Sample records for federal information security

  1. Information Security: Coordination of Federal Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

  2. AT&TSecurity Consulting Information Assurance Federal Information Security

    E-Print Network [OSTI]

    Fisher, Kathleen

    the security controls for the information system. The AT&T Consulting methodology is based on National in addressing industry best practices and provide Security Authorization Process, formerly Certification requirements under the Federal Information Security Management Act of 2002, of general support systems

  3. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    assessments of Security Controls in Information Systems To obtain better understanding of Agency- related to hardware, software, firmware) Security Controls in an Information System, to determine the extent to which/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Questions during C&A Process

  4. NIST Seeks Input for Planned 2011 Update of Security Control Catalog For Federal Information Systems and Organizations

    E-Print Network [OSTI]

    ; · Supply chain security; · Industrial/process control systems; and · Privacy. NIST SP 80053, Revision 3 Publication 80053, Recommended Security Controls for Federal Information Systems and Organizations webbased access to the security controls for federal information systems and organizations

  5. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE's information systems. The uniform approach to describing controls for both national security and nonnational, implement, and assess their security controls most effectively when the process is carried out as part

  6. FEDERAL INFORMATION PROCESSING STANDARD

    E-Print Network [OSTI]

    March 2004 FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 199, STANDARDS FOR SECURITY Information Technology Laboratory National Institute of Standards and Technology A new Federal Information Processing Standard (FIPS), recently approved by the Secretary of Commerce, will help federal agencies

  7. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

  8. Recommended Security Controls for Federal Information Systems and Organizations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST 800-53 Revision 3 + Draft Revision 4 Recommended

  9. Meeting Federal Energy Security Requirements

    Broader source: Energy.gov [DOE]

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  10. ITL BULLETIN FOR AUGUST 2010 ASSESSING THE EFFECTIVENESS OF SECURITY CONTROLS IN FEDERAL

    E-Print Network [OSTI]

    discusses the process for assessing the security controls in organizational information systems that are implemented in federal information systems. The selection and assessment of appropriate security controls Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  15. Federal Register Notice: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNLNM) Federal Register Notice: National Nuclear Security Administration Site-Wide...

  16. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  17. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  18. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  19. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

  20. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  2. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  3. ITL BULLETIN FOR MAY 2013 ITL PUBLISHES SECURITY AND PRIVACY CONTROLS FOR FEDERAL AGENCIES

    E-Print Network [OSTI]

    The selection and implementation of security and privacy controls for information systems and organizations systems and organizations. Controls are also designed to satisfy a set of defined security requirements for federal information systems and organizations. It describes a process for selecting controls to protect

  4. September 2004 INFORMATION SECURITY

    E-Print Network [OSTI]

    September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

  5. Security In Information Systems

    E-Print Network [OSTI]

    Candan, Selçuk

    rights, and they are proposing security policies, security planning, personal data protection laws, etc

  6. OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring

    E-Print Network [OSTI]

    Calyam, Prasad

    - driven access to related federated Network Performance Mon- itoring (NPM) services are important federated authorization entitlement policies for timely orches- tration of NPM services. On measurement resources. We validate OnTimeSecure in a federated multi-domain NPM infrastructure by performing

  7. UC DAVIS -FEDERAL GRANT FINANCIAL REPORTING INFORMATION INFORMATION

    E-Print Network [OSTI]

    Schladow, S. Geoffrey

    UC DAVIS - FEDERAL GRANT FINANCIAL REPORTING INFORMATION GENERAL INFORMATION · The University is required by Federal sponsors to submit Financial Status Reports (FSRs) on all federal awards no later than.) o Extension of final budget period of a project period without additional Federal funds. o Change

  8. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  9. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  10. 06 DEC 2013 1 Information Security Guideline

    E-Print Network [OSTI]

    Queitsch, Christine

    responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

  11. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Environmental Management (EM)

    INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

  12. A Strategy for Information Security: TOGAF , A. Movasseghi2

    E-Print Network [OSTI]

    Ertaull, Levent

    Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

  13. Request for Information on Improving Performance of Federal Permitting...

    Broader source: Energy.gov (indexed) [DOE]

    of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of...

  14. Security Federation in the Vehicular Networks Submitted to SAR-SSI 2011 1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security Federation in the Vehicular Networks Submitted to SAR-SSI 2011 1 Federated claims based authentication and access control in the vehicular networks Ramzi Debab (r_debab@esi.dz)* Yacine Challal in order to federate the existing techniques and even future ones. WS-Federation is one of the keys aiming

  15. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  16. Nuclear dependence| The Russian Federation's future reliance on nuclear weapons for national security.

    E-Print Network [OSTI]

    Lukszo, Adam J.

    2011-01-01T23:59:59.000Z

    ?? The Russian Federation's reliance on nuclear weapons for national security will steadily increase over time. Based on current evidence and historical data, the Russian… (more)

  17. Building an Information Technology Security Awareness

    E-Print Network [OSTI]

    Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

  18. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  19. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  20. Federal Register Notice: Proposed Agency Information Collection

    Broader source: Energy.gov [DOE]

    Federal Register Notice on the DOE’s invitation for public comment on its request to the Office of Management and Budget (OMB) to extend for three years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910–5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before November 7, 2011.

  1. Federal Register Notice: Proposed Agency Information Collection

    Broader source: Energy.gov [DOE]

    Federal Register Notice on the DOE’s invitation for public comment on its intent to request the Office of Management and Budget (OMB) to extend for four years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910–5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before October 11, 2011.

  2. Information Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for planningtoA JourneyISTI Information Science

  3. Electronic DOE Information Security System (eDISS) PIA, Office...

    Office of Environmental Management (EM)

    DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

  4. MSc and Postgraduate Diploma in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    of information security need internationally-recognised qualifications which How will the course help my career and understanding of What do employers say? Worldwide Access | Opportunity | International Standards qualifications. #12;`Attending my first Information Security supplier event after graduating made me reali

  5. Federal Funding Sources of Information Sources for Automatic Funding Notices

    E-Print Network [OSTI]

    ;Federal Funding Sources of Information r Grant Programs & Deadlines q World Health Organization - GrantFederal Funding Sources of Information Sources for Automatic Funding Notices q Catalogue of Federal Domestic Assistance q Grants.Gov q FedBizOpps q The Foundation Center r RFP Bulletin r Philanthropy News

  6. Information Resources Security Planning and Policy Committee -UTDPP1003

    E-Print Network [OSTI]

    O'Toole, Alice J.

    Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security Planning and Policy Committee Policy Statement The Information Resources Planning, and Policy a security plan to protect information identified as confidential, sensitive or both. 3. Assign management

  7. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  8. U-200: Red Hat Directory Server Information Disclosure Security...

    Broader source: Energy.gov (indexed) [DOE]

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  9. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  10. Information Security: Coordination of Federal Cyber Security Research and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomentheATLANTA,Fermi NationalBusiness PlanPosting Thomas F.Needs

  11. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01T23:59:59.000Z

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  12. Smart Grid Information Security (IS) Functional Requirement

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01T23:59:59.000Z

    It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

  13. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  14. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  15. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  16. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03T23:59:59.000Z

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  17. Principles of Secure Information Flow Analysis Geoffrey Smith

    E-Print Network [OSTI]

    Smith, Geoffrey

    Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

  18. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful with the guidance of their senior administrators. The re-organization in some of the finance offices continues the intranet site. #12;2 Harry Dumay, PhD MBA Chief Financial Officer/ Associate Dean for Finance

  19. Optimal Information Security Investment with Penetration Testing

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    gathering prior to investing into protection against so-identified threats. Penetration testing is alsoOptimal Information Security Investment with Penetration Testing Rainer B¨ohme and M´ark F´elegyh´azi International Computer Science Institute, Berkeley, California {rainer.boehme|mark}@icsi.berkeley.edu Abstract

  20. PRIVACY AND SECURITY OF PERSONAL INFORMATION

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

  1. Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security

    E-Print Network [OSTI]

    Kim, Kwangjo

    Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

  2. Ontological Mapping of Information Security Best-Practice Guidelines

    E-Print Network [OSTI]

    best-practice guidelines, security ontology, EBIOS, IT Grundschutz Manual. 1 Introduction In recent- schutz Manual [4] to the security ontology by [6]. 2 Ontological Mapping of Information Security Best-PracticeOntological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner

  3. Information Resources Security Planning and Policy Committee -UTDPP1003

    E-Print Network [OSTI]

    O'Toole, Alice J.

    Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security it is confidential, sensitive, both or neither. 2. Prepare a security plan to protect information identified as confidential, sensitive or both. 3. Assign management responsibility for implementing the security plan. 4

  4. Federal government information handbook: formerly utilized sites remedial action program

    SciTech Connect (OSTI)

    Not Available

    1980-12-31T23:59:59.000Z

    This volume is one of a series produced under contract with the DOE, by Politech Corporation to develop a legislative and regulatory data base to assist the FUSRAP management in addressing the institutional and socioeconomic issues involved in carrying out the Formerly Utilized Sites Remedial Action Program. This Information Handbook series contains information about all relevant government agencies at the Federal and state levels, the pertinent programs they administer, each affected state legislature, and current Federal and state legislative and regulatory initiatives. This volume is a compilation of information about the Federal Government. It contains a summary of the organization and responsibilities of agencies within the executive branch of the Federal government which may be relevant to FUSRAP activities; a brief summary of relevant Federal statutes and regulations; a description of the structure of the US Congress, identification of the officers, relevant committees and committee chairmen; a description of the Federal legislative process; a summary of legislation enacted and considered in the recently-adjourned 96th Congress; a description of the Federal budgetary process; a summary of the Carter Administration's comprehensive radioactive waste management program; and excerpts from the text of relevant federal statutes and regulations.

  5. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17T23:59:59.000Z

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing Department of Energy (DOE), including National Nuclear Security Administration (NNSA), Federal workers with a safe and healthful workplace. Cancels DOE O 440.1A. Certified 6/17/2011. Canceled by DOE O 440.1B Chg 1.

  6. Federal Trade Commission Su acceso a informes de crdito gratuitos

    E-Print Network [OSTI]

    Federal Trade Commission Su acceso a informes de crédito gratuitos Your Access to Free Credit Reports La Ley de Informe Imparcial de Crédito requiere que, a su pedido, cada una de las compañías de informes de los consumidores a nivel nacional -- Equifax, Experian y TransUnion -- le provea cada 12 meses

  7. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Squicciarini, Anna Cinzia

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  8. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Giles, C. Lee

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  9. Federal Register Notice: National Nuclear Security Administration Site-Wide

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASH 2004-12 AprilEnergyEnvironmental

  10. NIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4,

    E-Print Network [OSTI]

    and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, which .............................................................. 3 Figure 3: Security Control Selection Process

  11. Federated Rural Electric Assn | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (Smart GridHomeFederated Rural Electric Assn Place:

  12. Federal Reporting Recipient Information | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASHof Energy Planning

  13. Federal Reporting Recipient Information | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASHof Energy PlanningSeptember 12,

  14. Federal Reporting Recipient Information | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASHof Energy PlanningSeptember

  15. Federated Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProjectExpress JumpRegister -Federated

  16. Information Security Framework for Small and Medium Sized Businesses

    E-Print Network [OSTI]

    Michnick, Steven M.

    2009-06-17T23:59:59.000Z

    prevalent risks to business information and commonly exploited security holes can quickly close the door to a security incident. Just as with traditional burglary attempts, the computer criminals will first look for the path of least resistance when trying...

  17. The Relationship Between Information Security and Fraud Risk Management

    E-Print Network [OSTI]

    Huang, Jianwei

    of Regional Security & Fraud Risk HSBC THE CHINESE UNIVERSITY OF HONG KONG Department of Information current role in HSBC, as the Head of Regional Security & Fraud for Asia Pacific involves financial crime

  18. Modern Quantum Technologies of Information Security

    E-Print Network [OSTI]

    Korchenko, Oleksandr; Gnatyuk, Sergiy

    2010-01-01T23:59:59.000Z

    In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

  19. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude'SecurityAdministration rankedInformation | National

  20. Federal Power Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpen Energy InformationInformation Royalty Management Act

  1. DyKnow Federations: Distributing and Merging Information Among UAVs

    E-Print Network [OSTI]

    Doherty, Patrick

    DyKnow Federations: Distributing and Merging Information Among UAVs Fredrik Heintz and Patrick, patdo}@ida.liu.se Abstract--As unmanned aerial vehicle (UAV) applications be- come more complex and versatile there is an increasing need to allow multiple UAVs to cooperate to solve problems which are beyond

  2. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01T23:59:59.000Z

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  3. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  4. CMAD IV 11/14/96 Information Security

    E-Print Network [OSTI]

    California at Davis, University of

    utilities, power pools, vendors etc.. #12;CMAD IV 11/14/96 #12; #12; GridCo LineCo PoolCo Energy Merchant INFO INFO INFO $ $ $ PWR PWR PWR #12;CMAD IV 11/14/96 "Future" Is At Hand · Federal Energy Regulatory protection and audit practices inadequate. · Internal priorities limiting attention to security concerns

  5. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  6. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

  7. Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY

    E-Print Network [OSTI]

    Code of Practice for Information Security Management (ISO/IEC 27002:2005) The international standard Electrotechnical Commission (IEC) A global organization that develops and publishes standards, the private sector, consumer groups, professional associations, and others. International Organization

  8. Information Security Plan for Flight Simulator Applications

    E-Print Network [OSTI]

    Slaughter, Jason

    2011-01-01T23:59:59.000Z

    The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. We will be creating a system that will allow them to access their programs, back office and administrator functions remotely. A security plan outlining our security architecture will be delivered prior to the final code roll out. The plan will include responses to encryption used and the security architecture applied in the final documentation. The code will be delivered in phases to work out any issues that may occur during the implementation

  9. TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop

    E-Print Network [OSTI]

    security 1. PROBLEM STATEMENT Software engineers used standard software engineering processes to develop of software are annoying, but delays of an hour are not catastrophic. But in certain environments (notably to use techniques, and--more importantly--how to analyze social, political, and cultural environments

  10. TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop

    E-Print Network [OSTI]

    Bishop, Matt

    security 1. PROBLEM S A EMEN Software engineers used standard software engineering processes to develop and scenarios drawn from political science, history, and other humanities to force students to apply or derive the process enjoyable, stimulating, and effective. Key words: environment, judgment, instruction, computer

  11. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and Operating (M&O) Contract Competition Program Information Program Information FY 2015 Performance Evaluation Plan (PEP) FY 2013 Performance Evaluation Report (PER)...

  12. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  13. Information Flow for Secure Distributed Applications

    E-Print Network [OSTI]

    Cheng, Winnie Wing-Yee

    2009-08-27T23:59:59.000Z

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  14. Information flow for secure distributed applications

    E-Print Network [OSTI]

    Cheng, Winnie Wing-Yee

    2009-01-01T23:59:59.000Z

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  15. Research and Practice in Federated Information Systems Report of the EFIS '2000 International Workshop

    E-Print Network [OSTI]

    Houben, Geert-Jan

    for federated system integration, and the use of meta- directories in building federations. DetailsResearch and Practice in Federated Information Systems Report of the EFIS '2000 International Workshop W. Hasselbring W.-J. van den Heuvel y G.J. Houben z R.-D. Kutsche x B. Rieger M. Roantree k K

  16. Vendor Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500IIVasudha Patri MechanicalofVehicles - ORNL

  17. Page 10, Security Forms and Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Para9EnvironmentalPage of 1 pages1 of

  18. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    SciTech Connect (OSTI)

    Koker, Denise; Micheau, Jill M.

    2006-07-01T23:59:59.000Z

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  19. Information Security Analysis Using Game Theory and Simulation

    SciTech Connect (OSTI)

    Schlicher, Bob G [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

  20. Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.

    E-Print Network [OSTI]

    Lee, Ruby B.

    , military, process control . K.6.5 [Management Of Computing And Information Systems]: Security/server, distributed applications, distributed databases. J.7 [Computers In Other Systems]: Command and control security, unauthorized access. General Terms Management, Design, Security. Keywords Access Control

  1. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23T23:59:59.000Z

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Cancels DOE 5639.8.

  2. Roadmap: Computer Science Information Security -Bachelor of Science

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Computer Science ­ Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012­2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

  3. Finance, IT Operations& InformationSecurity Dear Colleagues,

    E-Print Network [OSTI]

    -examine collectively the customer service aspect of our grant and contract management. A dozen SEAS members, including, is Information Technology. While Indir has stepped into the role of Interim IT Director to keep the proverbial and to check out interesting tips about securing mobile devices and avoiding phishing scams. Harry Dumay, Ph

  4. Find It. Delete It. Protect It. Information Technology Security Strategy

    E-Print Network [OSTI]

    Sheridan, Jennifer

    that security will be a process rather than project. Achievement of the goal, optimized risk management to external best practices and seek external advice on effectiveness. For critical processes and systems valuable information for governance. This process will achieve the long term Internal Controls Maturity

  5. Office of the CISO, December 2010 Information Security Risk Advisory

    E-Print Network [OSTI]

    Queitsch, Christine

    Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

  6. Federating Distributed and Heterogeneous Information Sources in Neuroimaging: The NeuroBase Project Federating Distributed and Heterogeneous In-

    E-Print Network [OSTI]

    Boyer, Edmond

    Federating Distributed and Heterogeneous Information Sources in Neuroimaging: The NeuroBase ProjectBase Project C. Barillot1 , H. Benali2 , M. Dojat4 , A. Gaignard1 , B. Gibaud1 , S. Kinkingnéhun2 , J Sources in Neuroimaging: The NeuroBase Project C. Barillot1 , H. Benali2 , M. Dojat3 , A. Gaignard1 , B

  7. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    -component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  8. Contact Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartmentStewardshipAdministration helps|STEMChernobylMarchInformation |

  9. Area Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone by E-mailRadioimmunotherapyArchiveAre Earths Rare?Information

  10. Secure quantum private information retrieval using phase-encoded queries

    E-Print Network [OSTI]

    Olejnik, L

    2011-01-01T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries {[}Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that...

  11. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01T23:59:59.000Z

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  12. Information Technology Specialist (System Analysis/Information Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will provide the technical direction, planning, programming, implementation and operations of the Information Technology (IT) program for the Carlsbad Field...

  13. Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Downing, Timothy R.; Fangman, Patricia M.; Homer, Brian J.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Millard, W. David; Stoops, Lamar R.; Wood, Blanche M.

    1999-03-05T23:59:59.000Z

    Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

  14. The 5 Waves of Information Security From Kristian Beckman to the Present

    E-Print Network [OSTI]

    Boyer, Edmond

    The 5 Waves of Information Security ­ From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security ­ the Third Wave (von Solms, 2000) and Information Security ­ the Fourth Wave (von Solms, 2006), as well as a paper

  15. Credit Leona Securities Asia CLSA UK | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentratingRenewable Solutions LLC Jump to:InformationCrandall, Texas:Credit Leona Securities

  16. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  17. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.5

    SciTech Connect (OSTI)

    Bower, John C. (BATTELLE (PACIFIC NW LAB)); Burnett, Robert A. (BATTELLE (PACIFIC NW LAB)); Carter, Richard J. (BATTELLE (PACIFIC NW LAB)); Downing, Timothy R. (BATTELLE (PACIFIC NW LAB)); Homer, Brian J. (BATTELLE (PACIFIC NW LAB)); Holter, Nancy A. (BATTELLE (PACIFIC NW LAB)); Johnson, Daniel M. (BATTELLE (PACIFIC NW LAB)); Johnson, Ranata L. (BATTELLE (PACIFIC NW LAB)); Johnson, Sharon M. (BATTELLE (PACIFIC NW LAB)); Loveall, Robert M. (BATTELLE (PACIFIC NW LAB)); Ramos Jr., Juan (BATTELLE (PACIFIC NW LAB)); Schulze, Stacy A. (BATTELLE (PACIFIC NW LAB)); Sivaraman, Chitra (BATTELLE (PACIFIC NW LAB)); Stephan, Alex J. (BATTELLE (PACIFIC NW LAB)); Stoops, Lamar R. (BATTELLE (PACIFIC NW LAB)); Wood, Blanche M. (BATTELLE (PACIFIC NW LAB))

    2001-12-01T23:59:59.000Z

    The Federal Emergency Management System (FEMIS) is an emergency management planning and response tool. The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

  18. Category:Federal Oil and Gas Statutes | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpenWendeGuoCatalyst Renewables Jump to:En Español JumpFederalFederal

  19. Federal Railroad Administration

    Broader source: Energy.gov (indexed) [DOE]

    Transportation Federal Railroad Administration Overview of Proposed Rail Safety & Security Rulemakings Kevin R. Blackwell FRA Hazmat Division Washington, DC Federal Authority DOT...

  20. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F.; Carroll, J.; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30T23:59:59.000Z

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  1. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect (OSTI)

    Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

    2011-08-15T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  2. GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensional Subject: Guidance for Fast-Track CooperativeGAOa GAOthe Chairman,

  3. UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY

    E-Print Network [OSTI]

    Adali, Tulay

    UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

  4. Algorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security

    E-Print Network [OSTI]

    Khisti, Ashish, 1979-

    2009-01-01T23:59:59.000Z

    As modern infrastructure systems become increasingly more complex, we are faced with many new challenges in the area of information security. In this thesis we examine some approaches to security based on ideas from ...

  5. Voluntary Disclosure and Information Asymmetry: Evidence from the 2005 Securities Offering Reform

    E-Print Network [OSTI]

    SHROFF, NEMIT

    In 2005, the Securities and Exchange Commission enacted the Securities Offering Reform (Reform), which relaxes “gun-jumping” restrictions, thereby allowing firms to more freely disclose information before equity offerings. ...

  6. Proceedings of the 7th World Conference on Information Security Education

    E-Print Network [OSTI]

    Bishop, Matt

    Proceedings of the 7th World Conference on Information Security Education 9-10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1-933510-94-3 © IFIP TC11.8 97 moment. Thus, the notion of security varies

  7. Evergreen Securities formerly Ethanol Investments | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformationexplains a4Evendale, Ohio: EnergySecurities formerly

  8. CCC Federal License and Permit List | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin: EnergyBoston Areais aBurkittsville,Bushyhead,ButtsC &Energy2CCC Federal

  9. Category:Federal Oil and Gas Regulations | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCTBarreis aCallahanWind FarmAdd a new Federal Oil and Gas

  10. FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office of Audit|Department of Energy56Executive212-2012FAQSFAQSFAQs:CapturingFEDERAL

  11. Category:Federal Environmental Statutes | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpenWendeGuoCatalyst Renewables Jump to:En Español JumpFederal

  12. Federal Heights, Colorado: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,FauquierGrant Program Jump to:Federal

  13. How information resources are used by federal agencies in risk assessment application: Rapporteur summary

    SciTech Connect (OSTI)

    Fenner-Crisp, P. [Environmental Protection Agency, Washington, DC (United States)

    1990-12-31T23:59:59.000Z

    The application of information available for risk assessment from the federal perspective is described. Different federal agencies conduct varying degrees of hazard evaluation, and some also generate empirical data. The role of the Agency for Toxic Substances and Disease Registry in hazard assessments of potential public health impacts of Superfund sites includes identification of the 275 most significant substances. ATSDR is responsible for preparing toxicological profiles. ATSDR also identifies data gaps and needs critical to adequately assessing human health impacts.

  14. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17T23:59:59.000Z

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12. Cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13.

  15. Information Flow Control for Secure Web Sites Maxwell Norman Krohn

    E-Print Network [OSTI]

    smaller, and configure the Web site's security policies. They need only change when the policy changes

  16. THE UNIVERSITY OF TEXAS AT DALLAS INFORMATION SECURITY

    E-Print Network [OSTI]

    O'Toole, Alice J.

    . Instead, these requirements should be integrated into a comprehensive system security plan. II. Scope

  17. Information-Theoretically Secure Communication Under Channel Uncertainty

    E-Print Network [OSTI]

    Ly, Hung Dinh

    2012-07-16T23:59:59.000Z

    . In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We...

  18. automated federal information: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Technologies and Information Sciences Websites Summary: , 2012) This annual report, submitted as a memorandum from the Inspector General to the NASA Administrator,...

  19. MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

    E-Print Network [OSTI]

    a well-defined process for managing and controlling secure system configurations, and for managing risks, and the integration of security into the configuration management process throughout the life cycle of the system for establishing secure configurations in information systems; flow charts for SecCM processes and activities

  20. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

  1. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17T23:59:59.000Z

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12, cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13, cancels DOE O 440.1B Chg 1.

  2. Federal Advisory Committee Act of 1972 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpen Energy Information

  3. RAPID/Geothermal/Environment/Federal | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to: navigation, search RAPID Regulatory and Permitting InformationGeothermal/Environment

  4. Shared Solar: Current Landscape, Market Potential, and the Impact of Federal Securities Regulation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluatingconstructionSessioneightMemoryCanon,Data

  5. Efficient Private Information Retrieval Using Secure Xiangyao Yu, Christopher W. Fletcher

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    attention from the cryptography and security communities. Two main approaches to solve PIR have appearedEfficient Private Information Retrieval Using Secure Hardware Xiangyao Yu, Christopher W. Fletcher, marten, devadas}@mit.edu ABSTRACT Existing crypto-based Private Information Retrieval (PIR) schemes

  6. Federated DyKnow, a Distributed Information Fusion System for Collaborative UAVs

    E-Print Network [OSTI]

    Doherty, Patrick

    Federated DyKnow, a Distributed Information Fusion System for Collaborative UAVs Fredrik Heintz {frehe, patdo}@ida.liu.se Abstract--As unmanned aerial vehicle (UAV) applications are becoming more complex and covering larger physical areas there is an increasing need for multiple UAVs to cooperatively

  7. Information for the NIH Extramural Grantee Community During the Lapse of Federal Government Funding

    E-Print Network [OSTI]

    Kroll, Kristen L.

    Information for the NIH Extramural Grantee Community During the Lapse of Federal Government Funding by National Institutes of Health (NIH) Purpose The Government Fiscal Year (FY) 2013 ended on September 30 this lapse in appropriation will have on your grant/cooperative agreement or the availability of NIH

  8. Request for Information: Federal Government Power Purchase Agreements (PPA) Issues

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L dDepartmentnews-flashesEnergyRequest ForRequest for Information

  9. PKI-based security for peer-to-peer information sharing

    SciTech Connect (OSTI)

    Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

    2004-05-02T23:59:59.000Z

    The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

  10. Research With Students My principal research activities lie in information systems security with particular emphasis on access control

    E-Print Network [OSTI]

    of security, and secure transaction processing. My recent research has expanded beyond information systemsResearch With Students My principal research activities lie in information systems security and mining, semantic web and multimedia delivery. 1 Major Results · Security solutions for workflow systems

  11. PARS II New Contractor Information for Interconnection Security...

    Office of Environmental Management (EM)

    V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

  12. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  13. ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS

    E-Print Network [OSTI]

    Habib, Ayman

    ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

  14. Information Technology Security Training Requirements Appendix A --Learning Continuum A-1

    E-Print Network [OSTI]

    employees Security Awareness All employees involved with IT systems Security Basics and Literacy Information control. By accrediting a system or application, a manager accepts the associated risk. Accreditation, and Installation Controls -- the process of assuring that adequate controls are considered, evaluated, selected

  15. Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

  16. Proceedings of the 7 th World Conference on Information Security Education 910 June 2011, Lucerne, Switzerland

    E-Print Network [OSTI]

    Bishop, Matt

    Proceedings of the 7 th World Conference on Information Security Education 9­10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1­933510­94­3 © IFIP TC11.8 97 moment. Thus, the notion of security varies

  17. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard

    E-Print Network [OSTI]

    Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard Stefan Fenz an ontology-based framework to improve the preparation of ISO/IEC 27001 audits, and to strengthen the security elaborate on how ISO/IEC 27001 artifacts can be inte- grated into this ontology. A basic introduction

  18. GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor

    E-Print Network [OSTI]

    , was written by Karen Scarfone and Murugiah Souppaya of NIST, and by Amanda Cody and Angela Orebaugh of Booz Allen Hamilton. The new guide replaces NIST SP 800-42, Guideline on Network Security Testing. NIST SP

  19. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  20. An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions

    E-Print Network [OSTI]

    Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

    2006-01-01T23:59:59.000Z

    This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

  1. 29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    information resources. This includes, but is not limited to: laptops, Personal Digital Assistants (PDAs29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources ­ Portable Devices: Information Security Approved

  2. From Federal Computer Week:

    National Nuclear Security Administration (NNSA)

    Federal Computer Week: Energy agency launches performance-based pay system By Richard W. Walker Published on March 27, 2008 The Energy Department's National Nuclear Security...

  3. Delegating Network Security with More Information Stanford University

    E-Print Network [OSTI]

    's networks. Delegation makes administrators less of a bottle- neck when policy needs to be modified and allows network administration to follow organizational lines. To enable del- egation, we propose ident authority, the network administrator, that administrator has usually had to configure myriad security

  4. INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu

    E-Print Network [OSTI]

    Shyy, Wei

    what might be lurking there ready to attack. According to the SANS (SysAdmin, Audit, Network, Security the Internet with an administrator's account, your computer is at an even higher risk since most malicious code is designed to infiltrate your computer by using the total access of the administrator's account against you

  5. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Kolda, Tamara G.

    . Samatova, D. Speck, R. Srikant, J. Thomas, M. Wertheimer, P. C. Wong SANDIA REPORT SAND2004-6648 Unlimited Report of the DHS Workshop on Data Sciences September 22-23, 2004 Jointly released by Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  6. DOE Encourages Utility Sector Nominations to the Federal Communication...

    Broader source: Energy.gov (indexed) [DOE]

    the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council DOE Encourages Utility Sector Nominations to the Federal Communications...

  7. 29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.26 Information Resources ­ Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources ­ Information Security Risk Assessment Reviews security risk assessments are vital procedures for maintaining the security of information resources

  8. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.2

    SciTech Connect (OSTI)

    Burford, M.J.; Burnett, R.A.; Curtis, L.M. [and others

    1996-05-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS system package. System administrators, database administrators, and general users can use this guide to install, configure, and maintain the FEMIS client software package. This document provides a description of the FEMIS environment; distribution media; data, communications, and electronic mail servers; user workstations; and system management.

  9. On the Computational Practicality of Private Information Retrieval Network Security and Applied Cryptography Lab

    E-Print Network [OSTI]

    Carbunar, Bogdan

    On the Computational Practicality of Private Information Retrieval Radu Sion Network Security of single-server computational pri- vate information retrieval (PIR) for the purpose of preserv- ing client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real

  10. Information Security: The Human Perspective Kathleen M. Carley

    E-Print Network [OSTI]

    Sadeh, Norman M.

    , redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing resource records, and organizational accounting information. Recent cases of industrial espionage all point addressed if both technological and organizational issues are considered simultaneously. How should

  11. National Security Information Classification Guidance Fundamental Review, June 2012

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAXBalanced Scorecard Federal2 to:DieselEnergyHydrogen Storage1,

  12. Implementing Information Security and Its Technology: A LineManagement Perspective

    SciTech Connect (OSTI)

    Barletta, William A.

    2005-08-22T23:59:59.000Z

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  13. EcoSecurities Brasil Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It is classified asThisEcoGrid EU (Smart Grid Project) JumpEcoSecurities

  14. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002OpticsPeriodical: VolumeIComplaints - GoldenDepartment of

  15. TEPS/BPA Information | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign Object DamageSystemsU.S. TALKS1 | E nergyTEPS/BPA

  16. NMMSS Information, Reports & Forms | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclear SecurityNationalApplyMaintaining ForN x NSecurity| National

  17. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for37 East and West Other SLAC ResourcesSecurity /

  18. Federal Emergency Management Information system (FEMIS) data management guide. Version 1.2

    SciTech Connect (OSTI)

    Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Johnson, S.M.; Loveall, R.M.; Winters, C.

    1996-05-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of FEMIS. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, how it is loaded, and how it is managed while the system is in operation.

  19. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3

    SciTech Connect (OSTI)

    Burford, M.J.; Burnett, R.A.; Downing, T.R. [and others

    1996-12-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.

  20. Service oriented architecture governance tools within information security .

    E-Print Network [OSTI]

    Mokgosi, Letlhogonolo

    2012-01-01T23:59:59.000Z

    ??Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for… (more)

  1. Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.7

    SciTech Connect (OSTI)

    Arp, Jonathan A. (BATTELLE (PACIFIC NW LAB)); Downing, Timothy R. (BATTELLE (PACIFIC NW LAB)); Gackle, Philip P. (BATTELLE (PACIFIC NW LAB)); Homer, Brian J. (BATTELLE (PACIFIC NW LAB)); Johnson, Daniel M. (BATTELLE (PACIFIC NW LAB)); Johnson, Ranata L. (BATTELLE (PACIFIC NW LAB)); Johnson, Sharon M. (BATTELLE (PACIFIC NW LAB)); Loveall, Robert M. (BATTELLE (PACIFIC NW LAB)); Millard, W David (BATTELLE (PACIFIC NW LAB)); Stoops, Lamar R. (BATTELLE (PACIFIC NW LAB)); Tzemos, Spyridon (BATTELLE (PACIFIC NW LAB)); Wood, Blanche M. (BATTELLE (PACIFIC NW LAB))

    1999-12-01T23:59:59.000Z

    This document describes the hardware and software required for the Federal Emergency Management Information System version 1.4.7 (FEMIS v1.4.7) released by Pacific Northwest National Laboratory (PNNL). Information included in this document about hardware and software requirements is subject to change.

  2. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    devices have been used by cyber- criminals to launch attacks both within and outside universities information resources and to take action to mitigate that threat. Action that is taken will be based resource has been launched; 4) confidential, private, or proprietary electronic information

  3. Private Information Retrieval, Optimal for Users and Secure Coprocessors

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    @dbis.informatik.hu­berlin.de Abstract. A private information retrieval (PIR) protocol allows a user to retrieve one of N records from a database while hiding the identity of the record from the database server. A PIR protocol is optimal Private Information Retrieval (PIR) protocols. Formally, a PIR protocol allows a user to retrieve one of N

  4. An Information Security Education Initiative for Engineering and Computer Science

    E-Print Network [OSTI]

    and electronic commerce. These applications rely on a collection of switching systems, databases, network Science Board Task Force on Information Warfare { Defense (IW-D) 7]: The reality is that the vulnerability of the Department of Defense { and of the nation { to o ensive information warfare attack is largely a self

  5. Information Security: The Human Perspective Kathleen M. Carley

    E-Print Network [OSTI]

    Sadeh, Norman M.

    , redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing), CASOS ­ the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon network and knowledge management approach to discovering organizational vulnerabilities within companies

  6. Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

  7. Security in Information Systems: New Challenges and Opportunities

    E-Print Network [OSTI]

    Jurjens, Jan

    systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

  8. ISS-005, Laptop Encryption Standard 1/2 UCIT INFORMATION SECURITY STANDARDS

    E-Print Network [OSTI]

    Habib, Ayman

    ISS-005, Laptop Encryption Standard 1/2 UCIT INFORMATION SECURITY STANDARDS Laptop Encryption Standard Definitions 1 1.1 Encryption: The process used to protect the confidentiality and integrity contained within it is appropriately encrypted. Applicability 3 This standard applies to all UofC owned

  9. University of London International Academy MSc/PG Dip in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    from the criminal angle and presenting a study of computer crime and the computer criminal. We criminals. Pre-requisites None Essential Reading Cybercrime: The transformation of crime in the Information should be able to: follow trends in computer crime relate computer security methodologies to criminal

  10. Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy

    E-Print Network [OSTI]

    Maurer, Ueli

    Lucas Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT controls Supported by the Zurich Information Security Center. Work done while at ETH Zurich, Switzerland

  11. HybridSecure MPC: Trading InformationTheoretic Robustness for Computational Privacy

    E-Print Network [OSTI]

    Maurer, Ueli

    Lucas # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT--- Cryptographic controls # Supported by the Zurich Information Security Center. + Work done while at ETH Zurich

  12. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20T23:59:59.000Z

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13.

  13. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20T23:59:59.000Z

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13, cancels DOE G 440.1-1B.

  14. MN Office of Energy Security | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpIncMAKGalway Bay IEOWCCatcher.pngWavemill <MN Office of Energy

  15. Security-Widefield, Colorado: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd Jump to: navigation, search Name: Seadov PtySeboeis,Information

  16. Federal Emergency Management Information System (FEMIS). Data Management Guide, FEMIS: Phase 1, Version 1.1u

    SciTech Connect (OSTI)

    Burnett, R.A.; Johnson, D.M.; Johnson, S.M. [and others

    1995-06-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the U.S. Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system.

  17. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Arp, J.A.; Bower, J.C.; Burnett, R.A.; Carter, R.J.; Downing, T.R.; Fangman, P.M.; Gerhardstein, L.H.; Homer, B.J.; Johnson, D.M.; Johnson, R.L.; Johnson, S.M.; Loveall, R.M.; Martin, T.J.; Millard, W.D.; Schulze, S.A.; Stoops, L.R.; Tzemos, S.; Wood, B.M.

    1999-06-29T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.

  18. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.4

    SciTech Connect (OSTI)

    Arp, J.A.; Burnett, R.A.; Downing, T.R. [and others] [and others

    1997-11-21T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via telecommunications links.

  19. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  20. Reliability and the Federal Energy Regulatory Commission

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers the Federal Energy Regulatory Commission (FERC) strategic plan, the Federal Power Act (FPA), current energy security posture, and more.

  1. Federal Emergency Management Information System (FEMIS) system administration guide, version 1.4.5

    SciTech Connect (OSTI)

    Arp, J.A.; Burnett, R.A.; Carter, R.J. [and others

    1998-06-26T23:59:59.000Z

    The Federal Emergency Management Information Systems (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication, data distribution, and notification functionality necessary to operate FEMIS in a networked, client/server environment. The UNIX server provides an Oracle relational database management system (RDBMS) services, ARC/INFO GIS (optional) capabilities, and basic file management services. PNNL developed utilities that reside on the server include the Notification Service, the Command Service that executes the evacuation model, and AutoRecovery. To operate FEMIS, the Application Software must have access to a site specific FEMIS emergency management database. Data that pertains to an individual EOC`s jurisdiction is stored on the EOC`s local server. Information that needs to be accessible to all EOCs is automatically distributed by the FEMIS database to the other EOCs at the site.

  2. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

    2010-10-01T23:59:59.000Z

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  3. Boren Fellowship and Scholarship: Summer, semester, and year-long study in regions critical to US national security. Requires 1-year commitment to federal government. Scholarship campus deadline: mid-January. See also NSEP Flagship

    E-Print Network [OSTI]

    Bertini, Robert L.

    to US national security. Requires 1-year commitment to federal government. Scholarship campus deadline require university endorsement. Fulbright Grant: Cultural exchange funded by US State Department. One year receiving Pell Grants. Deadlines vary. Goldwater Scholarship: $7500 for up to 2 years of undergraduate study

  4. An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may partner with the

    E-Print Network [OSTI]

    .S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA scaling

  5. Int. J. Information and Computer Security, Vol. 4, No. 4, 2011 365 Copyright 2011 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    one of the business process security leitmotifs. It defines a mechanism that bridges the gap between workflow and access control systems. Delegation completion and authorisation enforcement are specified in workflow management systems', Int. J. Information and Computer Security, Vol. 4, No. 4, pp.365

  6. Federal Market Information Technology in the Post Flash Crash Era: Roles for Supercomputing

    SciTech Connect (OSTI)

    Bethel, E. Wes; Leinweber, David; Ruebel, Oliver; Wu, Kesheng

    2011-09-16T23:59:59.000Z

    This paper describes collaborative work between active traders, regulators, economists, and supercomputing researchers to replicate and extend investigations of the Flash Crash and other market anomalies in a National Laboratory HPC environment. Our work suggests that supercomputing tools and methods will be valuable to market regulators in achieving the goal of market safety, stability, and security. Research results using high frequency data and analytics are described, and directions for future development are discussed. Currently the key mechanism for preventing catastrophic market action are “circuit breakers.” We believe a more graduated approach, similar to the “yellow light” approach in motorsports to slow down traffic, might be a better way to achieve the same goal. To enable this objective, we study a number of indicators that could foresee hazards in market conditions and explore options to confirm such predictions. Our tests confirm that Volume Synchronized Probability of Informed Trading (VPIN) and a version of volume Herfindahl-Hirschman Index (HHI) for measuring market fragmentation can indeed give strong signals ahead of the Flash Crash event on May 6 2010. This is a preliminary step toward a full-fledged early-warning system for unusual market conditions.

  7. FOA for Assisting Federal Facilities with Energy Conservation Technologies Informational Webinar

    Broader source: Energy.gov [DOE]

    This webinar will highlight the funding opportunity announcement (FOA) that was issued on March 6, 2015. The AFFECT grant will provide funding for renewable energy projects at federal facilities...

  8. 54432 Federal Register / Vol. 76, No. 170 / Thursday, September 1, 2011 / Notices the contact information above by 5 p.m.

    E-Print Network [OSTI]

    .ohanlon@trade.gov or to the Renewable Energy and Energy Efficiency Advisory Committee, Office of Energy and Environmental Technologies and other Federal agencies to take this opportunity to comment on proposed and/or continuing information54432 Federal Register / Vol. 76, No. 170 / Thursday, September 1, 2011 / Notices the contact

  9. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect (OSTI)

    Farnham, Irene; Marutzky, Sam

    2014-12-01T23:59:59.000Z

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  10. Using Operational Security (OPSEC) to Support a Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

  11. Management of Control System Information SecurityI: Control System Patch Management

    SciTech Connect (OSTI)

    Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

    2011-09-01T23:59:59.000Z

    The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

  12. This paper, copyright the IEEE, appears in IEEE Symposium on Security and Privacy 2004. IEEE Computer Society Press, May 2004. This paper previously appeared as Johns Hopkins University Information Security

    E-Print Network [OSTI]

    Kohno, Tadayoshi

    This paper, copyright the IEEE, appears in IEEE Symposium on Security and Privacy 2004. IEEE U.S. federal funds now available to replace outdated punch-card and mechanical voting systems being detected by any mechanisms within the voting terminal software. Furthermore, we show that even

  13. University of London International Academy MSc/PG Dip in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    a computing system secure. This process starts with defining the proper security requirements, which system level. In order to understand these security controls we need to describe some background material systems will be examined as well as security related issues of computer architecture. Specific well

  14. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation

    E-Print Network [OSTI]

    number 428/11), Cabarnit Cyber Security MAGNET Consortium, Grant from the Institute for Future Defense;1 Introduction Secure multi-party computation (MPC) is a powerful concept in secure distributed computing Theoretically Secure Multi-Party Computation (Preliminary Report) Shlomi Dolev1 and Niv Gilboa2 and Ximing Li1 1

  15. Federal Employee Training Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-11T23:59:59.000Z

    This Manual provides detailed requirements to supplement DOE O 360.1B, FEDERAL EMPLOYEE TRAINING. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Cancels DOE M 360.1A-1. Canceled by DOE O 360.1C.

  16. Federal Employee Training Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-09-21T23:59:59.000Z

    This Manual provides detailed requirements to supplement DOE O 360.1A, Federal Employee Training, dated 9-21-99. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Canceled by DOE M 360.1-1B.

  17. Federal Technical Capability Program (FTCP) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Illness Compensation Program Pamphlet Federal Technical Capability Program (FTCP) Accident Investigation Reports Nuclear Safety Facility Safety Security Classification...

  18. File:08-FD-a - FederalTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublicIDAPowerPlantSitingConstruction.pdf Jump to: navigation, searchFD-a - FederalTransmission.pdf Jump to:

  19. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Arp, Jonathan A.; Bower, John C.; Burnett, Robert A.; Carter, Richard J.; Downing, Timothy R.; Fangman, Patricia M.; Gerhardstein, Lawrence H.; Homer, Brian J.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Loveall, Robert M.; Martin, Tonya J.; Millard, W. David; Schulze, Stacy A.; Stoops, Lamar R.; Tzemos, Spyridon; Wood, Blanche M.

    1999-06-24T23:59:59.000Z

    The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

  20. Federal Emergency Management Information System (FEMIS) System Administration Guide Version 1.5.3

    SciTech Connect (OSTI)

    Burnett, Robert A.; Carter, Richard J.; Downing, Timothy R.; Homer, Brian J.; Holter, Nancy A.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Loveall, Robert M.; Schulze, Stacy A.; Sivaraman, Chitra; Stephan, Alex J.; Stoops, LaMar R.; Wood, Blanche M.

    2002-11-20T23:59:59.000Z

    The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

  1. The Oak Ridge Technical Information Center: A trailblazer in federal documentation

    SciTech Connect (OSTI)

    Vaden, W.M.

    1992-01-01T23:59:59.000Z

    This document attempts to record the history of US AEC`s Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this document, with 18 chapters arranged into four sections according to different presidential administrations.

  2. The Oak Ridge Technical Information Center: A trailblazer in federal documentation

    SciTech Connect (OSTI)

    Vaden, W.M.

    1992-01-01T23:59:59.000Z

    This softbound book attempts to record the history of US AEC's Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this book, whose 18 chapters are arranged into four sections according to different presidential administrations.

  3. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  4. TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27

    E-Print Network [OSTI]

    TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines for all Texas Veterinary Medical Diagnostic Laboratory (TVMDL) positions. Reason for Procedure Under

  5. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30T23:59:59.000Z

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  6. Federal Government Energy Management Conservation Programs Reports...

    Broader source: Energy.gov (indexed) [DOE]

    Policy Act (NECPA, Pub. L. No. 95-619), as amended, and provide information on energy consumption in Federal buildings, operations, and vehicles. Compiled by the Federal...

  7. Federal Government Resources - Tribal Communities | Department...

    Energy Savers [EERE]

    preliminary information available regarding the tribal components of Federal Employees Health Benefits (FEHB) and Federal Employees' Group Life Insurance (FEGLI) coverage. OPM...

  8. TSO-1002 - In the Matter of Personnel Security Hearing | Department...

    Broader source: Energy.gov (indexed) [DOE]

    the Matter of Personnel Security Hearing The individual held a security clearance from 1990 until 2002 while working for government contractors and the federal government. In...

  9. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    . The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

  10. VOLUNTARY PROTECTION PROGRAM ONSITE REVIEW, Fluor Federal Services Richland, Washington February 26- March 2, 2001

    Broader source: Energy.gov [DOE]

    This report summarizes the results of the HSS DOE-VPP Team’s evaluation of Fluor Federal Services Richland, Washington during the period of February 26 - March 2, 2001, and provides the Chief Health, Safety and Security Officer with the necessary information to make the final decision regarding the company’s continued participation in DOE-VPP as a Star site.

  11. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01T23:59:59.000Z

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  12. Federal Emergency Management Information System (FEMIS) Data Management Guide Version 1.3

    SciTech Connect (OSTI)

    Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Hoza, M.; Johnson, S.M.; Loveall, R.M.; Millard, W.D.; Winters, C.; Wood, B.M.

    1996-12-01T23:59:59.000Z

    FEMIS is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. FEMIS is designed to help civilian emergency management personnel to plan for and support their responses to a chemical-releasing event at a military chemical stockpile. This guide provides the background as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the datafiles and database. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, loaded, and managed while the system is in operation.

  13. An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Request for Information

    E-Print Network [OSTI]

    .S. Department of Energy's NNSA ASM-SUB Request for Information Los Alamos National Laboratory Field Instruments by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA General Tasks On

  14. Federal Presence in Newfoundland and

    E-Print Network [OSTI]

    deYoung, Brad

    with the national levels Primary reliance on Statistics Canada data Objective: to inform the debate #12;II Employment Federal Government employment Overall Military Executives Federal Government Business Enterprises employment #12;Figure 7 Federal Government Employment Newfoundland and Labrador, 1981-2005 0 2

  15. Federal Biomass Activities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Budget Federal Biomass Activities Federal Biomass Activities Biopower Biopower Biofuels Biofuels Bioproducts Bioproducts Federal Biomass Activities Federal Biomass...

  16. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  17. Energy Security Planning for Sustainable Buildings

    Broader source: Energy.gov [DOE]

    For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to...

  18. Critical Mission Support Through Energy Security

    Broader source: Energy.gov [DOE]

    Presentation covers the critical mission support through energy security and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Rapid City, South Dakota.

  19. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses

  20. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses (not

  1. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1993-06-01T23:59:59.000Z

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  2. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  3. The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO.

    E-Print Network [OSTI]

    ' Information Technology policies require that any mobile device containing institutional data must be encrypted Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO. This directive Information Technology Appropriate Use Policy · Colorado School of Mines Administrative Data Policy Mines

  4. NNSA Awards Contract for Largest Federal Wind Farm to Siemens...

    National Nuclear Security Administration (NNSA)

    Contract for Largest Federal Wind Farm to Siemens Government Technologies, Inc. | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

  5. Y-12 Site Office Recognized For Contributions To Combined Federal...

    National Nuclear Security Administration (NNSA)

    To ... Y-12 Site Office Recognized For Contributions To Combined Federal Campaign OAK RIDGE, Tenn. -- Employees of the National Nuclear Security Administration's Y-12 Site...

  6. Energy-Efficient Product Procurement for Federal Agencies (Brochure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EPAct 2005 mandates Federal agen- cies to incorporate energy efficiency criteria into relevant contracts and specifications. * The Energy Independence and Security Act (EISA) of...

  7. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

    E-Print Network [OSTI]

    Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

    2010-01-01T23:59:59.000Z

    The importance of safeguarding information created and shared on computers and the Internet has increased significantly in recent years, as society has become increasingly dependent on information technology in government, ...

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  9. Utility Security & Resiliency: Working Together

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

  10. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  11. Meetings of the Federal Utility Partnership Working Group

    Broader source: Energy.gov [DOE]

    The Federal Utility Partnership Working Group (FUPWG) meets twice per year to share success stories, information on Federal Energy Management Program activities and other business.

  12. ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY

    E-Print Network [OSTI]

    is adequately addressed throughout the system development life cycle, and that data protection mechanisms. This approach involves addressing the protection of health information throughout the system development life cycle, and applying protective mechanisms, including contingency and disaster recovery planning

  13. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  14. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01T23:59:59.000Z

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  15. FEMP (Federal Energy Management Program) Update, Spring 1989

    SciTech Connect (OSTI)

    Not Available

    1989-04-01T23:59:59.000Z

    The FEMP Update, published quarterly by the Federal Energy Management Program (FEMP), provides information that will assist federal managers in their energy management responsibilities. The Update is distributed primarily to federal facility and energy management personnel.

  16. International Journal of Information Security manuscript No. (will be inserted by the editor)

    E-Print Network [OSTI]

    Ding, Xuhua

    Ding · Yanjiang Yang · Robert H. Deng · Shuhong Wang A New Hardware-assisted PIR with O(n) Shuffle Cost information re- trieval (PIR) was first formalized by Chor et. al, various constructions have been proposed on practical PIR schemes. In this paper, we propose a hardware-assisted PIR scheme with a novel shuffle

  17. Secure Group-based Information Sharing in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Wang, Yu

    efforts such as joint intrusion detection. As an example, Phoenix Joint Terrorism Task Forces have information. Therefore, in an integrated ad hoc network, group-based data access must be controlled through. First, even with Elliptic Curve Cryptography, symmetric encryption still has its unique advantages

  18. Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order with ROTC 1, Revision No. 0

    SciTech Connect (OSTI)

    Lynn Kidman

    2008-02-01T23:59:59.000Z

    Many Federal Facility Agreement and Consent Order (FFACO) Use Restrictions (URs) have been established at various corrective action sites (CASs) as part of FFACO corrective actions (FFACO, 1996; as amended January 2007). Since the signing of the FFACO in 1996, practices and procedures relating to the implementation of risk-based corrective action (RBCA) have evolved. This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: 1. Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria 2. Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria. 3. Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria.

  19. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

  20. DATABASE SECURITY APPLICATIONS

    E-Print Network [OSTI]

    Sandhu, Ravi

    DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

  1. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  2. Evaluation of the Impact of EISA Federal Project Investments

    SciTech Connect (OSTI)

    Judd, Kathleen S.; Wendel, Emily M.; Morris, Scott L.; Williamson, Jennifer L.; Halverson, Mark A.; Livingston, Olga V.; Loper, Susan A.

    2012-12-31T23:59:59.000Z

    The DOE's Federal Energy Management Program has been charged by Office of Management and Budget to conduct an evaluation on actual and verifiable energy savings and carbon emissions reductions from federal energy management investments made across the Federal government as a result of the Energy Independence and Security Act of 2007. This study presents the findings from that evaluation.

  3. This extended abstract appeared in Proceedings of the 2006 ACM Symposium on Information, computer and communications security (AsiaCCS '06)

    E-Print Network [OSTI]

    Abdalla, Michel Ferreira

    , however, have resulted in site security policy changes. Many sites are changing their security policies

  4. Preliminary Notice of Violation, National Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

  5. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31T23:59:59.000Z

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  6. A Database Management System for the Federal Courts

    E-Print Network [OSTI]

    Samet, Hanan

    A Database Management System for the Federal Courts JACK R. BUCHANAN, RICHARD D. FENNELL Federal Making Information Systems, Inc., McLean, VA 22101; R. D. Fennell, Federal Judicial Center, Washington, D and several large-scale information management systems projects have been undertaken within the Federal

  7. Securities Law Issues Relating to Community Solar Projects

    Broader source: Energy.gov [DOE]

    The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

  8. Safety and Security Interface Technology Initiative

    SciTech Connect (OSTI)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01T23:59:59.000Z

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.

  9. The Evolution of the Federal Monitoring and Assessment Center

    SciTech Connect (OSTI)

    NSTec Aerial Measurement System

    2012-07-31T23:59:59.000Z

    The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal emergency response asset whose assistance may be requested by the Department of Homeland Security (DHS), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Nuclear Regulatory Commission (NRC), and state and local agencies to respond to a nuclear or radiological incident. It is an interagency organization with representation from the Department of Energy’s National Nuclear Security Administration (DOE/NNSA), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Department of Health and Human Services (HHS), the Federal Bureau of Investigation (FBI), and other federal agencies. FRMAC, in its present form, was created in 1987 when the radiological support mission was assigned to the DOE’s Nevada Operations Office by DOE Headquarters. The FRMAC asset, including its predecessor entities, was created, grew, and evolved to function as a response to radiological incidents. Radiological emergency response exercises showed the need for a coordinated approach to managing federal emergency monitoring and assessment activities. The mission of FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment activities during a nuclear or radiological incident within the United States in support of state,local, tribal governments, DHS, and the federal coordinating agency. Radiological emergency response professionals with the DOE’s national laboratories support the Radiological Assistance Program (RAP), National Atmospheric Release Advisory Center (NARAC), the Aerial MeasuringSystem (AMS), and the Radiation Emergency Assistance Center/Training Site (REAC/TS). These teams support the FRMAC to provide: ? Atmospheric transport modeling ? Radiation monitoring ? Radiological analysis and data assessments ? Medical advice for radiation injuries In support of field operations, the FRMAC provides geographic information systems, communications, mechanical, electrical, logistics, and administrative support. The size of the FRMAC is tailored to the incident and is comprised of emergency response professionals drawn from across the federal government. State and local emergency response teams may also integrate their operations with FRMAC, but are not required to.

  10. Lemnos interoperable security project.

    SciTech Connect (OSTI)

    Halbgewachs, Ronald D.

    2010-03-01T23:59:59.000Z

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  11. 2015 DOE Safety and Security Enforcement Workshop - Badging and...

    Office of Environmental Management (EM)

    2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information 2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information January...

  12. Federal Buildings Supplemental Survey 1993

    SciTech Connect (OSTI)

    NONE

    1995-11-01T23:59:59.000Z

    The Energy Information Administration (EIA) of the US Department of Energy (DOE) is mandated by Congress to be the agency that collects, analyzes, and disseminates impartial, comprehensive data about energy including the volume consumed, its customers, and the purposes for which it is used. The Federal Buildings Supplemental Survey (FBSS) was conducted by EIA in conjunction with DOE`s Office of Federal Energy Management Programs (OFEMP) to gain a better understanding of how Federal buildings use energy. This report presents the data from 881 completed telephone interviews with Federal buildings in three Federal regions. These buildings were systematically selected using OFEMP`s specifications; therefore, these data do not statistically represent all Federal buildings in the country. The purpose of the FBSS was threefold: (1) to understand the characteristics of Federal buildings and their energy use; (2) to provide a baseline in these three Federal regions to measure future energy use in Federal buildings as required in EPACT; and (3) to compare building characteristics and energy use with the data collected in the CBECS.

  13. Social Security and Medicare Tax Liability An exemption from social security and Medicare taxes applies

    E-Print Network [OSTI]

    Chen, Tsuhan

    . Such persons are exempt from social security and Medicare taxes as long as they remain nonresident aliens for tax purposes. Those who become resident aliens must start paying social security and Medicare taxes resident aliens. If so, they must pay social security and Medicare taxes. Federal tax regulations state

  14. Delegation as Officially Designated Federal Security Authority...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NA Type: Organizations' Assignment of Responsibility Delegant: David Huizenga, Senior Advisor for Environmental Management Delegate: Mark Whitney, Manager, Oak Ridge Office of...

  15. Federal Employment | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxford SiteToledoSampling at the GrandSr:s I1Us |Contact

  16. federal budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICE OF CIVILAMENDMENT20/%2A6/%2A6/%2A

  17. Cool Roof Resource Guide for Federal Agencies (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2009-07-01T23:59:59.000Z

    Resource guide containing information and links for the evaluation and installation of cool roofs within the Federal Government

  18. Information Security Specialist

    Broader source: Energy.gov [DOE]

    THIS POSITION IS BEING ADVERTISED CONCURRENTLY UNDER MERIT PROMOTION PROCEDURES AS ANNOUNCEMENT # DOE-HQ-EA-15-00014-MP. YOU MUST APPLY TO THE VACANCY FOR WHICH YOU WISH TO RECEIVE CONSIDERATION....

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  1. ITL Bulletins are published by the Information Technology Laboratory

    E-Print Network [OSTI]

    Security Considerations in the Information System Development Life Cycle, December 2003 Computer Security

  2. John. F. O'Leary Appointed to Lead Federal Energy Administration...

    National Nuclear Security Administration (NNSA)

    John. F. O'Leary Appointed to Lead Federal Energy Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  3. Energy Citations Database (ECD) - Security/Disclaimer

    Office of Scientific and Technical Information (OSTI)

    Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

  4. Reimbursable Work for Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-02-28T23:59:59.000Z

    To authorize a modified process for the acceptance, performance, and administration of work from the Department of Homeland Security (DHS) by Department of Energy (DOE) contractor and federally operated laboratories, sites, and other facilities.

  5. Federal Trade Commission Necesita Crdito o Seguro?

    E-Print Network [OSTI]

    Comisión Federal de Comercio (Federal Trade Commission, FTC), la agencia nacional de protección del sus cuentas, es recolecta- da de su informe de crédito. A través de programas estadísticos, los a tiempo y en forma. Algunas compañías de seguros también usan la información en los informes de crédito

  6. Federal Register

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASH 2004-12 April 5, 2004

  7. Federal Register

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASH 2004-12 April 5, 200465541 Vol. 79,

  8. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google10 Federal

  9. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google10 Federal2985

  10. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google102479 Federal

  11. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google102479 Federal989

  12. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google10247954 Federal

  13. Federated search

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKYGas FedEx®|default SignFederated

  14. Technology Transfer Success Stories, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

  15. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  16. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    , efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  17. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  18. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  19. ACM Journal of Educational Resources in Computing, Vol. 6, No. 3, September 2006. Article 3. Teaching Context in Information Security

    E-Print Network [OSTI]

    Bishop, Matt

    __________________________________________________________________________________________ 1. INTRODUCTION Software engineers used standard software engineering processes to develop software political science, history, as well as other humanities, to force students to apply or derive principles and Protection General Terms: Management, Security Additional Key Words and Phrases: Environment, judgment

  20. Facilitating Sound, Cost-Effective Federal Energy Management (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-03-01T23:59:59.000Z

    This fact sheet is an overview of the U.S. Department of Energy's Federal Energy Management Program (FEMP). The Federal Government, as the nation's largest energy consumer, has a tremendous opportunity and acknowledged responsibility to lead by example. The U.S. Department of Energy's (DOE's) Federal Energy Management Program (FEMP) plays a critical role in this effort. FEMP facilitates the Federal Government's implementation of sound, cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. FEMP does this by focusing on the needs of its Federal customers, delivering an array of services across a variety of program areas.

  1. FEDERAL EMERGENCY MANAGEMENT AGENCY ARE YOU READY? 83

    E-Print Network [OSTI]

    Tullos, Desiree

    FEDERAL EMERGENCY MANAGEMENT AGENCY ARE YOU READY? 83 National Security Emergencies I n addition uncomfortable or if something does not seem right. #12;84 ARE YOU READY? FEDERAL EMERGENCY MANAGEMENT AGENCY 4- rupted--electricity, telephone, natural gas, gasoline pumps, cash registers, ATM machines, and internet

  2. Federal Utility Partnership Working Group Spring 2009 Meeting Welcome

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—covers the Federal Energy Management Program (FEMP) mission and services; Energy Independence and Security Act (EISA) Section 432 guidance; and American Reinvestment and Recovery Act (ARRA).

  3. Federal Express | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProjectExpress Jump to: navigation,

  4. Federal Register | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProjectExpress JumpRegister -

  5. Ordering Copies of PITAC Reports This report is published by the National Coordination Office for Information

    E-Print Network [OSTI]

    Anderson, Richard

    effects. Thus, it is a prime target for cyber terrorism as well as criminal acts. The IT infrastructure of Federally developed cutting-edge cyber security technologies to the private sector. · Strengthen it under the Networking and Information Technology Research and Development (NITRD) Program. These actions

  6. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  7. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  8. WIPP Documents - Federal Regulations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert SouthwestTechnologies | Blandine Jerome VelenciaNewsNewsFederal Regulations 40 CFR

  9. Federal Railroad Administration

    Broader source: Energy.gov (indexed) [DOE]

    Manager Federal Railroad Administration Federal Railroad Administration Dedicated Train Study- Report to Congress FRA' s Research & Development Office (as lead on the study)...

  10. The Security Plan: Effectively Teaching How To Write One

    E-Print Network [OSTI]

    1 The Security Plan: Effectively Teaching How To Write One Paul C. Clark Naval Postgraduate School government requires all federal systems to have a customized security plan. In addition, the National this standard to produce students capable of developing a security plan. The Naval Postgraduate School (NPS

  11. advancing nuclear security: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    private information within the system Paris-Sud XI, Universit de 183 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

  12. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  13. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  14. Estimating the Effects of Climate Change on Federal Hydropower and Power Marketing

    SciTech Connect (OSTI)

    Sale, Michael J [ORNL; Kao, Shih-Chieh [ORNL; Uria Martinez, Rocio [ORNL; Wei, Yaxing [ORNL

    2011-01-01T23:59:59.000Z

    The U.S. Department of Energy is currently preparing an assessment of the effects of climate change on federal hydropower, as directed by Congress in Section 9505 of the Secure Water Act of 2009 (P.L. 111-11). This paper describes the assessment approach being used in a Report to Congress currently being prepared by Oak Ridge National Laboratory. The 9505 assessment will examine climate change effects on water available for hydropower operations and the future power supplies marketed from federal hydropower projects. It will also include recommendations from the Power Marketing Administrations (PMAs) on potential changes in operation or contracting practices that could address these effects and risks of climate change. Potential adaption and mitigation strategies will also be identified. Federal hydropower comprises approximately half of the U.S. hydropower portfolio. The results from the 9505 assessment will promote better understanding among federal dam owners/operators of the sensitivity of their facilities to water availability, and it will provide a basis for planning future actions that will enable adaptation to climate variability and change. The end-users of information are Congressional members, their staff, the PMAs and their customers, federal dam owners/operators, and the DOE Water Power Program.

  15. Measuring the Economic Impacts of Federal Investments in Research

    SciTech Connect (OSTI)

    Olson, S; Merrill, S

    2011-08-31T23:59:59.000Z

    Measuring the Economic Impacts of Federal Investments in Research evaluates approaches to measuring the returns on federal research investments. This report identifies new methodologies and metrics that can be developed and used for assessing returns on research across a wide range of fields (biomedical, information technology, energy, agriculture, environment, and other biological and physical sciences, etc.), while using one or more background papers that review current methodologies as a starting point for the discussion. It focuses on tools that are able to exploit available data in the relatively near term rather than on methodologies that may require substantial new data collection. Over the last several years, there has been a growing interest in policy circles in identifying the payoffs from federal agency research investments, especially in terms of economic growth, competitiveness, and jobs. The extraordinary increase in research expenditures under the American Recovery and Reinvestment Act (ARRA) of 2009 and the President�������¢����������������s commitment to science and technology (S&T) funding increases going forward have heightened the need for measuring the impacts of research investments. Without a credible analysis of their outcomes, the recent and proposed increases in S&T funding may not be sustained, especially given competing claims for federal funding and pressures to reduce projected federal budget deficits. Motivated by these needs and requirements, Measuring the Economic Impacts of Federal Investments in Research reviews and discusses the use of quantitative and qualitative data to evaluate the returns on federal research and development (R&D) investments. Despite the job-focused mandate of the current ARRA reporting requirements, the impact of S&T funding extend well beyond employment. For instance, federal funding in energy research may lead to innovations that would reduce energy costs at the household level, energy imports at the national level, and greenhouse gas emissions at the global level. In principle, these benefits can be measured as a return on research investments, with appropriate consideration of time lags to research outcomes and attribution to private as well as public expenditure. With appropriate metrics, the same could be true for benefits to public health, environmental quality, and food productivity and security. Federal funding of research leads to the development of human capital that is deployed in a variety of occupations with economic and social impacts. Research also produces information that is used in formal (e.g., regulatory and judicial) and informal (e.g., firm and consumer) decision making processes. In addition to reviewing the range of work (by academics, consultants, and research agencies themselves) that has been done in measuring research outcomes and providing a forum to discuss their methods, this report also considers the different methodologies used across fields of research (e.g., agriculture and energy research) to identifies which are applicable to a range of federal S&T funding.

  16. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21T23:59:59.000Z

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  17. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04T23:59:59.000Z

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  18. Federal Laboratory Technology Transfer

    E-Print Network [OSTI]

    Perkins, Richard A.

    Federal Laboratory Technology Transfer Fiscal Year 2007 Prepared by: National Institute to present to the President and the Congress this Federal Laboratory Technology Transfer Report summarizing the achievements of Federal technology transfer and partnering programs of the Federal research and development

  19. Federal Aviation Administration

    E-Print Network [OSTI]

    transportation systems FAA's RDT&E Organization: Federal Laboratory for R&D of aviation systems IndependentFederal Aviation Administration Federal Aviation AdministrationNextGen: Primer, Challenges. Wilson N. Felder Director, FAA William J. Hughes Technical Center Date: 6 February 2012 #12;2Federal

  20. Federal Resume Guide

    Broader source: Energy.gov [DOE]

    This Learning Module will offer helpful tips and suggestions on the development of a federal resume.

  1. Federal Technology Alert: Ground-Source Heat Pumps Applied to Federal Facilities--Second Edition

    SciTech Connect (OSTI)

    Hadley, Donald L.

    2001-03-01T23:59:59.000Z

    This Federal Technology Alert, which was sponsored by the U.S. Department of Energy's Office of Federal Energy Management Programs, provides the detailed information and procedures that a Federal energy manager needs to evaluate most ground-source heat pump applications. This report updates an earlier report on ground-source heat pumps that was published in September 1995. In the current report, general benefits of this technology to the Federal sector are described, as are ground-source heat pump operation, system types, design variations, energy savings, and other benefits. In addition, information on current manufacturers, technology users, and references for further reading are provided.

  2. Federal Compensation to Idaho for Public Domain Federal Lands, 1988-99 FederalCompensationtoIdaho

    E-Print Network [OSTI]

    O'Laughlin, Jay

    ........................................................................................................ 9 Figure 7. Bingham County Federal Payments........................................................................................................ 12 Figure 15. Canyon County Federal Payments

  3. 30-Day Federal Register Notice - Proposed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Revised 11-2009 30-Day Federal Register Notice - Proposed 6450-01-P DEPARTMENT OF ENERGY Proposed Agency Information Collection AGENCY: U.S. Department of Energy. ACTION: Notice...

  4. Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical

    E-Print Network [OSTI]

    California at Davis, University of

    Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

  5. Enterprise Security Planning (ESP) L. Ertaul T. Braithwaite

    E-Print Network [OSTI]

    Ertaull, Levent

    143 Enterprise Security Planning (ESP) L. Ertaul T. Braithwaite California State University://www.feacinstitute.org Abstract: Enterprise security planning (ESP) is the aligning of information security policies and practices itself. Keywords: Enterprise Security Planning, Zachman Framework, Network Security, Mobile Agents

  6. Transportation Security

    Broader source: Energy.gov (indexed) [DOE]

    Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

  7. Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

  8. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

  11. Nevada National Security Site Environmental Report 2011 Summary

    SciTech Connect (OSTI)

    Cathy Wills, ed

    2012-09-12T23:59:59.000Z

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  12. Extension of Comment Period on Improving Performance of Federal...

    Energy Savers [EERE]

    to Export Electric Energy OE Docket No. EA-353 Boralex Fort Fairfield LP & Boralex Ashland LP: Federal Register Notice Vol 74 No 151 Request for Information on Improving...

  13. Energy Corridors on Federal Lands | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    of Federal Lands in States Identified by EPAct 2005 (August 2011) Related Links West-wide Energy Corridor Programmatic EIS Information Center East-wide Energy Corridor Programmatic...

  14. Guide to Federal Regulation of Sales of Imported Electricity...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    use of energy. Introduction This Guide to Federal Regulation of Sales of Imported Electricity in Canada, Mexico, and the United States is intended to inform national energy...

  15. Federal Facility Reporting and Data | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Program (FEMP) provides information and tools to help agencies report annual energy and water consumption and resource management efforts within Federal facilities. FEMP also...

  16. Model-driven Security Policy Deployment: Property Oriented Approach

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    and managing the access control rules of an information system are some of the major concerns of security systems. We formally prove the process of de- ploying a security policy related to an information system the deployment of access control security policies. We show how the use of a formal ex- pression of the security

  17. BLINK: Securing Information to the Last Connection Scott Craver, Yu Chen*, Hao Chen, Jun Yu, Idris M. Atakli

    E-Print Network [OSTI]

    Chen, Yu

    that exerts strict control over documents sent to users. However, people are used to using existing ABSTRACT: Robust cryptography provides confidentiality and integrity for information transferred between on top of Altera FPGA board with Digital Visual Interface (DVI) ports, the correctness, effectiveness

  18. 712 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011 The Effect of Eavesdroppers on Network

    E-Print Network [OSTI]

    Yener, Aylin

    USA. He is now with Qualcomm Inc., San Deigo, CA 92121 USA (e-mail: satashu@cmu.edu). V. Aggarwal years, there has been growing interest in em- ploying information theoretic methods to provide secrecy is with AT&T Laboratories Research, Florham Park, NJ 07932 USA, and also with the Department of Electrical

  19. Pricing Security L. Jean Camp

    E-Print Network [OSTI]

    Camp, L. Jean

    documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

  20. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  1. Federal Agency NEPA Procedures

    Broader source: Energy.gov [DOE]

    Each Federal agency is required to develop NEPA procedures that supplement the CEQ Regulations. Developed in consultation with CEQ, Federal agency NEPA procedures must meet the standards in the CEQ...

  2. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  3. ESPC Sucess Story- Harold Washington Social Security Administration Center

    Broader source: Energy.gov [DOE]

    Fact sheet describes the Federal Energy Management Program (FEMP) Energy Savings Performance Contract (ESPC) success story on environmental stewardship and cost savings at the Harold Washington Social Security Administration Center in Chicago, Illinois.

  4. The Department of Homeland Security Energy Management Program

    Energy Savers [EERE]

    Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies...

  5. FEDERAL ENERGY REGULATORY COMMISSION

    E-Print Network [OSTI]

    Laughlin, Robert B.

    FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT POWER MARKETS The Federal Energy Regulatory Commission today ordered its staff to conduct investigators will find out if any technical or operational factors, federal or state regulatory prohibitions

  6. Federal Government Presence in

    E-Print Network [OSTI]

    deYoung, Brad

    % since 1993 Source: Statistics Canada, Public Sector Employment, Table 183-0002. Figure 4 Federal of Federal Employment Source: Statistics Canada, Public Sector Employment, Table 183-0002. Figure 6 Federal #12;Employment Shares Across Provinces Source: Statistics Canada, Population, Table 51-0001 and Public

  7. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02T23:59:59.000Z

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  8. Headquarters Facilities Master Security Plan | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Welcome to the 2014 version of the Headquarters Facilities Master Security Plan (HQFMSP). The purpose of the HQFMSP is to inform employees, contractors, and visitors of the...

  9. Office of Security Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    security policies and programs throughout the Department, including protection of special nuclear material, and classified and sensitive information. The Office has established and...

  10. Office of Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  11. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  12. Radiation control coatings installed on federal buildings at Tyndall Air Force Base. Volume 2: Long-term monitoring and modeling

    SciTech Connect (OSTI)

    Petrie, T.W.; Childs, P.W.

    1998-06-01T23:59:59.000Z

    The US Department of Energy`s (DOE`s) Federal Energy Management Program (FEMP) supports efforts to reduce energy use and associated expenses in the federal sector. One such effort, the New Technology Demonstration Program (NTDP), seeks to evaluate new energy-saving US technologies and secure their more timely adoption by the US government. Through a partnership with a federal site, the utility serving the site, a manufacturer of an energy-related technology, and other organizations associated with these interests, DOE can evaluate a new technology. The results of the program give federal agency decision makers more hands-on information with which to validate a decision to utilize a new technology in their facilities. This is the second volume of a two-volume report that describes the effects of radiation control coatings installed on federal buildings at Tyndall Air Force Base (AFB) in Florida by ThermShield International. ORNL`s Buildings Technology Center (BTC) was assigned the responsibility for gathering, analyzing, and reporting on the data to describe the effects of the coatings. The first volume described the monitoring plan and its implementation, the results of pre-coating monitoring, the coating installation, results from fresh coatings compared to pre-coating results, and a plan to decommission the monitoring equipment. This second volume updates and completes the presentation of data to compare performance of fresh coatings with weathered coatings.

  13. Human Resources Security Access Matrix Function Training

    E-Print Network [OSTI]

    Wu, Shin-Tson

    June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  15. National Nuclear Security Administration to Help Train Former...

    National Nuclear Security Administration (NNSA)

    Former Soviet WMD Scientists in Commercial Information Technology Fields --Reduces Proliferation Threats-- | National Nuclear Security Administration Facebook Twitter Youtube...

  16. Federal Response Assets for a Radioactive Dispersal Device Incident

    SciTech Connect (OSTI)

    Sullivan,T.

    2009-06-30T23:59:59.000Z

    If a large scale RDD event where to occur in New York City, the magnitude of the problem would likely exceed the capabilities of City and State to effectively respond to the event. New York State could request Federal Assistance if the United States President has not already made the decision to provide it. The United States Federal Government has a well developed protocol to respond to emergencies. The National Response Framework (NRF) describes the process for responding to all types of emergencies including RDD incidents. Depending on the location and type of event, the NRF involves appropriate Federal Agencies, e.g., Department of Homeland Security (DHS), the Department of Energy (DOE), Environmental Protection Agency (EPA), United States Coast Guard (USCG), Department of Defense (DOD), Department of Justice (DOJ), Department of Agriculture (USDA), and Nuclear Regulatory Commission (NRC). The Federal response to emergencies has been refined and improved over the last thirty years and has been tested on natural disasters (e.g. hurricanes and floods), man-made disasters (oil spills), and terrorist events (9/11). However, the system has never been tested under an actual RDD event. Drills have been conducted with Federal, State, and local agencies to examine the initial (early) phases of such an event (TopOff 2 and TopOff 4). The Planning Guidance for Protection and Recovery Following Radiological Dispersal Device (RDD) and Improvised Nuclear Device (IND) incidents issued by the Department of Homeland Security (DHS) in August 2008 has never been fully tested in an interagency exercise. Recently, another exercise called Empire 09 that was situated in Albany, New York was conducted. Empire 09 consists of 3 different exercises be held in May and June, 2009. The first exercise, May 2009, involved a table top exercise for phase 1 (0-48 hours) of the response to an RDD incident. In early June, a full-scale 3- day exercise was conducted for the mid-phase response (48 hours +). A few weeks later, a one day full-scale exercise was conducted for the late phase (recovery) response to an RDD event. The lessons learned from this study are not available as of June 30, 2009. The objective of this report is to review and summarize anticipated Federal and State response actions and the roles and responsibilities of various agencies (DHS, EPA, DOE, NY-DEP, NY-DEC) with respect to decontamination issues that would arise from a radiological dispersion device (RDD), e.g., dirty bomb attack. These issues arise in the late phase of the response (48 hours and beyond) after the area has been stabilized and forensic information has been obtained. Much of the information provided in this report is taken directly from published guidance that is readily available.

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  18. White Paper: CA and Microsoft for Interoperable, Secure Web Business

    E-Print Network [OSTI]

    Narasayya, Vivek

    White Paper: CA and Microsoft for Interoperable, Secure Web Business Enablement Author: Dave, and improve outreach to business partners and customers. This white paper reviews how solutions from CA (CA SiteMinder, CA Federation Manager) and Microsoft (Active Directory Federation Services (formerly code

  19. Instructions for Optional Application for Federal Employment -OF 612 You may apply for most Federal jobs with a resume, an Optional Application for Federal Employment (OF 612), or other written format. If your resume or

    E-Print Network [OSTI]

    Federal jobs with a resume, an Optional Application for Federal Employment (OF 612), or other written format. If your resume or application does not provide all the information requested on this form

  20. Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order, Revision 0

    SciTech Connect (OSTI)

    Lynn Kidman

    2008-02-01T23:59:59.000Z

    This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: 1. Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria 2. Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria. 3. Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria.

  1. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  2. High Level Architecture (HLA) federation with Umbra and OPNET federates.

    SciTech Connect (OSTI)

    Oppel, Fred John III; Hart, Brian; Van Leeuwen, Brian P.

    2004-03-01T23:59:59.000Z

    Network-centric systems that depend on mobile wireless ad hoc networks for their information exchange require detailed analysis to support their development. In many cases, this critical analysis is best provided with high-fidelity system simulations that include the effects of network architectures and protocols. In this research, we developed a high-fidelity system simulation capability using an HLA federation. The HLA federation, consisting of the Umbra system simulator and OPNET Modeler network simulator, provides a means for the system simulator to both affect, and be affected by, events in the network simulator. Advances are also made in increasing the fidelity of the wireless communication channel and reducing simulation run-time with a dead reckoning capability. A simulation experiment is included to demonstrate the developed modeling and simulation capability.

  3. TRAINING FOR INFORMATION

    E-Print Network [OSTI]

    June 1998 TRAINING FOR INFORMATION TECHNOLOGY SECURITY: EVALUATING THE EFFECTIVENESS OF RESULTS-BASED LEARNING The basic principles of results-based training for information technology (IT) security were discussed in our April 1998 bulletin, Training Require- ments for Information Technology Security

  4. Safeguards and Security Technology Development Directory. FY 1993

    SciTech Connect (OSTI)

    Not Available

    1993-06-01T23:59:59.000Z

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  5. Landmark Tribal Wind Energy Deal Paves the Way for Tribal-Federal...

    Office of Environmental Management (EM)

    just tremendous. This has been like Energy Development 101 and we were right in the heart of it." For Geronimo Energy President Blake Nixon, securing a large federal contract...

  6. Federal Railroad Administration

    Broader source: Energy.gov (indexed) [DOE]

    very similar to this bill in regard to the core provisions Core provisions: Review and reform the Federal hours of service requirements Establish a new risk reduction program...

  7. Federal Employee Health Services

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-10-18T23:59:59.000Z

    The order establishes requirements and responsibilities for occupational medical, employee assistance, and workers' compensation programs for Federal employees. Cancels DOE O 341.1.

  8. Federal NEPA Contacts

    Broader source: Energy.gov [DOE]

    CEQ and most Federal agencies identify primary points of contact for NEPA compliance. Normally a senior environmental professional, environmental law attorney, or member of agency leadership, these...

  9. Federal Railroad Administration

    Broader source: Energy.gov (indexed) [DOE]

    - HQ Hazmat Division, Washington, DC. Federal Railroad Administration Dedicated Train Study - Report to Congress November 2003 - FRA' s Ofc. Of Research & Development...

  10. INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for

    E-Print Network [OSTI]

    Sandhu, Ravi

    -leading research with real-world impact! #12;INSTITUTE FOR CYBER SECURITY Super vs Micro-distribution in g-SIS 8INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Executive Director and Endowed Professor Institute for Cyber Security University of Texas at San Antonio

  11. Non-Possessing Security Plan Page 1 of 2

    E-Print Network [OSTI]

    Pennycook, Steve

    Non-Possessing Security Plan Page 1 of 2 This plan summarizes the safeguards and security personnel to hold DOE access authorizations for access to classified information and/or special nuclear -- comply with all applicable DOE security requirements, including the following: Security Training [DOE M

  12. Recommendations and Justifications To Remove Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office Federal Facility Agreement and Consent Order, Revision 0

    SciTech Connect (OSTI)

    Birney, Cathleen; Krauss, Mark J

    2013-09-01T23:59:59.000Z

    This document is part of an effort to reevaluate 37 FFACO and Administrative URs against the current Soils Risk-Based Corrective Action Evaluation Process. After reviewing 37 existing FFACO and Administrative URs, 3 URs addressed in this document have sufficient information to determine that these current URs may be removed, based on the RBCA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RBCA criteria.

  13. Recommendations and Justifications for Modifications To Downgrade Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office Federal Facility Agreement and Consent Order, Revision 1

    SciTech Connect (OSTI)

    Birney, Cathleen; Krauss, Mark J

    2013-10-01T23:59:59.000Z

    This document is part of an effort to reevaluate 37 FFACO and Administrative URs against the current Soils Risk-Based Corrective Action Evaluation Process. After reviewing 37 existing FFACO and Administrative URs, 11 URs addressed in this document have sufficient information to determine that these current URs may be downgraded to Administrative URs based on the RBCA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RBCA criteria.

  14. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

    1996-06-20T23:59:59.000Z

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  15. Northwest Regional Technology Center, May 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Security (DHS) Domestic Nuclear Detection Office (DNDO), recently visited PNNL. The goals of the trip wereNorthwest Regional Technology Center, May 2014 Page 1 of 2 Around The Region In Homeland Security, and recovery. The center enables homeland security solutions for emergency responder communities and federal

  16. FACT SHEET: Homeland Security Partner Agencies (Page 1 of 2) Agency Project

    E-Print Network [OSTI]

    (OI&A) Evaluation of fusion centers. US Department of Homeland Security - - Domestic Nuclear DetectionFACT SHEET: Homeland Security Partner Agencies (Page 1 of 2) Agency Project US Department of Homeland Security - - Federal Emergency Management Administration (FEMA) Flood mitigation; risk based

  17. Federal Technical Capability Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-05T23:59:59.000Z

    The Federal Technical Capability Manual provides the process for the recruitment, deployment, development, and retention of Federal personnel with the demonstrated technical capability to safely accomplish the Departments missions and responsibilities at defense nuclear facilities. Canceled by DOE M 426.1-1A. Does not cancel other directives.

  18. Federal Technical Capability

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-11-19T23:59:59.000Z

    This directive defines requirements and responsibilities for meeting the Department of Energy (DOE) commitment to recruiting, deploying, developing, and retaining a technically competent workforce that will accomplish DOE missions in a safe and efficient manner through the Federal Technical Capability Program (FTCP). Cancels DOE M 426.1-1A, Federal Technical Capability Manual.

  19. FEDERAL ENERGY REGULATORY COMMISSION

    E-Print Network [OSTI]

    Laughlin, Robert B.

    FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT AND FERC STAFF The Federal Energy Regulatory Commission today accepted a settlement, valued at nearly $500 stemming from the 2000-2001 energy crisis in California and other Western states. The global settlement

  20. FEDERAL ENERGY REGULATORY COMMISSION

    E-Print Network [OSTI]

    Laughlin, Robert B.

    FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT SETTLEMENT BETWEEN DUKE AND COMMISSION STAFF The Federal Energy Regulatory Commission today accepted a settlement between the Commission's enforcement staff and Houston-based units of Duke Energy that resolves

  1. FEDERAL ENERGY REGULATORY COMMISSION

    E-Print Network [OSTI]

    Laughlin, Robert B.

    FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT POWER EXCHANGE MARKET The Federal Energy Regulatory Commission today approved a staff settlement calling-2-001 COMMISSION APPROVES $13.8 MILLION SETTLEMENT WITH RELIANT ENERGY OVER PHYSICAL WITHHOLDING IN CALIFORNIA

  2. FEDERAL ENERGY REGULATORY COMMISSION

    E-Print Network [OSTI]

    Laughlin, Robert B.

    FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT The Federal Energy Regulatory Commission today accepted an agreement between Nevada Power and Sierra Pacific. AGREEMENT ACCEPTED BETWEEN ENRON AND NEVADA COMPANIES SETTLING MATTERS STEMMING FROM WESTERN ENERGY CRISIS

  3. FEDERAL ENERGY REGULATORY COMMISSION

    E-Print Network [OSTI]

    Laughlin, Robert B.

    FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT FERC APPROVES SETTLEMENT WITH RELIANT IN CALIFORNIA CASES; PROCEEDS COULD TOTAL $50 MILLION The Federal Energy Regulatory Commission today approved a settlement between the Commission's enforcement staff

  4. FEDERAL ENERGY REGULATORY COMMISSION

    E-Print Network [OSTI]

    Laughlin, Robert B.

    FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT CRISIS The Federal Energy Regulatory Commission today approved a comprehensive settlement among APX Inc. Coral Power LLC, Puget Sound Energy Inc. and Avista are Supporting Parties. R-07-14 (30) #12;

  5. FEDERAL ENERGY REGULATORY COMMISSION

    E-Print Network [OSTI]

    Laughlin, Robert B.

    FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT-95-191 COMMISSION APPROVES TWO WESTERN POWER SETTLEMENTS The Federal Energy Regulatory Commission today approved two markets during the Western energy crisis of 2000-2001. The first case involves a settlement agreement

  6. Electricity Advisory Committee - Federal Register Notices | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Register Notices Electricity Advisory Committee - Federal Register Notices Electricity Advisory Committee - Federal Register Notices September 3, 2014 Electricity Advisory...

  7. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  8. SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK

    E-Print Network [OSTI]

    Azevedo, Ricardo

    Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

  9. Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-03-18T23:59:59.000Z

    To establish Department of Energy (DOE) requirements and responsibilities for reporting cyber security incidents involving classified and unclassified systems and responding to cyber security alerts and advisories; and to implement requirements of DOE N 205.1, Unclassified Cyber Security Program, and DOE M 471.2-2, Classified Information Systems Security Manual. DOE N 205.13, dated 7-6-04, extends this notice until 7-6-05. Cancels DOE M 471.2-2, Chapter III, section 8.

  10. Quantum Information Science | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Geographic Information Science and Technology Quantum Information Science Quantum Communication and Security Quantum-Enhanced Sensing Quantum Computing Supercomputing and...

  11. Annual report to Congress on Federal Government Energy Management and Conservation Programs, Fiscal Year 1997

    SciTech Connect (OSTI)

    none,

    1999-08-13T23:59:59.000Z

    In fulfillment of statutory requirements, this report provides information on energy consumption in Federal buildings and operations and also documents activities conducted by Federal agencies in fulfilling those requirements during Fiscal Year 1997.

  12. Annual report to Congress on Federal Government Energy Management and Conservation Programs, Fiscal Year 1998

    SciTech Connect (OSTI)

    none,

    2000-03-20T23:59:59.000Z

    In fulfillment of statutory requirements, this report provides information on energy consumption in Federal buildings and operations and also documents activities conducted by Federal agencies in fulfilling those requirements during Fiscal Year 1998.

  13. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  14. Federal Facility Agreement progress report

    SciTech Connect (OSTI)

    Not Available

    1993-10-01T23:59:59.000Z

    The (SRS) Federal Facility Agreement (FFA) was made effective by the US. Environmental Protection Agency Region IV (EPA) on August 16, 1993. To meet the reporting requirements in Section XXV of the Agreement, the FFA Progress Report was developed. The FFA Progress Report is the first of a series of quarterly progress reports to be prepared by the SRS. As such this report describes the information and action taken to September 30, 1993 on the SRS units identified for investigation and remediation in the Agreement. This includes; rubble pits, runoff basins, retention basin, seepage basin, burning pits, H-Area Tank 16, and spill areas.

  15. Federal Activities in the Bioeconomy

    Broader source: Energy.gov [DOE]

    Plenary V: Federal Activities in the Bioeconomy Federal Activities in the Bioeconomy Zia Haq, Senior Analyst, Technology Manager, Bioenergy Technologies Office, U.S. Department of Energy

  16. Executive Order 13514: Federal Leadership in Environmental, Energy, and Economic Performance; Comprehensive Federal Fleet Management Handbook (Book)

    SciTech Connect (OSTI)

    Daley, R.; Ahdieh, N.; Bentley, J.

    2014-01-01T23:59:59.000Z

    A comprehensive Federal Fleet Management Handbook that builds upon the "Guidance for Federal Agencies on E.O. 13514 Section 12-Federal Fleet Management" and provides information to help fleet managers select optimal greenhouse gas and petroleum reduction strategies for each location, meeting or exceeding related fleet requirements, acquiring vehicles to support these strategies while minimizing fleet size and vehicle miles traveled, and refining strategies based on agency performance.

  17. Department of Energy Cites Bechtel Jacobs for Classified Information...

    Office of Environmental Management (EM)

    Bechtel Jacobs for Classified Information Security and Worker Safety and Health Violations Department of Energy Cites Bechtel Jacobs for Classified Information Security and Worker...

  18. Attributes of the Federal Energy Management Program's Federal Site Building Characteristics Database

    SciTech Connect (OSTI)

    Loper, Susan A.; Sandusky, William F.

    2010-12-31T23:59:59.000Z

    Typically, the Federal building stock is referred to as a group of about one-half million buildings throughout the United States. Additional information beyond this level is generally limited to distribution of that total by agency and maybe distribution of the total by state. However, additional characterization of the Federal building stock is required as the Federal sector seeks ways to implement efficiency projects to reduce energy and water use intensity as mandated by legislation and Executive Order. Using a Federal facility database that was assembled for use in a geographic information system tool, additional characterization of the Federal building stock is provided including information regarding the geographical distribution of sites, building counts and percentage of total by agency, distribution of sites and building totals by agency, distribution of building count and floor space by Federal building type classification by agency, and rank ordering of sites, buildings, and floor space by state. A case study is provided regarding how the building stock has changed for the Department of Energy from 2000 through 2008.

  19. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Federal Water Use Indices

    Broader source: Energy.gov [DOE]

    FEMP provides water use indices as a guide for Federal agencies. Note that each is a rough estimate of water usage at different types of sites. Your site may vary considerably.

  1. Federal Employee Health Services

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-12-01T23:59:59.000Z

    To establish requirements and responsibilities for occupational medical, employee assistance, and workers' compensation programs for Federal employees. Cancels DOE 3790.1B. Canceled by DOE O 341.1A.

  2. Federal Protective Force

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-07-15T23:59:59.000Z

    This Manual establishes requirements for the management and operation of the Department of Energy (DOE) Federal protective forces (FPFs). Cancels DOE M 470.4-3, Chg 1. Canceled by DOE O 473.3.

  3. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01T23:59:59.000Z

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  4. Hawaii Bioenergy Master Plan State, County, and Federal

    E-Print Network [OSTI]

    Hawaii Bioenergy Master Plan State, County, and Federal Plans, Policies, Statutes, and Regulations, Policies, Statutes, and Regulations was prepared as part of the Hawaii Bioenergy Master Plan project based on information available as of April 28, 2009. #12;ii Hawaii Bioenergy Master Plan State, County and Federal

  5. NREL: Technology Deployment - Other Federal Agency Support

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andData and ResourcesOther Federal Agency Support Photo of a man and a

  6. Lecture 13: Control System Cyber Security

    E-Print Network [OSTI]

    CERN. Geneva

    2013-01-01T23:59:59.000Z

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  7. SOURCE SELECTION INFORMATION -

    Office of Environmental Management (EM)

    on Energy and Water Development U.S. House of Representatives The Honorable Lamar Alexander Ranking Member SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION...

  8. SOURCE SELECTION INFORMATION -

    Energy Savers [EERE]

    on Energy and Water Development U.S. House of Representatives The Honorable Lamar Alexander SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION REGULATION (FAR)...

  9. This report is a part of the College's efforts to provide you with information on security procedures, services, and resources available on

    E-Print Network [OSTI]

    Security for Campus Grounds & Buildings ­ P. 2-3 Public Safety Services ­ P. 3 Section Two Reporting Crimes. 7-8 Valuable Property ­ P. 8 Campus Buildings ­ P. 8 Residential Facilities and Policies ­ P. 8. 24-25 NYS Laws and Penalties Regarding Sex Offenses ­ P. 25-26 Sexual Assault Prevention ­ P. 27 Sex

  10. Foundations 6% Federal 49%

    E-Print Network [OSTI]

    Ponce, V. Miguel

    Administration National Renewable Energy Laboratory National Science Foundation National Security Agency Naval Agencies Administration for Children and Families Air Force Office of Scientific Research Air Force Administration Lawrence Livermore National Laboratory NASA Headquarters NASA Jet Propulsion Laboratory National

  11. Re: DOE Request for Information - Implementing the National Broadband...

    Broader source: Energy.gov (indexed) [DOE]

    the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy (Federal RegisterVol.75, No.90Tuesday May 11,...

  12. Re: DOE Request for Information - Implementing the National Broadband...

    Broader source: Energy.gov (indexed) [DOE]

    the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy, which was published at 75 Federal Register...

  13. Federal Register Notices | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in Review:Department ofDistribution Infrastructure |Federal Long Tern Care2 FederalInformation

  14. Federating data sets for use in a map context

    E-Print Network [OSTI]

    Giovine, Grayson P

    2006-01-01T23:59:59.000Z

    The goal of this project is to federate data sets containing location information such that they can be used in a map context. There are numerous examples of these data sets around the MIT campus: asset data with the ...

  15. Border Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

  16. Security Engineering for Ambient Intelligence: A Manifesto

    E-Print Network [OSTI]

    Spanoudakis, George

    : +34952131397 amg@lcc.uma.es Carsten Rudolph Fraunhofer Institute for Secure Information Technology (SIT), Rheinstrasse 75, D-64295 Darmstadt, Germany Tel: +496151869344 Fax: +496151869224 Carsten.Rudolph@sit.fraunhofer challenges for the design and engineering of secure and dependable systems. This chapter describes SERENITY

  17. FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon A DISSERTATION in Computer and Information Science #12;FOUNDATIONS OF WEB SCRIPT SECURITY COPYRIGHT 2012 Aaron Bohannon #12;Acknowledgements applying reactive noninterference to web browsers. Before I started the final phase of my thesis research

  18. Radiation control coatings installed on federal buildings at Tyndall Air Force Base. Volume 1: Pre-coating monitoring and fresh coating results

    SciTech Connect (OSTI)

    Petrie, T.W.; Childs, P.W.

    1997-02-01T23:59:59.000Z

    The US Department of Energy`s (DOE`s) Federal Energy Management Program (FEMP) supports efforts to reduce energy use and associated expenses in the federal sector. One such effort, the New Technology Demonstration Program (NTDP), seeks to evaluate new energy-saving US technologies and secure their more timely adoption by the US government. Through a partnership with a federal site, the utility serving the site, a manufacturer of an energy-related technology, and other organizations associated with these interests, DOE can evaluate a new technology. The results of the program give federal agency decision makers more hands-on information with which to validate a decision to utilize a new technology in their facilities. The partnership of these interests is secured through a cooperative research and development agreement (CRADA), in this case between Lockheed Martin Energy Research Corporation, the manager of the Oak Ridge National Laboratory (ORNL), Oak Ridge, Tennessee, and ThermShield International, Ltd., the manufacturer of the technology. This is the first volume of a two-volume report that describes the effects of radiation control coatings installed on federal buildings at Tyndall Air Force Base (AFB) in Florida by ThermShield International. ORNL`s Buildings Technology Center (BTC) was assigned the responsibility for gathering, analyzing, and reporting on the data to describe the effects of the coatings. This volume describes the monitoring plan and its implementation, the results of pre-coating monitoring, the coating installation, results from fresh coatings compared to pre-coating results, and a plan to decommission the monitoring equipment. By including results from roofs at Tyndall AFB and from an outdoor test facility at the BTC, the data cover the range from poorly insulated to well-insulated roofs and two kinds of radiation control coatings on various roof membranes.

  19. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

  20. Federal Register Notice

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResourcesFLASH2011-11-OPAMFY 2007 Total System12Federal Long Tern810 Federal Register

  1. Delegation as Officially Designated Federal Security Authority - DOE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesData Files Data Files 1B&W Y-12studiesDOE

  2. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  3. KNOWLEDGE: Building, Securing, Sharing & Applying

    E-Print Network [OSTI]

    is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

  4. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  5. US statutes for enforcement by security inspectors

    SciTech Connect (OSTI)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01T23:59:59.000Z

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  6. Appendix C: Criteria Review and Approach Documents, National Nuclear Security Administration

    Broader source: Energy.gov [DOE]

    A section of Appendix C to DOE G 226.1-2A "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of a table of National Nuclear Security Administration Criteria Review and Approach Documents (CRADS).

  7. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

  8. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01T23:59:59.000Z

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

  9. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  10. Global Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

  11. Federal Laboratory Technology Transfer

    E-Print Network [OSTI]

    Perkins, Richard A.

    Federal Laboratory Technology Transfer Fiscal Year 2009 Prepared by: National Institute to submit this fiscal year 2009 Technology Transfer Summary Report to the President and the Congress in accordance with 15 USC Sec 3710(g)(2) for an annual summary on the implementation of technology transfer

  12. Federal Laboratory Technology Transfer

    E-Print Network [OSTI]

    Perkins, Richard A.

    Federal Laboratory Technology Transfer Fiscal Year 2008 Prepared by: National Institute to submit this fiscal year 2008 Technology Transfer Summary Report to the President and the Congress transfer authorities established by the Technology Transfer Commercialization Act of 2000 (P.L. 106

  13. 632 Appendix Federal Infonnation

    E-Print Network [OSTI]

    Holden, Joshua Brandon

    632 Appendix Federal Infonnation Processing Standards Publication 46 1977 JanuW)' 15 ANNOUNCING. d.,~ !oh)' II. 1973). and P." 6 of Tit\\rCt·Rl. Name (If Standard with a key. The key is generated in such a way that each of the 56 bits used directly by the algori~hrn an' r

  14. da Reitoria UNIVERSIDADE FEDERAL

    E-Print Network [OSTI]

    Floeter, Sergio Ricardo

    Aperfeiçoamento Institucional. A PRESIDENTE DO CONSELHO UNIVERSITÁRIO da Universidade Federal de Santa Catarina, mudando o nome da Secretaria Especial de Aperfeiçoamento Institucional para "Secretaria de Aperfeiçoamento) Secretaria de Relações Internacionais; c) Secretaria de Gestão de Pessoas; d) Secretaria de Aperfeiçoamento

  15. Federal Employee Training

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-11T23:59:59.000Z

    To plan and establish requirements and assign responsibilities for Department of Energy (DOE) Federal employee training, education, and development (hereafter referred to as "training") under the Government Employees Training Act of 1958. Cancels DOE O 360.1A. Canceled by DOE O 360.1C.

  16. Federal Employee Training

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-09-21T23:59:59.000Z

    To plan and establish requirements and assign responsibilities for Department of Energy (DOE) Federal employee training, education, and development under the Government Employees Training Act of 1958, as amended. Cancels DOE O 360.1. Canceled by DOE O 360.1B.

  17. Federal Employee Training

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-06T23:59:59.000Z

    This Order establishes requirements and responsibilities for DOE Federal employee training in accordance with Chapter 41 of Title 5, United States Code (U.S.C.). Cancels DOE O 360.1B and DOE M 360.1-1B.

  18. Federal Technical Capability

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-11-19T23:59:59.000Z

    To define requirements and responsibilities for meeting the Department of Energy (DOE) commitment to recruiting, deploying, developing, and retaining a technically competent workforce that will accomplish DOE missions in a safe and efficient manner through the Federal Technical Capability Program (FTCP). Chg. 1 dated 9-20-11 Cancels DOE O 426.1. Cancels DOE P 426.1.

  19. Privacy ANU is subject to the Privacy Act 1988 and the University will take steps to ensure the security of your personal information. The University

    E-Print Network [OSTI]

    Botea, Adi

    collects and maintains personal information, please view the policy at https://policies.anu.edu.au/ ppl

  20. IT Security Plan for Flight Simulation Program

    E-Print Network [OSTI]

    Hood, David; 10.5121/ijcsea.2011.1510

    2011-01-01T23:59:59.000Z

    Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United States. Compromise insecurity could lead severe consequences. However, technology changes so rapidly that change has to be made to reflect these changes with security in mind. This article outlines a growing technological change (virtualization and cloud computing), and how to properly address IT security concerns within an operating environment. By leveraging a series of encrypted physical and virtual systems, andnetwork isolation measures, this paper delivered a secured high performance computing environment that efficiently utilized computing resources, reduced overall computer processing costs, and ensures confidentia...

  1. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01T23:59:59.000Z

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  2. Federal Memorandum of Understanding for Hydropower/Federal Inland...

    Open Energy Info (EERE)

    of Energy Environmental Protection Agency Federal Energy Regulatory Commission Fish and Wildlife Service Forest Service National Oceanic and Atmospheric Administration...

  3. Nevada National Security Site Environmental Report 2013 Summary

    SciTech Connect (OSTI)

    Wills, C.

    2014-09-09T23:59:59.000Z

    The information presented in this document is explained in greater detail in the Nevada National Security Site Environmental Report 2013 (DOE/NV/25946--2182).

  4. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  5. Trust Model for Security Automation Data 1.0 (TMSAD)

    E-Print Network [OSTI]

    Trust Model for Security Automation Data 1.0 (TMSAD) HaroldBooth AdamHalbardier NIST Interagency Report 7802 #12;NIST Interagency Report 7802 Trust Model for Security Automation Data 1.0 (TMSAD) Harold FOR SECURITY AUTOMATION DATA 1.0 (TMSAD) iii Reports on Computer Systems Technology The Information Technology

  6. Safeguarding Confidential Information Policy Number: 05-001

    E-Print Network [OSTI]

    Ickert-Bond, Steffi

    .) involving confidential information, shall work under an Information Security Plan (ISP) which has been information (confidential, secret and top secret). · Information Security Plan (ISP) is the specific policies

  7. Guidance: Requirements for Installing Renewable Fuel Pumps at Federal Fleet Fueling Centers under EISA Section 246: Federal Fleet Program, Federal Energy Management Program, U.S. Department of Energy, March 2011

    SciTech Connect (OSTI)

    Not Available

    2011-03-01T23:59:59.000Z

    On December 19, 2007, the Energy Independence and Security Act of 2007 (EISA) was signed into law as Public Law 110-140. Section 246(a) of EISA directs Federal agencies to install at least one renewable fuel pump at each Federal fleet fueling center under their jurisdiction by January 1, 2010. Section 246(b) requires the President to submit an annual report to Congress on Federal agency progress in meeting this renewable fuel pump installation mandate. This guidance document provides guidelines to help agencies understand these requirements and how to comply with EISA Section 246.

  8. August 2005 ADVISING USERS ON INFORMATION TECHNOLOGY

    E-Print Network [OSTI]

    of secure access control to facilities and to information systems. NIST recently developed supplementary the need for better quality and security of the processes for identifying individuals, Homeland Security quality and security of the processes for identifying individuals, Homeland Security Presidential

  9. Federal Emergency Management Agency | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (Smart GridHome Kyoung'sTechnologies JumpEmergency

  10. Federal Aviation Administration | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProject JumpTechnologiesAviation

  11. Federal Energy Regulatory Commission | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProject

  12. Federal Business Opportunities website | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,Fauquier County,4Opportunities website

  13. Federal Energy Subsidies | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,Fauquier County,4OpportunitiesSubsidies

  14. Federal Grant Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,FauquierGrant Program Jump to:

  15. Federal Loan Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,FauquierGrant Program

  16. Federal Reporting Recipient Information | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulie A. Reddick|Document that lists someCertification,July,April 3,

  17. A common language for computer security incidents

    SciTech Connect (OSTI)

    John D. Howard; Thomas A Longstaff

    1998-10-01T23:59:59.000Z

    Much of the computer security information regularly gathered and disseminated by individuals and organizations cannot currently be combined or compared because a common language has yet to emerge in the field of computer security. A common language consists of terms and taxonomies (principles of classification) which enable the gathering, exchange and comparison of information. This paper presents the results of a project to develop such a common language for computer security incidents. This project results from cooperation between the Security and Networking Research Group at the Sandia National Laboratories, Livermore, CA, and the CERT{reg_sign} Coordination Center at Carnegie Mellon University, Pittsburgh, PA. This Common Language Project was not an effort to develop a comprehensive dictionary of terms used in the field of computer security. Instead, the authors developed a minimum set of high-level terms, along with a structure indicating their relationship (a taxonomy), which can be used to classify and understand computer security incident information. They hope these high-level terms and their structure will gain wide acceptance, be useful, and most importantly, enable the exchange and comparison of computer security incident information. They anticipate, however, that individuals and organizations will continue to use their own terms, which may be more specific both in meaning and use. They designed the common language to enable these lower-level terms to be classified within the common language structure.

  18. Federal Utility Partnership Working Group

    Broader source: Energy.gov [DOE]

    The Federal Utility Partnership Working Group (FUPWG) establishes partnerships and facilitates communications among Federal agencies, utilities, and energy service companies. The group develops strategies to implement cost-effective energy efficiency and water conservation projects through utility incentive programs at Federal sites.

  19. 69536 Federal Register / Vol. 69, No. 229 / Tuesday, November 30, 2004 / Rules and Regulations Indiana, with a request that the Indiana

    E-Print Network [OSTI]

    Westcott, (410) 786­4515. SUPPLEMENTARY INFORMATION: I. Background We published a final rule in the Federal

  20. Federal Agency Hazardous Waste Compliance Docket (docket). Revision 1

    SciTech Connect (OSTI)

    Not Available

    1994-01-01T23:59:59.000Z

    The Federal Facilities Hazardous Waste Compliance Docket (``docket``) identifies Federal facilities that may be contaminated with hazardous substances and that must be evaluated to determine if they pose a risk to public health or the environment The docket, required by Section 120(c) of the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA), as amended by the Superfund Amendments and Reauthorization Act of 1986 (SARA), also provides a vehicle for making information about potentially contaminated facilities available to the public. Facilities listed on the docket must complete site assessments that provide the Environmental Protection Agency (EPA) with information needed to determine whether or not the facility should be included on he National Priorities List (NPL). This Information Brief, which revises the previous Federal Agency Hazardous Waste Compiliance Docket Information Brief, provides updated information on the docket listing process, the implications of listing, and facility status after listing.

  1. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  2. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  3. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  4. Best Practices: Elements of a Federal Privacy Program

    Energy Savers [EERE]

    Pub. L. No. 104- 191) Health Information Technology for Economic and Clinical Health Act (-HITECH Act, 42 U.S.C. 300jj et seq.; 17901 et seq.) Homeland Security...

  5. Fritz Technologies is a small company based in Sebastopol, California, specializing in information assurance and data security. Fritz has completed several contracts with the

    E-Print Network [OSTI]

    Ravikumar, B.

    Fritz Technologies is a small company based in Sebastopol, California, specializing in information office in Sebastopol, CA. Fritz Technologies is currently offering the following Internships for Sonoma

  6. Section 4 -Financial Information A. General Information

    E-Print Network [OSTI]

    Pantaleone, Jim

    Section 4 - Financial Information A. General Information 1. All University Housing and Dining fees. The security deposit, less any charges for damages, will be returned approximately ten weeks after the end according to Section 5 ­ Termination of Occupancy, will result in the forfeiture of the security deposit

  7. Twitter Training for Small Business Federal Contractors

    Broader source: Energy.gov [DOE]

    Twitter can be used to raise brand awareness, share and obtain information on upcoming federal contract opportunities, to network with peers and government leaders, and to help build a reputation for expertise in your field. Put Twitter to work for you! If you are already on Twitter, just getting started on Twitter, or thinking of joining, you can get super ideas on how to make a positive impression, discover more opportunities, team with colleagues, and drive business growth.

  8. Cyber Security & Smart Grid

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

  9. Executive Order 13423- Strengthening Federal Environmental, Energy...

    Energy Savers [EERE]

    423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

  10. Federal Biomass Activities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Biomass Activities Federal Biomass Activities Statutory and executive order requirements for Bioproducts and Biofuels federalbiomassactivities.pdf More Documents &...

  11. Revised: August 2013 INFORMATION SYSTEMS

    E-Print Network [OSTI]

    Howitt, Ivan

    ] as the common security framework baseline to be used by the campuses of the University of North Carolina system implementation standards are the NC IT Security Manual, the Control Objectives for Information and related responsibilities 08.02.02 Information security awareness, education, and training 08.02.03 Disciplinary process 08

  12. Corrective Action Decision Document/Closure Report for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    SciTech Connect (OSTI)

    Matthews, Patrick

    2013-11-01T23:59:59.000Z

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. This complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The purpose of the CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed.

  13. PSH-11-0017- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    This case involves derogatory information developed during the course of a background investigation of the Individual. Unable to resolve the security concerns raised by this derogatory information,...

  14. National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat Cornell Batteries &NST DivisionNationalEnergy

  15. Federal Geothermal Research Program Update - Fiscal Year 2001

    SciTech Connect (OSTI)

    Laney, P.T.

    2002-08-31T23:59:59.000Z

    This Federal Geothermal Program Research Update reviews the specific objectives, status, and accomplishments of DOE's Geothermal Program for Federal Fiscal Year (FY) 2001. The information contained in this Research Update illustrates how the mission and goals of the Office of Geothermal Technologies are reflected in each R&D activity. The Geothermal Program, from its guiding principles to the most detailed research activities, is focused on expanding the use of geothermal energy.

  16. An XML Security Framework that Integrates NIST RBAC, MAC and DAC Policies

    E-Print Network [OSTI]

    Demurjian, Steven A.

    is to integrate the local security (existing systems) and their associated access control models into a global is to ensure that local security policies (of constituent systems) and access control mechanisms are satisfied. As a result, the XML security framework requires the inclusion of a secure information engineering process

  17. The Federal Budget Process - Lessons That Can Be Learned

    ScienceCinema (OSTI)

    Stephen Goldberg

    2010-01-08T23:59:59.000Z

    The talk will provide up-to-date information on the Federal budget process and present three informative case studies regarding the intersection of budget decisions with important National policy decisions. In conclusion, the lecture will provide a preview of topics that may be interest for future study.

  18. The Federal Budget Process - Lessons That Can Be Learned

    SciTech Connect (OSTI)

    Goldberg, Stephen (ANL) [ANL

    2008-01-30T23:59:59.000Z

    The talk will provide up-to-date information on the Federal budget process and present three informative case studies regarding the intersection of budget decisions with important National policy decisions. In conclusion, the lecture will provide a preview of topics that may be interest for future study.

  19. ORNL/TM-2003/210 THE FEDERAL HIGHWAY ADMINISTRATION

    E-Print Network [OSTI]

    ORNL/TM-2003/210 THE FEDERAL HIGHWAY ADMINISTRATION GASOHOL CONSUMPTION ESTIMATION MODEL August January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge by members of the public from the following source. National Technical Information Service 5285 Port Royal

  20. ITL Bulletins are published by the Information Technology Laboratory

    E-Print Network [OSTI]

    Cryptography in the Federal Government, February 2000 Security Implications of Active Content, March 2000 is an attempt to utilize cryptographic tech niques in a more global solution to the problem of Internet security. Rather than requiring each e-mail program or web browser to implement its own security mechanisms, IPsec

  1. Direct Federal Financial

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesData FilesShape,PhysicsDileepDiracNanotubes . |Federal

  2. Federal Financial Report

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import96Nebraska NuclearDecade2003 DetailedUsebaseline 12FEDERAL

  3. The challenge of information access

    SciTech Connect (OSTI)

    Travers, L.A. [Environmental Protection Agency, Washington, DC (United States)

    1990-12-31T23:59:59.000Z

    Traditional methods of risk communication may not work for large quantities of information. Federal databases are being created to meet the public`s right-to-know.

  4. Sales of Fossil Fuels Produced from Federal and Indian Lands, FY 2003 through FY 2011

    Broader source: Energy.gov [DOE]

    This paper was prepared in response to recent requests that the U.S. Energy Information Administration (EIA) provide updated summary information regarding fossil fuel production on federal and...

  5. Coordination of Federal Transmission Permitting on Federal Lands...

    Office of Environmental Management (EM)

    transmission facilities on federal lands. In most instances, the Departments of Agriculture or Interior will be the Lead Agency, since they have jurisdiction over most of the...

  6. Determinants of the Informativeness of Analyst Research

    E-Print Network [OSTI]

    Kothari, S.P.

    2002-06-07T23:59:59.000Z

    Analyst research helps prices reflect information about a security's fundamentals. However, analysts' private incentives potentially contribute to misleading research and ...

  7. Visualizing Cyber Security: Usable Workspaces

    SciTech Connect (OSTI)

    Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

    2009-10-11T23:59:59.000Z

    An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

  8. ?Framework for a Risk-Informed Groundwater Compliance Strategy for Corrective Action Unit 98: Frenchman Flat, Nevada National Security Site, Nye County, Nevada, Revision 1

    SciTech Connect (OSTI)

    Sam Marutzky

    2010-09-01T23:59:59.000Z

    Note: This document was prepared before the NTS was renamed the Nevada National Security Site (August 23, 2010); thus, all references to the site herein remain NTS. Corrective Action Unit (CAU) 98, Frenchman Flat, at the Nevada Test Site (NTS) was the location of ten underground nuclear tests between 1965 and 1971. As a result, radionuclides were released in the subsurface in the vicinity of the test cavities. Corrective Action Unit 98 and other CAUs at the NTS and offsite locations are being investigated. The Frenchman Flat CAU is one of five Underground Test Area (UGTA) CAUs at the NTS that are being evaluated as potential sources of local or regional impact to groundwater resources. For UGTA sites, including Frenchman Flat, contamination in and around the test cavities will not be remediated because it is technologically infeasible due to the depth of the test cavities (150 to 2,000 feet [ft] below ground surface) and the volume of contaminated groundwater at widely dispersed locations on the NTS. Instead, the compliance strategy for these sites is to model contaminant flow and transport, estimate the maximum spatial extent and volume of contaminated groundwater (over a period of 1,000 years), maintain institutional controls, and restrict access to potentially contaminated groundwater at areas where contaminants could migrate beyond the NTS boundaries.

  9. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-05-16T23:59:59.000Z

    The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

  10. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

  11. Data Security ROCKVILLE, MD

    E-Print Network [OSTI]

    Rau, Don C.

    by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

  12. THE CONTENT OF CORPORATE FEDERALISM

    E-Print Network [OSTI]

    Bratton, William W.

    2004-01-01T23:59:59.000Z

    Federalism in Corporate Governance: Protecting ShareholderCollaborative Corporate Governance: Listing Standards, Stateof Care Stadanrd in Corporate Governance 75 Iowa L. Rev. 1,

  13. Computing, information, and communications: Technologies for the 21. Century

    SciTech Connect (OSTI)

    NONE

    1998-11-01T23:59:59.000Z

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  14. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 4, AUGUST 2012 1315 Temporal Forensics and Anti-Forensics for Motion

    E-Print Network [OSTI]

    Liu, K. J. Ray

    -mail: mcstamm@umd.edu; kjrliu@umd.edu). W. S. Lin is with the Intel Corporation, Hillsboro, OR 97124 USA (e, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE Abstract--Due to the ease with which digital information of this manuscript and approving it for publication was Dr. Alex ChiChung Kot. M. C. Stamm and K. J. R. Liu

  15. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  16. Energy Independence and Security Act of 2007: Summary of Provisions (released in AEO2008)

    Reports and Publications (EIA)

    2008-01-01T23:59:59.000Z

    The Energy Independence and Security Act of 2007 was signed into law on December 19, 2007, and became Public Law 110-140. Provisions in EISA2007 that require funding appropriations to be implemented, whose impact is highly uncertain, or that require further specification by federal agencies or Congress are not included in Annual Energy Outlook 2008 (AEO). For example, the Energy Information Administration (EIA) does not try to anticipate policy responses to the many studies required by EISA2007, nor to predict the impact of research and development (R&D) funding authorizations included in the bill. Moreover, AEO2008 does not include any provision that addresses a level of detail beyond that modeled in the National Energy Modeling System (NEMS), which was used to develop the AEO2008 projections. AEO2008 addresses only those provisions in EISA2007 that establish specific tax credits, incentives, or standards.

  17. Federal Participation in LEED Christopher Payne1

    E-Print Network [OSTI]

    1 Federal Participation in LEED Christopher Payne1 Beverly Dyer2 1 Environmental Energy-mail: CTPayne@lbl.gov 2 Federal Energy Management Program, U. S. Department of Energy. Phone: +1 202 586 expectations for ongoing partnership. CERTIFIED FEDERAL BUILDINGS US federal agencies have certified 16 federal

  18. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

  19. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

  20. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage