National Library of Energy BETA

Sample records for federal information security

  1. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  3. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  4. AT&TSecurity Consulting Information Assurance Federal Information Security

    E-Print Network [OSTI]

    Fisher, Kathleen

    AT&TSecurity Consulting Information Assurance ­ Federal Information Security Management Act (FISMA requirements under the Federal Information Security Management Act of 2002, of general support systems the security controls for the information system. The AT&T Consulting methodology is based on National

  5. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  6. Appendix III to OMB Circular No. A-130 -Security of Federal Automated Information Resources

    E-Print Network [OSTI]

    Appendix III to OMB Circular No. A-130 - Security of Federal Automated Information Resources A automated information security programs; assigns Federal agency responsibilities for the security of automated information; and links agency automated information security programs and agency management

  7. Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20, 2013)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20 year (FY) 2013 reporting requirements for the Federal Information Security Management Act (FISMA is steadily working to improve its overall information technology (IT) security posture. Nevertheless

  8. Information Security: Coordination of Federal Cyber Security Research and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11,SecurityHomeRemarksEnergyConfigurationsEGS

  9. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE and expanded its catalog of security controls to help organizations protect their information and information, the revised catalog brings together, for the first time, comprehensive information about security controls

  10. Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13, 2014)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13) identified for this year's Federal Information Security Management Act (FISMA) review; however, the Agency Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information

  11. Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12-002, October 17, 2011)

    E-Print Network [OSTI]

    Christian, Eric

    Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12's information technology (IT) security posture. For FY 2011, we adopted a risk-based approach in which we required areas of review for FY 2011 Federal Information Security Management Act (FISMA) reporting: · Risk

  12. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  13. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  14. Meeting Federal Energy Security Requirements

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  16. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  17. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  19. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  20. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  4. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  5. Security Architecture for Federated Mobile Cloud Computing

    E-Print Network [OSTI]

    Xu, Shouhuai

    Security Architecture for Federated Mobile Cloud Computing Shouhuai Xu and E. Paul Ratazzi, federated mobile cloud computing imposes a diverse set of new chal- lenges, especially from a security clouds for security purposes? How should we deal with the tar- geted attackers that attempt to launch

  6. Federal Register Notice: National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNLNM) Federal Register Notice: National Nuclear Security Administration Site-Wide...

  7. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  8. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  9. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  10. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  11. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  14. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  15. FIPS PUB 188 Federal Information

    E-Print Network [OSTI]

    OF COMMERCE / National Institute of Standards and Technology Standard Security Label for Information Transfer Computer Systems Laboratory Abstract Information Transfer security labels convey information used with semantics provided by the authority establishing the security policy for the protection of the information

  16. Federal Information Processing Standards Publication 180-2

    E-Print Network [OSTI]

    Babinkostova, Liljana

    implementing this standard and technical data regarding them must comply with these Federal rFederal Information Processing Standards Publication 180-2 (+ Change Notice to include SHA-224) 2002 August 1 Announcing the SECURE HASH STANDARD Federal Information Processing Standards Publications

  17. Federal Information Processing Standards Publication 180-2

    E-Print Network [OSTI]

    implementing this standard and technical data regarding them must comply with these Federal regulationsFederal Information Processing Standards Publication 180-2 2002 August 1 Announcing the SECURE HASH STANDARD Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National

  18. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  19. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  20. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  1. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  2. Federated Grids and their Security Geoffrey Fox and Marlon Pierce

    E-Print Network [OSTI]

    Federated Grids and their Security Geoffrey Fox and Marlon Pierce Draft 0.4 Introduction We examine the consequences, requirements, and possible implementation issues needed to support security in federated grids that user identity in current Grid security implementations has two major shortcomings: it does not scale

  3. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  4. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  5. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  6. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  7. Performing Energy Security Assessments - A How-To Guide for Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers Guide...

  8. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  9. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    Radack, Editor Computer Security Division Information Technology Laboratory National Institute-35, Guide to Information Technology Security Ser vices, Recommendations of the National InstituteJune 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley

  10. Social Security Administration Information Phone:(706)5422900Fax:(706)5830123Web:international.uga.edu Email:issis@uga.edu

    E-Print Network [OSTI]

    Arnold, Jonathan

    Social Security Administration Information Phone:(706)5422900Fax:(706)5830123Web number. For additional information you may visit the Social Security Administration's (SSA) website Security Administration (SSA) Social Security Administration Federal Building 1650 Prince Avenue, Athens

  11. NIST Computer Security Division csrc.nist.gov Supplemental Guidance on

    E-Print Network [OSTI]

    -03, Enhancing the Security of Federal Information and Information Systems, stated that, "Our nation's security monitoring, or security authorization. Keywords Federal Information Security Management Act, Information Information For additional information on NIST's Computer Security Division programs, projects

  12. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  13. Federal Information Processing Standards Publication 197

    E-Print Network [OSTI]

    controls. Exports of cryptographic modules implementing this standard and technical data regarding themFederal Information Processing Standards Publication 197 November 26, 2001 Announcing the ADVANCED ENCRYPTION STANDARD (AES) Federal Information Processing Standards Publications (FIPS PUBS) are issued

  14. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  15. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  16. Federal Information Technology Acquisition Reform Act (FITARA...

    Energy Savers [EERE]

    Information Technology Acquisition Reform Act (FITARA) Data Resources Federal Information Technology Acquisition Reform Act (FITARA) Data Resources FITARA Resources Available for...

  17. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    is directed to develop cyber security standards, guidelines, and associated methods and techniques. ITLNISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew

  18. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful financial institutions or e-commerce organizations. On December 6, SEAS' Information Security Office held some basic security awareness information. More information on how to remain secure during the busy

  19. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  20. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  1. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  2. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  3. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  4. Combined Federal Campaign | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1 PAGE 1 OF2Guidance to the1 1Combined Federal

  5. Federal Employment | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find whatGasEnergy Technologies |Feature StoriesFederal

  6. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  7. Information Security Office Risk Management

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Information Security Office Risk Management Exception Template #12;Risk Management Exception or Approved) 6/01/2013 CISO Jason Pufahl, CISO Approved 6/01/2013 RMAC Risk Management Advisory Council Reviewed #12;Risk Management Exception Template 2 | P a g e Please check one of the following: Requester

  8. Information Security Policy Manual Latest Revision: May 16, 2012

    E-Print Network [OSTI]

    Alpay, S. Pamir

    1 Information Security Policy Manual Latest Revision: May 16, 2012 #12;2 Table of Contents Information Security Policy Manual...............................................................................................................................................17 Information Security Glossary

  9. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

  10. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all

  11. Information Security Specialist | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security Specialist Information Security Specialist Submitted by admin on Sun, 2015-09-13 00:15 Job Summary Organization Name Department Of Energy Agency SubElement...

  12. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  13. Information Technology Security for Small Business

    E-Print Network [OSTI]

    Magee, Joseph W.

    Information Technology Security for Small Business (video script) Descriptive Text for the Visually symbolic of information technology security and cyber crime. Narration: "No matter how well you protect, "Information Technology Security for Small Business" and "It's not just good business. It's essential business

  14. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, As we write the summer issue, with the hire of Indir Advagic, SEAS is launching an Office of Information Security. Besides assessing the general state of information security at SEAS, one of Indir's first tasks will be to revive the cross

  15. Secured Information Flow for Asynchronous Sequential Processes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Secured Information Flow for Asynchronous Sequential Processes Isabelle Attali, Denis Caromel for unauthorized information flows. As a final result, all authorized communication paths are secure: no disclosure a new issue in data confidentiality: authorization of secured information flow transiting (by the mean

  16. 06 DEC 2013 1 Information Security Guideline

    E-Print Network [OSTI]

    Queitsch, Christine

    06 DEC 2013 1 Information Security Guideline Definitions can be found in Administrative Policy Statement 2.4, Information Security and Privacy Roles, Responsibilities, and Definitions. 1 Purpose Administrative Policy Statement (APS) 2.6, Information Security Controls and Operational Practices, states

  17. Information Security 26:198:643:01

    E-Print Network [OSTI]

    Lin, Xiaodong

    Information Security 26:198:643:01 Spring 2012 Rutgers University M 2:30-5:20pm, 1WP-534 Panagiotis and interconnecting networks, raising demands for security measures to protect the information and relevant systems, students will learn the theoretical advancements in information security, state-of-the- art techniques

  18. Start your information security planning here!

    E-Print Network [OSTI]

    Magee, Joseph W.

    Start your information security planning here! Save the Date July 15, 2008 8:30 am ­ 12:30 pm-technology crimes. For additional information, visit http://csrc.nist.gov/secure iz/b or contact: securebiz developed a workshop to help the small business owner increase information system security. Learn how

  19. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision requirements for the protection of that information on the University. The University has had security of the University. The Information Technology Security Office has created this Incident Response Plan to assist

  20. Formalizing Information Security Knowledge Stefan Fenz

    E-Print Network [OSTI]

    Formalizing Information Security Knowledge Stefan Fenz Vienna University of Technology Vienna ontology which provides an on- tological structure for information security domain knowl- edge. Besides of the considered organization is incorporated. An evaluation conducted by an information security expert team has

  1. OFFICE of the CHIEF INFORMATION SECURITY OFFICER

    E-Print Network [OSTI]

    Matrajt, Graciela

    OFFICE of the CHIEF INFORMATION SECURITY OFFICER 2013 Information Security and Privacy Annual conversation,The Office of the Chief Information Security Officer (CISO) invites readers to email ciso@uw.edu by May 1st, 2014 with privacy-themed cap- tions for the cartoon on the right.Winning captions

  2. The Department of Energy's National Security Information Fundamental...

    Energy Savers [EERE]

    The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental...

  3. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  4. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  5. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  6. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  7. OFFICE of the CHIEF INFORMATION SECURITY OFFICER

    E-Print Network [OSTI]

    Matrajt, Graciela

    security and privacy. Services are designed to help UW units understand risks by analyzing and forecasting Chief Information Security Officer In reflecting back on all our hard work during 2012, I would like of Contents Asset-Based Risk Management

  8. GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor

    E-Print Network [OSTI]

    to improve their overall security. The Information Technology Laboratory of the National Institute-115, Technical Guide to Information Security Testing and Assessment: Recommendations of the National InstituteGUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security

  9. ITL BULLETIN FOR NOVEMBER 2012 PRACTICES FOR MANAGING SUPPLY CHAIN RISKS TO PROTECT FEDERAL INFORMATION

    E-Print Network [OSTI]

    ICT supply chain risk management (SCRM) considerations can be integrated into the #12;federal logistics, reliability, security, and safety. The specific ICT SCRM practices are directed toward federal by different system developers, suppliers, and integrators. The information and communications technology (ICT

  10. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  11. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  13. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information...

  14. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information...

  15. Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE

    E-Print Network [OSTI]

    Martin, Jeff

    Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE Demand for technical security and information assurance professionals has risen dramatically in recent years OPPORTUNITIES: TUITION: Required Courses (78 Hours): · Information Assurance and Security Level 1: Information

  16. USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY

    E-Print Network [OSTI]

    USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY Shirley about the security of information systems for the decision makers of organizations. When organizations to strengthen the overall security of their information and their information systems. Organizations

  17. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access technology security incident. A standard Universitywide approach to information security is important the Information Technology Services Office has completed its investigation and authorizes such activity. 3

  18. The Handbook of Information Security 25. Routers and Switches The Handbook of Information Security

    E-Print Network [OSTI]

    Dommel, Hans-Peter

    The Handbook of Information Security 25. Routers and Switches 1 The Handbook of Information Security John Wiley & Sons Chapter 25. Routers and Switches Mar 31, 2005 - FINAL VERSION - #12;The Handbook of Information Security 25. Routers and Switches 2 OUTLINE INTRODUCTION Principles of Routing and Switching

  19. Request for Information: Federal Government Power Purchase Agreements (PPA) Issues

    Broader source: Energy.gov [DOE]

    Document describes the request for information for federal government power purchase agreement (PPA) issues.

  20. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    E-Print Network [OSTI]

    Thaw, David Bernard

    2011-01-01

    assets. Current information security law in the Unitedimplications for information security professionalism inbeing abundant in the information security community: Yes,

  1. Securing the information infrastructure for EV charging

    E-Print Network [OSTI]

    Poll, Erik

    Securing the information infrastructure for EV charging Fabian van den Broek1 , Erik Poll1 , and B for the information exchanges in the infrastructure for EV charging being tri- alled in the Netherlands, which. Key words: EV charging, congestion management, end-to-end security, smart grids 1 Introduction

  2. CMAD IV 11/14/96 Information Security

    E-Print Network [OSTI]

    California at Davis, University of

    CMAD IV 11/14/96 Information Security and the Electric Power Industry Ab Kader Ron Skelton Electric;CMAD IV 11/14/96 EPRI Security Initiatives · Information Security Workshop ­ Utility Security Survey (MIS Training) · Information Security Applications ­ Power System Security (LANL) ­ Residential

  3. Before the Senate Homeland Security and Governmental Affairs...

    Energy Savers [EERE]

    and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland...

  4. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en NNSA sitesInformation/%2ARLUOB

  5. Information Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence of TopologicalISTI

  6. FIPS PUB 186-2 FEDERAL INFORMATION

    E-Print Network [OSTI]

    Bernstein, Daniel

    , technical guidance, and coordination of Government efforts in the development of standards and guidelinesFIPS PUB 186-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 2000 January 27 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology DIGITAL SIGNATURE STANDARD (DSS) CATEGORY: COMPUTER

  7. Order Code RL33494 Security Classified and Controlled Information

    E-Print Network [OSTI]

    Laughlin, Robert B.

    Order Code RL33494 Security Classified and Controlled Information: History, Status, and Emerging Government and Finance Division #12;Security Classified and Controlled Information: History, Status in the creation, management, and declassification of national security information followed over the succeeding

  8. University of Warwick Information Security Policy 1. Introduction

    E-Print Network [OSTI]

    Davies, Christopher

    University of Warwick Information Security Policy 1. Introduction The University recognises's strategic objectives. Information security is important to the protection of the University's reputation implications for individuals and is subject to legal obligations. The consequences of information security

  9. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Broader source: Energy.gov (indexed) [DOE]

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE More Documents & Publications PIA - INL Education Programs...

  10. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  11. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved POLICY TITLE: Information Technology Security Policy POLICY PURPOSE: The purpose of this Information Technology Security Policy is to ensure and describe the steps necessary to secure information

  12. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    o471.6AdminChg2-Certified.pdf -- PDF Document, 665 KB Writer: Carl Piechowski Subjects: Administration Information Technology Security ID: DOE O 471.6 Admin Chg 2 Type:...

  13. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision management issue for all organizations, including the University of Connecticut. Furthermore, as more or framework within which University of Connecticut incident handlers can work to ensure a complete

  14. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  15. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Walker, Lawrence R.

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsmLE OFFICE(S): ORIGINALLY ISSUED: ApPROVALS: VICE PROVOST FOR INFORMATION TECHNOLOGY OFFICE OF THE VICE PROVOST FOR INFORMATION TECHNOLOGY ApPROVED BY: ~ Date ~ts-tl2- Date li/rO/I?... I I Date REVISION DATE

  16. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery for Homeland Security Information Management and Knowledge Discovery Authors Tamara Kolda, Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  17. ISMS for Microsoft's Cloud Infrastructure 1 Information Security Management System

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    ISMS for Microsoft's Cloud Infrastructure 1 Information Security Management System for Microsoft's Cloud Infrastructure Online Services Security and Compliance Executive summary This paper describes the Microsoft Cloud Infrastructure and Operations (MCIO) Information Security Management System (ISMS) program

  18. Electronic DOE Information Security System (eDISS) PIA, Office...

    Energy Savers [EERE]

    Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and...

  19. Washington and Lee University Guidance on Information Security

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidance on Information Security This guidance addresses common issues that have come up during information security discussions with offices and departments across, Information Security Program Committee Chair (sdittman@wlu.edu) or Dean Tallman, Information Security Officer

  20. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  1. Smart Grid Information Security (IS) Functional Requirement

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01

    It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

  2. Cloud Computing Security in Business Information Systems

    E-Print Network [OSTI]

    Ristov, Sasko; Kostoska, Magdalena

    2012-01-01

    Cloud computing providers' and customers' services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analyze main international and industrial standards targeting information security and their conformity with cloud computing security challenges. We evaluate that almost all main cloud service providers (CSPs) are ISO 27001:2005 certified, at minimum. As a result, we propose an extension to the ISO 27001:2005 standard with new control objective about virtualization, to retain generic, regardless of company's type, size and nature, that is, to be applicable for cloud systems, as well, where virtualization is its baseline. We also define a quantitative metric and evaluate the importance factor of ISO 27001:2005 control objecti...

  3. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  4. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  5. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  6. ITL Bulletins are published by the Information Technology Laboratory

    E-Print Network [OSTI]

    Intrusion Detection Systems, July 2003 IT Security Metrics, August 2003 Information Technology Security Security Considerations in the Information System Development Life Cycle, December 2003 Computer Security Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems

  7. When security meets software engineering: A case of modelling secure information systems

    E-Print Network [OSTI]

    When security meets software engineering: A case of modelling secure information systems Engineering: towards the Modeling of Secure Information Systems" paper presented at the 15th International. This is mainly because private information is stored in computer systems and without security, organisations (and

  8. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

    E-Print Network [OSTI]

    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems for information systems. Traditionally, security is considered after the definition of the system. However the health sector to military. As the use of Information Systems arises, the demand to secure those systems

  9. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  10. Federal Power Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavy ElectricalsFTL Solar Jump to: navigation,InformationFederal

  11. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Office of Energy Efficiency and Renewable Energy (EERE)

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  12. Ontological Mapping of Information Security Best-Practice Guidelines

    E-Print Network [OSTI]

    Ontological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner security knowl- edge. While information security ontologies already exist, no methods have been proposed. Therefore, this paper presents a method for mapping the information security knowledge of the French EBIOS

  13. The Center for Information Systems Security Studies and

    E-Print Network [OSTI]

    The Center for Information Systems Security Studies and Research (CISR) has created the ISSE) and the Department of Homeland Security (DHS) have designated NPS as a Center of Academic Excellence in Information developments where cyber security is a concern. Information Systems Security Engineering (ISSE) Certificate

  14. Banner Job Installation Security Form Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Job Installation Security Form Office of Information Technology 424 Roy S. Nicks Hall, Box: ______________________________ Job Description: ______________________________ Section 3. Security Information Banner Module 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu Section 1. Requestor Information

  15. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS of Standards and Technology The management of risks to information technology (IT) systems is a fundamental component of every organization's information security program. An effective risk management process enables

  16. Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY

    E-Print Network [OSTI]

    Policy 3505 ­ Information Technology Security 1 OLD DOMINION UNIVERSITY University Policy Policy #3505 INFORMATION TECHNOLOGY SECURITY POLICY Responsible Oversight Executive: Vice President of this policy is to state the codes of practice with which the University aligns its information technology

  17. Physical and Information Security Policy Category: Campus Life

    E-Print Network [OSTI]

    Physical and Information Security Policy Category: Campus Life Facilities Information Management 1. The Security Office (Bentley Campus) will provide information to assist staff and students in protecting Manager. 2.7 Information security University information must be protected in a manner that is appropriate

  18. Teaching Aggressive Information Security Labs

    E-Print Network [OSTI]

    information platforms used by organizations to conduct business and share information and data. 3. I and unlawful ways. 4. I will not "hack" the NPGS domain. _______________________ Print your name and are relevant to the discussion... 8 #12;So Why Do They Hack? · Script Kiddies: ­ According to Sarah Gordon

  19. Secure Information and Resource Sharing in Cloud Institute for Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Secure Information and Resource Sharing in Cloud Yun Zhang Institute for Cyber Security Univ Institute for Cyber Security Univ of Texas at San Antonio San Antonio, TX 78249 Ravi.Sandhu@utsa.edu ABSTRACT The significant threats from information security breaches in cyber world is one of the most

  20. ESRCThe economics of information security ESRC Seminar Series

    E-Print Network [OSTI]

    Pym, David J.

    by the Economic and Social Research Council (ESRC), the Cyber Security Knowledge Transfer Network (KTNThe economics of information security Cyber Security KTN The Cyber Security Knowledge Transfer Network (KTN) under the Directorship of Nigel A Jones provides a single focal point for UK Cyber Security

  1. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  2. A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING Daria Stepanova, Simon E.K. dasha stepanova@list.ru, s.e.parkin@ncl.ac.uk, aad.vanmoorsel@ncl.ac.uk Keywords: Information security Information Security Officer (CISO) within an organisation to ensure that such information is adequately

  3. Quantum non-locality and information security Muhammad Nadeem

    E-Print Network [OSTI]

    1 Quantum non-locality and information security Muhammad Nadeem Department of Basic Sciences-locality, as discussed here, is sufficient to achieve unconditional information security without requiring advanced, integrity, authenticity and availability of information to legitimate users. These information security

  4. Page 1 of 2 Policy Name: Information Technology (IT) Security

    E-Print Network [OSTI]

    Carleton University

    Page 1 of 2 Policy Name: Information Technology (IT) Security Originating/Responsible Department Information Officer (CIO) Policy: Information Technology (IT) Security Purpose: The purpose of this Policy is to outline Carleton University's approach to campus- wide IT security for networks, enterprise information

  5. Building an Information Technology Security Awareness

    E-Print Network [OSTI]

    by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests of technical, physical, administrative, and management standards and guidelines for the cost-effective security Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899

  6. Request for Information: Federal Government Power Purchase Agreements...

    Broader source: Energy.gov (indexed) [DOE]

    request for information for federal government power purchase agreement (PPA) issues. pparfi.pdf More Documents & Publications Response Summary: Department of Energy Power...

  7. The Promotion of Access to and Protection of National Security Information in South Africa

    E-Print Network [OSTI]

    Klaaren, Jonathan E.

    2003-01-01

    broadly, a military information security policy has beenfor secrecy and therefore information security measures in asection describes the information security implementation

  8. Constructivist Approach To Information Security Awareness In The Middle East

    E-Print Network [OSTI]

    Wang, Yongge

    Constructivist Approach To Information Security Awareness In The Middle East Mohammed Boujettif the application of an approach to en- hance information security awareness amongst employees within middle- eastern companies, in effort to improve information security. We aim at surveying the current attitudes

  9. The Complexity of Synchronous Notions of Information Flow Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Complexity of Synchronous Notions of Information Flow Security Franck Cassez1, , Ron van der flow security is concerned with the ability for agents in a system to deduce information about an information flow security policy has proved to be a subtle matter. A substantial literature has developed

  10. SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS

    E-Print Network [OSTI]

    Williamson, John

    SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS Maryam Al-Awadi University This paper will explore and identify success factors related to the implementation of information security was to identify those factors required to ensure successful implementation of information security, particularly

  11. A Comprehensive and Comparative Metric for Information Security

    E-Print Network [OSTI]

    Breu, Ruth

    A Comprehensive and Comparative Metric for Information Security Steffen Weiß1 , Oliver Weissmann2 security GmbH, Germany Abstract Measurement of information security is important for organizations , Falko Dressler1* 1 Dept. of Computer Science 7, University of Erlangen, Germany 2 atsec information

  12. A Survey of Interdependent Information Security Games ARON LASZKA1

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    A A Survey of Interdependent Information Security Games ARON LASZKA1 , MARK FELEGYHAZI1 , LEVENTE by the security-related decisions of others. This interdependence between information system operators and users Information security has traditionally been considered a strategic cat-and-mouse game between the defending

  13. Information Security and Computer Systems: An Integrated Approach

    E-Print Network [OSTI]

    Holliday, Mark A.

    Information Security and Computer Systems: An Integrated Approach Mark A. Holliday Dept in information security that build upon concepts the students will already have seen in their computer systems this integrated approach to information security and computer systems. Categories and Subject Descriptors D.4

  14. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Lee, Dongwon

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  15. Secure Information Sharing and Dissemination in the Context of Public Security

    E-Print Network [OSTI]

    Secure Information Sharing and Dissemination in the Context of Public Security Professor Nabil R. Adam Director, The Center for Information Management Integration & Connectivity (CIMIC) Executive://cimic.rutgers.edu/~adam/ Abstract In the context of homeland security, one of the key challenges in such environment is achieving

  16. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access, and University policy and procedures regarding use, privacy and confidentiality of information. University data University (University) functions that are: a) stored on University information systems, b) maintained

  17. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  18. Find It. Delete It. Protect It. Information Technology Security Strategy

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Find It. Delete It. Protect It. Information Technology Security Strategy Executive Summary The general proposed strategy is to optimize risk management for information security incrementally and over that security will be a process rather than project. Achievement of the goal, optimized risk management

  19. The Promotion of Access to and Protection of National Security Information in South Africa

    E-Print Network [OSTI]

    Klaaren, Jonathan E.

    2003-01-01

    to and Protection of National Security Information in Southmost relevant to national security information have similarbeen extended. 2 The national security ground of refusal to

  20. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing Department of Energy (DOE), including National Nuclear Security Administration (NNSA), Federal workers with a safe and healthful workplace. Cancels DOE O 440.1A. Certified 6/17/2011. Canceled by DOE O 440.1B Chg 1.

  1. Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation

    SciTech Connect (OSTI)

    Feldman, David; Brockway, Anna M.; Ulrich, Elaine; Margolis, Robert

    2015-04-07

    This report provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  2. Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation

    SciTech Connect (OSTI)

    Feldman, David; Brockway, Anna M.; Ulrich, Elaine; Margolis, Robert

    2015-04-01

    This report provides a high-level overview of the current U.S. shared solar landscape and the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  3. Federal Energy Subsidies | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello Geothermal Power StationIndiana:BusinessFederal EnergyFederal

  4. The Security Plan: Effectively Teaching How To Write One

    E-Print Network [OSTI]

    government requires all federal systems to have a customized security plan. In addition, the National for National Security Systems (CNSS), formerly known as the National Security Telecommunications, Issuance No. 4011, National Training Standard for Information Systems Security (INFOSEC) Professionals

  5. Annual Security and Fire Safety Report Availability The University is required by federal law (The Jeanne Clery Disclosure of

    E-Print Network [OSTI]

    Schrag, Daniel

    Annual Security and Fire Safety Report Availability The University is required by federal law (The, Cambridge, MA 02139, (617) 496-7168. The Annual Security Report, "Playing it Safe," is available at www.hupd.harvard.edu/annual-security-report. The Annual Fire Safety Report is available at www

  6. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security STATUS: Approved POLICY of the requesting department to send pricing requests to Information Technology Services, have funds available the requesting department should coordinate with Information Technology Services to ensure dependencies

  7. Federal government information handbook: formerly utilized sites remedial action program

    SciTech Connect (OSTI)

    Not Available

    1980-12-31

    This volume is one of a series produced under contract with the DOE, by Politech Corporation to develop a legislative and regulatory data base to assist the FUSRAP management in addressing the institutional and socioeconomic issues involved in carrying out the Formerly Utilized Sites Remedial Action Program. This Information Handbook series contains information about all relevant government agencies at the Federal and state levels, the pertinent programs they administer, each affected state legislature, and current Federal and state legislative and regulatory initiatives. This volume is a compilation of information about the Federal Government. It contains a summary of the organization and responsibilities of agencies within the executive branch of the Federal government which may be relevant to FUSRAP activities; a brief summary of relevant Federal statutes and regulations; a description of the structure of the US Congress, identification of the officers, relevant committees and committee chairmen; a description of the Federal legislative process; a summary of legislation enacted and considered in the recently-adjourned 96th Congress; a description of the Federal budgetary process; a summary of the Carter Administration's comprehensive radioactive waste management program; and excerpts from the text of relevant federal statutes and regulations.

  8. OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring

    E-Print Network [OSTI]

    Calyam, Prasad

    ]. Measurement federation related standards- development efforts are on-going at Open Grid Forum (OGF), IETF IP-SC0007531 and the National Science Foundation under Award Numbers: ACI-1246001 and ACI-1245795. The views

  9. U-200: Red Hat Directory Server Information Disclosure Security...

    Broader source: Energy.gov (indexed) [DOE]

    A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat...

  10. List of Major Information Systems,National Nuclear Security Administra...

    Broader source: Energy.gov (indexed) [DOE]

    emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

  11. NISTIR 7621 Small Business Information Security

    E-Print Network [OSTI]

    . .......................................8 3.3 Security concerns about popup windows and other hacker tricks

  12. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  13. Federal Energy Administration Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello Geothermal Power StationIndiana:BusinessFederal Energy

  14. Federal Grant Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello Geothermal Power StationIndiana:BusinessFederalGrant Program

  15. Federal Loan Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello Geothermal PowerGuidelines | Open EnergyFederal Loan Program

  16. ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION AND INFORMATION SYSTEM VIEW Shirley Radack, Editor Computer Security Division Information Technology Laboratory. Managing information security risk is an essential element of the organization's overall risk management

  17. Bounds on Information and the Security of Quantum Cryptography

    E-Print Network [OSTI]

    E. Biahm; T. Mor

    1997-01-08

    Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed states, and we find bounds on the information leaked to an eavesdropper. Our result suggests that quantum cryptography is ultimately secure.

  18. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  19. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  20. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  1. Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction This document contains the information security control requirements for Dartmouth College. The Dartmouth Information Security Commitee (DISC) developed these controls based on industry best practice, using Dartmouth

  2. J. Douglas Streit, Information Security Officer Office of Computing and Communications Services

    E-Print Network [OSTI]

    J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated February 6, 2012 Old Dominion University Information Technology Security Program #12;J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated

  3. Washington and Lee University Guidelines for Responding to Information Security Breaches

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidelines for Responding to Information Security Breaches Notifications 1. As further detailed in the university's Guidelines for Reporting Information Security Breaches regarding an actual or suspected data breach should contact: i. the university's Information Security

  4. Information Technology Security Training Requirements Appendix E --Training Cross Reference E-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX E Appendix E -- Training Cross Reference E-1 #12;Information Technology Security Training Requirements Appendix E -- Training Cross Reference E-2 #12;Information Technology Security Training Requirements APPENDIX E -- JOB FUNCTION

  5. Federal Aviation Administration | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePowerEdisto Electric Coop,ErosionNewCoalFarmland ProtectionInformation

  6. Hobsons Information Security Introduction and Purpose

    E-Print Network [OSTI]

    Aickelin, Uwe

    . Among the foreseeable risks are external hacks, unauthorised access, thefts, inadvertent destruction of access by employees, students or business associates. The Data Security Coordinator, along with other

  7. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Health, Safety and Security Status: Archive Approved Date: Jun 20, 2011 CRD: Yes DNFSB: No Related History Exemptions Standards Related to: Request to Make Administrative...

  8. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Health, Safety and Security Status: Archive Approved Date: Jun 20, 2011 CRD: Yes DNFSB: No Related History Exemptions Standards Related to: Delegation of Authority - Acting...

  9. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Operations Acquisition and Project Management Major Contract Solicitation National Security Campus Management and...

  10. DyKnow Federations: Distributing and Merging Information Among UAVs

    E-Print Network [OSTI]

    Doherty, Patrick

    DyKnow Federations: Distributing and Merging Information Among UAVs Fredrik Heintz and Patrick, patdo}@ida.liu.se Abstract--As unmanned aerial vehicle (UAV) applications be- come more complex and versatile there is an increasing need to allow multiple UAVs to cooperate to solve problems which are beyond

  11. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Victoria, University of

    key privacy and security concepts specific to academic units; · Integrate the knowledge through/security questions; · External Review recommended wider education and training at the university #12;Why Are You Here principles · Proactive · Better practices #12;University's commitment Protection of Privacy Policy

  12. ISM6328 -Boca Raton Campus-Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT

    E-Print Network [OSTI]

    Richman, Fred

    ISM6328 - Boca Raton Campus- Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT FALL 2011 security. Emphasis is on the management of information security efforts as well as progression in adopting, regularity and policy aspects of Information Security Management. We will examine security management

  13. Ninth Annual Cyber and Information Security Research Conference...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ninth Annual Cyber and Information Security Research Conference Apr 08 2014 04-08-2014 08:30 AM - 04-10-2014 04:00 PM Multiple speakers, multiple disciplines, multiple affiliations...

  14. The Benefits of Student Research in Information Systems Security Education

    E-Print Network [OSTI]

    for Information Systems Security Studies and Research Code CSIc Naval Postgraduate School Monterey, CA 93943 for the younger students. For example, in fourth grade I painted some cardboard boxes to look like houses

  15. Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf

    E-Print Network [OSTI]

    Xia, Yu "Brandon"

    1 Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf it must collect, store and use Sensitive Information relating to its students, employees and individuals Information properly and securely. Reason for Policy / Implication Statement Boston University is committed

  16. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  17. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST PROCEDURE SELECTION LIST/2014 Testing based on criteria in 45 CFR Part 170, Health Information Technology: Standards, Implementation to the Permanent Certification Program for Health Information Technology; Final Rule (September 4, 2012). Complete

  18. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  19. Stay protected when connected Visit security.duke.edu for more information.

    E-Print Network [OSTI]

    McShea, Daniel W.

    Stay protected when connected Visit security.duke.edu for more information. Follow these guidelines Visit security.duke.edu for more information. Follow these tips for securing mobile devices: iOS 6/software/. Windows Mac Another free option: Microsoft Security Essentials: http://windows.microsoft.com/en- US/windows/products/security

  20. Information theoretic security by the laws of classical physics

    E-Print Network [OSTI]

    Mingesz, R; Gingl, Z; Granqvist, C G; Wen, H; Peper, F; Eubank, T; Schmera, G

    2013-01-01

    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.

  1. Mutual information, bit error rate and security in Wójcik's scheme

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-21

    In this paper the correct calculations of the mutual information of the whole transmission, the quantum bit error rate (QBER) are presented. Mistakes of the general conclusions relative to the mutual information, the quantum bit error rate (QBER) and the security in W\\'{o}jcik's paper [Phys. Rev. Lett. {\\bf 90}, 157901(2003)] have been pointed out.

  2. First Analysis Securities Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport Jump to: navigation, searchSecurities Corporation Jump

  3. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)

    E-Print Network [OSTI]

    Proceedings of the Third International Symposium on Human Aspects of Information Security the scope of remediation, is a pervasive feature of Information Technology Security Management (ITSM of Information Security & Assurance (HAISA 2009) 120 which is security incident response. We extend those results

  4. Security Forms and Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES Pursuant to the contract clauseProgramSecurity Forms and

  5. Shared Solar: Current Landscape, Market Potential, and the Impact of Federal Securities Regulation; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    2015-05-27

    This presentation provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program's structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.

  6. The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute at The Johns Hopkins University (JHUISI) is planning for substantial multi-year growth in the area of

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute of Information Security and Cryptography. Our administration is committed at the highest level to substantially: Applicants in Information Security would also be associated with: · The Information Security Institute

  7. Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code: CS4520

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    students to take an active role in the design, planning, evaluation and management of secure information -- Ability to analyse security risks and deliver a fit-for-purpose information security management system security * Professional/Subject-Specific Skills -- Ability identify risks in software programs, computer

  8. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Well, what are the manifestations of insecurities?insecurities? Virus/WormsVirus/Worms Denial of serviceIt''s all about the softwares all about the software ""Behind every computer security problem andBehind every computer security problem and malicious attack lies a common enemymalicious attack lies a common

  9. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    9 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation In Ubiquitous Environments Mohamed Aymen Chalouf1 make the concerned communications vulnerable to security attacks because of the open medium on which

  10. Short collusion-secure ngerprint codes against three pirates Research Center for Information Security (RCIS), National Institute of Advanced Industrial

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 1Short collusion-secure #12;ngerprint codes against three pirates Koji Nuida Research Center a new construction of probabilistic collusion-secure #12;ngerprint codes against up to three pirates

  11. Short collusion-secure fingerprint codes against three pirates Research Center for Information Security (RCIS), National Institute of Advanced Industrial

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 1Short collusion-secure fingerprint codes against three pirates Koji Nuida Research Center a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates

  12. Roadmap: Computer Science Information Security -Bachelor of Science

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Computer Science ­ Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012­2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

  13. Information Uncertainty to Compare Qualitative Reasoning Security Risk Assessment Results

    SciTech Connect (OSTI)

    Chavez, Gregory M [Los Alamos National Laboratory; Key, Brian P [Los Alamos National Laboratory; Zerkle, David K [Los Alamos National Laboratory; Shevitz, Daniel W [Los Alamos National Laboratory

    2009-01-01

    The security risk associated with malevolent acts such as those of terrorism are often void of the historical data required for a traditional PRA. Most information available to conduct security risk assessments for these malevolent acts is obtained from subject matter experts as subjective judgements. Qualitative reasoning approaches such as approximate reasoning and evidential reasoning are useful for modeling the predicted risk from information provided by subject matter experts. Absent from these approaches is a consistent means to compare the security risk assessment results. Associated with each predicted risk reasoning result is a quantifiable amount of information uncertainty which can be measured and used to compare the results. This paper explores using entropy measures to quantify the information uncertainty associated with conflict and non-specificity in the predicted reasoning results. The measured quantities of conflict and non-specificity can ultimately be used to compare qualitative reasoning results which are important in triage studies and ultimately resource allocation. Straight forward extensions of previous entropy measures are presented here to quantify the non-specificity and conflict associated with security risk assessment results obtained from qualitative reasoning models.

  14. A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    E-Print Network [OSTI]

    Xu, Haiping

    333 A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage Daniel F. Fitch, however, with data security, reliability, and availability in the cloud. In this paper, we address these concerns by proposing a novel security mechanism for secure and fault-tolerant cloud-based information

  15. Allan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003.

    E-Print Network [OSTI]

    Camp, L. Jean

    With the increased concern over national security there has been increased debate over reliability and securityAllan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003. Making Security Manifest Security and Autonomy for End Users

  16. Informational Materials | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence ofMedia on LightingInformational

  17. The Need for Effective Information Security Awareness

    E-Print Network [OSTI]

    Aloul, Fadi

    hacking methods that can be used to steal money and information from the general public. Furthermore to conduct business in the Middle East and allowed many existing sectors, such as education, health, airline incidents in the Middle East. Local media occasionally report incidents of online fraud, attempts to hack

  18. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Supersedes DOE 5639.8.

  19. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  20. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    played an active role in implementation planning for the Comprehensive National Cyber Security InitiativeComputer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act

  1. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    SciTech Connect (OSTI)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  2. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity Date Version Author Comments

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management Information Security Policy 2004 09/2008 D01 Duncan Woodhouse Adaption and consolidation of best practices Registrar for Information Security, Risk Management and Business Continuity 2 University of Warwick

  3. Stateful UML Design with Security Constraints for Information Assurance The design of software applications using UML embodies

    E-Print Network [OSTI]

    Demurjian, Steven A.

    Stateful UML Design with Security Constraints for Information Assurance Abstract The design design state containing security constraints and insures that information assurance with respect. Keywords: RBAC, MAC, UML, access control, information assurance, secure software design. 1. Introduction

  4. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en NNSA sitesInformation | National

  5. Contact Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National NuclearaCSGFNuclearCongressmen tourInformation

  6. Site Information | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque|Sensitive Species3 Outlook forSimulations YieldRichardInformation

  7. A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng

    E-Print Network [OSTI]

    Zheng, Yuliang

    A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage,chandag,yuliangg@fcit.monash.edu.au Abstract Information security is based on access control models and cryptographic techniques of comprehensive information security within organizations. There is a need to study upper level issues

  8. Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts

    E-Print Network [OSTI]

    Queitsch, Christine

    Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts Page 1 of 16 Document Name: Information Security and Privacy Laws Version #: vF Created By: Ann Nagel, Associate Chief Information Security Officer Date Created: June 2, 2009 Updated By: Melissa Albin-Wurzer, Education

  9. Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.

    E-Print Network [OSTI]

    Lee, Ruby B.

    Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr. Computer Science in one crisis and adversaries in another, raising difficult security issues with respect to information on the information sharing and security risks when coalitions are formed in response to a crisis. This paper defines

  10. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series FISMA AND TECHNOLOGY 5 FISMA Strategic Vision We are building a solid foundation of information security across one of the largest information technology infrastructures in the world based on comprehensive security standards

  11. Master of Science in Information SecurityFlexible, Applied, Master's Degrees.

    E-Print Network [OSTI]

    Snider, Barry B.

    GPS ONLINE Master of Science in Information SecurityFlexible, Applied, Master's Degrees. Join our professionals in both the private and public sectors. The Master of Science in Information Security provides its risks to the security of proprietary information in an organization. Understand the technical

  12. 1 8th of january 2014 CNRS Information System Security Charter

    E-Print Network [OSTI]

    Jeanjean, Louis

    1 8th of january 2014 CNRS Information System Security Charter This charter, annexed or availability. Any breach of rules governing information systems security is indeed likely to have significant or the scientific and technical potential). The User makes a contribution to information system security. As such

  13. Guideline for Identifying an Information System as a National Security System

    E-Print Network [OSTI]

    Guideline for Identifying an Information System as a National Security System NIST Special Publication 800-59 Guideline for Identifying an Information System as a National Security System William C;Guideline for Identifying an Information System as a National Security System Reports on Computer Systems

  14. Information Technology Security Training Requirements Appendix A --Learning Continuum A-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX A Appendix A -- Learning Continuum A-1 #12;Information Technology Security Training Requirements Appendix A -- Learning Continuum A-2 #12;Information Technology Security Training Requirements APPENDIX A -- LEARNING CONTINUUM T R A I N I N G E D U

  15. The use of information technology security assessment criteria to protect specialized computer systems

    SciTech Connect (OSTI)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  16. Guide for Security-Focused Configuration Management of

    E-Print Network [OSTI]

    U R I T Y Computer Security Division Information Technology Laboratory National Institute and privacy of other than national security-related information in federal information systems. The Special information systems, but such standards and guidelines shall not apply to national security systems without

  17. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  18. NISTIR 7358 Program Review for Information

    E-Print Network [OSTI]

    reviewers, auditors, and agency Inspector General (IG) staff personnel in reviewing information security for Technology National Institute of Standards and Technology William Jeffrey, Director #12;Reports-security- related information in federal information systems. This Interagency Report provides an overview

  19. Guidelines on Hardware-Rooted Security in Mobile

    E-Print Network [OSTI]

    Guidelines on Hardware- Rooted Security in Mobile Devices (Draft) Recommendationsof the National Franklin Andrew Regenscheid Computer Security Division Information Technology Laboratory National Institute for the cost-effective security and privacy of other than national security-related information in Federal

  20. 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN- CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION

    Broader source: Energy.gov [DOE]

    2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

  1. Information System Security Critical Elements Please note that prior to including this language in the performance plans of employees covered by

    E-Print Network [OSTI]

    Information System Security Critical Elements Please note that prior to including this language fulfilled. Stand-Alone Critical Elements Senior Agency Information Security Officer/Chief Information Security Officer/ Information Technology Security Officer Critical Element and Objective · Senior Agency

  2. 2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID#: ____________________

    E-Print Network [OSTI]

    Mountziaris, T. J.

    2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID YYYY My correct Social Security Number is: ________ - _____ - _________ B. SIGNATURE- For corrections to date of birth. · Signed Social Security card or passport- For corrections to social security

  3. Information for the NIH Extramural Grantee Community During the Lapse of Federal Government Funding

    E-Print Network [OSTI]

    Kroll, Kristen L.

    Information for the NIH Extramural Grantee Community During the Lapse of Federal Government Funding and a Notice in the NIH Guide Page 1 of 4NOT-OD-13-126: Information for the NIH Extramural Grantee Community

  4. Request for Information: Federal Government Power Purchase Agreements...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to facilitate project development and the purchase of electricity from renewable sources on federal facilities. One means of execution is through the use of long term Power...

  5. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  6. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1: it is bad code. This perspective on computer security education informs the design of our new approach, computer security education is often relegated to a secondary role in undergraduate curricula. Exposure

  7. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Ray, Indrakshi

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how}@cs.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  8. A Virtual Environment for Interactive Visualization of Power System Economic and Security Information

    E-Print Network [OSTI]

    visualization of power system economic and security information. Keywords: Power System Economics, SecurityA Virtual Environment for Interactive Visualization of Power System Economic and Security Information Thomas J. Overbye Raymond P. Klump Jamie D. Weber Senior Member Member Student Member University

  9. Published in IET Information Security Received on 10th December 2009

    E-Print Network [OSTI]

    Ansari, Nirwan

    Published in IET Information Security Received on 10th December 2009 Revised on 19th March 2010 doi: 10.1049/iet-ifs.2009.0261 Special Issue on Multi-Agent & Distributed Information Security ISSN 1751-8709 Survey of security services on group communications P. Sakarindr N. Ansari Advanced Networking Laboratory

  10. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  11. Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare

    E-Print Network [OSTI]

    Smith, Sean W.

    Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare Joseph A. Cooleyand USA {jac,sws}@cs.dartmouth.edu Abstract "Jekyll and Hyde" embodies how information security af- fects today's healthcare ecosystem. When security works, it promotes patient health and a smooth operating

  12. Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum, MD 21090

    E-Print Network [OSTI]

    Lee, Ruby B.

    1 Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum security of the Global Information Grid (GIG). The context for "hardening" this infrastructure also describes the Department of Defense (DoD) activities aimed toward defining security requirements

  13. UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY

    E-Print Network [OSTI]

    Suri, Manil

    UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

  14. Secure Retrieval of FFTF Testing, Design, and Operating Information

    SciTech Connect (OSTI)

    Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

    2009-10-01

    One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.

  15. Form:Federal Environmental Statute | Open Energy Information

    Open Energy Info (EERE)

    Environmental Statute This is the "Federal Environmental Statute" form. To create a page with this form, enter the page name below; if a page with that name already exists, you...

  16. GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,Executive Compensation References: FAR 31.205-6 CompensationD, Titlethe

  17. Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code: CS3190

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    -- Operation and limitations of common information safeguards -- Current leading technologies and standards information from unstructured sources at a level sufficient to keep up to date and communicate with computing of information security. Legal, ethical and human aspects of security. Module Delivery Methods of Delivery

  18. Policy Name: Information Security Policy Originating/Responsible Departments: Computing and Communication Services (CCS)

    E-Print Network [OSTI]

    Carleton University

    Policy Name: Information Security Policy Originating/Responsible Departments: Computing: Chief Information Officer (CIO) Corporate Archivist and Assistant Privacy Officer Introduction Records in all formats contain information that is vital to ongoing operations - for insuring accountability

  19. Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information prepared by the Office of Security and Public

    E-Print Network [OSTI]

    Collins, Gary S.

    of Security and Public Safety. Information prepared by the Office of Security and Public Safety at WSU Spokane and Security Department Information 3 Reporting, Access and Programs 3-5 Policies and Procedures 6Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office

  20. A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS

    E-Print Network [OSTI]

    Baras, John S.

    A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS several information security goals, such as authentication, integrity and secrecy, have often been and the Institute for Systems Research, University of Maryland, College Park, MD, 20742 ABSTRACT Most information

  1. 6/17/13 (v1.2) Information Security Exit Process

    E-Print Network [OSTI]

    Kay, Mark A.

    6/17/13 (v1.2) Information Security Exit Process All Stanford related PHI, and other Restricted and Prohibited information (see http://dataclass.stanford.edu for details) must be securely may be held liable in the future. Once the applicable Stanford information has been removed

  2. A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp

    E-Print Network [OSTI]

    George, Edward I.

    Page 1 I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103 and Responsibility Information Systems and Computing is responsible for the operation of Penn's data networks (Penn-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer

  3. Toward a Security Domain Model for Static Analysis and Verification of Information Systems

    E-Print Network [OSTI]

    Toward a Security Domain Model for Static Analysis and Verification of Information Systems Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Tim Levin Computer Science Department Naval Postgraduate School

  4. Making Collusion-Secure Codes (More) Robust against Bit Erasure Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AISTMaking Collusion-Secure Codes (More) Robust against Bit Erasure Koji Nuida Research Center.nuida@aist.go.jp Abstract A collusion-secure code is called robust if it is secure against erasure of a limited number

  5. SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01

    SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of threats note of the data security issues covered in these publications. Ask yourself "Is my business vulnerable network with your peers, talk about cyber security issues. Give and get advice, hints, tips, etc. 4. Make

  6. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon Institute for Cyber Security World-Leading Research with Real Ravi Sandhu, Khalid Zaman Bijon Institute for Cyber Security University of Texas at San Antonio Oct. 15, 2011 International

  7. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

  8. ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION

    E-Print Network [OSTI]

    Lazos, Loukas

    ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast

  9. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    ­ Software 1 Testing (Security Levels 1 to 3) 17CMS2 = Cryptographic Modules ­ Software 2 Testing (Security of this document. 17/CMS1 Cryptographic Modules ­ Software 1 Testing (Security Levels 1 to 3) 17CMS1/01 All testCMS2 Cryptographic Modules ­ Software 2 Testing (Security Levels 4

  10. Federated States of Micronesia: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello Geothermal PowerGuidelines | Open EnergyFederalJumpFederated

  11. FOIA 10CFR, Code of Federal Regulations for the Freedom of Information Act

    Office of Energy Efficiency and Renewable Energy (EERE)

    FOIA 10CFR, Code of Federal Regulations (CFR) for the Freedom of Information Act is 10 CFR 1004, as posted on the U.S. Department of Energy website.

  12. RAPID/Geothermal/Land Use/Federal | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onRAPID/Geothermal/Exploration/Colorado < RAPID‎RAPID/Geothermal/Land Use/Federal < RAPID‎ | Geothermal‎ |

  13. Security Awareness Programs During orientation in September, students are informed of services offered by the University

    E-Print Network [OSTI]

    Escher, Christine

    Security Awareness Programs During orientation in September, students are informed of services. Video and slide presentations outline ways to maintain personal safety and residence hall security. Students are told about crime on campus and in surrounding neighborhoods. Similar information is presented

  14. University of Connecticut / Jason Pufahl, CISSP, CISM 1 INFORMATION SECURITY STRATEGIC

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 INFORMATION SECURITY STRATEGIC PLAN, CISSP, CISM 2 2 MISSION STATEMENT The mission of the Information Security Office (ISO) is to design ­ IMPLEMENTATION CYCLE #12;University of Connecticut / Jason Pufahl, CISSP, CISM 3 3 GOVERNANCE In recognition

  15. CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT

    E-Print Network [OSTI]

    CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley and environments. The risks associated with these changing situations can be managed through an integrated programs based on the management of risk. Information Security Continuous Monitoring and the Risk

  16. ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY

    E-Print Network [OSTI]

    ARCHITECTURE TO PROVIDE INFORMATION SECURITY AND PRIVACY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce Improved, more effective healthcare is a high priority in the United States today. While the U

  17. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12. Cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13.

  18. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Supersedes DOE O 440.1B Chg 1.

  19. Form:Federal Oil and Gas Regulation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport JumpFlowood,Pevafersa JVOhio:River,Event Jump to:Federal

  20. Denver Federal Center Solar Park | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (UtilityInstruments IncMississippi:DeltaFish Lake Valley Area (DOEDentonFederal

  1. Federal Heights, Colorado: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello Geothermal Power StationIndiana:BusinessFederalGrant

  2. Federal Way, Washington: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello Geothermal PowerGuidelines | Open EnergyFederalJump to:

  3. Federal Way, Washington: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello Geothermal PowerGuidelines | Open EnergyFederalJump

  4. LOPP Federal Register Example Document | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: EnergyKulpsville,LEDSGP/activities <LEDSGP/hometraining <Federal Register

  5. Category:Federal Oil and Gas Statutes | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLCLtd Jump to: navigation, searchsource History ViewEnFederal Oil and

  6. CCC Federal License and Permit List | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmentalBowerbank, Maine:Kansas: Energy Resources Jump to:Energy Inc -6CCC Federal License

  7. Request for Information on Improving Performance of Federal Permitting...

    Broader source: Energy.gov (indexed) [DOE]

    created under Executive Order 13604 of March 22, 2012, and pursuant to the June 7, 2013 Transmission Presidential Memorandum, is seeking information on a draft Integrated,...

  8. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V.

    2014-05-30

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  9. Lighting recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA

    SciTech Connect (OSTI)

    Rubinstein, Francis M.

    1999-10-25

    Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.

  10. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12, cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13, cancels DOE O 440.1B Chg 1.

  11. NIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4,

    E-Print Network [OSTI]

    , the Intelligence Community, the Committee on National Security Systems, the Department of Homeland Security, and UNIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security

  12. Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)

    E-Print Network [OSTI]

    1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS, Acting Chief, Computer Security Division, Information Technology Laboratory (ITL), NIST 9 Data Using Encryption Matthew Scholl, Computer Security Division, Information Technology Laboratory

  13. How information resources are used by federal agencies in risk assessment application: Rapporteur summary

    SciTech Connect (OSTI)

    Fenner-Crisp, P.

    1990-12-31

    The application of information available for risk assessment from the federal perspective is described. Different federal agencies conduct varying degrees of hazard evaluation, and some also generate empirical data. The role of the Agency for Toxic Substances and Disease Registry in hazard assessments of potential public health impacts of Superfund sites includes identification of the 275 most significant substances. ATSDR is responsible for preparing toxicological profiles. ATSDR also identifies data gaps and needs critical to adequately assessing human health impacts.

  14. Implementing Information Security and Its Technology: A LineManagement...

    Office of Scientific and Technical Information (OSTI)

    Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat...

  15. 29.01.03.M1.28 Information Resources Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.28 Information Resources ­ Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.28 Information Resources ­ Security Surveillance Approved April 13, 2010 Revised by the University Police Department #12;29.01.03.M1.28 Information Resources ­ Security Surveillance Page 2 of 4

  16. 29.01.03. M1.18 Information Resources Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.18 Information Resources ­ Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.18 Information Resources ­ Security Monitoring Approved July 18, 2005 Revised April 27, etc. Reason for SAP The purpose of the security monitoring policy is to ensure that information

  17. SMB Information Security Seminar (2013) Exercise 2 Estimated costs from bad things happening to your

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01

    SMB Information Security Seminar (2013) Exercise 2 ­ Estimated costs from bad things happening to your important information. First, think about the information used in/by your organization. Second, enter into the table below your top two highest priority information types. Third, enter estimated costs

  18. Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1

    E-Print Network [OSTI]

    Chen, Li-Chiou

    Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

  19. Federal Cave Protection Act of 1988 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePowerEdisto Electric Coop,ErosionNewCoalFarmland ProtectionInformationCave

  20. An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions

    E-Print Network [OSTI]

    Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

    2006-01-01

    This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions...

  1. Restricting information flow in security APIs via typing 

    E-Print Network [OSTI]

    Keighren, Gavin

    2014-06-27

    Security APIs are designed to enable the storage and processing of confidential data without that data becoming known to individuals who are not permitted to obtain it, and are central to the operation of Automated Teller ...

  2. 29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources ­ Portable Devices: Information Security Approved on the responsibilities of information resource owners to adequately protect data residing on portable devices

  3. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  4. MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

    E-Print Network [OSTI]

    MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor U.S. Department of Commerce Organizations have to make frequent changes to their information systems result in adjustments being made to the configuration of information systems; these activities could have

  5. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1 Zenebe: Department of Management Information Systems,Bowie State University,14000 Jericho Park Road - 3, 2009 ISBN 1-933510-96-7/$15.00 2009 CISSE Abstract ­ The Maryland Alliance for Information

  6. On The Security of Mobile Cockpit Information Systems Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast,

    E-Print Network [OSTI]

    Snoeren, Alex

    expanded to include live data such as weather and traffic information that is used to make flight decisions, information kiosks, home automation controls, and so on--our expectations of security and reliability information services supported by the receiver, the display may also include a graphical weather overlay (FIS

  7. Federated DyKnow, a Distributed Information Fusion System for Collaborative UAVs

    E-Print Network [OSTI]

    Doherty, Patrick

    Federated DyKnow, a Distributed Information Fusion System for Collaborative UAVs Fredrik Heintz {frehe, patdo}@ida.liu.se Abstract--As unmanned aerial vehicle (UAV) applications are becoming more complex and covering larger physical areas there is an increasing need for multiple UAVs to cooperatively

  8. HR System Access Request Form Security Administration, Human Resources (HR) For additional instructions and information, log onto http://hr.vanderbilt.edu/security/

    E-Print Network [OSTI]

    Simaan, Nabil

    instructions and information, log onto http://hr.vanderbilt.edu/security/ Home Department VUnet IDHR EmployeeHR System Access Request Form Security Administration, Human Resources (HR) For additional ID Name Email AddressWork Phone Home Dept Name Effective Date of Access Operator Information I

  9. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W. Hamlen and Murat Kantarcioglu

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W to the cloud kernel software, OS/hypervisor, VM, or cloud file system, SilverLine automatically in-lines secure information flow security for Hadoop clouds with easy maintainability (through modularity) and low overhead

  10. National Information Assurance Education and Training Program (NIETP) National Security Agency ~ 9800 Savage Road ~ Ft. Meade, MD 20755-6744 ~ ATTN: I083, Suite 6744

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    National Information Assurance Education and Training Program (NIETP) National Security Agency University courseware meets all of the elements of the Committee on National Security Systems (CNSS) National Training Standards for: Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011 System

  11. February 2008 FEDERAL DESKTOP CORE

    E-Print Network [OSTI]

    Computer Security DivisionComputer Security Division Information Technology LaboratoryInformation their information security and reduce the information technology (IT) costs associated with securing their Windows their information security and reduce the information technology (IT) costs associated with securing their Windows

  12. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security,

    E-Print Network [OSTI]

    Gering, Jon C.

    connection. 3. Dual (split) tunneling is not permitted; only one network connection is allowed. 4. All VPN gateways or concentrators on the Truman network will be installed and managed by ITS. 5. All computers, etc. - IPSec ­ A secure network protocol used for VPN sessions. - VPN Gateway/Concentrator - A device

  13. An Efficient Approach to Support Querying Secure Outsourced XML Information

    E-Print Network [OSTI]

    Ng, Wilfred Siu Hung

    and Technology {yini, wilfred, lauhl, csjames}@cs.ust.hk Abstract. Data security is well-recognized a vital issue encrypted XML. XQEnc is based on two important techniques of vectorization and skele- ton compression. Essentially, vectorization, which is a generalization of columns of a relational table, makes use the basic

  14. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  15. Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2

    E-Print Network [OSTI]

    Hwang, Kai

    Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1 and optimize energy usage to meet sustainability goals. Managing the energy information lifecycle ­ from, feedback, and query/response interactions, which are transmitted across a widely distributed infrastructure

  16. Securing Tags to Control Information Flows within the Internet of Things

    E-Print Network [OSTI]

    Cambridge, University of

    Securing Tags to Control Information Flows within the Internet of Things Jatinder Singh, Thomas F.lastname@cl.cam.ac.uk Abstract--To realise the full potential of the Internet of Things (IoT), IoT architectures are moving. INTRODUCTION Information sharing underpins the broad vision of the "Internet of Things" (IoT). Io

  17. 29.01.03.M1.28 Information Resources Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    by the Associate Vice President for Information Technology & Chief Information Officer to review AVST installations for Information Technology & Chief Information Officer, Networking and Information Security, University P ol i ce is to provide recommendations to the Associate Vice President for Information Technology & Chief Information

  18. Federal Automated Information System of Nuclear Material Control and Accounting: Uniform System of Reporting Documents

    SciTech Connect (OSTI)

    Pitel, M V; Kasumova, L; Babcock, R A; Heinberg, C

    2003-06-12

    One of the fundamental regulations of the Russian State System for Nuclear Material Accounting and Control (SSAC), ''Basic Nuclear Material Control and Accounting Rules,'' directed that a uniform report system be developed to support the operation of the SSAC. According to the ''Regulation on State Nuclear Material Control and Accounting,'' adopted by the Russian Federation Government, Minatom of Russia is response for the development and adoption of report forms, as well as the reporting procedure and schedule. The report forms are being developed in tandem with the creation of an automated national nuclear material control and accounting system, the Federal Information System (FIS). The forms are in different stages of development and implementation. The first report forms (the Summarized Inventory Listing (SIL), Summarized Inventory Change Report (SICR) and federal and agency registers of nuclear material) have already been created and implemented. The second set of reports (nuclear material movement reports and the special anomaly report) is currently in development. A third set of reports (reports on import/export operations, and foreign nuclear material temporarily located in the Russian Federation) is still in the conceptual stage. To facilitate the development of a unified document system, the FIS must establish a uniform philosophy for the reporting system and determine the requirements for each reporting level, adhering to the following principles: completeness--the unified report system provides the entire range of information that the FIS requires to perform SSAC tasks; requisite level of detail; hierarchical structure--each report is based on the information provided in a lower-level report and is the source of information for reports at the next highest level; consistency checking--reports can be checked against other reports. A similar philosophy should eliminate redundancy in the different reports, support a uniform approach to the contents of previously developed and new reports within the FIS, as well as identify the main priorities for the direction of the FIS.

  19. 29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE

    E-Print Network [OSTI]

    29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE 29.01.03.M1 Security of Electronic Information Resources Approved May 27, 2002 Revised May 28, 2009 Revised October 15&M) electronic information resources are vital academic and administrative assets which require appropriate

  20. 3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University

    E-Print Network [OSTI]

    Keil, David M.

    3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University CSCI 135 Information Technology and Society 3. Security and privacy 1. Crime, law protections David Keil Information Technology and Society 5/13 1 Readings: Baase, Chapters 2 and 5 David Keil

  1. Caisson: A Hardware Description Language for Secure Information Flow

    E-Print Network [OSTI]

    Sherwood, Tim

    : Unclassified Secret Top Secret. An important information flow policy based on such lattices is non to higher elements in the lattice (e.g., Secret information can flow to Top Secret, but not vice on information flow. Policies may target confidentiality, so that secret Permission to make digital or hard

  2. Secure Program Execution Via Dynamic Information Flow Tracking

    E-Print Network [OSTI]

    Suh, G. Edward

    2003-07-21

    We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...

  3. Secure communication of static information by electronic means

    DOE Patents [OSTI]

    Gritton, Dale G. (Pleasanton, CA)

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  4. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  5. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  6. CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations

    E-Print Network [OSTI]

    Locasto, Michael E.

    permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

  7. 11World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    11World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing client © Ravi Sandhu World-Leading Research with Real-World Impact! Goal: Share but protect Policy-Centric Collaboration © Ravi Sandhu World-Leading Research with Real-World Impact! Collaboration Group Individual

  8. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES ScienceInformation Company NamenewEmail ListsLaboratoryEmergency

  9. Finance, IT Operations& InformationSecurity Dear Colleagues,

    E-Print Network [OSTI]

    Chen, Yiling

    section of this newsletter. In this issue, we also want to inform the community about the various audits through which SEAS goes on a regular basis and what to expect if your lab is selected for an audit important guidelines on the distinction between gifts and grants, receiving awards from the European Union

  10. Transcript: NUIT Information Security News Podcast, May 24, 2012

    E-Print Network [OSTI]

    Ottino, Julio M.

    . Anyway what we're talking about with Facebook is a story that I read that came out actually just before by Northwestern University Information Technology. We'll start today's news with the Facebook. And Facebook has people thought, and now there's already a lawsuit--welcome to the to the world Facebook, boy what a bad

  11. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  12. Zicom Electronic Security Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavyAgencyTendo NewYanbu, Saudi Arabia:InformationZicom

  13. Credit Leona Securities Asia CLSA UK | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePower VenturesInformation EU-UNDP ClimatePublic Schools WindLeona

  14. Freedom of Information Act - Costs | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvanServicesAmesFour Los AlamosFranklinFred

  15. Freedom of Information Act Related Sites | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvanServicesAmesFour Los

  16. NNSA Awards Information Technology Contract | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving Basic NERSCKey StaffNEWTAdministration

  17. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    Chappell, James M

    2012-01-01

    The idealized Kish-Sethuraman (KS) cipher is known to offer perfect information theoretical security with classical physical means. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a three and four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a classical physical realization having benefits in increased security with reduced complexity.

  18. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    James M. Chappell; Derek Abbott

    2012-12-31

    The idealized Kish-Sethuraman (KS) cipher is theoretically known to offer perfect security through a classical information channel. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a physical realization having benefits in increased security with reduced complexity.

  19. This report is a part of the College's efforts to provide you with information on security procedures, services, and resources available on

    E-Print Network [OSTI]

    's efforts to provide you with information on security procedures, services, and resources available on our ............................................................................................................................... 6 CLERY GEOGRAPHY

  20. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  1. TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27

    E-Print Network [OSTI]

    TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27 29.01.03.V1.01 INFORMATION SECURITY, COMPUTER USE AND SOFTWARE INSTALLATION/USE Approved: May 10.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines

  2. 29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE

    E-Print Network [OSTI]

    Technology & Chief Information Officer. 2. RESPONSIBILITIES 2.1 The Associate Vice President for Information Technology & Chief Information Officer, or designee, is responsible for administering the provisions29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE 29.01.03.M1

  3. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  4. Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem

    E-Print Network [OSTI]

    Pal, Ranjan

    2012-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as \\emph{self-defense} mechanisms. However, according to security experts, such software (and their subsequent advancements) will not completely eliminate risk. Recent research efforts have considered the problem of residual risk elimination by proposing the idea of \\emph{cyber-insurance}. In this regard, an important research problem is resolving information asymmetry issues associated with cyber-insurance contracts. In this paper we propose \\emph{three} mechanisms to resolve information asymmetry in cyber-insurance. Our mechanisms are based on the \\emph{Principal-Agent} (PA) model in microeconomic theory. We show that (1) optimal cyber-insurance contracts induced by our mechanisms only provide partial...

  5. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Supersedes DOE G 440.1-1A and DOE G 440.1-8.

  6. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13.

  7. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  8. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  9. Correct mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme on ping-pong protocol

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-16

    The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected.

  10. Security of quantum bit string commitment depends on the information measure

    E-Print Network [OSTI]

    Harry Buhrman; Matthias Christandl; Patrick Hayden; Hoi-Kwong Lo; Stephanie Wehner

    2006-11-09

    Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classical and the quantum world. However, when committing to a string of n bits at once, how far can we stretch the quantum limits? In this letter, we introduce a framework of quantum schemes where Alice commits a string of n bits to Bob, in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are two-fold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a+b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we construct schemes where a=4 log n+O(1) and b=4, which is impossible classically. Our findings significantly extend known no-go results for quantum bit commitment.

  11. An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may partner with the

    E-Print Network [OSTI]

    .S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA scaling

  12. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  13. Subsidized Loan Limits This communication is for the purpose of informing students about the Federal Updates regarding

    E-Print Network [OSTI]

    Li, X. Rong

    Subsidized Loan Limits This communication is for the purpose of informing students about the Federal Updates regarding Subsidized Stafford Loan eligibility. On May 16, 2013, The U.S. Department in July 2012. The changes apply to subsidized Stafford Loan borrowers who meet the definition of "first

  14. Vice Provost for Research Statement on Export Controls Although federal laws governing and limiting exports of technology and information have

    E-Print Network [OSTI]

    Huang, Jianyu

    Vice Provost for Research Statement on Export Controls Although federal laws governing and limiting exports of technology and information have existed for many decades, companies and universities are coming to complying with all applicable laws, regulations, and policies related to such exports. While most

  15. To appear in ACM Transactions on Information and System Security, ACM, 2004. An extended abstract of this paper appeared in Ninth ACM Conference on Computer and Communications

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    To appear in ACM Transactions on Information and System Security, ACM, 2004. An extended abstract of this paper appeared in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. Breaking

  16. 29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.26 Information Resources ­ Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources ­ Information Security Risk Assessment Reviews with assurance that the information on which risk assessment assertions are made is correct. The goal

  17. Federal Market Information Technology in the Post Flash Crash Era: Roles for Supercomputing

    E-Print Network [OSTI]

    Bethel, E. Wes

    2013-01-01

    Level 2 data only shows the inside Best Bid/Offer (BBO)bid and offer price for each security in the combined markets included in the data.

  18. Federal Market Information Technology in the Post Flash Crash Era: Roles for Supercomputing

    SciTech Connect (OSTI)

    Bethel, E. Wes; Leinweber, David; Ruebel, Oliver; Wu, Kesheng

    2011-09-16

    This paper describes collaborative work between active traders, regulators, economists, and supercomputing researchers to replicate and extend investigations of the Flash Crash and other market anomalies in a National Laboratory HPC environment. Our work suggests that supercomputing tools and methods will be valuable to market regulators in achieving the goal of market safety, stability, and security. Research results using high frequency data and analytics are described, and directions for future development are discussed. Currently the key mechanism for preventing catastrophic market action are “circuit breakers.” We believe a more graduated approach, similar to the “yellow light” approach in motorsports to slow down traffic, might be a better way to achieve the same goal. To enable this objective, we study a number of indicators that could foresee hazards in market conditions and explore options to confirm such predictions. Our tests confirm that Volume Synchronized Probability of Informed Trading (VPIN) and a version of volume Herfindahl-Hirschman Index (HHI) for measuring market fragmentation can indeed give strong signals ahead of the Flash Crash event on May 6 2010. This is a preliminary step toward a full-fledged early-warning system for unusual market conditions.

  19. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect (OSTI)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  20. FOA for Assisting Federal Facilities with Energy Conservation Technologies Informational Webinar

    Broader source: Energy.gov [DOE]

    This webinar will highlight the funding opportunity announcement (FOA) that was issued on March 6, 2015. The AFFECT grant will provide funding for renewable energy projects at federal facilities...

  1. For Profit Audits - Information Related to 12/21/11 Federal Register...

    Broader source: Energy.gov (indexed) [DOE]

    comments received to Federal Register notice Document Number 2011-32622, a copy of the matrix of the comments, a copy of DOE's responses to the comments, and marked up versions of...

  2. Federal Register Notices | Department of Energy

    Office of Environmental Management (EM)

    Information Center Library Federal Register Notices Federal Register Notices May 22, 2015 Electricity Advisory Committee Notice of Open Meeting June 29 and 30, 2015: Federal...

  3. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  4. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  5. GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according

    E-Print Network [OSTI]

    Sun, Yi

    a computer virus. Can appear to be a legitimate program or system resource. WormGLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used or damage your computer. Pharming ·(aka Vishing) a hacker's attack aiming to redirect

  6. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  7. Today, there are almost 90 federal agencies that are rapidly upgrad-ing and enhancing their language resources. For national security, the

    E-Print Network [OSTI]

    Hill, Wendell T.

    their language resources. For national security, the globalization of business, and a better understanding lives are at stake on foreign soil, or we think about homeland security, then increasing the nation's foreign language capacity is a vital national security priority." At the University of Maryland, new

  8. Federal Acquisition Regulation; Federal Acquisition Circular...

    Energy Savers [EERE]

    Federal Acquisition Regulation; Federal Acquisition Circular Federal Acquisition Regulation; Federal Acquisition Circular Federal Acquisition Regulation; Federal Acquisition...

  9. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  10. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  11. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  12. Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 6th, 2005 Information Systems Security: a Model for HIPAA Security Compliance

    E-Print Network [OSTI]

    Tappert, Charles

    Systems Security: a Model for HIPAA Security Compliance Kathleen M. Bravo Abstract The healthcare industry are struggling with preparedness. HIPAA security differs from current security measures that organizations have in place in that organizations cannot pick and choose which measures to implement but, instead, must adhere

  13. The Oak Ridge Technical Information Center: A trailblazer in federal documentation

    SciTech Connect (OSTI)

    Vaden, W.M.

    1992-01-01

    This document attempts to record the history of US AEC`s Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this document, with 18 chapters arranged into four sections according to different presidential administrations.

  14. The Oak Ridge Technical Information Center: A trailblazer in federal documentation

    SciTech Connect (OSTI)

    Vaden, W.M.

    1992-01-01

    This softbound book attempts to record the history of US AEC's Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this book, whose 18 chapters are arranged into four sections according to different presidential administrations.

  15. Federal Employee Training Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-09-21

    This Manual provides detailed requirements to supplement DOE O 360.1A, Federal Employee Training, dated 9-21-99. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Canceled by DOE M 360.1-1B.

  16. Federal Employee Training Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-11

    This Manual provides detailed requirements to supplement DOE O 360.1B, FEDERAL EMPLOYEE TRAINING. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Cancels DOE M 360.1A-1. Canceled by DOE O 360.1C.

  17. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

    E-Print Network [OSTI]

    Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

    2010-01-01

    -Government and Cyber Security: The Role of Cyber Security Exercises. Proceedings of the 39th Hawaii International Conference on System Sciences. Kauai, Hawaii. January 4–7, 2006. IBM Center for The Business of Government8 CYBERSECURITY MANAGEMENT IN THE STATES...

  18. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Jornsten, Rebecka

    . The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

  19. AUTHORIZATION TO DISCLOSE AND USE INFORMATION FERPA, also known as the Buckley Amendment, is a federal law that gives students' some rights of privacy and dis-

    E-Print Network [OSTI]

    Alpay, S. Pamir

    AUTHORIZATION TO DISCLOSE AND USE INFORMATION FERPA, also known as the Buckley Amendment, is a federal law that gives students' some rights of privacy and dis- closure over the records and documents, the University may not disclose the information contained in student education records without a student

  20. Criteria & Review Approach Documents, National Nuclear Security Administration

    Broader source: Energy.gov [DOE]

    A section of Appendix C to DOE G 226.1-2A "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of a table of National Nuclear Security Administration Criteria Review and Approach Documents (CRADS) with links to the CRADs. CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs.

  1. Criteria Review and Approach Documents, National Nuclear Security Administration

    Broader source: Energy.gov [DOE]

    A section of Appendix C to DOE G 226.1-2A "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of National Nuclear Security Administration Criteria Review and Approach Documents (CRADS). CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs.

  2. Federal Acquisition Regulation; Federal Acquisition Circular...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regulation; Federal Acquisition Circular Federal Acquisition Regulation; Federal Acquisition Circular Federal Acquisition Regulation; Federal Acquisition Circular More Documents &...

  3. Towards improving software security by using simulation to inform requirements and conceptual design

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nutaro, James J.; Allgood, Glenn O.; Kuruganti, Teja

    2015-06-17

    We illustrate the use of modeling and simulation early in the system life-cycle to improve security and reduce costs. The models that we develop for this illustration are inspired by problems in reliability analysis and supervisory control, for which similar models are used to quantify failure probabilities and rates. In the context of security, we propose that models of this general type can be used to understand trades between risk and cost while writing system requirements and during conceptual design, and thereby significantly reduce the need for expensive security corrections after a system enters operation

  4. Efficient Private Information Retrieval Using Secure Xiangyao Yu, Christopher W. Fletcher

    E-Print Network [OSTI]

    is not trusted and would leak the query when executed on conventional secure processors. Stream-Ascend is based. In a map database, frequent queries to a partic- ular geographical region may indicate the drilling

  5. Appeared in Journal of Computer Security 3 (4) pp. 283309 (1994/1995). Page 1 of 32 Theft of Information in the TakeGrant Protection Model

    E-Print Network [OSTI]

    Bishop, Matt

    the unautho­ rized release of information, not merely the illicit obtaining of access rights because conditions necessary and sufficient for information to flow between two objects, and for rights undesirable occurs. In terms of security models, this means that a right, or information, can be transferred

  6. Standard for IT Security Roles and Responsibilities Version 1.0 Office of Information Technology University of Maryland College Park Page 1

    E-Print Network [OSTI]

    Yorke, James

    Standard for IT Security Roles and Responsibilities ­ Version 1.0 Office of Information Technology University of Maryland ­ College Park Page 1 Information Technology Standard Document Title: Standard The Board of Regents' Information Technology policy and Section 12-112 of the Education article

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  8. PROTECTING SENSITIVE INFORMATION TRANSMITTED

    E-Print Network [OSTI]

    INFORMATION TRANSMITTED IN PUBLIC NETWORKS Shirley Radack, EditorShirley Radack, Editor Computer Security DivisionComputer Security Division Information Technology LaboratoryInformation Technology Laboratory to the overall security of an organization's information and information systems. The Information Technology

  9. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  10. File:08-FD-a - FederalTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermitORDExpeditedPlantCommissioningProcess.pdf Jump8 -Information

  11. INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment

    SciTech Connect (OSTI)

    None

    2009-05-01

    The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

  12. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  13. Embedding Security Policies into a Distributed Computing Environment

    E-Print Network [OSTI]

    Kühnhauser, Winfried

    : security policy, multipolicy system, information domain, policy domain, custodian, policy sep- arationD information systems must support information processing under multiple security policies of any complexity information support information processing among users with di erent security attributes employing resources

  14. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  15. TITLE: HIPAA PRIVACY AND INFORMATION SECURITY TRAINING FOR COLUMBIA UNIVERSITY MEDICAL CENTER WORKFORCE

    E-Print Network [OSTI]

    Columbia University

    . The online training includes two modules. o HIPAA Privacy o Security Essentials Workforce members shall "Compliance") and select training module TC0019 (HIPAA: Health Insurance Portability and Accountability Act) is provided through the online training modules. It is the responsibility of each school to assure that all

  16. The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO.

    E-Print Network [OSTI]

    1 The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO. This directive Information Technology Appropriate Use Policy · Colorado School of Mines Administrative Data Policy Mines

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  19. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  20. Authorization Federation in IaaS Multi Cloud Navid Pustchi

    E-Print Network [OSTI]

    Sandhu, Ravi

    Authorization Federation in IaaS Multi Cloud Navid Pustchi Institute for Cyber Security Department; Cloud Federation; Distributed Access Control; Security; Trust Management. 1. INTRODUCTION Cloud of Computer Science Univ of Texas at San Antonio tam498@my.utsa.edu Ram Krishnan Institute for Cyber Security

  1. Independent Oversight Review, Nevada National Security Site,...

    Broader source: Energy.gov (indexed) [DOE]

    December 2013 Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security...

  2. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13...

    Office of Environmental Management (EM)

    HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED...

  4. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  5. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    information, sensitive unclassified information, special nuclear materials, nuclear weapons, other Government property) ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

  6. Teaching in computer security and privacy The Computer Laboratory's undergraduate and masters programmes

    E-Print Network [OSTI]

    Crowcroft, Jon

    computing security · Economics of cybercrime · Economics of information security · Formal methods · Hardware security · Location and positioning systems · Malware analysis · Medical information security · MobileTeaching in computer security and privacy The Computer Laboratory's undergraduate and masters

  7. Context Interchange Mediation for Semantic Interoperability and Dynamic Integration of Autonomous Information Sources in the Fixed Income Securities Industry

    E-Print Network [OSTI]

    Siegel, Michael

    2003-02-10

    We examine semantic interoperability problems in the fixed income securities industry and propose a knowledge representation architecture for context interchange ...

  8. Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1Curriculum Editorial Comments, Volume 1 and Volume 2

    SciTech Connect (OSTI)

    Frincke, Deb; Ouderkirk, Steven J.; Popovsky, Barbara

    2006-12-28

    This is a pair of articles to be used as the cover editorials for a special edition of the Journal of Educational Resources in Computing (JERIC) Special Edition on Resources for the Computer Security and Information Assurance Curriculum, volumes 1 and 2.

  9. Homeland Security Issues for Facilities 

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01

    The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become...

  10. The Intersection of National Security and Climate Change

    SciTech Connect (OSTI)

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.; Sandusky, Jessica A.

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  11. Federal Building Energy Use Benchmarking Guidance, August 2014...

    Office of Environmental Management (EM)

    Energy Use Benchmarking Guidance, August 2014 Update Federal Building Energy Use Benchmarking Guidance, August 2014 Update Guidance describes the Energy Independence and Security...

  12. NNSA Awards Contract for Largest Federal Wind Farm to Siemens...

    National Nuclear Security Administration (NNSA)

    Contract for Largest Federal Wind Farm to Siemens Government Technologies, Inc. | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

  13. DOE Encourages Utility Sector Nominations to the Federal Communication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Utility Sector Nominations to the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council March 29, 2011 - 5:22pm Addthis...

  14. Y-12 Site Office Recognized For Contributions To Combined Federal...

    National Nuclear Security Administration (NNSA)

    Site Office Recognized For Contributions To Combined Federal Campaign | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  15. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  16. J. Hebcek et al. (Eds.): ISESS 2013, IFIP AICT 413, pp. 311320, 2013. IFIP International Federation for Information Processing 2013

    E-Print Network [OSTI]

    in the near future. Keywords: Smart Cities, urban safety, urban crime, data visualisation, deci- sion driven Future Internet concepts of "Smart cities" [5], [2]. For example, security in the smart cities alone, a key driver which will aid smart cities to be managed at localised levels in- volves

  17. Office of the CISO, February 2011 Information Security and Privacy Risk Advisory

    E-Print Network [OSTI]

    or the safe browsing feature when available in your web browser. · Keep an eye on the web browser address bar address. · Exercise caution if a message sounds or a website looks suspicious, is out of the ordinary of the message. · Don't use email to send personal or financial information, and delete any emails that ask you

  18. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard

    E-Print Network [OSTI]

    ontologies can be used for a tool to support the ISO/IEC 27001 certification, providing pivotal information percent carried out such certification initiatives, in terms of BS7799 [2], ISO/IEC 17799 [9] and ISO mapping of the ISO/IEC 27001 standard to increase the degree of automa- tion within the certification

  19. A Model for Role Administration Using Organization Lab. for Information Security Technology

    E-Print Network [OSTI]

    Sandhu, Ravi

    A Model for Role Administration Using Organization Structure Sejong Oh Lab. for Information administration is a major issue. ARBAC97 is a well-known solution for decentralized RBAC administration. ARBAC97 authorizes administrative roles by means of `role ranges' and `prerequisite conditions'. Although attractive

  20. FINANCIAL INFORMATION SERVICES WWEEBB QQUUIICCKK TTIIPPSSOCTOBER 2006

    E-Print Network [OSTI]

    FINANCIAL INFORMATION SERVICES WWEEBB QQUUIICCKK TTIIPPSSOCTOBER 2006 Security to Web Applications How do I obtain security access to... Financial Information Library (FIL) Security is different for each Information Extract. To find security requirements, click on Details next to the Information

  1. 4344 Federal Register / Vol. 71, No. 17 / Thursday, January 26, 2006 / Proposed Rules evaluated that information in relation to

    E-Print Network [OSTI]

    of the status of the North Pacific right whale, and is soliciting data, information, and comment on the subject that information in relation to information readily available in our files. On the basis of our review, we find that the petition does not present substantial scientific or commercial information to indicate that listing

  2. Design and Implementation of a Hypervisor-Based Platform for Dynamic Information Flow Tracking in a Distributed Environment

    E-Print Network [OSTI]

    Ermolinskiy, Andrey

    2011-01-01

    desktop security. Information Security Tech. Report, 11(4):hypervisor-driven information security archi- tecture forPIFT) is a novel information security architecture that

  3. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  4. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  5. Watermarking Security Part One: Theory Francois Cayrea, Caroline Fontaineb, and Teddy Furona

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    's mutual information and Fisher's information matrix) can measure this leakage of information. The security atermarking, Security, Equivocation, Fisher information matrix. 1. INTRODUCTION Digital watermarking studies information security) despite its robustness. However, they only deal with dedicated attacks relevant

  6. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  7. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  8. Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking

    E-Print Network [OSTI]

    Vahlenkamp, Matthias Wählisch Thomas C Schmidt Markus

    2012-01-01

    Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

  9. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  11. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  12. 41424 Federal Register / Vol. 75, No. 136 / Friday, July 16, 2010 / Proposed Rules requests for additional information from

    E-Print Network [OSTI]

    for additional information from DOE, particularly regarding the WIPP waste inventory and groundwater (karst whether the WIPP continues to comply with the radiation protection standards for disposal. EPA will also consider any additional public comments and other information relevant to WIPP's compliance. The Agency

  13. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  16. POLICY FLASH 2015-21 - Federal Acquisition Circulars (FACs) 2005...

    Energy Savers [EERE]

    SUMMARY: Attached for your information is a brief summary of Federal Acquisition Regulation (FAR) amendments, published in the December 15, 2014 Federal Register at 79 FR...

  17. POLICY FLASH 2015-24 - Federal Acquisition Circular (FAC) 2005...

    Energy Savers [EERE]

    SUMMARY: Attached for your information is a brief summary of Federal Acquisition Regulation (FAR) amendments, published in the May 7, 2015 Federal Register at 80 FR 26422. FAC...

  18. Microsoft Word - Preservation of Department of Energy Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and unlawful destruction, damage, or alienation of Federal Records is three years in prison (18 USC 2071). Federal Records A record is any recorded information relating to the...

  19. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  20. James R. Schlesinger Medal for Energy Security

    Broader source: Energy.gov [DOE]

    This page contains information and updates on the Energy Department's James R. Schlesinger Medal for Energy Security.

  1. AT&T Consulting Security Services for Mergers and Acquisitions

    E-Print Network [OSTI]

    Fisher, Kathleen

    . This presents an increasing risk for the security of personally identifiable information entrusted the combined strengths and create a larger economic value. While doing so, overlooking information security Espionage · Misuse of Information · Theft, Fraud Security in the M&A Process Information Security needs

  2. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  3. Social Security and Medicare Tax Liability An exemption from social security and Medicare taxes applies

    E-Print Network [OSTI]

    Chen, Tsuhan

    . Such persons are exempt from social security and Medicare taxes as long as they remain nonresident aliens for tax purposes. Those who become resident aliens must start paying social security and Medicare taxes resident aliens. If so, they must pay social security and Medicare taxes. Federal tax regulations state

  4. Take Action Now: Empower a Secure Energy Future

    Broader source: Energy.gov [DOE]

    Document features a Federal Energy Management Program (FEMP) template for creating a Take Action Now: Empower a Secure Energy Future campaign handout.

  5. Take Action Now: Empower a Secure Energy Future 2

    Broader source: Energy.gov [DOE]

    Document features a Federal Energy Management Program (FEMP) template for creating a Take Action Now: Empower a Secure Energy Future 2 handout.

  6. Securities Law Issues Relating to Community Solar Projects

    Broader source: Energy.gov [DOE]

    The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

  7. Delegation as Officially Designated Federal Security Authority...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Status: Current Effective Date: Sep 27, 2012 Re-delegation Allowed: No Authorities: DOE O 473.3 Related History Related to: DOE O 473.3, Protection Program Operations There...

  8. federal budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

  9. federal budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en46Afed feed families |

  10. A Software Engineering Perspective for Services Security

    E-Print Network [OSTI]

    Han, Jun

    A Software Engineering Perspective for Services Security Jun Han School of Information Technology. We have seen much work in the traditional area of information and network security, focusing such as encryption algo- rithms and key exchange protocols has been the main topic of the information security

  11. A Formal model to aid documenting and harmonizing of information

    E-Print Network [OSTI]

    Zheng, Yuliang

    A Formal model to aid documenting and harmonizing of information security requirements Jussipekka Information security development, harmonization of information security, organizational modeling 1 INTRODUCTION A formal top down model to harmonize and document information security requirements shall

  12. Developmental Integrative BiologyCyber Security UNT is recognized by the National Security Agency and the Department of

    E-Print Network [OSTI]

    Tarau, Paul

    security. Information and computer security, trust and information assurance, systems architecture to identify and address a range of changing information sources and security vulnerabilities. UNT brings experts to address next generation challenges. The UNT-based Center for Information and Computer Security

  13. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  14. 29.01.03. M1.19 Information Resources Security Awareness Training Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    and require acknowledgement as determined by the department. 2.3 Departmental information technology personnel For interpretation or clarification, contact Information Technology Risk Management. OFFICE OF RESPONSIBILITY: Associate Vice President for Information Technology & Chief Information Officer #12;

  15. UNIVERSITY OF NEBRASKA-LINCOLN Annual Campus Security

    E-Print Network [OSTI]

    Farritor, Shane

    )......................................................................38 Geographical Information System and security information of the University of Nebraska-Lincoln for the 2011 calendar year. This information......................................................................................................................6 Information on Reporting

  16. F. Boavida et al. (Eds.): NETWORKING 2006, LNCS 3976, pp. 1210 1215, 2006. IFIP International Federation for Information Processing 2006

    E-Print Network [OSTI]

    need to know the state of the WSN. In this paper, we propose a model-aided approach to support- perimental results show the effectiveness of our approach. 1 Introduction A WSN may consist of a large number themselves based on the state information of the WSN. For example, Database technology has been adopted

  17. 3593Federal Register / Vol. 79, No. 14 / Wednesday, January 22, 2014 / Notices to read and prepare the information. No

    E-Print Network [OSTI]

    Rau, Don C.

    Poverty Guidelines AGENCY: Department of Health and Human Services. ACTION: Notice. SUMMARY: This notice provides an update of the Department of Health and Human Services (HHS) poverty guidelines to account that is responsible for that program. For information about poverty figures for immigration forms, the Hill

  18. Assessment of the Effects of Climate Change on Federal Hydropower

    SciTech Connect (OSTI)

    Sale, Michael J.; Shih-Chieh, Kao; Ashfaq, Moetasim; Kaiser, Dale P.; Martinez, Rocio; Webb, Cindy; Wei, Yaxing

    2012-10-01

    As directed by Congress in Section 9505 of the SECURE Water Act of 2009 (Public Law 111-11), the US Department of Energy (DOE), in consultation with the federal Power Marketing Administrations (PMAs) and other federal agencies, including federal dam owners, has prepared a comprehensive assessment examining the effects of climate change on water available for hydropower at federal facilities and on the marketing of power from these federal facilities. This Oak Ridge National Laboratory report, referred to as the “9505 Assessment,” describes the technical basis for the report to Congress that was called for in the SECURE Water Act.

  19. Evaluation of the Impact of EISA Federal Project Investments

    SciTech Connect (OSTI)

    Judd, Kathleen S.; Wendel, Emily M.; Morris, Scott L.; Williamson, Jennifer L.; Halverson, Mark A.; Livingston, Olga V.; Loper, Susan A.

    2012-12-31

    The DOE's Federal Energy Management Program has been charged by Office of Management and Budget to conduct an evaluation on actual and verifiable energy savings and carbon emissions reductions from federal energy management investments made across the Federal government as a result of the Energy Independence and Security Act of 2007. This study presents the findings from that evaluation.

  20. Search for Efficient Technologies and Products for Federal Applications

    Broader source: Energy.gov [DOE]

    The Federal Energy Management Program provides information and resources about energy- and water-efficient technologies and products that are well suited for federal applications and can help agencies meet federal laws and requirements.

  1. 6 Enterprise information risk management: Dealing with cloud computing

    E-Print Network [OSTI]

    Pym, David J.

    6 Enterprise information risk management: Dealing with cloud computing Adrian Baldwin HP Labs for the enterprise risk and security management lifecycle. Specifically, the economies of scale that large providers federated assurance for the cloud. 6.1 Introduction Managing IT risks remains a significant challenge

  2. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  3. Are We Compromised? Modelling Security Assessment Games

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    against cyber-attacks. A security assessment is the process of determining how effectively an entity being examples of cyber attacks that fit this profile are the security breach at RSA Data Security [6Are We Compromised? Modelling Security Assessment Games Viet Pham and Carlos Cid Information

  4. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  5. INSTITUTE FOR CYBER SECURITY Purpose-Centric

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security (ICS) University of Texas at San Antonio September 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Butler

  6. Publication and Protection of Sensitive Site Information in a Grid Infrastructure

    E-Print Network [OSTI]

    Cholia, Shreyas

    2008-01-01

    privacy and security of sensitive information. an analysisspecific problem. Security incident information is perhapsprovide more information to the OSG GOC and security team,

  7. Dynamic Information Flow Analysis for JavaScript in a Web Browser

    E-Print Network [OSTI]

    Austin, Thomas Howard

    2013-01-01

    languages for information security. PhD thesis, CornellInternational Journal of Information Security, 2009. [36]Workshop on Information and System Security, 2008. [35

  8. Let The People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    E-Print Network [OSTI]

    2006-01-01

    Acting Director of the Information Security Oversight OfficeActing Director, Information Security Oversight Office,Chemical Safety Information, Site Security and Fuels

  9. Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies

    E-Print Network [OSTI]

    Fleming, Charles

    2013-01-01

    Information SecurityACM Transactions on Information Security, 2011. [25] D. E.network. Of course, information security policies ap- ply to

  10. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  11. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  12. PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application

    Energy Savers [EERE]

    Assistant Project Manager, Technical Assurance Deanna Harvey, Program Analyst Allen Rome, Cyber Security Program Manger Chris Shipp, Information System Security Manager (504)...

  13. Introducing Abuse Frames for Analysing Security Requirements Luncheng Lin Bashar Nuseibeh Darrel Ince Michael Jackson Jonathan Moffett

    E-Print Network [OSTI]

    Nuseibeh, Bashar

    a focus for early security threat analysis. Traditional information security development methods haveIntroducing Abuse Frames for Analysing Security Requirements Luncheng Lin Bashar Nuseibeh Darrel using Jackson's Problem Frames to analyse security problems in order to determine security

  14. The Evolution of the Federal Monitoring and Assessment Center

    SciTech Connect (OSTI)

    NSTec Aerial Measurement System

    2012-07-31

    The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal emergency response asset whose assistance may be requested by the Department of Homeland Security (DHS), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Nuclear Regulatory Commission (NRC), and state and local agencies to respond to a nuclear or radiological incident. It is an interagency organization with representation from the Department of Energy’s National Nuclear Security Administration (DOE/NNSA), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Department of Health and Human Services (HHS), the Federal Bureau of Investigation (FBI), and other federal agencies. FRMAC, in its present form, was created in 1987 when the radiological support mission was assigned to the DOE’s Nevada Operations Office by DOE Headquarters. The FRMAC asset, including its predecessor entities, was created, grew, and evolved to function as a response to radiological incidents. Radiological emergency response exercises showed the need for a coordinated approach to managing federal emergency monitoring and assessment activities. The mission of FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment activities during a nuclear or radiological incident within the United States in support of state,local, tribal governments, DHS, and the federal coordinating agency. Radiological emergency response professionals with the DOE’s national laboratories support the Radiological Assistance Program (RAP), National Atmospheric Release Advisory Center (NARAC), the Aerial MeasuringSystem (AMS), and the Radiation Emergency Assistance Center/Training Site (REAC/TS). These teams support the FRMAC to provide: ? Atmospheric transport modeling ? Radiation monitoring ? Radiological analysis and data assessments ? Medical advice for radiation injuries In support of field operations, the FRMAC provides geographic information systems, communications, mechanical, electrical, logistics, and administrative support. The size of the FRMAC is tailored to the incident and is comprised of emergency response professionals drawn from across the federal government. State and local emergency response teams may also integrate their operations with FRMAC, but are not required to.

  15. Reimbursable Work for Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-02-28

    To authorize a modified process for the acceptance, performance, and administration of work from the Department of Homeland Security (DHS) by Department of Energy (DOE) contractor and federally operated laboratories, sites, and other facilities.

  16. Energy Citations Database (ECD) - Security/Disclaimer

    Office of Scientific and Technical Information (OSTI)

    Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

  17. 2011 WSU SPOKANE ANNUAL Security/Fire Safety

    E-Print Network [OSTI]

    Collins, Gary S.

    Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information Information and Preparation of Statistics 1 Director's Letter 2 Mission Statement and Security Department INFORMATION The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (also

  18. 2012 WSU SPOKANE ANNUAL Security/Fire Safety

    E-Print Network [OSTI]

    Collins, Gary S.

    Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information Information and Preparation of Statistics 1 Director's Letter 2 Mission Statement and Security Department INFORMATION The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (also

  19. 30-Day Federal Register Notice - Extension

    Energy Savers [EERE]

    30-Day Federal Register Notice - Extension 6450-01-P DEPARTMENT OF ENERGY Agency Information Collection Extension AGENCY: U.S. Department of Energy. ACTION: Submission for...

  20. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  1. M.. Uyar, A.Y. Duale, and M.A. Fecko (Eds.): TestCom 2006, LNCS 3964, pp. 103 117, 2006. IFIP International Federation for Information Processing 2006

    E-Print Network [OSTI]

    Kim, Yong Jung

    International Federation for Information Processing 2006 Generating Test Cases for Web Services Using Extended}@icu.ac.kr Abstract. Web services utilize a standard communication infrastructure such as XML and SOAP to communicate through the Internet. Even though Web ser- vices are becoming more and more widespread as an emerging

  2. Federal Register

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111,FYDepartmentBillionFederalDepartment2

  3. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  4. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  5. From CCNY IT Summary of Security Bulletin

    E-Print Network [OSTI]

    Sun, Yi

    code that will infect your computer and may result in the exposure of the information you have stored on your computer. To keep you informed, there is a mass-mailing worm often labeled "Here you have/CIS IT Security team: **Keep your endpoint security (e.g., anti-virus, software security patches) updated at all

  6. www.ISTS.dartmouth.edu Institute for Security,

    E-Print Network [OSTI]

    efficient, high- quality care. · Security of the power grid ­ exploring wayswww.ISTS.dartmouth.edu Institute for Security, Technology, and Society at Dartmouth College 6211 to pursuing research and education to advance information security and privacy throughout society ISTS

  7. John. F. O'Leary Appointed to Lead Federal Energy Administration...

    National Nuclear Security Administration (NNSA)

    John. F. O'Leary Appointed to Lead Federal Energy Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  8. Investigating Database Security in a Networked Environment

    E-Print Network [OSTI]

    Wagner, Paul J.

    Investigating Database Security in a Networked Environment Matthew Giuliani Computer Science wagnerpj@uwec.edu Abstract Database and network security have traditionally been separate fields within flowing between client and database systems. Although vender specific information is available for many

  9. The Technical Specification for the Security Content

    E-Print Network [OSTI]

    Security Agency (NSA); Jeff Ito, Matt Kerr, Shane Shaffer, and Greg Witte of G2, Inc.; Andy Bove of Secure Thompson of Booz Allen Hamilton; Alan Peltzman of the Defense Information Systems Agency (DISA); and Jon

  10. Cool Roof Resource Guide for Federal Agencies (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2009-07-01

    Resource guide containing information and links for the evaluation and installation of cool roofs within the Federal Government

  11. federal budget

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4)9 Federal RegisterStorm1 3446 YEAR/%2A en2/%2A4/%2A

  12. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) AugustA. GeographicYucca faultEGGUSE CODE2479 Federal

  13. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) AugustA. GeographicYucca faultEGGUSE54 Federal

  14. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    planning and oversight for programs funded by the Weapons Activities, Defense Nuclear Non- proliferation, for Weapons Ac- tivities and Defense Nuclear Nonproliferation, and Federal employees at the NNSA service379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special

  15. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    and oversight for programs funded by the Weapons Activities, Defense Nuclear Non- proliferation, and Naval pro- gram direction for Weapons Activities and Defense Nuclear Nonproliferation, and Federal employees361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special

  16. Int. J. Security and Networks, Vol. ESPAC: Enabling Security and Patient-centric Access

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    sensitive Personal Health Information (PHI), where PHI is expected to be securely stored in cloud storageHealth in cloud computing', Int. J. Security and Networks, Vol. Biographical notes: Mrinmoy Barua is now pursuingInt. J. Security and Networks, Vol. ESPAC: Enabling Security and Patient-centric Access Control

  17. Cyber Security via Signaling Games: Toward a Science of Cyber Security

    E-Print Network [OSTI]

    Mishra, Bud

    Cyber Security via Signaling Games: Toward a Science of Cyber Security W. Casey, J.A. Morales, T to address various cyber security problems involving exchange of information (asymmetrically). This research challenge in defining a science of cyber-security derives from the peculiar aspects of the field

  18. Challenges of Cyber Security Education at the Graduate Level

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director World-Leading Research with Real-World Impact! Institute for Cyber Security #12;Cyber technologies and systems have evolved Cyber security goals have evolved Computer security Information security

  19. A Cloud-Oriented Cross-Domain Security Architecture

    E-Print Network [OSTI]

    A Cloud-Oriented Cross-Domain Security Architecture Thuy D. Nguyen, Mark A. Gondree, David J to support a cloud of cross-domain services, hosted within a federation of multilevel secure (MLS) MYSEA}@nps.edu Abstract--The Monterey Security Architecture addresses the need to share high-value data across multiple

  20. Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid

    E-Print Network [OSTI]

    Kent, University of

    Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid R and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community in the education domain. We believe that this federated VO security model for fine grained access to Grid services