questions > Users Frequently Asked Questions

354

Federal Government Energy Management Conservation Programs Reports...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Act (NECPA, Pub. L. No. 95-619), as amended, and provide information on energy consumption in Federal buildings, operations, and vehicles. Compiled by the Federal Energy...

355

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

356

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

357

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

358

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Federal Register / Vol. 68, No. 220 / Friday, November 14, 2003 / Notices 1 Because the plants' refueling schedules determine the availability for lead assembly use, Duke Power Company has submitted a license amendment request to the NRC to allow irradiation of MOX lead assemblies at Catawba. The SA also analyzes the use of the McGuire Nuclear Station (McGuire) in North Carolina, which could be used in lieu of Catawba, if a license amendment request were submitted and approved. SUMMARY: The Leader, Regulatory Information Management Group, Office of the Chief Information Officer, invites comments on the proposed information collection requests as required by the Paperwork Reduction Act of 1995. DATES: Interested persons are invited to submit comments on or before January

359

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87 87 Federal Register / Vol. 61, No. 173 / Thursday, September 5, 1996 / Notices of burden accurate, (4) how might the Department enhance the quality, utility, and clarity of the information to be collected, and (5) how might the Department minimize the burden of this collection on the respondents, including through the use of information technology. Dated: August 29, 1996. Gloria Parker, Director, Information Resources Group. Office of Elementary and Secondary Education Type of Review: New. Title: Guidance on the Goals 2000 Amendments (Draft). Frequency: One-time submission. Affected Public: State, local or Tribal Gov't, SEAs or LEAs. Reporting and Recordkeeping Hour Burden: Responses: 30 Burden Hours: 3,000 Abstract: The Omnibus Consolidated Rescissions and Appropriations Act of

360

VOLUNTARY PROTECTION PROGRAM ONSITE REVIEW, Fluor Federal Services Richland, Washington February 26- March 2, 2001  

Energy.gov (U.S. Department of Energy (DOE))

This report summarizes the results of the HSS DOE-VPP Teams evaluation of Fluor Federal Services Richland, Washington during the period of February 26 - March 2, 2001, and provides the Chief Health, Safety and Security Officer with the necessary information to make the final decision regarding the companys continued participation in DOE-VPP as a Star site.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

362

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

363

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

364

Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures  

Science Journals Connector (OSTI)

We provide a unified architecture, called SPACe, for Secure, Privacy-Aware, and Contextual multimedia systems in organizations. Many key and important architectural components already exist which contribute to a unified platform, including the classic ...

Dawn N. Jutla; Dimitri Kanevsky

2006-12-01T23:59:59.000Z

365

Federal Emergency Management Information System (FEMIS) Data Management Guide Version 1.3  

SciTech Connect

FEMIS is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. FEMIS is designed to help civilian emergency management personnel to plan for and support their responses to a chemical-releasing event at a military chemical stockpile. This guide provides the background as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the datafiles and database. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, loaded, and managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Hoza, M.; Johnson, S.M.; Loveall, R.M.; Millard, W.D.; Winters, C.; Wood, B.M.

1996-12-01T23:59:59.000Z

366

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

78 78 Federal Register / Vol. 70, No. 158 / Wednesday, August 17, 2005 / Notices requirements and practices for institutions participating in the Title IV, Higher Education Act (HEA) programs. The public is alerted that this package is a request for an extension of a currently approved collection. Until the anticipated reauthorization of the Higher Education Act and any resulting changes to the implementing regulations, the existing paperwork collection is simply extended, rather than revised. Requests for copies of the proposed information collection request may be accessed from http://edicsweb.ed.gov, by selecting the ''Browse Pending Collections'' link and by clicking on link number 2853. When you access the information collection, click on ''Download Attachments'' to view.

367

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

247 247 Federal Register / Vol. 61, No. 138 / Wednesday, July 17, 1996 / Notices by the Secretary of Commerce. The purpose of this meeting is to review the 1996 Award applications and to select applications to be considered in the site visit stage of the evaluation. The applications under review contain trade secrets and proprietary commercial information submitted to the Government in confidence. DATES: The meeting will convene August 7, 1996, at 8:00 a.m. and adjourn at 5:00 p.m. on August 7, 1996. The entire meeting will be closed. ADDRESS: The meeting will be held at the National Institute of Standards and Technology, Administration Building, Gaithersburg, Maryland 20899. FOR FURTHER INFORMATION CONTACT: Dr. Harry Hertz, Director for Quality Programs, National Institute of

368

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

369

Personnel Security  

Directives, Delegations, and Requirements

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

370

PSH-11-0036 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0036 - In the Matter of Personnel Security Hearing 1-0036 - In the Matter of Personnel Security Hearing PSH-11-0036 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held an access authorization for several years. DOE Exhibit (Ex.) 6 at 1. Pursuant to an investigation, it was discovered that the Individual, for a second period of time, had not filed state or federal tax returns. Ex. 4 at 1-2. This discovery prompted the Local Security Office (LSO) to conduct a Personnel Security Interview (PSI) with the Individual in October 2011. Ex. 5. After conducting the October 2011 PSI with the Individual, the LSO informed the Individual in a November 2011 notification letter (Notification Letter) that derogatory information existed that raised security concerns under 10

371

PSH-11-0039 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0039 - In the Matter of Personnel Security Hearing 1-0039 - In the Matter of Personnel Security Hearing PSH-11-0039 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. On September 8, 2011, the individual notified the DOE that the Internal Revenue Service (IRS) began garnishing his wages in August 2011, due to his failure to file a 2006 federal tax return. Exhibit 7. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on September 28, 2011. Exhibit 7. After the PSI, the LSO determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth the DOE's security concerns and the reasons for

372

Renewable-Based Energy Secure Communities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities U.S. Department of Energy (DOE) Community Renewable Energy Deployment (CommRE) projects receive financial assistance and support from numerous federal and state agencies and partnering organizations. The University of California at Davis CommRE project is not only being funded by DOE, but also by the California Energy Commission's (CEC) Renewable-Based Energy Secure Communities (RESCO) program. Below are summaries of select RESCO projects and links to additional information. About Renewable-Based Energy Secure Communities RESCO projects are funded by the CEC's Public Interest Energy Research (PIER) Program, which supports public interest energy research, development, and demonstration. The goal of RESCO is to develop and

373

INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment  

SciTech Connect

The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

None

2009-05-01T23:59:59.000Z

374

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

375

Reliability and the Federal Energy Regulatory Commission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and the Federal Reliability and the Federal and the Federal Reliability and the Federal Energy Regulatory Energy Regulatory Commission Commission Michael Peters Michael Peters Energy Infrastructure & Cyber Security Advisor Energy Infrastructure & Cyber Security Advisor Federal Energy Regulatory Commission Federal Energy Regulatory Commission 202 202 - - 502 502 - - 8461 8461 Michael.Peters@FERC.GOV Michael.Peters@FERC.GOV The views expressed in this The views expressed in this presentation do not represent the presentation do not represent the views of the Federal Energy views of the Federal Energy Regulatory Commission or the United Regulatory Commission or the United States. States. These views are the personal opinion These views are the personal opinion of Mike Peters!!!! of Mike Peters!!!! ☺ ☺ ☺ ☺ ☺ ☺

376

Office of Security Policy  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

377

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network (OSTI)

361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not reflect the Administration's 2003 policy proposals. Program and Financing (in millions of dollars

378

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

379

March 2012 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Mar 23, 2012 Y-12 Site Office Recognized For Contributions To Combined Federal Campaign OAK RIDGE, Tenn. -- Employees of the National Nuclear Security Administration's Y-12 Site...

380

Energy Security Planning for Sustainable Buildings  

Energy.gov (U.S. Department of Energy (DOE))

For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Critical Mission Support Through Energy Security  

Energy.gov (U.S. Department of Energy (DOE))

Presentation covers the critical mission support through energy security and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Rapid City, South Dakota.

382

Formal specification of role-based security policies for clinical information systems  

Science Journals Connector (OSTI)

Many healthcare organizations have transited from their old and disparate business models based on ink and paper to a new, consolidated ones based on electronic patient records. There are significant demands on secure mechanisms for collaboration and ... Keywords: LTL, authorisation constraints, healthcare environments

Karsten Sohr; Michael Drouineaud; Gail-Joon Ahn

2005-03-01T23:59:59.000Z

383

Request for Investigation or Inspection of Safety or Classified Information Security Violations  

Energy.gov (U.S. Department of Energy (DOE))

Form allows for any DOE contractor employee or employee representative to submit a request to the Department of Energys Office of Enforcement, within the Office of Health, Safety, and Security, to initiate an enforcement investigation or inspection into a potential violation of DOE regulatory requirements.

384

TSO-1108 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1108 - In the Matter of Personnel Security Hearing TSO-1108 - In the Matter of Personnel Security Hearing TSO-1108 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and held an access authorization until it was recently suspended. During a routine reinvestigation of the individual, he informed an Office of Personnel Management (OPM) investigator on February 16, 2011, that he had not filed federal or state income tax returns for several years. Exhibit 6 at 13. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on June 23, 2011. Exhibit 9. The LSO ultimately determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth

385

Federal Presence in Newfoundland and  

E-Print Network (OSTI)

with the national levels Primary reliance on Statistics Canada data Objective: to inform the debate #12;II Employment Federal Government employment Overall Military Executives Federal Government Business Enterprises employment #12;Figure 7 Federal Government Employment Newfoundland and Labrador, 1981-2005 0 2

deYoung, Brad

386

Bob Osborn selected as 2012 Federal 100 Award winner | National Nuclear  

National Nuclear Security Administration (NNSA)

Bob Osborn selected as 2012 Federal 100 Award winner | National Nuclear Bob Osborn selected as 2012 Federal 100 Award winner | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Bob Osborn selected as 2012 Federal 100 ... Bob Osborn selected as 2012 Federal 100 Award winner Posted By Office of Public Affairs Bob Osborn Bob Osborn, NNSA Associate Administrator for Information

387

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07 07 Federal Register / Vol. 69, No. 146 / Friday, July 30, 2004 / Notices assessment; and (f) environmental statistics. Process and Deadline for Submitting Nominations Any interested person or organization may nominate individuals qualified in the areas of expertise described above to serve on the Subcommittee. Nominations should be submitted in electronic format through the Form for Nominating Individuals to Panels of the EPA Science Advisory Board provided on the SAB Web site, http:// www.epa.gov/sab. The form can be accessed through a link on the blue navigational bar on the SAB Web site, http://www.epa.gov/sab. To be considered, all nominations must include the information required on that form. Anyone who is unable to submit nominations using this form, and any

388

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 9 Federal Register / Vol. 61, No. 17 / Thursday, January 25, 1996 / Notices Department of Energy Organization Act (Public Law 95-91), and rules and regulations issued in implementation of those Acts. Further information regarding this Advisory Board may be obtained from Rachel Murphy Samuel at (202) 586- 3279. Issued in Washington, DC, on January 18, 1996. JoAnne Whitman, Deputy Advisory Committee Management Officer. [FR Doc. 96-1197 Filed 1-24-96; 8:45 am] BILLING CODE 6450-01-P Alternative Strategies for the Long- Term Management and Use of Depleted Uranium Hexafluoride AGENCY: Department of Energy ACTION: Notice of Intent (NOI). SUMMARY: The Department of Energy (DOE) announces its intent to prepare a programmatic environmental impact statement (PEIS) pursuant to the National Environmental Policy Act

389

Payment Card Data Security Alert All University departments that process, store or transmit credit card information  

E-Print Network (OSTI)

the University into compliance with these standards, Information Technologies has partnered with Internal Audit temporarily moved from Smith Hall due to HVAC enovations. For information about temporary locations

Firestone, Jeremy

390

Fact Sheets | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Fact Sheets | National Nuclear Security Administration Fact Sheets | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Fact Sheets Home > Media Room > Fact Sheets Fact Sheets Find out more information about key NNSA programs, initiatives and accomplishments. Fact Sheet Nov 13, 2013 Highly Enriched Uranium Transparency Program

391

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

392

Y-12 Site Office Recognized For Contributions To Combined Federal...  

National Nuclear Security Administration (NNSA)

To ... Y-12 Site Office Recognized For Contributions To Combined Federal Campaign OAK RIDGE, Tenn. -- Employees of the National Nuclear Security Administration's Y-12 Site...

393

Sandia National Laboratories: EC, DHS's S&T Directorate, Federal...  

NLE Websites -- All DOE Office Websites (Extended Search)

provides this coupling ability. Funding from the Department of Homeland Security's (DHS) Science and Technology Directorate and the Federal Emergency Management Agency's (FEMA)...

394

DOE Encourages Utility Sector Nominations to the Federal Communication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Utility Sector Nominations to the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council March 29, 2011 - 5:22pm Addthis...

395

Transcript: NUIT Information Security News Podcast, December 21, Hello, I'm Roger Safian. Today is Wednesday, December 21, and you're listening to the  

E-Print Network (OSTI)

. Today is Wednesday, December 21, and you're listening to the Information Security News podcast, brought with personally- enabled Internet devices, and there's a lot of good information in this article. Now some a public Wi-Fi network, you know, you go over to the Starbucks and you fire up your device and you read it

Shahriar, Selim

396

Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)  

E-Print Network (OSTI)

1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS:20-10:00 Keynote: Safeguarding Patient Information: Real Life Experience Darren Dworkin Senior Vice President, Center for Devices and Radiological Health, Food and Drug Administration 2:15-3:00 Panel: Safeguarding

397

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

398

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

399

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

400

EO 12114: Environmental Effects Abroad of Major Federal Actions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

114-Environmental Effects Abroad of Major Federal Actions 114-Environmental Effects Abroad of Major Federal Actions SOURCE: The provisions of Executive Order 12114 of January 4, 1979, appear at 44 FR 1957, 3 CFR, 1979, Comp., p. 356, unless otherwise noted. By virtue of the authority vested in me by the Constitution and the laws of the United States, and as President of the United States, in order to further environmental objectives consistent with the foreign policy and national security policy of the United States, it is ordered as follows: Section 1. 1-1. Purpose and Scope. The purpose of this Executive Order is to enable responsible officials of Federal Agencies having ultimate responsibility for authorizing and approving actions encompassed by this Order to be informed of pertinent environmental considerations and to take

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers  

E-Print Network (OSTI)

The importance of safeguarding information created and shared on computers and the Internet has increased significantly in recent years, as society has become increasingly dependent on information technology in government, ...

Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

2010-01-01T23:59:59.000Z

402

TSO-1006 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1006 - In the Matter of Personnel Security Hearing TSO-1006 - In the Matter of Personnel Security Hearing TSO-1006 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and holds a DOE access authorization, now in suspension. He provided inconsistent information on four separate occasions to the Local Security Office (LSO) concerning his diagnosis and treatment for mental health issues: in his responses to two Questionnaires for National Security Positions (QNSPs) in 2003 and 2009, during a background investigation interview conducted by the Federal Bureau of Investigation (FBI) in 2006, and during a Personnel Security Interview (PSI) in 2010. The LSO could not resolve these discrepancies to its satisfaction, so it referred the individual to a DOE

403

HIPAA Procedure 5111 PR.2 Protected Health Information: Physical Security & Environmental Supports  

E-Print Network (OSTI)

safeguards ...................................................................................................................1 Environmental Safeguards physical safeguards such that: departmental protected health information (ePHI & PHI in all formats

404

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

405

Personnel Security  

Directives, Delegations, and Requirements

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

406

Utility Security & Resiliency: Working Together  

Energy.gov (U.S. Department of Energy (DOE))

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

407

Cyber Security Architecture Guidelines  

Directives, Delegations, and Requirements

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

408

Federal Energy Management Program: Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services to Services to someone by E-mail Share Federal Energy Management Program: Services on Facebook Tweet about Federal Energy Management Program: Services on Twitter Bookmark Federal Energy Management Program: Services on Google Bookmark Federal Energy Management Program: Services on Delicious Rank Federal Energy Management Program: Services on Digg Find More places to share Federal Energy Management Program: Services on AddThis.com... Project Assistance Training Outreach Services The Federal Energy Management Program (FEMP) offers specialized services through: Technical and Project Assistance: Find resources for technical assistance and information about FEMP calls for projects. Training: Look up FEMP-produced live and on-demand courses, workshops, and webinars. Outreach: Get information about awards and campaigns that motivate energy-

409

Sustainable Federal Fleets | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Fleets Federal Fleets Sustainable Federal Fleets October 8, 2013 - 10:16am Addthis FEMP's Sustainable Federal Fleets website provides guidance and assistance to help implement Federal legislative and regulatory requirements mandating reduced petroleum consumption and increased alternative fuel use. FEMP's efforts include assisting agencies with implementing and managing energy-efficient and alternative fuel vehicles and facilitating a coordinated effort to reduce petroleum consumption and increase alternative fuel use annually. Content on Sustainable Federal Fleets spans Federal requirements and reporting compliance, alternative fuels and advanced vehicles, fleet performance data, analysis services, information resources, and FEMP contacts. Graphic of a button that reads Visit FEMP's Sustainable Federal Fleets Website.

410

Federal Energy Management Program: Federal Correctional Institution -  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Federal Correctional Institution - Phoenix, Arizona to someone by E-mail Share Federal Energy Management Program: Federal Correctional Institution - Phoenix, Arizona on Facebook Tweet about Federal Energy Management Program: Federal Correctional Institution - Phoenix, Arizona on Twitter Bookmark Federal Energy Management Program: Federal Correctional Institution - Phoenix, Arizona on Google Bookmark Federal Energy Management Program: Federal Correctional Institution - Phoenix, Arizona on Delicious Rank Federal Energy Management Program: Federal Correctional Institution - Phoenix, Arizona on Digg Find More places to share Federal Energy Management Program: Federal Correctional Institution - Phoenix, Arizona on AddThis.com... Energy-Efficient Products Technology Deployment

411

Federal Energy Management Program: Sustainable Federal Fleets  

NLE Websites -- All DOE Office Websites (Extended Search)

Sustainable Sustainable Federal Fleets to someone by E-mail Share Federal Energy Management Program: Sustainable Federal Fleets on Facebook Tweet about Federal Energy Management Program: Sustainable Federal Fleets on Twitter Bookmark Federal Energy Management Program: Sustainable Federal Fleets on Google Bookmark Federal Energy Management Program: Sustainable Federal Fleets on Delicious Rank Federal Energy Management Program: Sustainable Federal Fleets on Digg Find More places to share Federal Energy Management Program: Sustainable Federal Fleets on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases Water Efficiency Data Center Energy Efficiency Industrial Facilities Sustainable Federal Fleets Laboratories for the 21st Century Institutional Change

412

Deployment of EVs in the Federal Fleet  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electric Vehicles 101 Electric Vehicles 101 eere.energy.gov The Parker Ranch installation in Hawaii Deployment of EVs in the Federal Fleet FUPWG Rapid City, South Dakota October 20 th , 2010 Amanda Sahl Federal Energy Management Program 2 | Electric Vehicles 101 eere.energy.gov FEMP facilitates the Federal Government"s implementation of sound, cost-effective energy management and investment practices to enhance the nation"s energy security and environmental stewardship. 3 | Electric Vehicles 101 eere.energy.gov Agenda * Overview of the Federal Fleet * Infrastructure Requirements * Current implementation and activity * Ongoing barriers and questions 4 | Electric Vehicles 101 eere.energy.gov Federal Fleet Inventory

413

Federal Correctional Institution- Phoenix, Arizona  

Energy.gov (U.S. Department of Energy (DOE))

A parabolic-trough solar water-heating system was installed at the Federal Correctional Institution (FCI) facility north of Phoenix, Arizona. This medium security prison for males has a current population of about 1,200 inmates and uses an average of 50,000 gallons of hot water per day for kitchen, shower, laundry, and sanitation needs.

414

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

415

Federal Register  

NLE Websites -- All DOE Office Websites (Extended Search)

151 151 Rules and Regulations Federal Register Vol. 60, No. 203 Friday, October 20, 1995 This section of the FEDERAL REGISTER contains regulatory documents having general applicability and legal effect, most of which are keyed to and codified in the Code of Federal IRegulations, which is published under 50 titles pursuant to 44 U.S.C. 1610. The Code of Federal Regulations is sold by the Superintendent of Documents. Prices of new books are listed in the first FEDERAL REGISTER issue of each week. DEPARTMENT OF ENERGY Western Area Power Administration 10 CFR Part 905 Energy Planning and Management Program AGENCY: Western Area Power Administration, DOE. A cmoN: Final rule. summARv: The Western Area Power Administration is publishing this final rule to adopt an Energy Planning and

416

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

417

Transcript: NUIT Information Security News Podcast, November 23, Hello, I'm Roger Safian. Today is Wednesday, November 23, and you're listening to the  

E-Print Network (OSTI)

. Today is Wednesday, November 23, and you're listening to the Information Security News podcast, brought devices, you know, devices that you can lose and stuff like that. That, I think, even adds to the risk. He Thanksgiving! Thanks for listening! If you have any comments or suggestions, please feel free to send them to r

Shahriar, Selim

418

Transcript: NUIT Information Security News Podcast, September 29, Hello, I'm Roger Safian. Today is Thursday, September 29, and you're listening to the  

E-Print Network (OSTI)

. Today is Thursday, September 29, and you're listening to the Information Security News podcast, brought issues are probably more concerning is if you've got a device like your computer, maybe even a smartphone, they should be making sure that these devices, especially devices that t

Shahriar, Selim

419

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

420

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Alternative Fuels Data Center: Key Federal Legislation  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Key Federal Key Federal Legislation to someone by E-mail Share Alternative Fuels Data Center: Key Federal Legislation on Facebook Tweet about Alternative Fuels Data Center: Key Federal Legislation on Twitter Bookmark Alternative Fuels Data Center: Key Federal Legislation on Google Bookmark Alternative Fuels Data Center: Key Federal Legislation on Delicious Rank Alternative Fuels Data Center: Key Federal Legislation on Digg Find More places to share Alternative Fuels Data Center: Key Federal Legislation on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Key Federal Legislation The information below includes a brief chronology and summaries of key federal legislation related to alternative fuels and vehicles, air quality,

422

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

423

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

424

Compensation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Compensation | National Nuclear Security Administration Compensation | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Compensation Home > Federal Employment > Working at NNSA > Compensation Compensation Whether you're a new college graduate, someone with industry experience looking to move into a Federal job or a current government employee looking

425

Chapter_17_Headquarters_Security_Officer_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 Headquarters Security Officer Program This chapter implements the requirements of HQ Order 472.1, Headquarters Security Officer Program. The goal of the HSO Program is to have a knowledgeable security person within each HQ element to answer common security questions, process security documentation on behalf of the element's personnel, arrange for security services provided by HS-90, and serve as the element's security point of contact. In summary, HQ Order 472.1 requires each Head of Element at HQ to appoint a Federal employee as his/her HSO and at least one Federal employee as his/her Alternate HSO. The Head of Element may also appoint any number of contractors to the position of HSO Representative. HSOs and Alternate HSOs must be Federal employees because they commit the government to

426

March 6, 2012, 1Q FY2012 Quarterly Report on Federal Technical Capability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 6, 2012 MEMORANDUM FOR DISTRIBUTION FROM: KAREN L. BOARDMAN DIRECTOR NATIONAL TRAINING CENTER OFFICE OF HEALTH, SAFETY AND SECURITY SUBJECT: Quarterly Report on Federal Technical Capability This Quarterly Report on the Federal Technical Capability Program (FTCP) contains information on the status of qualifications in the Technical Qualification Program (TQP) and technical skill gaps, as of December 31, 2011. Attachment 1 provides the Status of Qualifications in the TQP. The Department of Energy's (DOE) goal is to exceed 80% "fully qualified or on schedule for qualification" for all personnel in the TQP. Currently, this overall DOE TQP qualification rate is 93%. In addition, 77% of all

427

This extended abstract appeared in Proceedings of the 2006 ACM Symposium on Information, computer and communications security (AsiaCCS '06)  

E-Print Network (OSTI)

, however, have resulted in site security policy changes. Many sites are changing their security policies

Abdalla, Michel Ferreira

428

Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order with ROTC 1, Revision No. 0  

SciTech Connect

Many Federal Facility Agreement and Consent Order (FFACO) Use Restrictions (URs) have been established at various corrective action sites (CASs) as part of FFACO corrective actions (FFACO, 1996; as amended January 2007). Since the signing of the FFACO in 1996, practices and procedures relating to the implementation of risk-based corrective action (RBCA) have evolved. This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: 1. Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria 2. Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria. 3. Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria.

Lynn Kidman

2008-02-01T23:59:59.000Z

429

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

430

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

431

FEMP (Federal Energy Management Program) Update, Spring 1989  

SciTech Connect

The FEMP Update, published quarterly by the Federal Energy Management Program (FEMP), provides information that will assist federal managers in their energy management responsibilities. The Update is distributed primarily to federal facility and energy management personnel.

Not Available

1989-04-01T23:59:59.000Z

432

DOE Encourages Utility Sector Nominations to the Federal Communications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Federal the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council DOE Encourages Utility Sector Nominations to the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council March 29, 2011 - 5:22pm Addthis Because of the role communications technologies will play in the evolution toward a smarter national grid, DOE recommended in its October 2010 report, The Communications Requirements of Smart Grid Technologies, that members of the utility sector become more engaged in the federal advisory committees that consider key policy issues related to the Smart Grid, including the reliability of communications networks. Last week, the Federal Communications Commission announced that it is seeking nominations

433

Sample Contract Language for Information Technology Using Energy-Efficient Products  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INFORMATION TECHNOLOGY USING ENERGY- INFORMATION TECHNOLOGY USING ENERGY- EFFICIENT PRODUCTS Section C - Performance Work Statement/Descriptions, Specifications The Contractor shall comply with Sections 524 and Sections 525 of the Energy Independence and Security Act of 2007; Section 104 of the Energy Policy Act of 2005; Executive Order 13514, "Federal Leadership in Environmental, Energy, and Economic Performance," dated October 5, 2009; Executive Order 13423, "Strengthening Federal Environmental, Energy, and Transportation Management," dated

434

Sample Contract Language for Information Technology Using Energy-Efficient Products  

NLE Websites -- All DOE Office Websites (Extended Search)

INFORMATION TECHNOLOGY USING ENERGY- INFORMATION TECHNOLOGY USING ENERGY- EFFICIENT PRODUCTS Section C - Performance Work Statement/Descriptions, Specifications The Contractor shall comply with Sections 524 and Sections 525 of the Energy Independence and Security Act of 2007; Section 104 of the Energy Policy Act of 2005; Executive Order 13514, "Federal Leadership in Environmental, Energy, and Economic Performance," dated October 5, 2009; Executive Order 13423, "Strengthening Federal Environmental, Energy, and Transportation Management," dated

435

Federal, State, and Local Coordination | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal, State, and Local Coordination Federal, State, and Local Coordination Federal, State, and Local Coordination ISER's success in supporting the national security mission relies heavily upon the ability to partner and coordinate with numerous Federal, State, local and tribal government agencies and organizations, domestic and international private and public energy sectors, other DOE offices, and DOE National Laboratories. Some of these partners include: Federal Partners: White House National Security Staff (NSS), Federal Emergency Management Agency (FEMA), U.S. Army Corps of Engineers (USACE), Department of Transportation (DOT), Department of Defense (DOD), Department of Homeland Security (DHS), National Oceanic and Atmospheric Administration (NOAA), Federal Energy Regulatory Commission (FERC), U.S. Coast Guard, U.S.

436

Evaluation of the Impact of EISA Federal Project Investments  

SciTech Connect

The DOE's Federal Energy Management Program has been charged by Office of Management and Budget to conduct an evaluation on actual and verifiable energy savings and carbon emissions reductions from federal energy management investments made across the Federal government as a result of the Energy Independence and Security Act of 2007. This study presents the findings from that evaluation.

Judd, Kathleen S.; Wendel, Emily M.; Morris, Scott L.; Williamson, Jennifer L.; Halverson, Mark A.; Livingston, Olga V.; Loper, Susan A.

2012-12-31T23:59:59.000Z

437

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

438

Citizens' social media use and homeland security information policy: Some evidences from Twitter users during the 2013 North Korea nuclear test  

Science Journals Connector (OSTI)

Abstract In the era of Web 2.0, managing risk communication on social networking sites has increasingly become crucial and complicated issues in the field of homeland security. The response to the 2013 nuclear test in North Korea was largely based on a coordinated effort by Korea's Ministry of Defense, the United Nations, and many countries from around the globe. By analyzing risk communication networks emerged from Twitter users for the period from January 30 to February 24, 2013, this study investigates the way in which citizens' risk communication is formulated through social media and how they transmit risk information in homeland security. Analysis results show the dynamic evolution of risk communication networks based on influential actors with critical information who played pivotal roles in distributing this information to other actors.

Kyujin Jung; Han Woo Park

2014-01-01T23:59:59.000Z

439

Public Reading Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reading Facilities | National Nuclear Security Administration Reading Facilities | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Public Reading Facilities Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) > Public Reading Facilities Public Reading Facilities The FOIA and E-FOIA require that specific types of records as well as

440

Privacy Act Statement | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Statement | National Nuclear Security Administration Statement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Statement Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Statement Privacy Act Statement Agency forms used to collect personal information protected by the Act must

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Annual Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Annual Reports | National Nuclear Security Administration Annual Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Annual Reports Home > Our Mission > Powering the Nuclear Navy > Annual Reports Annual Reports NNSA's Naval Reactors is committed to providing information about its operations. Environmental Monitoring Report NT-12-1 - May 2012 - ENVIRONMENTAL MONITORING AND DISPOSAL OF

442

Federal Energy Management Program: Laws and Regulations  

NLE Websites -- All DOE Office Websites (Extended Search)

Laws and Laws and Regulations to someone by E-mail Share Federal Energy Management Program: Laws and Regulations on Facebook Tweet about Federal Energy Management Program: Laws and Regulations on Twitter Bookmark Federal Energy Management Program: Laws and Regulations on Google Bookmark Federal Energy Management Program: Laws and Regulations on Delicious Rank Federal Energy Management Program: Laws and Regulations on Digg Find More places to share Federal Energy Management Program: Laws and Regulations on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Laws and Regulations EISA 432 Compliance Tracking Track Federal agency progress toward Section 432 of the Energy Independence and Security Act (EISA) of 2007 using FEMP's EISA 432 Compliance Tracking

443

Federal Energy Management Program: Laws & Regulations  

NLE Websites -- All DOE Office Websites (Extended Search)

Laws and Regulations Laws and Regulations EISA 432 Compliance Tracking Track Federal agency progress toward Section 432 of the Energy Independence and Security Act (EISA) of 2007 using FEMP's EISA 432 Compliance Tracking System. Federal laws and regulations set multiple energy management requirements for Federal agencies spanning energy efficiency, renewable energy, water conservation, and alternative fuel use. This section outlines Federal energy management authorities through: Requirements by Subject: Find regulatory requirements and related guidance by topic area. Requirements by Regulation: Take an in-depth look at individual laws and regulations. The Federal Energy Management Program (FEMP) analyzes energy management authorities and develops rules and guidance to help Federal agencies comply with applicable requirements. Reporting requirements and Federal Government performance reports are also available through:

444

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

445

2015 DOE Safety and Security Enforcement Workshop - Badging and...  

Office of Environmental Management (EM)

2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information 2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information January...

446

Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking  

E-Print Network (OSTI)

Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

Vahlenkamp, Matthias Whlisch Thomas C Schmidt Markus

2012-01-01T23:59:59.000Z

447

Office of Information Resources  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Bureau of Investigations Billing System Federal Bureau of Investigations Billing System Bureau: Department of Energy Project Unique ID: 01 9-10-01 -22-02-3028-00 Date: 02/08/2008 A. CONTACT INFORMATION 1) Who is the person completing this document? Joanne Csordas (HS-1.21), Office of Business Operations, Office of Resource Management, Office of Health, Safety and Security, U.S. Department of Energy, HS-1.21, 1000 Independence Avenue, SW, Washington D.C. 20585, (301) 903-3573 2) Who is the system owner? Joanne Csordas (HS-1.21), Office of Business Operations, Office of Resource Management, Office of Health, Safety and Security, U.S. Department of Energy, HS-1.21, 1000 Independence Avenue, SW, Washington D.C. 20585, (301) 903-3573 3) Who is the system manager for this system or application?

448

Securities Law Issues Relating to Community Solar Projects  

Energy.gov (U.S. Department of Energy (DOE))

The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

449

Independent Oversight Review, Nevada National Security Site, December 2013  

Energy.gov (U.S. Department of Energy (DOE))

Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site

450

Access control models and security labelling  

Science Journals Connector (OSTI)

Security labels convey information that is utilised to perform access control decisions, specify protective measures, and aid in the determination of additional handling restrictions required by security policies. In discussing security labelling, one ... Keywords: access control, assurance, dynamic labelling model, open system, security label, security policy

Chuchang Liu; Angela Billard; Maris Ozols; Nikifor Jeremic

2007-01-01T23:59:59.000Z

451

Federal Energy Management Program: Federal Facility Annual Energy Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Annual Energy Reports and Performance Annual Energy Reports and Performance Published Annual Reports Visit the FEMP Library to search for read FEMP Annual Reports to Congress on Federal Government Energy Management. For more information, contact Chris Tremper. The Federal Energy Management Program (FEMP) offers information and data sets illustrating Federal agencies' annual progress in meeting facility energy goals. Additional detail about each agency's performance can be found in their Strategic Sustainability Performance Plans on the Performance.Gov website. Federal Facility Efficiency Investment and Progress toward Sustainability Goals: Get an overview of Federal progress made in facility energy management and sustainability based on preliminary fiscal year (FY) 2012 reported findings. (For facility-level data reported under Section 432 of EISA, see EISA CTS Reports and Data.)

452

Notice of Intent to Develop an Information Sharing and Safeguarding Program Notice  

Directives, Delegations, and Requirements

This memorandum provides justification for establishing a Directive that sets forth requirements and responsibilities for the Department of Energy's (DOE) Information Sharing and Safeguarding (ISS) Program for the responsible sharing and safeguarding of Agency information to enhance national security, protect the safety of the American people, and encourage sustained collaboration between Federal, state, local, tribal, territorial, private sector, and foreign partners,

2014-08-07T23:59:59.000Z

453

Strengthening Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Jan. 24 Jan. 24 / Administration of George W. Bush, 2007 Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management January 24, 2007 By the authority vested in me as President by the Constitution and the laws of the United States of America, and to strengthen the environmental, energy, and transpor- tation management of Federal agencies, it is hereby ordered as follows: Section 1. Policy. It is the policy of the United States that Federal agencies conduct their environmental, transportation, and en- ergy-related activities under the law in sup- port of their respective missions in an envi- ronmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner. Sec. 2. Goals for Agencies. In imple-

454

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44 44 Federal Register / Vol. 61, No. 114 / Wednesday, June 12, 1996 / Notices will be issued this fall in accordance with the reallocation procedures contained in the Higher Education Act of 1965, as amended (HEA). Under section 442(e) of the HEA, unexpended FWS funds returned to the Secretary must be reallocated to eligible institutions that used at least 10 percent of the total FWS Federal funds granted to the institution to compensate students employed in community services. Because reallocated FWS funds will be distributed on the basis of fair share shortfall criteria, institutions must also have a fair share shortfall to receive these funds. Institutions must use all the reallocated FWS Federal funds to compensate students employed in community services. To ensure

455

Department of Energy Proposed Agency Information Collection: Federal Register Notice Volume 75, No. 140- Jul. 22, 2010  

Energy.gov (U.S. Department of Energy (DOE))

Department of Energy proposed Agency Information Collection: The Department of Energy (DOE) invites public comment on DOEs request to the Office of Management and Budget (OMB) to extend for three...

456

Information retrieval system: impacts of water-level changes on uses of federal storage reservoirs of the Columbia River.  

SciTech Connect

A project undertaken to provide the Bonneville Power Administration (BPA) with information needed to conduct environmental assessments and meet requirements of the National Environmental Policy Act (NEPA) and the Pacific Northwest Electric Power Planning and Conservation Act (Regional Act) is described. Access to information on environmental effects would help BPA fulfill its responsibilities to coordinate power generation on the Columbia River system, protect uses of the river system (e.g., irrigation, recreation, navigation), and enhance fish and wildlife production. Staff members at BPA identified the need to compile and index information resources that would help answer environmental impact questions. A computer retrieval system that would provide ready access to the information was envisioned. This project was supported by BPA to provide an initial step toward a compilation of environmental impact information. Scientists at Pacific Northwest Laboratory (PNL) identified, gathered, and evaluated information related to environmental effects of water level on uses of five study reservoirs and developed and implemented and environmental data retrieval system, which provides for automated storage and retrieval of annotated citations to published and unpublished information. The data retrieval system is operating on BPA's computer facility and includes the reservoir water-level environmental data. This project was divided into several tasks, some of which were conducted simultaneously to meet project deadlines. The tasks were to identify uses of the five study reservoirs, compile and evaluate reservoir information, develop a data entry and retrieval system, identify and analyze research needs, and document the data retrieval system and train users. Additional details of the project are described in several appendixes.

Fickeisen, D.H.; Cowley, P.J.; Neitzel, D.A.; Simmons, M.A.

1982-09-01T23:59:59.000Z

457

Newsletters | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

458

Speeches | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

459

Speeches | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

460

Social Security and Medicare Tax Liability An exemption from social security and Medicare taxes applies  

E-Print Network (OSTI)

. Such persons are exempt from social security and Medicare taxes as long as they remain nonresident aliens for tax purposes. Those who become resident aliens must start paying social security and Medicare taxes resident aliens. If so, they must pay social security and Medicare taxes. Federal tax regulations state

Chen, Tsuhan

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

What Are the Other Uses of NMMSS? | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Are the Other Uses of NMMSS? | National Nuclear Security Are the Other Uses of NMMSS? | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog What Are the Other Uses of NMMSS? Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Frequently Asked Questions > What Are the Other Uses of NMMSS?

462

Nature of Transactions (TI) Code | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nature of Transactions (TI) Code | National Nuclear Security Administration Nature of Transactions (TI) Code | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nature of Transactions (TI) Code Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Code Tables > Nature of Transactions (TI) Code

463

What is the History of the NMMSS? | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History of the NMMSS? | National Nuclear Security History of the NMMSS? | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog What is the History of the NMMSS? Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Frequently Asked Questions > What is the History of the NMMSS?

464

A Database Management System for the Federal Courts  

E-Print Network (OSTI)

A Database Management System for the Federal Courts JACK R. BUCHANAN, RICHARD D. FENNELL Federal Making Information Systems, Inc., McLean, VA 22101; R. D. Fennell, Federal Judicial Center, Washington, D and several large-scale information management systems projects have been undertaken within the Federal

Samet, Hanan

465

The Evolution of the Federal Monitoring and Assessment Center  

SciTech Connect

The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal emergency response asset whose assistance may be requested by the Department of Homeland Security (DHS), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Nuclear Regulatory Commission (NRC), and state and local agencies to respond to a nuclear or radiological incident. It is an interagency organization with representation from the Department of Energys National Nuclear Security Administration (DOE/NNSA), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Department of Health and Human Services (HHS), the Federal Bureau of Investigation (FBI), and other federal agencies. FRMAC, in its present form, was created in 1987 when the radiological support mission was assigned to the DOEs Nevada Operations Office by DOE Headquarters. The FRMAC asset, including its predecessor entities, was created, grew, and evolved to function as a response to radiological incidents. Radiological emergency response exercises showed the need for a coordinated approach to managing federal emergency monitoring and assessment activities. The mission of FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment activities during a nuclear or radiological incident within the United States in support of state,local, tribal governments, DHS, and the federal coordinating agency. Radiological emergency response professionals with the DOEs national laboratories support the Radiological Assistance Program (RAP), National Atmospheric Release Advisory Center (NARAC), the Aerial MeasuringSystem (AMS), and the Radiation Emergency Assistance Center/Training Site (REAC/TS). These teams support the FRMAC to provide: ? Atmospheric transport modeling ? Radiation monitoring ? Radiological analysis and data assessments ? Medical advice for radiation injuries In support of field operations, the FRMAC provides geographic information systems, communications, mechanical, electrical, logistics, and administrative support. The size of the FRMAC is tailored to the incident and is comprised of emergency response professionals drawn from across the federal government. State and local emergency response teams may also integrate their operations with FRMAC, but are not required to.

NSTec Aerial Measurement System

2012-07-31T23:59:59.000Z

466

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

467

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

468

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

469

federal budget | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

to support NNSA's continued Management and Budget The organization provides timely, cost-effective, and efficient administrative and financial support for NNSA headquarters...

470

Delegation as Officially Designated Federal Security Authority...  

NLE Websites -- All DOE Office Websites (Extended Search)

NA Type: Organizations' Assignment of Responsibility Delegant: David Huizenga, Senior Advisor for Environmental Management Delegate: Mark Whitney, Manager, Oak Ridge Office of...

471

Federal Authorities  

Energy.gov (U.S. Department of Energy (DOE))

ISER maintains a close partnership with the two Energy Sector Coordinating Councils (SCCs), the Electricity SCC and the Oil and Natural Gas SCC, and governmental partners through the Critical Infrastructure Protection Advisory Council (CIPAC). In addition to the Energy SSP, DOE and its security partners are required to submit an annual Critical Infrastructure and Key Resources (CI/KR) report to DHS.

472

Guidance for Electric Metering in Federal Buildings  

Energy.gov (U.S. Department of Energy (DOE))

Guidelines describe information and recommendations for meeting the requirements of the Energy Policy Act of 2005 for federal energy program managers.

473

Federal Energy Management Program Website Contact  

Energy.gov (U.S. Department of Energy (DOE))

Use this form to send us your comments, report problems, and/or ask questions about information on the Federal Energy Management Program (FEMP) website.

474

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

475

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

476

DOE Information Center  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Information Center DOE Information Center The U.S. Department of Energy (DOE) Information Center provides citizens a consolidated facility to obtain information and records related to the DOE's various programs in Oak Ridge and abroad. Employees at the DOE Information Center are available to assist with your requests and searches from 8:00 a.m. to 5:00 p.m. (EST), Monday through Friday, except for federal holidays. Requests Documents can be requested in person or by telephone, email, or fax. Reproduction Please allow DOE Information Center staff adequate time to reproduce documents. Some material requires special handling, security reviews, etc. Delivery Unless special arrangements have been made with DOE Information Center staff, documents should be picked up during normal business hours.

477

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

478

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

479

Federal Energy Management Program: Executive Order 13423  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Order Executive Order 13423 to someone by E-mail Share Federal Energy Management Program: Executive Order 13423 on Facebook Tweet about Federal Energy Management Program: Executive Order 13423 on Twitter Bookmark Federal Energy Management Program: Executive Order 13423 on Google Bookmark Federal Energy Management Program: Executive Order 13423 on Delicious Rank Federal Energy Management Program: Executive Order 13423 on Digg Find More places to share Federal Energy Management Program: Executive Order 13423 on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act Executive Order 13423 Energy Policy Act of 2005 Executive Order 13221 Energy Policy Act of 1992 Notices & Rules

480

Federal Buildings Supplemental Survey 1993  

SciTech Connect

The Energy Information Administration (EIA) of the US Department of Energy (DOE) is mandated by Congress to be the agency that collects, analyzes, and disseminates impartial, comprehensive data about energy including the volume consumed, its customers, and the purposes for which it is used. The Federal Buildings Supplemental Survey (FBSS) was conducted by EIA in conjunction with DOE`s Office of Federal Energy Management Programs (OFEMP) to gain a better understanding of how Federal buildings use energy. This report presents the data from 881 completed telephone interviews with Federal buildings in three Federal regions. These buildings were systematically selected using OFEMP`s specifications; therefore, these data do not statistically represent all Federal buildings in the country. The purpose of the FBSS was threefold: (1) to understand the characteristics of Federal buildings and their energy use; (2) to provide a baseline in these three Federal regions to measure future energy use in Federal buildings as required in EPACT; and (3) to compare building characteristics and energy use with the data collected in the CBECS.

NONE

1995-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Headquarters Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Security Operations Headquarters Security Operations Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

482

Federal and Non-federal Funding Sources | BNL Technology Commercialization  

NLE Websites -- All DOE Office Websites (Extended Search)

Sponsored Research Sponsored Research Federal Resources Non-federal Resources Federal Agencies and Resources Below are links to a range of federal agencies and resources, including direct links to specific information for seeking research grant support. Please note that the inclusion of a particular agency or program office does not mean that national laboratories are in all cases eligible to receive funding from that entity. If you have questions regarding BNL's eligibility for a particular program, please contact Alison Schwartz, (631) 344-3428. Federal Agencies Department of Agriculture (USDA) Department of Commerce (DOC) National Institute of Standards and Technology National Oceanic and Atmospheric Administration Department of Defense (DOD) Department of Education (ED) Department of Energy (DOE)

483

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

901 901 Federal Register / Vol. 69, No. 230 / Wednesday, December 1, 2004 / Notices As a result of this dispute, the SLA requested the Secretary of Education to convene a Federal arbitration panel to hear this complaint. A panel was convened, and a hearing on this matter was held on May 13, 2002. Arbitration Panel Decision The arbitration panel heard the following issue: whether the Army's alleged failure to negotiate with the SLA in good faith for the full food services and dining facility attendant services contract at Ft. Campbell, Kentucky, constituted a violation of the Act (20 U.S.C. 107 et seq.) and the implementing regulations in 34 CFR part 395. After considering the evidence presented, the majority of the panel ruled that the Act clearly covers all

484

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32 32 Federal Register / Vol. 64, No. 114 / Tuesday, June 15, 1999 / Notices that the original selection list would remain in effect. The complainant requested review of the SLA's stipulated decision by a Federal arbitration panel. The panel was convened on April 17, 1998. Arbitration Panel Decision The issue before the arbitration panel was whether the SLA's stipulated decision to make a determination concerning the continuation of the special assignment process at the time a military base became available was inconsistent with the ALJ's determination. The arbitration panel ruled that, at the time a military base contract became available, there may be a compelling reason that would benefit both the program and the complainant that would justify not assigning complainant

485

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25 25 Federal Register / Vol. 62, No. 224 / Thursday, November 20, 1997 / Notices implementation from 8:30 a.m. to 10:00 a.m. For the rest of the day, the Council will meet with representatives from the State School-to-Work Implementation Grantees in small groups to discuss and determine strategies for addressing State sustainability issues. The meeting will close with a summary of the day's meeting and a discussion of future actions. Public Participation: The meeting on Tuesday, December 2, 1997, from 8:30 a.m. to 4:30 p.m. at the Renaissance Mayflower Hotel, will be open to the public. Seats will be reserved for the media. Individuals with disabilities in need of special accommodations should contact the Designated Federal Official (DFO), listed below, at least seven (7)

486

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66 66 Federal Register / Vol. 63, No. 142 / Friday, July 24, 1998 / Notices Dated: July 16, 1998. Richard D. Wilson, Acting Assistant Administrator. [FR Doc. 98-19832 Filed 7-23-98; 8:45 am] BILLING CODE 6560-50-P ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-5494-1] Environmental Impact Statements and Regulations; Availability of EPA Comments Availability of EPA comments prepared July 6, 1998 Through July 10, 1998 pursuant to the Environmental Review Process (ERP), under Section 309 of the Clean Air Act and Section 102(2)(c) of the National Environmental Policy Act as amended. Requests for copies of EPA comments can be directed to the Office of Federal Activities AT (202) 564-5076. An explanation of the ratings assigned to draft environmental impact statements (EISs) was published

487

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 9 Federal Register / Vol. 61, No. 47 / Friday, March 8, 1996 / Notices Comment date: March 18, 1996, in accordance with Standard Paragraph E at the end of this notice. 13. Benjamin F. Montoya [Docket No. ID-2945-000] Take notice that on February 23, 1996, Benjamin F. Montoya (Applicant) tendered for filing an application under Section 305(b) of the Federal Power Act to hold the following positions: President, Chief Executive Officer and Director, Public Service Company of New Mexico, a New Mexico corporation Director, Northwest Corporation Comment date: March 15, 1996, in accordance with Standard Paragraph E at the end of this notice. 14. Montana Power Company [Docket No. TX96-6-000] Take notice that on February 26, 1996, Montana Power Company (MPC) tendered for filing an application

488

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

489

John. F. O'Leary Appointed to Lead Federal Energy Administration...  

National Nuclear Security Administration (NNSA)

John. F. O'Leary Appointed to Lead Federal Energy Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

490

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 20, 2012 June 20, 2012 PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. June 13, 2012 PSH-12-0010 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and is an applicant for DOE access authorization. In August 2010, the individual completed a Questionnaire for National Security Positions (QNSP) and was

491

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

492

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

493

Information Security Specialist  

Energy.gov (U.S. Department of Energy (DOE))

THIS POSITION IS BEING ADVERTISED CONCURRENTLY UNDER MERIT PROMOTION PROCEDURES AS ANNOUNCEMENT # DOE-HQ-EA-15-00014-MP. YOU MUST APPLY TO THE VACANCY FOR WHICH YOU WISH TO RECEIVE CONSIDERATION....

494

Energy Citations Database (ECD) - Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

495

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

496

Federal Energy Management Program: Renewable Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Photo of the Earth taken from space. Renewable energy generates clean energy, reducing greenhouse gas emissions and the Federal government's dependence on fossil fuels. More importantly, renewable energy increases energy security, creates jobs, and powers our clean energy economy. Photo of solar panels with the American flag reflected in them. FEMP helps Federal agencies increase the proportion of renewable energy in their energy mixes. FEMP does this by providing a number of services, most of which can be accessed on this website. This website helps agencies... Screenshot of the FEMP web page on Renewable Energy Federal Requirements. Meet Federal renewable energy requirements, such as the Energy Policy Act, Energy Independence and Security Act, and the latest executive orders.

497

Personnel Security Corner- PERSEC Corner  

Energy.gov (U.S. Department of Energy (DOE))

Welcome to the Departmental Personnel Security PERSEC Corner document collection. If you have not yet registered for access to this information, please complete our Registration form.

498

Secure Data Center (Fact Sheet)  

SciTech Connect

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

499

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

the potential danger associated with an item is questionable, consult the physical security contact for additional information. Illegal drugs (does not include controlled...

500

Federal Technical Capability Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Technical Capability Federal Technical Capability Program (FTCP) Home About the FTCP FTCP Topics FTCP Meetings Performance Indicator Reports Guiding Documents Qualifying Official Training Approaches FTCP Plans, Reports & Issue Papers Workforce Analysis & Staffing Site Specific Information Nuclear Executive Leadership Training General Information 2004-1 FTCP Commitments FTCP Correspondence Site Map Contact Us Quick Reference Departmental Representative to the DNFSB Facility Representative Safety System Oversight DOE Integrated Safety Management National Training Center DOE Directives Program DOE Technical Standards Program DOE Phone Book HSS Logo FTCP FTCP Topics DOE Strategic Human Capital Plan (FY 2006 - 2011) New Directions in Learning: Building a DOE University System May 4, 2007, the Deputy Secretary memorandum designating Karen Boardman the FTCP Chairperson.