Powered by Deep Web Technologies
Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

2

AT&TSecurity Consulting Information Assurance Federal Information Security  

E-Print Network [OSTI]

the security controls for the information system. The AT&T Consulting methodology is based on National in addressing industry best practices and provide Security Authorization Process, formerly Certification requirements under the Federal Information Security Management Act of 2002, of general support systems

Fisher, Kathleen

3

Security Certification & Accreditation of Federal Information Systems A Tutorial  

E-Print Network [OSTI]

assessments of Security Controls in Information Systems To obtain better understanding of Agency- related to hardware, software, firmware) Security Controls in an Information System, to determine the extent to which/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Questions during C&A Process

Madisetti, Vijay K.

4

NIST Seeks Input for Planned 2011 Update of Security Control Catalog For Federal Information Systems and Organizations  

E-Print Network [OSTI]

; · Supply chain security; · Industrial/process control systems; and · Privacy. NIST SP 80053, Revision 3 Publication 80053, Recommended Security Controls for Federal Information Systems and Organizations webbased access to the security controls for federal information systems and organizations

5

REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH  

E-Print Network [OSTI]

REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE's information systems. The uniform approach to describing controls for both national security and nonnational, implement, and assess their security controls most effectively when the process is carried out as part

6

FEDERAL INFORMATION PROCESSING STANDARD  

E-Print Network [OSTI]

March 2004 FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 199, STANDARDS FOR SECURITY Information Technology Laboratory National Institute of Standards and Technology A new Federal Information Processing Standard (FIPS), recently approved by the Secretary of Commerce, will help federal agencies

7

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

8

Recommended Security Controls for Federal Information Systems and Organizations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST 800-53 Revision 3 + Draft Revision 4 Recommended

9

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

10

ITL BULLETIN FOR AUGUST 2010 ASSESSING THE EFFECTIVENESS OF SECURITY CONTROLS IN FEDERAL  

E-Print Network [OSTI]

discusses the process for assessing the security controls in organizational information systems that are implemented in federal information systems. The selection and assessment of appropriate security controls Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans

11

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

12

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

13

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

14

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

15

Federal Register Notice: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNLNM) Federal Register Notice: National Nuclear Security Administration Site-Wide...

16

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

17

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

18

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

19

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

20

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

22

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

23

ITL BULLETIN FOR MAY 2013 ITL PUBLISHES SECURITY AND PRIVACY CONTROLS FOR FEDERAL AGENCIES  

E-Print Network [OSTI]

The selection and implementation of security and privacy controls for information systems and organizations systems and organizations. Controls are also designed to satisfy a set of defined security requirements for federal information systems and organizations. It describes a process for selecting controls to protect

24

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

25

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

26

OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring  

E-Print Network [OSTI]

- driven access to related federated Network Performance Mon- itoring (NPM) services are important federated authorization entitlement policies for timely orches- tration of NPM services. On measurement resources. We validate OnTimeSecure in a federated multi-domain NPM infrastructure by performing

Calyam, Prasad

27

UC DAVIS -FEDERAL GRANT FINANCIAL REPORTING INFORMATION INFORMATION  

E-Print Network [OSTI]

UC DAVIS - FEDERAL GRANT FINANCIAL REPORTING INFORMATION GENERAL INFORMATION · The University is required by Federal sponsors to submit Financial Status Reports (FSRs) on all federal awards no later than.) o Extension of final budget period of a project period without additional Federal funds. o Change

Schladow, S. Geoffrey

28

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

29

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

30

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

31

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

32

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

33

Request for Information on Improving Performance of Federal Permitting...  

Broader source: Energy.gov (indexed) [DOE]

of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of...

34

Security Federation in the Vehicular Networks Submitted to SAR-SSI 2011 1  

E-Print Network [OSTI]

Security Federation in the Vehicular Networks Submitted to SAR-SSI 2011 1 Federated claims based authentication and access control in the vehicular networks Ramzi Debab (r_debab@esi.dz)* Yacine Challal in order to federate the existing techniques and even future ones. WS-Federation is one of the keys aiming

Paris-Sud XI, Université de

35

Third Annual Cyber Security and Information  

E-Print Network [OSTI]

Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

Krings, Axel W.

36

Nuclear dependence| The Russian Federation's future reliance on nuclear weapons for national security.  

E-Print Network [OSTI]

?? The Russian Federation's reliance on nuclear weapons for national security will steadily increase over time. Based on current evidence and historical data, the Russian… (more)

Lukszo, Adam J.

2011-01-01T23:59:59.000Z

37

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

38

Certification and Accreditation Process for Information Systems Including National Security Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

2004-02-19T23:59:59.000Z

39

Enterprise Information Security Management Framework [EISMF  

E-Print Network [OSTI]

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

40

Federal Register Notice: Proposed Agency Information Collection  

Broader source: Energy.gov [DOE]

Federal Register Notice on the DOE’s invitation for public comment on its request to the Office of Management and Budget (OMB) to extend for three years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910–5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before November 7, 2011.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Federal Register Notice: Proposed Agency Information Collection  

Broader source: Energy.gov [DOE]

Federal Register Notice on the DOE’s invitation for public comment on its intent to request the Office of Management and Budget (OMB) to extend for four years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910–5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before October 11, 2011.

42

Information Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for planningtoA JourneyISTI Information Science

43

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

44

MSc and Postgraduate Diploma in Information Security  

E-Print Network [OSTI]

of information security need internationally-recognised qualifications which How will the course help my career and understanding of What do employers say? Worldwide Access | Opportunity | International Standards qualifications. #12;`Attending my first Information Security supplier event after graduating made me reali

Royal Holloway, University of London

45

Federal Funding Sources of Information Sources for Automatic Funding Notices  

E-Print Network [OSTI]

;Federal Funding Sources of Information r Grant Programs & Deadlines q World Health Organization - GrantFederal Funding Sources of Information Sources for Automatic Funding Notices q Catalogue of Federal Domestic Assistance q Grants.Gov q FedBizOpps q The Foundation Center r RFP Bulletin r Philanthropy News

46

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network [OSTI]

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security Planning and Policy Committee Policy Statement The Information Resources Planning, and Policy a security plan to protect information identified as confidential, sensitive or both. 3. Assign management

O'Toole, Alice J.

47

Classified Automated Information System Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

1994-07-15T23:59:59.000Z

48

U-200: Red Hat Directory Server Information Disclosure Security...  

Broader source: Energy.gov (indexed) [DOE]

0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

49

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

50

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomentheATLANTA,Fermi NationalBusiness PlanPosting Thomas F.Needs

51

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network [OSTI]

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

52

Smart Grid Information Security (IS) Functional Requirement  

E-Print Network [OSTI]

It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

53

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

2009-01-05T23:59:59.000Z

54

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

55

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

56

Classified Information Systems Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

1999-08-03T23:59:59.000Z

57

Principles of Secure Information Flow Analysis Geoffrey Smith  

E-Print Network [OSTI]

Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

Smith, Geoffrey

58

Finance, IT Operations & Information Security Dear Colleagues,  

E-Print Network [OSTI]

1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful with the guidance of their senior administrators. The re-organization in some of the finance offices continues the intranet site. #12;2 Harry Dumay, PhD MBA Chief Financial Officer/ Associate Dean for Finance

59

Optimal Information Security Investment with Penetration Testing  

E-Print Network [OSTI]

gathering prior to investing into protection against so-identified threats. Penetration testing is alsoOptimal Information Security Investment with Penetration Testing Rainer B¨ohme and M´ark F´elegyh´azi International Computer Science Institute, Berkeley, California {rainer.boehme|mark}@icsi.berkeley.edu Abstract

Bencsáth, Boldizsár

60

PRIVACY AND SECURITY OF PERSONAL INFORMATION  

E-Print Network [OSTI]

Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

Sadeh, Norman M.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network [OSTI]

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

62

Ontological Mapping of Information Security Best-Practice Guidelines  

E-Print Network [OSTI]

best-practice guidelines, security ontology, EBIOS, IT Grundschutz Manual. 1 Introduction In recent- schutz Manual [4] to the security ontology by [6]. 2 Ontological Mapping of Information Security Best-PracticeOntological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner

63

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network [OSTI]

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security it is confidential, sensitive, both or neither. 2. Prepare a security plan to protect information identified as confidential, sensitive or both. 3. Assign management responsibility for implementing the security plan. 4

O'Toole, Alice J.

64

Federal government information handbook: formerly utilized sites remedial action program  

SciTech Connect (OSTI)

This volume is one of a series produced under contract with the DOE, by Politech Corporation to develop a legislative and regulatory data base to assist the FUSRAP management in addressing the institutional and socioeconomic issues involved in carrying out the Formerly Utilized Sites Remedial Action Program. This Information Handbook series contains information about all relevant government agencies at the Federal and state levels, the pertinent programs they administer, each affected state legislature, and current Federal and state legislative and regulatory initiatives. This volume is a compilation of information about the Federal Government. It contains a summary of the organization and responsibilities of agencies within the executive branch of the Federal government which may be relevant to FUSRAP activities; a brief summary of relevant Federal statutes and regulations; a description of the structure of the US Congress, identification of the officers, relevant committees and committee chairmen; a description of the Federal legislative process; a summary of legislation enacted and considered in the recently-adjourned 96th Congress; a description of the Federal budgetary process; a summary of the Carter Administration's comprehensive radioactive waste management program; and excerpts from the text of relevant federal statutes and regulations.

Not Available

1980-12-31T23:59:59.000Z

65

Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing Department of Energy (DOE), including National Nuclear Security Administration (NNSA), Federal workers with a safe and healthful workplace. Cancels DOE O 440.1A. Certified 6/17/2011. Canceled by DOE O 440.1B Chg 1.

2007-05-17T23:59:59.000Z

66

Federal Trade Commission Su acceso a informes de crdito gratuitos  

E-Print Network [OSTI]

Federal Trade Commission Su acceso a informes de crédito gratuitos Your Access to Free Credit Reports La Ley de Informe Imparcial de Crédito requiere que, a su pedido, cada una de las compañías de informes de los consumidores a nivel nacional -- Equifax, Experian y TransUnion -- le provea cada 12 meses

67

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

68

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

69

Federal Register Notice: National Nuclear Security Administration Site-Wide  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASH 2004-12 AprilEnergyEnvironmental

70

NIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4,  

E-Print Network [OSTI]

and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, which .............................................................. 3 Figure 3: Security Control Selection Process

71

Federated Rural Electric Assn | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (Smart GridHomeFederated Rural Electric Assn Place:

72

Federal Reporting Recipient Information | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASHof Energy Planning

73

Federal Reporting Recipient Information | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASHof Energy PlanningSeptember 12,

74

Federal Reporting Recipient Information | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASHof Energy PlanningSeptember

75

Federated Wind Farm | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProjectExpress JumpRegister -Federated

76

Information Security Framework for Small and Medium Sized Businesses  

E-Print Network [OSTI]

prevalent risks to business information and commonly exploited security holes can quickly close the door to a security incident. Just as with traditional burglary attempts, the computer criminals will first look for the path of least resistance when trying...

Michnick, Steven M.

2009-06-17T23:59:59.000Z

77

The Relationship Between Information Security and Fraud Risk Management  

E-Print Network [OSTI]

of Regional Security & Fraud Risk HSBC THE CHINESE UNIVERSITY OF HONG KONG Department of Information current role in HSBC, as the Head of Regional Security & Fraud for Asia Pacific involves financial crime

Huang, Jianwei

78

Modern Quantum Technologies of Information Security  

E-Print Network [OSTI]

In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

Korchenko, Oleksandr; Gnatyuk, Sergiy

2010-01-01T23:59:59.000Z

79

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude'SecurityAdministration rankedInformation | National

80

Federal Power Act | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpen Energy InformationInformation Royalty Management Act

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

DyKnow Federations: Distributing and Merging Information Among UAVs  

E-Print Network [OSTI]

DyKnow Federations: Distributing and Merging Information Among UAVs Fredrik Heintz and Patrick, patdo}@ida.liu.se Abstract--As unmanned aerial vehicle (UAV) applications be- come more complex and versatile there is an increasing need to allow multiple UAVs to cooperate to solve problems which are beyond

Doherty, Patrick

82

Selection of Model in Developing Information Security Criteria for Smart Grid Security System  

E-Print Network [OSTI]

At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

83

Delegating Network Security with More Information  

E-Print Network [OSTI]

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

84

CMAD IV 11/14/96 Information Security  

E-Print Network [OSTI]

utilities, power pools, vendors etc.. #12;CMAD IV 11/14/96 #12; #12; GridCo LineCo PoolCo Energy Merchant INFO INFO INFO $ $ $ PWR PWR PWR #12;CMAD IV 11/14/96 "Future" Is At Hand · Federal Energy Regulatory protection and audit practices inadequate. · Internal priorities limiting attention to security concerns

California at Davis, University of

85

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop  

SciTech Connect (OSTI)

The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

2006-01-01T23:59:59.000Z

86

RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS  

E-Print Network [OSTI]

organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

87

Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY  

E-Print Network [OSTI]

Code of Practice for Information Security Management (ISO/IEC 27002:2005) The international standard Electrotechnical Commission (IEC) A global organization that develops and publishes standards, the private sector, consumer groups, professional associations, and others. International Organization

88

Information Security Plan for Flight Simulator Applications  

E-Print Network [OSTI]

The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. We will be creating a system that will allow them to access their programs, back office and administrator functions remotely. A security plan outlining our security architecture will be delivered prior to the final code roll out. The plan will include responses to encryption used and the security architecture applied in the final documentation. The code will be delivered in phases to work out any issues that may occur during the implementation

Slaughter, Jason

2011-01-01T23:59:59.000Z

89

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network [OSTI]

security 1. PROBLEM STATEMENT Software engineers used standard software engineering processes to develop of software are annoying, but delays of an hour are not catastrophic. But in certain environments (notably to use techniques, and--more importantly--how to analyze social, political, and cultural environments

90

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network [OSTI]

security 1. PROBLEM S A EMEN Software engineers used standard software engineering processes to develop and scenarios drawn from political science, history, and other humanities to force students to apply or derive the process enjoyable, stimulating, and effective. Key words: environment, judgment, instruction, computer

Bishop, Matt

91

Program Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

and Operating (M&O) Contract Competition Program Information Program Information FY 2015 Performance Evaluation Plan (PEP) FY 2013 Performance Evaluation Report (PER)...

92

Manual of Security Requirements for the Classified Automated Information System Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

1994-07-15T23:59:59.000Z

93

Information Flow for Secure Distributed Applications  

E-Print Network [OSTI]

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-08-27T23:59:59.000Z

94

Information flow for secure distributed applications  

E-Print Network [OSTI]

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-01-01T23:59:59.000Z

95

Research and Practice in Federated Information Systems Report of the EFIS '2000 International Workshop  

E-Print Network [OSTI]

for federated system integration, and the use of meta- directories in building federations. DetailsResearch and Practice in Federated Information Systems Report of the EFIS '2000 International Workshop W. Hasselbring W.-J. van den Heuvel y G.J. Houben z R.-D. Kutsche x B. Rieger M. Roantree k K

Houben, Geert-Jan

96

Vendor Information | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500IIVasudha Patri MechanicalofVehicles - ORNL

97

Page 10, Security Forms and Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Para9EnvironmentalPage of 1 pages1 of

98

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

SciTech Connect (OSTI)

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

99

Information Security Analysis Using Game Theory and Simulation  

SciTech Connect (OSTI)

Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

Schlicher, Bob G [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL

2012-01-01T23:59:59.000Z

100

Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.  

E-Print Network [OSTI]

, military, process control . K.6.5 [Management Of Computing And Information Systems]: Security/server, distributed applications, distributed databases. J.7 [Computers In Other Systems]: Command and control security, unauthorized access. General Terms Management, Design, Security. Keywords Access Control

Lee, Ruby B.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Cancels DOE 5639.8.

1993-07-23T23:59:59.000Z

102

Roadmap: Computer Science Information Security -Bachelor of Science  

E-Print Network [OSTI]

Roadmap: Computer Science ­ Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012­2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

Sheridan, Scott

103

Finance, IT Operations& InformationSecurity Dear Colleagues,  

E-Print Network [OSTI]

-examine collectively the customer service aspect of our grant and contract management. A dozen SEAS members, including, is Information Technology. While Indir has stepped into the role of Interim IT Director to keep the proverbial and to check out interesting tips about securing mobile devices and avoiding phishing scams. Harry Dumay, Ph

104

Find It. Delete It. Protect It. Information Technology Security Strategy  

E-Print Network [OSTI]

that security will be a process rather than project. Achievement of the goal, optimized risk management to external best practices and seek external advice on effectiveness. For critical processes and systems valuable information for governance. This process will achieve the long term Internal Controls Maturity

Sheridan, Jennifer

105

Office of the CISO, December 2010 Information Security Risk Advisory  

E-Print Network [OSTI]

Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

Queitsch, Christine

106

Federating Distributed and Heterogeneous Information Sources in Neuroimaging: The NeuroBase Project Federating Distributed and Heterogeneous In-  

E-Print Network [OSTI]

Federating Distributed and Heterogeneous Information Sources in Neuroimaging: The NeuroBase ProjectBase Project C. Barillot1 , H. Benali2 , M. Dojat4 , A. Gaignard1 , B. Gibaud1 , S. Kinkingnéhun2 , J Sources in Neuroimaging: The NeuroBase Project C. Barillot1 , H. Benali2 , M. Dojat3 , A. Gaignard1 , B

Boyer, Edmond

107

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

108

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartmentStewardshipAdministration helps|STEMChernobylMarchInformation |

109

Area Information | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone by E-mailRadioimmunotherapyArchiveAre Earths Rare?Information

110

Secure quantum private information retrieval using phase-encoded queries  

E-Print Network [OSTI]

We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries {[}Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that...

Olejnik, L

2011-01-01T23:59:59.000Z

111

Quantifying and managing the risk of information security breaches participants in a supply chain  

E-Print Network [OSTI]

Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

Bellefeuille, Cynthia Lynn

2005-01-01T23:59:59.000Z

112

Information Technology Specialist (System Analysis/Information Security)  

Broader source: Energy.gov [DOE]

A successful candidate in this position will provide the technical direction, planning, programming, implementation and operations of the Information Technology (IT) program for the Carlsbad Field...

113

Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6  

SciTech Connect (OSTI)

Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

Downing, Timothy R.; Fangman, Patricia M.; Homer, Brian J.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Millard, W. David; Stoops, Lamar R.; Wood, Blanche M.

1999-03-05T23:59:59.000Z

114

The 5 Waves of Information Security From Kristian Beckman to the Present  

E-Print Network [OSTI]

The 5 Waves of Information Security ­ From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security ­ the Third Wave (von Solms, 2000) and Information Security ­ the Fourth Wave (von Solms, 2006), as well as a paper

Boyer, Edmond

115

Credit Leona Securities Asia CLSA UK | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentratingRenewable Solutions LLC Jump to:InformationCrandall, Texas:Credit Leona Securities

116

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

117

Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.5  

SciTech Connect (OSTI)

The Federal Emergency Management System (FEMIS) is an emergency management planning and response tool. The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

Bower, John C. (BATTELLE (PACIFIC NW LAB)); Burnett, Robert A. (BATTELLE (PACIFIC NW LAB)); Carter, Richard J. (BATTELLE (PACIFIC NW LAB)); Downing, Timothy R. (BATTELLE (PACIFIC NW LAB)); Homer, Brian J. (BATTELLE (PACIFIC NW LAB)); Holter, Nancy A. (BATTELLE (PACIFIC NW LAB)); Johnson, Daniel M. (BATTELLE (PACIFIC NW LAB)); Johnson, Ranata L. (BATTELLE (PACIFIC NW LAB)); Johnson, Sharon M. (BATTELLE (PACIFIC NW LAB)); Loveall, Robert M. (BATTELLE (PACIFIC NW LAB)); Ramos Jr., Juan (BATTELLE (PACIFIC NW LAB)); Schulze, Stacy A. (BATTELLE (PACIFIC NW LAB)); Sivaraman, Chitra (BATTELLE (PACIFIC NW LAB)); Stephan, Alex J. (BATTELLE (PACIFIC NW LAB)); Stoops, Lamar R. (BATTELLE (PACIFIC NW LAB)); Wood, Blanche M. (BATTELLE (PACIFIC NW LAB))

2001-12-01T23:59:59.000Z

118

Category:Federal Oil and Gas Statutes | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpenWendeGuoCatalyst Renewables Jump to:En Español JumpFederalFederal

119

Federal Railroad Administration  

Broader source: Energy.gov (indexed) [DOE]

Transportation Federal Railroad Administration Overview of Proposed Rail Safety & Security Rulemakings Kevin R. Blackwell FRA Hazmat Division Washington, DC Federal Authority DOT...

120

Secure Information Exchange Gateway for Electric Grid Operations  

SciTech Connect (OSTI)

The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

Robertson, F.; Carroll, J.; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

2014-09-30T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Secure quantum private information retrieval using phase-encoded queries  

SciTech Connect (OSTI)

We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

2011-08-15T23:59:59.000Z

122

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensional Subject: Guidance for Fast-Track CooperativeGAOa GAOthe Chairman,

123

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY  

E-Print Network [OSTI]

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

Adali, Tulay

124

Algorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security  

E-Print Network [OSTI]

As modern infrastructure systems become increasingly more complex, we are faced with many new challenges in the area of information security. In this thesis we examine some approaches to security based on ideas from ...

Khisti, Ashish, 1979-

2009-01-01T23:59:59.000Z

125

Voluntary Disclosure and Information Asymmetry: Evidence from the 2005 Securities Offering Reform  

E-Print Network [OSTI]

In 2005, the Securities and Exchange Commission enacted the Securities Offering Reform (Reform), which relaxes “gun-jumping” restrictions, thereby allowing firms to more freely disclose information before equity offerings. ...

SHROFF, NEMIT

126

Proceedings of the 7th World Conference on Information Security Education  

E-Print Network [OSTI]

Proceedings of the 7th World Conference on Information Security Education 9-10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1-933510-94-3 © IFIP TC11.8 97 moment. Thus, the notion of security varies

Bishop, Matt

127

Evergreen Securities formerly Ethanol Investments | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformationexplains a4Evendale, Ohio: EnergySecurities formerly

128

CCC Federal License and Permit List | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin: EnergyBoston Areais aBurkittsville,Bushyhead,ButtsC &Energy2CCC Federal

129

Category:Federal Oil and Gas Regulations | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCTBarreis aCallahanWind FarmAdd a new Federal Oil and Gas

130

FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office of Audit|Department of Energy56Executive212-2012FAQSFAQSFAQs:CapturingFEDERAL

131

Category:Federal Environmental Statutes | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpenWendeGuoCatalyst Renewables Jump to:En Español JumpFederal

132

Federal Heights, Colorado: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,FauquierGrant Program Jump to:Federal

133

How information resources are used by federal agencies in risk assessment application: Rapporteur summary  

SciTech Connect (OSTI)

The application of information available for risk assessment from the federal perspective is described. Different federal agencies conduct varying degrees of hazard evaluation, and some also generate empirical data. The role of the Agency for Toxic Substances and Disease Registry in hazard assessments of potential public health impacts of Superfund sites includes identification of the 275 most significant substances. ATSDR is responsible for preparing toxicological profiles. ATSDR also identifies data gaps and needs critical to adequately assessing human health impacts.

Fenner-Crisp, P. [Environmental Protection Agency, Washington, DC (United States)

1990-12-31T23:59:59.000Z

134

Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12. Cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13.

2007-05-17T23:59:59.000Z

135

Information Flow Control for Secure Web Sites Maxwell Norman Krohn  

E-Print Network [OSTI]

smaller, and configure the Web site's security policies. They need only change when the policy changes

136

THE UNIVERSITY OF TEXAS AT DALLAS INFORMATION SECURITY  

E-Print Network [OSTI]

. Instead, these requirements should be integrated into a comprehensive system security plan. II. Scope

O'Toole, Alice J.

137

Information-Theoretically Secure Communication Under Channel Uncertainty  

E-Print Network [OSTI]

. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We...

Ly, Hung Dinh

2012-07-16T23:59:59.000Z

138

automated federal information: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Computer Technologies and Information Sciences Websites Summary: , 2012) This annual report, submitted as a memorandum from the Inspector General to the NASA Administrator,...

139

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY  

E-Print Network [OSTI]

a well-defined process for managing and controlling secure system configurations, and for managing risks, and the integration of security into the configuration management process throughout the life cycle of the system for establishing secure configurations in information systems; flow charts for SecCM processes and activities

140

RT-Based Administrative Models for Community Cyber Security Information Sharing  

E-Print Network [OSTI]

RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

Sandhu, Ravi

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12, cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13, cancels DOE O 440.1B Chg 1.

2007-05-17T23:59:59.000Z

142

Federal Advisory Committee Act of 1972 | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpen Energy Information

143

RAPID/Geothermal/Environment/Federal | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to: navigation, search RAPID Regulatory and Permitting InformationGeothermal/Environment

144

Shared Solar: Current Landscape, Market Potential, and the Impact of Federal Securities Regulation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluatingconstructionSessioneightMemoryCanon,Data

145

Efficient Private Information Retrieval Using Secure Xiangyao Yu, Christopher W. Fletcher  

E-Print Network [OSTI]

attention from the cryptography and security communities. Two main approaches to solve PIR have appearedEfficient Private Information Retrieval Using Secure Hardware Xiangyao Yu, Christopher W. Fletcher, marten, devadas}@mit.edu ABSTRACT Existing crypto-based Private Information Retrieval (PIR) schemes

Gummadi, Ramakrishna

146

Federated DyKnow, a Distributed Information Fusion System for Collaborative UAVs  

E-Print Network [OSTI]

Federated DyKnow, a Distributed Information Fusion System for Collaborative UAVs Fredrik Heintz {frehe, patdo}@ida.liu.se Abstract--As unmanned aerial vehicle (UAV) applications are becoming more complex and covering larger physical areas there is an increasing need for multiple UAVs to cooperatively

Doherty, Patrick

147

Information for the NIH Extramural Grantee Community During the Lapse of Federal Government Funding  

E-Print Network [OSTI]

Information for the NIH Extramural Grantee Community During the Lapse of Federal Government Funding by National Institutes of Health (NIH) Purpose The Government Fiscal Year (FY) 2013 ended on September 30 this lapse in appropriation will have on your grant/cooperative agreement or the availability of NIH

Kroll, Kristen L.

148

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L dDepartmentnews-flashesEnergyRequest ForRequest for Information

149

PKI-based security for peer-to-peer information sharing  

SciTech Connect (OSTI)

The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

2004-05-02T23:59:59.000Z

150

Research With Students My principal research activities lie in information systems security with particular emphasis on access control  

E-Print Network [OSTI]

of security, and secure transaction processing. My recent research has expanded beyond information systemsResearch With Students My principal research activities lie in information systems security and mining, semantic web and multimedia delivery. 1 Major Results · Security solutions for workflow systems

151

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

152

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

153

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

154

Information Technology Security Training Requirements Appendix A --Learning Continuum A-1  

E-Print Network [OSTI]

employees Security Awareness All employees involved with IT systems Security Basics and Literacy Information control. By accrediting a system or application, a manager accepts the associated risk. Accreditation, and Installation Controls -- the process of assuring that adequate controls are considered, evaluated, selected

155

Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1  

E-Print Network [OSTI]

Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

Sadeh, Norman M.

156

Proceedings of the 7 th World Conference on Information Security Education 910 June 2011, Lucerne, Switzerland  

E-Print Network [OSTI]

Proceedings of the 7 th World Conference on Information Security Education 9­10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1­933510­94­3 © IFIP TC11.8 97 moment. Thus, the notion of security varies

Bishop, Matt

157

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard  

E-Print Network [OSTI]

Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard Stefan Fenz an ontology-based framework to improve the preparation of ISO/IEC 27001 audits, and to strengthen the security elaborate on how ISO/IEC 27001 artifacts can be inte- grated into this ontology. A basic introduction

158

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor  

E-Print Network [OSTI]

, was written by Karen Scarfone and Murugiah Souppaya of NIST, and by Amanda Cody and Angela Orebaugh of Booz Allen Hamilton. The new guide replaces NIST SP 800-42, Guideline on Network Security Testing. NIST SP

159

Cyber Security Requirements for Wireless Devices and Information Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

160

An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions  

E-Print Network [OSTI]

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

information resources. This includes, but is not limited to: laptops, Personal Digital Assistants (PDAs29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources ­ Portable Devices: Information Security Approved

162

From Federal Computer Week:  

National Nuclear Security Administration (NNSA)

Federal Computer Week: Energy agency launches performance-based pay system By Richard W. Walker Published on March 27, 2008 The Energy Department's National Nuclear Security...

163

Delegating Network Security with More Information Stanford University  

E-Print Network [OSTI]

's networks. Delegation makes administrators less of a bottle- neck when policy needs to be modified and allows network administration to follow organizational lines. To enable del- egation, we propose ident authority, the network administrator, that administrator has usually had to configure myriad security

164

INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu  

E-Print Network [OSTI]

what might be lurking there ready to attack. According to the SANS (SysAdmin, Audit, Network, Security the Internet with an administrator's account, your computer is at an even higher risk since most malicious code is designed to infiltrate your computer by using the total access of the administrator's account against you

Shyy, Wei

165

Data Sciences Technology for Homeland Security Information Management  

E-Print Network [OSTI]

. Samatova, D. Speck, R. Srikant, J. Thomas, M. Wertheimer, P. C. Wong SANDIA REPORT SAND2004-6648 Unlimited Report of the DHS Workshop on Data Sciences September 22-23, 2004 Jointly released by Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

Kolda, Tamara G.

166

DOE Encourages Utility Sector Nominations to the Federal Communication...  

Broader source: Energy.gov (indexed) [DOE]

the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council DOE Encourages Utility Sector Nominations to the Federal Communications...

167

29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.26 Information Resources ­ Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources ­ Information Security Risk Assessment Reviews security risk assessments are vital procedures for maintaining the security of information resources

168

Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.2  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS system package. System administrators, database administrators, and general users can use this guide to install, configure, and maintain the FEMIS client software package. This document provides a description of the FEMIS environment; distribution media; data, communications, and electronic mail servers; user workstations; and system management.

Burford, M.J.; Burnett, R.A.; Curtis, L.M. [and others

1996-05-01T23:59:59.000Z

169

On the Computational Practicality of Private Information Retrieval Network Security and Applied Cryptography Lab  

E-Print Network [OSTI]

On the Computational Practicality of Private Information Retrieval Radu Sion Network Security of single-server computational pri- vate information retrieval (PIR) for the purpose of preserv- ing client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real

Carbunar, Bogdan

170

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network [OSTI]

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing resource records, and organizational accounting information. Recent cases of industrial espionage all point addressed if both technological and organizational issues are considered simultaneously. How should

Sadeh, Norman M.

171

National Security Information Classification Guidance Fundamental Review, June 2012  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAXBalanced Scorecard Federal2 to:DieselEnergyHydrogen Storage1,

172

Implementing Information Security and Its Technology: A LineManagement Perspective  

SciTech Connect (OSTI)

Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

Barletta, William A.

2005-08-22T23:59:59.000Z

173

EcoSecurities Brasil Ltd | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It is classified asThisEcoGrid EU (Smart Grid Project) JumpEcoSecurities

174

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002OpticsPeriodical: VolumeIComplaints - GoldenDepartment of

175

TEPS/BPA Information | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign Object DamageSystemsU.S. TALKS1 | E nergyTEPS/BPA

176

NMMSS Information, Reports & Forms | National Nuclear Security  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclear SecurityNationalApplyMaintaining ForN x NSecurity| National

177

Emergency Public Information | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for37 East and West Other SLAC ResourcesSecurity /

178

Federal Emergency Management Information system (FEMIS) data management guide. Version 1.2  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of FEMIS. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, how it is loaded, and how it is managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Johnson, S.M.; Loveall, R.M.; Winters, C.

1996-05-01T23:59:59.000Z

179

Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.

Burford, M.J.; Burnett, R.A.; Downing, T.R. [and others

1996-12-01T23:59:59.000Z

180

Service oriented architecture governance tools within information security .  

E-Print Network [OSTI]

??Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for… (more)

Mokgosi, Letlhogonolo

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.7  

SciTech Connect (OSTI)

This document describes the hardware and software required for the Federal Emergency Management Information System version 1.4.7 (FEMIS v1.4.7) released by Pacific Northwest National Laboratory (PNNL). Information included in this document about hardware and software requirements is subject to change.

Arp, Jonathan A. (BATTELLE (PACIFIC NW LAB)); Downing, Timothy R. (BATTELLE (PACIFIC NW LAB)); Gackle, Philip P. (BATTELLE (PACIFIC NW LAB)); Homer, Brian J. (BATTELLE (PACIFIC NW LAB)); Johnson, Daniel M. (BATTELLE (PACIFIC NW LAB)); Johnson, Ranata L. (BATTELLE (PACIFIC NW LAB)); Johnson, Sharon M. (BATTELLE (PACIFIC NW LAB)); Loveall, Robert M. (BATTELLE (PACIFIC NW LAB)); Millard, W David (BATTELLE (PACIFIC NW LAB)); Stoops, Lamar R. (BATTELLE (PACIFIC NW LAB)); Tzemos, Spyridon (BATTELLE (PACIFIC NW LAB)); Wood, Blanche M. (BATTELLE (PACIFIC NW LAB))

1999-12-01T23:59:59.000Z

182

ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,  

E-Print Network [OSTI]

devices have been used by cyber- criminals to launch attacks both within and outside universities information resources and to take action to mitigate that threat. Action that is taken will be based resource has been launched; 4) confidential, private, or proprietary electronic information

Gering, Jon C.

183

Private Information Retrieval, Optimal for Users and Secure Coprocessors  

E-Print Network [OSTI]

@dbis.informatik.hu­berlin.de Abstract. A private information retrieval (PIR) protocol allows a user to retrieve one of N records from a database while hiding the identity of the record from the database server. A PIR protocol is optimal Private Information Retrieval (PIR) protocols. Formally, a PIR protocol allows a user to retrieve one of N

Freytag, Johann-Christoph

184

An Information Security Education Initiative for Engineering and Computer Science  

E-Print Network [OSTI]

and electronic commerce. These applications rely on a collection of switching systems, databases, network Science Board Task Force on Information Warfare { Defense (IW-D) 7]: The reality is that the vulnerability of the Department of Defense { and of the nation { to o ensive information warfare attack is largely a self

185

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network [OSTI]

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing), CASOS ­ the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon network and knowledge management approach to discovering organizational vulnerabilities within companies

Sadeh, Norman M.

186

Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}  

SciTech Connect (OSTI)

The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

NONE

1998-05-01T23:59:59.000Z

187

Security in Information Systems: New Challenges and Opportunities  

E-Print Network [OSTI]

systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

Jurjens, Jan

188

ISS-005, Laptop Encryption Standard 1/2 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-005, Laptop Encryption Standard 1/2 UCIT INFORMATION SECURITY STANDARDS Laptop Encryption Standard Definitions 1 1.1 Encryption: The process used to protect the confidentiality and integrity contained within it is appropriately encrypted. Applicability 3 This standard applies to all UofC owned

Habib, Ayman

189

University of London International Academy MSc/PG Dip in Information Security  

E-Print Network [OSTI]

from the criminal angle and presenting a study of computer crime and the computer criminal. We criminals. Pre-requisites None Essential Reading Cybercrime: The transformation of crime in the Information should be able to: follow trends in computer crime relate computer security methodologies to criminal

Royal Holloway, University of London

190

Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy  

E-Print Network [OSTI]

Lucas Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT controls Supported by the Zurich Information Security Center. Work done while at ETH Zurich, Switzerland

Maurer, Ueli

191

HybridSecure MPC: Trading InformationTheoretic Robustness for Computational Privacy  

E-Print Network [OSTI]

Lucas # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT--- Cryptographic controls # Supported by the Zurich Information Security Center. + Work done while at ETH Zurich

Maurer, Ueli

192

Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13.

2011-10-20T23:59:59.000Z

193

Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13, cancels DOE G 440.1-1B.

2011-10-20T23:59:59.000Z

194

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpIncMAKGalway Bay IEOWCCatcher.pngWavemill <MN Office of Energy

195

Security-Widefield, Colorado: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd Jump to: navigation, search Name: Seadov PtySeboeis,Information

196

Federal Emergency Management Information System (FEMIS). Data Management Guide, FEMIS: Phase 1, Version 1.1u  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the U.S. Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system.

Burnett, R.A.; Johnson, D.M.; Johnson, S.M. [and others

1995-06-01T23:59:59.000Z

197

Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.

Arp, J.A.; Bower, J.C.; Burnett, R.A.; Carter, R.J.; Downing, T.R.; Fangman, P.M.; Gerhardstein, L.H.; Homer, B.J.; Johnson, D.M.; Johnson, R.L.; Johnson, S.M.; Loveall, R.M.; Martin, T.J.; Millard, W.D.; Schulze, S.A.; Stoops, L.R.; Tzemos, S.; Wood, B.M.

1999-06-29T23:59:59.000Z

198

Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.4  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via telecommunications links.

Arp, J.A.; Burnett, R.A.; Downing, T.R. [and others] [and others

1997-11-21T23:59:59.000Z

199

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

200

Reliability and the Federal Energy Regulatory Commission  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers the Federal Energy Regulatory Commission (FERC) strategic plan, the Federal Power Act (FPA), current energy security posture, and more.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Federal Emergency Management Information System (FEMIS) system administration guide, version 1.4.5  

SciTech Connect (OSTI)

The Federal Emergency Management Information Systems (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication, data distribution, and notification functionality necessary to operate FEMIS in a networked, client/server environment. The UNIX server provides an Oracle relational database management system (RDBMS) services, ARC/INFO GIS (optional) capabilities, and basic file management services. PNNL developed utilities that reside on the server include the Notification Service, the Command Service that executes the evacuation model, and AutoRecovery. To operate FEMIS, the Application Software must have access to a site specific FEMIS emergency management database. Data that pertains to an individual EOC`s jurisdiction is stored on the EOC`s local server. Information that needs to be accessible to all EOCs is automatically distributed by the FEMIS database to the other EOCs at the site.

Arp, J.A.; Burnett, R.A.; Carter, R.J. [and others

1998-06-26T23:59:59.000Z

202

The theory of diversity and redundancy in information system security : LDRD final report.  

SciTech Connect (OSTI)

The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

2010-10-01T23:59:59.000Z

203

Boren Fellowship and Scholarship: Summer, semester, and year-long study in regions critical to US national security. Requires 1-year commitment to federal government. Scholarship campus deadline: mid-January. See also NSEP Flagship  

E-Print Network [OSTI]

to US national security. Requires 1-year commitment to federal government. Scholarship campus deadline require university endorsement. Fulbright Grant: Cultural exchange funded by US State Department. One year receiving Pell Grants. Deadlines vary. Goldwater Scholarship: $7500 for up to 2 years of undergraduate study

Bertini, Robert L.

204

An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may partner with the  

E-Print Network [OSTI]

.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA scaling

205

Int. J. Information and Computer Security, Vol. 4, No. 4, 2011 365 Copyright 2011 Inderscience Enterprises Ltd.  

E-Print Network [OSTI]

one of the business process security leitmotifs. It defines a mechanism that bridges the gap between workflow and access control systems. Delegation completion and authorisation enforcement are specified in workflow management systems', Int. J. Information and Computer Security, Vol. 4, No. 4, pp.365

Paris-Sud XI, Université de

206

Federal Market Information Technology in the Post Flash Crash Era: Roles for Supercomputing  

SciTech Connect (OSTI)

This paper describes collaborative work between active traders, regulators, economists, and supercomputing researchers to replicate and extend investigations of the Flash Crash and other market anomalies in a National Laboratory HPC environment. Our work suggests that supercomputing tools and methods will be valuable to market regulators in achieving the goal of market safety, stability, and security. Research results using high frequency data and analytics are described, and directions for future development are discussed. Currently the key mechanism for preventing catastrophic market action are “circuit breakers.” We believe a more graduated approach, similar to the “yellow light” approach in motorsports to slow down traffic, might be a better way to achieve the same goal. To enable this objective, we study a number of indicators that could foresee hazards in market conditions and explore options to confirm such predictions. Our tests confirm that Volume Synchronized Probability of Informed Trading (VPIN) and a version of volume Herfindahl-Hirschman Index (HHI) for measuring market fragmentation can indeed give strong signals ahead of the Flash Crash event on May 6 2010. This is a preliminary step toward a full-fledged early-warning system for unusual market conditions.

Bethel, E. Wes; Leinweber, David; Ruebel, Oliver; Wu, Kesheng

2011-09-16T23:59:59.000Z

207

FOA for Assisting Federal Facilities with Energy Conservation Technologies Informational Webinar  

Broader source: Energy.gov [DOE]

This webinar will highlight the funding opportunity announcement (FOA) that was issued on March 6, 2015. The AFFECT grant will provide funding for renewable energy projects at federal facilities...

208

54432 Federal Register / Vol. 76, No. 170 / Thursday, September 1, 2011 / Notices the contact information above by 5 p.m.  

E-Print Network [OSTI]

.ohanlon@trade.gov or to the Renewable Energy and Energy Efficiency Advisory Committee, Office of Energy and Environmental Technologies and other Federal agencies to take this opportunity to comment on proposed and/or continuing information54432 Federal Register / Vol. 76, No. 170 / Thursday, September 1, 2011 / Notices the contact

209

Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0  

SciTech Connect (OSTI)

This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

Farnham, Irene; Marutzky, Sam

2014-12-01T23:59:59.000Z

210

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

211

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect (OSTI)

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

212

This paper, copyright the IEEE, appears in IEEE Symposium on Security and Privacy 2004. IEEE Computer Society Press, May 2004. This paper previously appeared as Johns Hopkins University Information Security  

E-Print Network [OSTI]

This paper, copyright the IEEE, appears in IEEE Symposium on Security and Privacy 2004. IEEE U.S. federal funds now available to replace outdated punch-card and mechanical voting systems being detected by any mechanisms within the voting terminal software. Furthermore, we show that even

Kohno, Tadayoshi

213

University of London International Academy MSc/PG Dip in Information Security  

E-Print Network [OSTI]

a computing system secure. This process starts with defining the proper security requirements, which system level. In order to understand these security controls we need to describe some background material systems will be examined as well as security related issues of computer architecture. Specific well

Royal Holloway, University of London

214

Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation  

E-Print Network [OSTI]

number 428/11), Cabarnit Cyber Security MAGNET Consortium, Grant from the Institute for Future Defense;1 Introduction Secure multi-party computation (MPC) is a powerful concept in secure distributed computing Theoretically Secure Multi-Party Computation (Preliminary Report) Shlomi Dolev1 and Niv Gilboa2 and Ximing Li1 1

215

Federal Employee Training Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements to supplement DOE O 360.1B, FEDERAL EMPLOYEE TRAINING. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Cancels DOE M 360.1A-1. Canceled by DOE O 360.1C.

2001-10-11T23:59:59.000Z

216

Federal Employee Training Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements to supplement DOE O 360.1A, Federal Employee Training, dated 9-21-99. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Canceled by DOE M 360.1-1B.

1999-09-21T23:59:59.000Z

217

Federal Technical Capability Program (FTCP) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Illness Compensation Program Pamphlet Federal Technical Capability Program (FTCP) Accident Investigation Reports Nuclear Safety Facility Safety Security Classification...

218

File:08-FD-a - FederalTransmission.pdf | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublicIDAPowerPlantSitingConstruction.pdf Jump to: navigation, searchFD-a - FederalTransmission.pdf Jump to:

219

Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6  

SciTech Connect (OSTI)

The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

Arp, Jonathan A.; Bower, John C.; Burnett, Robert A.; Carter, Richard J.; Downing, Timothy R.; Fangman, Patricia M.; Gerhardstein, Lawrence H.; Homer, Brian J.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Loveall, Robert M.; Martin, Tonya J.; Millard, W. David; Schulze, Stacy A.; Stoops, Lamar R.; Tzemos, Spyridon; Wood, Blanche M.

1999-06-24T23:59:59.000Z

220

Federal Emergency Management Information System (FEMIS) System Administration Guide Version 1.5.3  

SciTech Connect (OSTI)

The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

Burnett, Robert A.; Carter, Richard J.; Downing, Timothy R.; Homer, Brian J.; Holter, Nancy A.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Loveall, Robert M.; Schulze, Stacy A.; Sivaraman, Chitra; Stephan, Alex J.; Stoops, LaMar R.; Wood, Blanche M.

2002-11-20T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

The Oak Ridge Technical Information Center: A trailblazer in federal documentation  

SciTech Connect (OSTI)

This document attempts to record the history of US AEC`s Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this document, with 18 chapters arranged into four sections according to different presidential administrations.

Vaden, W.M.

1992-01-01T23:59:59.000Z

222

The Oak Ridge Technical Information Center: A trailblazer in federal documentation  

SciTech Connect (OSTI)

This softbound book attempts to record the history of US AEC's Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this book, whose 18 chapters are arranged into four sections according to different presidential administrations.

Vaden, W.M.

1992-01-01T23:59:59.000Z

223

T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID  

Broader source: Energy.gov [DOE]

RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

224

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27  

E-Print Network [OSTI]

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines for all Texas Veterinary Medical Diagnostic Laboratory (TVMDL) positions. Reason for Procedure Under

225

Energy Security and Restoration Exercise Program/Best Practices and Information Sharing  

SciTech Connect (OSTI)

The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

Barbara McCabe; John Kovach

2009-03-30T23:59:59.000Z

226

Federal Government Energy Management Conservation Programs Reports...  

Broader source: Energy.gov (indexed) [DOE]

Policy Act (NECPA, Pub. L. No. 95-619), as amended, and provide information on energy consumption in Federal buildings, operations, and vehicles. Compiled by the Federal...

227

Federal Government Resources - Tribal Communities | Department...  

Energy Savers [EERE]

preliminary information available regarding the tribal components of Federal Employees Health Benefits (FEHB) and Federal Employees' Group Life Insurance (FEGLI) coverage. OPM...

228

TSO-1002 - In the Matter of Personnel Security Hearing | Department...  

Broader source: Energy.gov (indexed) [DOE]

the Matter of Personnel Security Hearing The individual held a security clearance from 1990 until 2002 while working for government contractors and the federal government. In...

229

Review your system access with your company's Information Security Officer. Access that is not  

E-Print Network [OSTI]

. The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

Shepp, Larry

230

VOLUNTARY PROTECTION PROGRAM ONSITE REVIEW, Fluor Federal Services Richland, Washington February 26- March 2, 2001  

Broader source: Energy.gov [DOE]

This report summarizes the results of the HSS DOE-VPP Team’s evaluation of Fluor Federal Services Richland, Washington during the period of February 26 - March 2, 2001, and provides the Chief Health, Safety and Security Officer with the necessary information to make the final decision regarding the company’s continued participation in DOE-VPP as a Star site.

231

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

232

Federal Emergency Management Information System (FEMIS) Data Management Guide Version 1.3  

SciTech Connect (OSTI)

FEMIS is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. FEMIS is designed to help civilian emergency management personnel to plan for and support their responses to a chemical-releasing event at a military chemical stockpile. This guide provides the background as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the datafiles and database. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, loaded, and managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Hoza, M.; Johnson, S.M.; Loveall, R.M.; Millard, W.D.; Winters, C.; Wood, B.M.

1996-12-01T23:59:59.000Z

233

An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Request for Information  

E-Print Network [OSTI]

.S. Department of Energy's NNSA ASM-SUB Request for Information Los Alamos National Laboratory Field Instruments by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA General Tasks On

234

Federal Presence in Newfoundland and  

E-Print Network [OSTI]

with the national levels Primary reliance on Statistics Canada data Objective: to inform the debate #12;II Employment Federal Government employment Overall Military Executives Federal Government Business Enterprises employment #12;Figure 7 Federal Government Employment Newfoundland and Labrador, 1981-2005 0 2

deYoung, Brad

235

Federal Biomass Activities  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and Budget Federal Biomass Activities Federal Biomass Activities Biopower Biopower Biofuels Biofuels Bioproducts Bioproducts Federal Biomass Activities Federal Biomass...

236

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

237

Energy Security Planning for Sustainable Buildings  

Broader source: Energy.gov [DOE]

For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to...

238

Critical Mission Support Through Energy Security  

Broader source: Energy.gov [DOE]

Presentation covers the critical mission support through energy security and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Rapid City, South Dakota.

239

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses

240

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses (not

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

242

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

243

The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO.  

E-Print Network [OSTI]

' Information Technology policies require that any mobile device containing institutional data must be encrypted Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO. This directive Information Technology Appropriate Use Policy · Colorado School of Mines Administrative Data Policy Mines

244

NNSA Awards Contract for Largest Federal Wind Farm to Siemens...  

National Nuclear Security Administration (NNSA)

Contract for Largest Federal Wind Farm to Siemens Government Technologies, Inc. | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

245

Y-12 Site Office Recognized For Contributions To Combined Federal...  

National Nuclear Security Administration (NNSA)

To ... Y-12 Site Office Recognized For Contributions To Combined Federal Campaign OAK RIDGE, Tenn. -- Employees of the National Nuclear Security Administration's Y-12 Site...

246

Energy-Efficient Product Procurement for Federal Agencies (Brochure...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

EPAct 2005 mandates Federal agen- cies to incorporate energy efficiency criteria into relevant contracts and specifications. * The Energy Independence and Security Act (EISA) of...

247

Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers  

E-Print Network [OSTI]

The importance of safeguarding information created and shared on computers and the Internet has increased significantly in recent years, as society has become increasingly dependent on information technology in government, ...

Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

2010-01-01T23:59:59.000Z

248

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

249

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

250

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

251

Meetings of the Federal Utility Partnership Working Group  

Broader source: Energy.gov [DOE]

The Federal Utility Partnership Working Group (FUPWG) meets twice per year to share success stories, information on Federal Energy Management Program activities and other business.

252

ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY  

E-Print Network [OSTI]

is adequately addressed throughout the system development life cycle, and that data protection mechanisms. This approach involves addressing the protection of health information throughout the system development life cycle, and applying protective mechanisms, including contingency and disaster recovery planning

253

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

254

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect (OSTI)

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

None

2009-10-01T23:59:59.000Z

255

FEMP (Federal Energy Management Program) Update, Spring 1989  

SciTech Connect (OSTI)

The FEMP Update, published quarterly by the Federal Energy Management Program (FEMP), provides information that will assist federal managers in their energy management responsibilities. The Update is distributed primarily to federal facility and energy management personnel.

Not Available

1989-04-01T23:59:59.000Z

256

International Journal of Information Security manuscript No. (will be inserted by the editor)  

E-Print Network [OSTI]

Ding · Yanjiang Yang · Robert H. Deng · Shuhong Wang A New Hardware-assisted PIR with O(n) Shuffle Cost information re- trieval (PIR) was first formalized by Chor et. al, various constructions have been proposed on practical PIR schemes. In this paper, we propose a hardware-assisted PIR scheme with a novel shuffle

Ding, Xuhua

257

Secure Group-based Information Sharing in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

efforts such as joint intrusion detection. As an example, Phoenix Joint Terrorism Task Forces have information. Therefore, in an integrated ad hoc network, group-based data access must be controlled through. First, even with Elliptic Curve Cryptography, symmetric encryption still has its unique advantages

Wang, Yu

258

Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order with ROTC 1, Revision No. 0  

SciTech Connect (OSTI)

Many Federal Facility Agreement and Consent Order (FFACO) Use Restrictions (URs) have been established at various corrective action sites (CASs) as part of FFACO corrective actions (FFACO, 1996; as amended January 2007). Since the signing of the FFACO in 1996, practices and procedures relating to the implementation of risk-based corrective action (RBCA) have evolved. This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: 1. Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria 2. Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria. 3. Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria.

Lynn Kidman

2008-02-01T23:59:59.000Z

259

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

260

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

262

Evaluation of the Impact of EISA Federal Project Investments  

SciTech Connect (OSTI)

The DOE's Federal Energy Management Program has been charged by Office of Management and Budget to conduct an evaluation on actual and verifiable energy savings and carbon emissions reductions from federal energy management investments made across the Federal government as a result of the Energy Independence and Security Act of 2007. This study presents the findings from that evaluation.

Judd, Kathleen S.; Wendel, Emily M.; Morris, Scott L.; Williamson, Jennifer L.; Halverson, Mark A.; Livingston, Olga V.; Loper, Susan A.

2012-12-31T23:59:59.000Z

263

This extended abstract appeared in Proceedings of the 2006 ACM Symposium on Information, computer and communications security (AsiaCCS '06)  

E-Print Network [OSTI]

, however, have resulted in site security policy changes. Many sites are changing their security policies

Abdalla, Michel Ferreira

264

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

265

Secure Control Systems for the Energy Sector  

SciTech Connect (OSTI)

Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

Smith, Rhett; Campbell, Jack; Hadley, Mark

2012-03-31T23:59:59.000Z

266

A Database Management System for the Federal Courts  

E-Print Network [OSTI]

A Database Management System for the Federal Courts JACK R. BUCHANAN, RICHARD D. FENNELL Federal Making Information Systems, Inc., McLean, VA 22101; R. D. Fennell, Federal Judicial Center, Washington, D and several large-scale information management systems projects have been undertaken within the Federal

Samet, Hanan

267

Securities Law Issues Relating to Community Solar Projects  

Broader source: Energy.gov [DOE]

The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

268

Safety and Security Interface Technology Initiative  

SciTech Connect (OSTI)

Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.

Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

2007-05-01T23:59:59.000Z

269

The Evolution of the Federal Monitoring and Assessment Center  

SciTech Connect (OSTI)

The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal emergency response asset whose assistance may be requested by the Department of Homeland Security (DHS), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Nuclear Regulatory Commission (NRC), and state and local agencies to respond to a nuclear or radiological incident. It is an interagency organization with representation from the Department of Energy’s National Nuclear Security Administration (DOE/NNSA), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Department of Health and Human Services (HHS), the Federal Bureau of Investigation (FBI), and other federal agencies. FRMAC, in its present form, was created in 1987 when the radiological support mission was assigned to the DOE’s Nevada Operations Office by DOE Headquarters. The FRMAC asset, including its predecessor entities, was created, grew, and evolved to function as a response to radiological incidents. Radiological emergency response exercises showed the need for a coordinated approach to managing federal emergency monitoring and assessment activities. The mission of FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment activities during a nuclear or radiological incident within the United States in support of state,local, tribal governments, DHS, and the federal coordinating agency. Radiological emergency response professionals with the DOE’s national laboratories support the Radiological Assistance Program (RAP), National Atmospheric Release Advisory Center (NARAC), the Aerial MeasuringSystem (AMS), and the Radiation Emergency Assistance Center/Training Site (REAC/TS). These teams support the FRMAC to provide: ? Atmospheric transport modeling ? Radiation monitoring ? Radiological analysis and data assessments ? Medical advice for radiation injuries In support of field operations, the FRMAC provides geographic information systems, communications, mechanical, electrical, logistics, and administrative support. The size of the FRMAC is tailored to the incident and is comprised of emergency response professionals drawn from across the federal government. State and local emergency response teams may also integrate their operations with FRMAC, but are not required to.

NSTec Aerial Measurement System

2012-07-31T23:59:59.000Z

270

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

271

2015 DOE Safety and Security Enforcement Workshop - Badging and...  

Office of Environmental Management (EM)

2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information 2015 DOE Safety and Security Enforcement Workshop - Badging and Facility Information January...

272

Federal Buildings Supplemental Survey 1993  

SciTech Connect (OSTI)

The Energy Information Administration (EIA) of the US Department of Energy (DOE) is mandated by Congress to be the agency that collects, analyzes, and disseminates impartial, comprehensive data about energy including the volume consumed, its customers, and the purposes for which it is used. The Federal Buildings Supplemental Survey (FBSS) was conducted by EIA in conjunction with DOE`s Office of Federal Energy Management Programs (OFEMP) to gain a better understanding of how Federal buildings use energy. This report presents the data from 881 completed telephone interviews with Federal buildings in three Federal regions. These buildings were systematically selected using OFEMP`s specifications; therefore, these data do not statistically represent all Federal buildings in the country. The purpose of the FBSS was threefold: (1) to understand the characteristics of Federal buildings and their energy use; (2) to provide a baseline in these three Federal regions to measure future energy use in Federal buildings as required in EPACT; and (3) to compare building characteristics and energy use with the data collected in the CBECS.

NONE

1995-11-01T23:59:59.000Z

273

Social Security and Medicare Tax Liability An exemption from social security and Medicare taxes applies  

E-Print Network [OSTI]

. Such persons are exempt from social security and Medicare taxes as long as they remain nonresident aliens for tax purposes. Those who become resident aliens must start paying social security and Medicare taxes resident aliens. If so, they must pay social security and Medicare taxes. Federal tax regulations state

Chen, Tsuhan

274

Delegation as Officially Designated Federal Security Authority...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NA Type: Organizations' Assignment of Responsibility Delegant: David Huizenga, Senior Advisor for Environmental Management Delegate: Mark Whitney, Manager, Oak Ridge Office of...

275

Federal Employment | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxford SiteToledoSampling at the GrandSr:s I1Us |Contact

276

federal budget | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICE OF CIVILAMENDMENT20/%2A6/%2A6/%2A

277

Cool Roof Resource Guide for Federal Agencies (Fact Sheet)  

SciTech Connect (OSTI)

Resource guide containing information and links for the evaluation and installation of cool roofs within the Federal Government

Not Available

2009-07-01T23:59:59.000Z

278

Information Security Specialist  

Broader source: Energy.gov [DOE]

THIS POSITION IS BEING ADVERTISED CONCURRENTLY UNDER MERIT PROMOTION PROCEDURES AS ANNOUNCEMENT # DOE-HQ-EA-15-00014-MP. YOU MUST APPLY TO THE VACANCY FOR WHICH YOU WISH TO RECEIVE CONSIDERATION....

279

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

280

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

ITL Bulletins are published by the Information Technology Laboratory  

E-Print Network [OSTI]

Security Considerations in the Information System Development Life Cycle, December 2003 Computer Security

282

John. F. O'Leary Appointed to Lead Federal Energy Administration...  

National Nuclear Security Administration (NNSA)

John. F. O'Leary Appointed to Lead Federal Energy Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

283

Energy Citations Database (ECD) - Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

284

Reimbursable Work for Department of Homeland Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To authorize a modified process for the acceptance, performance, and administration of work from the Department of Homeland Security (DHS) by Department of Energy (DOE) contractor and federally operated laboratories, sites, and other facilities.

2003-02-28T23:59:59.000Z

285

Federal Trade Commission Necesita Crdito o Seguro?  

E-Print Network [OSTI]

Comisión Federal de Comercio (Federal Trade Commission, FTC), la agencia nacional de protección del sus cuentas, es recolecta- da de su informe de crédito. A través de programas estadísticos, los a tiempo y en forma. Algunas compañías de seguros también usan la información en los informes de crédito

286

Federal Register  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASH 2004-12 April 5, 2004

287

Federal Register  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES ANDIndustrialEnergy FederalFLASH 2004-12 April 5, 200465541 Vol. 79,

288

Federal Register  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google10 Federal

289

Federal Register  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google10 Federal2985

290

Federal Register  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google102479 Federal

291

Federal Register  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google102479 Federal989

292

Federal Register  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME |Supplement5869Google10247954 Federal

293

Federated search  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKYGas FedEx®|default SignFederated

294

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

295

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

296

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

297

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

298

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

299

ACM Journal of Educational Resources in Computing, Vol. 6, No. 3, September 2006. Article 3. Teaching Context in Information Security  

E-Print Network [OSTI]

__________________________________________________________________________________________ 1. INTRODUCTION Software engineers used standard software engineering processes to develop software political science, history, as well as other humanities, to force students to apply or derive principles and Protection General Terms: Management, Security Additional Key Words and Phrases: Environment, judgment

Bishop, Matt

300

Facilitating Sound, Cost-Effective Federal Energy Management (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet is an overview of the U.S. Department of Energy's Federal Energy Management Program (FEMP). The Federal Government, as the nation's largest energy consumer, has a tremendous opportunity and acknowledged responsibility to lead by example. The U.S. Department of Energy's (DOE's) Federal Energy Management Program (FEMP) plays a critical role in this effort. FEMP facilitates the Federal Government's implementation of sound, cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. FEMP does this by focusing on the needs of its Federal customers, delivering an array of services across a variety of program areas.

Not Available

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

FEDERAL EMERGENCY MANAGEMENT AGENCY ARE YOU READY? 83  

E-Print Network [OSTI]

FEDERAL EMERGENCY MANAGEMENT AGENCY ARE YOU READY? 83 National Security Emergencies I n addition uncomfortable or if something does not seem right. #12;84 ARE YOU READY? FEDERAL EMERGENCY MANAGEMENT AGENCY 4- rupted--electricity, telephone, natural gas, gasoline pumps, cash registers, ATM machines, and internet

Tullos, Desiree

302

Federal Utility Partnership Working Group Spring 2009 Meeting Welcome  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—covers the Federal Energy Management Program (FEMP) mission and services; Energy Independence and Security Act (EISA) Section 432 guidance; and American Reinvestment and Recovery Act (ARRA).

303

Federal Express | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProjectExpress Jump to: navigation,

304

Federal Register | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProjectExpress JumpRegister -

305

Ordering Copies of PITAC Reports This report is published by the National Coordination Office for Information  

E-Print Network [OSTI]

effects. Thus, it is a prime target for cyber terrorism as well as criminal acts. The IT infrastructure of Federally developed cutting-edge cyber security technologies to the private sector. · Strengthen it under the Networking and Information Technology Research and Development (NITRD) Program. These actions

Anderson, Richard

306

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

307

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

308

WIPP Documents - Federal Regulations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert SouthwestTechnologies | Blandine Jerome VelenciaNewsNewsFederal Regulations 40 CFR

309

Federal Railroad Administration  

Broader source: Energy.gov (indexed) [DOE]

Manager Federal Railroad Administration Federal Railroad Administration Dedicated Train Study- Report to Congress FRA' s Research & Development Office (as lead on the study)...

310

The Security Plan: Effectively Teaching How To Write One  

E-Print Network [OSTI]

1 The Security Plan: Effectively Teaching How To Write One Paul C. Clark Naval Postgraduate School government requires all federal systems to have a customized security plan. In addition, the National this standard to produce students capable of developing a security plan. The Naval Postgraduate School (NPS

311

advancing nuclear security: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

private information within the system Paris-Sud XI, Universit de 183 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

312

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

313

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

314

Estimating the Effects of Climate Change on Federal Hydropower and Power Marketing  

SciTech Connect (OSTI)

The U.S. Department of Energy is currently preparing an assessment of the effects of climate change on federal hydropower, as directed by Congress in Section 9505 of the Secure Water Act of 2009 (P.L. 111-11). This paper describes the assessment approach being used in a Report to Congress currently being prepared by Oak Ridge National Laboratory. The 9505 assessment will examine climate change effects on water available for hydropower operations and the future power supplies marketed from federal hydropower projects. It will also include recommendations from the Power Marketing Administrations (PMAs) on potential changes in operation or contracting practices that could address these effects and risks of climate change. Potential adaption and mitigation strategies will also be identified. Federal hydropower comprises approximately half of the U.S. hydropower portfolio. The results from the 9505 assessment will promote better understanding among federal dam owners/operators of the sensitivity of their facilities to water availability, and it will provide a basis for planning future actions that will enable adaptation to climate variability and change. The end-users of information are Congressional members, their staff, the PMAs and their customers, federal dam owners/operators, and the DOE Water Power Program.

Sale, Michael J [ORNL; Kao, Shih-Chieh [ORNL; Uria Martinez, Rocio [ORNL; Wei, Yaxing [ORNL

2011-01-01T23:59:59.000Z

315

Measuring the Economic Impacts of Federal Investments in Research  

SciTech Connect (OSTI)

Measuring the Economic Impacts of Federal Investments in Research evaluates approaches to measuring the returns on federal research investments. This report identifies new methodologies and metrics that can be developed and used for assessing returns on research across a wide range of fields (biomedical, information technology, energy, agriculture, environment, and other biological and physical sciences, etc.), while using one or more background papers that review current methodologies as a starting point for the discussion. It focuses on tools that are able to exploit available data in the relatively near term rather than on methodologies that may require substantial new data collection. Over the last several years, there has been a growing interest in policy circles in identifying the payoffs from federal agency research investments, especially in terms of economic growth, competitiveness, and jobs. The extraordinary increase in research expenditures under the American Recovery and Reinvestment Act (ARRA) of 2009 and the President�������¢����������������s commitment to science and technology (S&T) funding increases going forward have heightened the need for measuring the impacts of research investments. Without a credible analysis of their outcomes, the recent and proposed increases in S&T funding may not be sustained, especially given competing claims for federal funding and pressures to reduce projected federal budget deficits. Motivated by these needs and requirements, Measuring the Economic Impacts of Federal Investments in Research reviews and discusses the use of quantitative and qualitative data to evaluate the returns on federal research and development (R&D) investments. Despite the job-focused mandate of the current ARRA reporting requirements, the impact of S&T funding extend well beyond employment. For instance, federal funding in energy research may lead to innovations that would reduce energy costs at the household level, energy imports at the national level, and greenhouse gas emissions at the global level. In principle, these benefits can be measured as a return on research investments, with appropriate consideration of time lags to research outcomes and attribution to private as well as public expenditure. With appropriate metrics, the same could be true for benefits to public health, environmental quality, and food productivity and security. Federal funding of research leads to the development of human capital that is deployed in a variety of occupations with economic and social impacts. Research also produces information that is used in formal (e.g., regulatory and judicial) and informal (e.g., firm and consumer) decision making processes. In addition to reviewing the range of work (by academics, consultants, and research agencies themselves) that has been done in measuring research outcomes and providing a forum to discuss their methods, this report also considers the different methodologies used across fields of research (e.g., agriculture and energy research) to identifies which are applicable to a range of federal S&T funding.

Olson, S; Merrill, S

2011-08-31T23:59:59.000Z

316

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

317

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

318

Federal Laboratory Technology Transfer  

E-Print Network [OSTI]

Federal Laboratory Technology Transfer Fiscal Year 2007 Prepared by: National Institute to present to the President and the Congress this Federal Laboratory Technology Transfer Report summarizing the achievements of Federal technology transfer and partnering programs of the Federal research and development

Perkins, Richard A.

319

Federal Aviation Administration  

E-Print Network [OSTI]

transportation systems FAA's RDT&E Organization: Federal Laboratory for R&D of aviation systems IndependentFederal Aviation Administration Federal Aviation AdministrationNextGen: Primer, Challenges. Wilson N. Felder Director, FAA William J. Hughes Technical Center Date: 6 February 2012 #12;2Federal

320

Federal Resume Guide  

Broader source: Energy.gov [DOE]

This Learning Module will offer helpful tips and suggestions on the development of a federal resume.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Federal Technology Alert: Ground-Source Heat Pumps Applied to Federal Facilities--Second Edition  

SciTech Connect (OSTI)

This Federal Technology Alert, which was sponsored by the U.S. Department of Energy's Office of Federal Energy Management Programs, provides the detailed information and procedures that a Federal energy manager needs to evaluate most ground-source heat pump applications. This report updates an earlier report on ground-source heat pumps that was published in September 1995. In the current report, general benefits of this technology to the Federal sector are described, as are ground-source heat pump operation, system types, design variations, energy savings, and other benefits. In addition, information on current manufacturers, technology users, and references for further reading are provided.

Hadley, Donald L.

2001-03-01T23:59:59.000Z

322

Federal Compensation to Idaho for Public Domain Federal Lands, 1988-99 FederalCompensationtoIdaho  

E-Print Network [OSTI]

........................................................................................................ 9 Figure 7. Bingham County Federal Payments........................................................................................................ 12 Figure 15. Canyon County Federal Payments

O'Laughlin, Jay

323

30-Day Federal Register Notice - Proposed  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Revised 11-2009 30-Day Federal Register Notice - Proposed 6450-01-P DEPARTMENT OF ENERGY Proposed Agency Information Collection AGENCY: U.S. Department of Energy. ACTION: Notice...

324

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical  

E-Print Network [OSTI]

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

California at Davis, University of

325

Enterprise Security Planning (ESP) L. Ertaul T. Braithwaite  

E-Print Network [OSTI]

143 Enterprise Security Planning (ESP) L. Ertaul T. Braithwaite California State University://www.feacinstitute.org Abstract: Enterprise security planning (ESP) is the aligning of information security policies and practices itself. Keywords: Enterprise Security Planning, Zachman Framework, Network Security, Mobile Agents

Ertaull, Levent

326

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

327

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

328

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

329

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

330

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

331

Nevada National Security Site Environmental Report 2011 Summary  

SciTech Connect (OSTI)

The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

Cathy Wills, ed

2012-09-12T23:59:59.000Z

332

Extension of Comment Period on Improving Performance of Federal...  

Energy Savers [EERE]

to Export Electric Energy OE Docket No. EA-353 Boralex Fort Fairfield LP & Boralex Ashland LP: Federal Register Notice Vol 74 No 151 Request for Information on Improving...

333

Energy Corridors on Federal Lands | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

of Federal Lands in States Identified by EPAct 2005 (August 2011) Related Links West-wide Energy Corridor Programmatic EIS Information Center East-wide Energy Corridor Programmatic...

334

Guide to Federal Regulation of Sales of Imported Electricity...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

use of energy. Introduction This Guide to Federal Regulation of Sales of Imported Electricity in Canada, Mexico, and the United States is intended to inform national energy...

335

Federal Facility Reporting and Data | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Program (FEMP) provides information and tools to help agencies report annual energy and water consumption and resource management efforts within Federal facilities. FEMP also...

336

Model-driven Security Policy Deployment: Property Oriented Approach  

E-Print Network [OSTI]

and managing the access control rules of an information system are some of the major concerns of security systems. We formally prove the process of de- ploying a security policy related to an information system the deployment of access control security policies. We show how the use of a formal ex- pression of the security

Garcia-Alfaro, Joaquin

337

BLINK: Securing Information to the Last Connection Scott Craver, Yu Chen*, Hao Chen, Jun Yu, Idris M. Atakli  

E-Print Network [OSTI]

that exerts strict control over documents sent to users. However, people are used to using existing ABSTRACT: Robust cryptography provides confidentiality and integrity for information transferred between on top of Altera FPGA board with Digital Visual Interface (DVI) ports, the correctness, effectiveness

Chen, Yu

338

712 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011 The Effect of Eavesdroppers on Network  

E-Print Network [OSTI]

USA. He is now with Qualcomm Inc., San Deigo, CA 92121 USA (e-mail: satashu@cmu.edu). V. Aggarwal years, there has been growing interest in em- ploying information theoretic methods to provide secrecy is with AT&T Laboratories Research, Florham Park, NJ 07932 USA, and also with the Department of Electrical

Yener, Aylin

339

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

340

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Federal Agency NEPA Procedures  

Broader source: Energy.gov [DOE]

Each Federal agency is required to develop NEPA procedures that supplement the CEQ Regulations. Developed in consultation with CEQ, Federal agency NEPA procedures must meet the standards in the CEQ...

342

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

343

ESPC Sucess Story- Harold Washington Social Security Administration Center  

Broader source: Energy.gov [DOE]

Fact sheet describes the Federal Energy Management Program (FEMP) Energy Savings Performance Contract (ESPC) success story on environmental stewardship and cost savings at the Harold Washington Social Security Administration Center in Chicago, Illinois.

344

The Department of Homeland Security Energy Management Program  

Energy Savers [EERE]

Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies...

345

FEDERAL ENERGY REGULATORY COMMISSION  

E-Print Network [OSTI]

FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT POWER MARKETS The Federal Energy Regulatory Commission today ordered its staff to conduct investigators will find out if any technical or operational factors, federal or state regulatory prohibitions

Laughlin, Robert B.

346

Federal Government Presence in  

E-Print Network [OSTI]

% since 1993 Source: Statistics Canada, Public Sector Employment, Table 183-0002. Figure 4 Federal of Federal Employment Source: Statistics Canada, Public Sector Employment, Table 183-0002. Figure 6 Federal #12;Employment Shares Across Provinces Source: Statistics Canada, Population, Table 51-0001 and Public

deYoung, Brad

347

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

348

Headquarters Facilities Master Security Plan | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Welcome to the 2014 version of the Headquarters Facilities Master Security Plan (HQFMSP). The purpose of the HQFMSP is to inform employees, contractors, and visitors of the...

349

Office of Security Assessments | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

security policies and programs throughout the Department, including protection of special nuclear material, and classified and sensitive information. The Office has established and...

350

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

351

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

352

Radiation control coatings installed on federal buildings at Tyndall Air Force Base. Volume 2: Long-term monitoring and modeling  

SciTech Connect (OSTI)

The US Department of Energy`s (DOE`s) Federal Energy Management Program (FEMP) supports efforts to reduce energy use and associated expenses in the federal sector. One such effort, the New Technology Demonstration Program (NTDP), seeks to evaluate new energy-saving US technologies and secure their more timely adoption by the US government. Through a partnership with a federal site, the utility serving the site, a manufacturer of an energy-related technology, and other organizations associated with these interests, DOE can evaluate a new technology. The results of the program give federal agency decision makers more hands-on information with which to validate a decision to utilize a new technology in their facilities. This is the second volume of a two-volume report that describes the effects of radiation control coatings installed on federal buildings at Tyndall Air Force Base (AFB) in Florida by ThermShield International. ORNL`s Buildings Technology Center (BTC) was assigned the responsibility for gathering, analyzing, and reporting on the data to describe the effects of the coatings. The first volume described the monitoring plan and its implementation, the results of pre-coating monitoring, the coating installation, results from fresh coatings compared to pre-coating results, and a plan to decommission the monitoring equipment. This second volume updates and completes the presentation of data to compare performance of fresh coatings with weathered coatings.

Petrie, T.W.; Childs, P.W.

1998-06-01T23:59:59.000Z

353

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

354

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

355

National Nuclear Security Administration to Help Train Former...  

National Nuclear Security Administration (NNSA)

Former Soviet WMD Scientists in Commercial Information Technology Fields --Reduces Proliferation Threats-- | National Nuclear Security Administration Facebook Twitter Youtube...

356

Federal Response Assets for a Radioactive Dispersal Device Incident  

SciTech Connect (OSTI)

If a large scale RDD event where to occur in New York City, the magnitude of the problem would likely exceed the capabilities of City and State to effectively respond to the event. New York State could request Federal Assistance if the United States President has not already made the decision to provide it. The United States Federal Government has a well developed protocol to respond to emergencies. The National Response Framework (NRF) describes the process for responding to all types of emergencies including RDD incidents. Depending on the location and type of event, the NRF involves appropriate Federal Agencies, e.g., Department of Homeland Security (DHS), the Department of Energy (DOE), Environmental Protection Agency (EPA), United States Coast Guard (USCG), Department of Defense (DOD), Department of Justice (DOJ), Department of Agriculture (USDA), and Nuclear Regulatory Commission (NRC). The Federal response to emergencies has been refined and improved over the last thirty years and has been tested on natural disasters (e.g. hurricanes and floods), man-made disasters (oil spills), and terrorist events (9/11). However, the system has never been tested under an actual RDD event. Drills have been conducted with Federal, State, and local agencies to examine the initial (early) phases of such an event (TopOff 2 and TopOff 4). The Planning Guidance for Protection and Recovery Following Radiological Dispersal Device (RDD) and Improvised Nuclear Device (IND) incidents issued by the Department of Homeland Security (DHS) in August 2008 has never been fully tested in an interagency exercise. Recently, another exercise called Empire 09 that was situated in Albany, New York was conducted. Empire 09 consists of 3 different exercises be held in May and June, 2009. The first exercise, May 2009, involved a table top exercise for phase 1 (0-48 hours) of the response to an RDD incident. In early June, a full-scale 3- day exercise was conducted for the mid-phase response (48 hours +). A few weeks later, a one day full-scale exercise was conducted for the late phase (recovery) response to an RDD event. The lessons learned from this study are not available as of June 30, 2009. The objective of this report is to review and summarize anticipated Federal and State response actions and the roles and responsibilities of various agencies (DHS, EPA, DOE, NY-DEP, NY-DEC) with respect to decontamination issues that would arise from a radiological dispersion device (RDD), e.g., dirty bomb attack. These issues arise in the late phase of the response (48 hours and beyond) after the area has been stabilized and forensic information has been obtained. Much of the information provided in this report is taken directly from published guidance that is readily available.

Sullivan,T.

2009-06-30T23:59:59.000Z

357

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

358

White Paper: CA and Microsoft for Interoperable, Secure Web Business  

E-Print Network [OSTI]

White Paper: CA and Microsoft for Interoperable, Secure Web Business Enablement Author: Dave, and improve outreach to business partners and customers. This white paper reviews how solutions from CA (CA SiteMinder, CA Federation Manager) and Microsoft (Active Directory Federation Services (formerly code

Narasayya, Vivek

359

Instructions for Optional Application for Federal Employment -OF 612 You may apply for most Federal jobs with a resume, an Optional Application for Federal Employment (OF 612), or other written format. If your resume or  

E-Print Network [OSTI]

Federal jobs with a resume, an Optional Application for Federal Employment (OF 612), or other written format. If your resume or application does not provide all the information requested on this form

360

Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order, Revision 0  

SciTech Connect (OSTI)

This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: 1. Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria 2. Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria. 3. Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria.

Lynn Kidman

2008-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

362

High Level Architecture (HLA) federation with Umbra and OPNET federates.  

SciTech Connect (OSTI)

Network-centric systems that depend on mobile wireless ad hoc networks for their information exchange require detailed analysis to support their development. In many cases, this critical analysis is best provided with high-fidelity system simulations that include the effects of network architectures and protocols. In this research, we developed a high-fidelity system simulation capability using an HLA federation. The HLA federation, consisting of the Umbra system simulator and OPNET Modeler network simulator, provides a means for the system simulator to both affect, and be affected by, events in the network simulator. Advances are also made in increasing the fidelity of the wireless communication channel and reducing simulation run-time with a dead reckoning capability. A simulation experiment is included to demonstrate the developed modeling and simulation capability.

Oppel, Fred John III; Hart, Brian; Van Leeuwen, Brian P.

2004-03-01T23:59:59.000Z

363

TRAINING FOR INFORMATION  

E-Print Network [OSTI]

June 1998 TRAINING FOR INFORMATION TECHNOLOGY SECURITY: EVALUATING THE EFFECTIVENESS OF RESULTS-BASED LEARNING The basic principles of results-based training for information technology (IT) security were discussed in our April 1998 bulletin, Training Require- ments for Information Technology Security

364

Safeguards and Security Technology Development Directory. FY 1993  

SciTech Connect (OSTI)

The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

Not Available

1993-06-01T23:59:59.000Z

365

Landmark Tribal Wind Energy Deal Paves the Way for Tribal-Federal...  

Office of Environmental Management (EM)

just tremendous. This has been like Energy Development 101 and we were right in the heart of it." For Geronimo Energy President Blake Nixon, securing a large federal contract...

366

Federal Railroad Administration  

Broader source: Energy.gov (indexed) [DOE]

very similar to this bill in regard to the core provisions Core provisions: Review and reform the Federal hours of service requirements Establish a new risk reduction program...

367

Federal Employee Health Services  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements and responsibilities for occupational medical, employee assistance, and workers' compensation programs for Federal employees. Cancels DOE O 341.1.

2007-10-18T23:59:59.000Z

368

Federal NEPA Contacts  

Broader source: Energy.gov [DOE]

CEQ and most Federal agencies identify primary points of contact for NEPA compliance. Normally a senior environmental professional, environmental law attorney, or member of agency leadership, these...

369

Federal Railroad Administration  

Broader source: Energy.gov (indexed) [DOE]

- HQ Hazmat Division, Washington, DC. Federal Railroad Administration Dedicated Train Study - Report to Congress November 2003 - FRA' s Ofc. Of Research & Development...

370

INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for  

E-Print Network [OSTI]

-leading research with real-world impact! #12;INSTITUTE FOR CYBER SECURITY Super vs Micro-distribution in g-SIS 8INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Executive Director and Endowed Professor Institute for Cyber Security University of Texas at San Antonio

Sandhu, Ravi

371

Non-Possessing Security Plan Page 1 of 2  

E-Print Network [OSTI]

Non-Possessing Security Plan Page 1 of 2 This plan summarizes the safeguards and security personnel to hold DOE access authorizations for access to classified information and/or special nuclear -- comply with all applicable DOE security requirements, including the following: Security Training [DOE M

Pennycook, Steve

372

Recommendations and Justifications To Remove Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office Federal Facility Agreement and Consent Order, Revision 0  

SciTech Connect (OSTI)

This document is part of an effort to reevaluate 37 FFACO and Administrative URs against the current Soils Risk-Based Corrective Action Evaluation Process. After reviewing 37 existing FFACO and Administrative URs, 3 URs addressed in this document have sufficient information to determine that these current URs may be removed, based on the RBCA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RBCA criteria.

Birney, Cathleen; Krauss, Mark J

2013-09-01T23:59:59.000Z

373

Recommendations and Justifications for Modifications To Downgrade Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office Federal Facility Agreement and Consent Order, Revision 1  

SciTech Connect (OSTI)

This document is part of an effort to reevaluate 37 FFACO and Administrative URs against the current Soils Risk-Based Corrective Action Evaluation Process. After reviewing 37 existing FFACO and Administrative URs, 11 URs addressed in this document have sufficient information to determine that these current URs may be downgraded to Administrative URs based on the RBCA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RBCA criteria.

Birney, Cathleen; Krauss, Mark J

2013-10-01T23:59:59.000Z

374

Security Equipment and Systems Certification Program (SESCP)  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

1996-06-20T23:59:59.000Z

375

Northwest Regional Technology Center, May 2014 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network [OSTI]

Security (DHS) Domestic Nuclear Detection Office (DNDO), recently visited PNNL. The goals of the trip wereNorthwest Regional Technology Center, May 2014 Page 1 of 2 Around The Region In Homeland Security, and recovery. The center enables homeland security solutions for emergency responder communities and federal

376

FACT SHEET: Homeland Security Partner Agencies (Page 1 of 2) Agency Project  

E-Print Network [OSTI]

(OI&A) Evaluation of fusion centers. US Department of Homeland Security - - Domestic Nuclear DetectionFACT SHEET: Homeland Security Partner Agencies (Page 1 of 2) Agency Project US Department of Homeland Security - - Federal Emergency Management Administration (FEMA) Flood mitigation; risk based

377

Federal Technical Capability Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Federal Technical Capability Manual provides the process for the recruitment, deployment, development, and retention of Federal personnel with the demonstrated technical capability to safely accomplish the Departments missions and responsibilities at defense nuclear facilities. Canceled by DOE M 426.1-1A. Does not cancel other directives.

2000-06-05T23:59:59.000Z

378

Federal Technical Capability  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This directive defines requirements and responsibilities for meeting the Department of Energy (DOE) commitment to recruiting, deploying, developing, and retaining a technically competent workforce that will accomplish DOE missions in a safe and efficient manner through the Federal Technical Capability Program (FTCP). Cancels DOE M 426.1-1A, Federal Technical Capability Manual.

2009-11-19T23:59:59.000Z

379

FEDERAL ENERGY REGULATORY COMMISSION  

E-Print Network [OSTI]

FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT AND FERC STAFF The Federal Energy Regulatory Commission today accepted a settlement, valued at nearly $500 stemming from the 2000-2001 energy crisis in California and other Western states. The global settlement

Laughlin, Robert B.

380

FEDERAL ENERGY REGULATORY COMMISSION  

E-Print Network [OSTI]

FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT SETTLEMENT BETWEEN DUKE AND COMMISSION STAFF The Federal Energy Regulatory Commission today accepted a settlement between the Commission's enforcement staff and Houston-based units of Duke Energy that resolves

Laughlin, Robert B.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

FEDERAL ENERGY REGULATORY COMMISSION  

E-Print Network [OSTI]

FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT POWER EXCHANGE MARKET The Federal Energy Regulatory Commission today approved a staff settlement calling-2-001 COMMISSION APPROVES $13.8 MILLION SETTLEMENT WITH RELIANT ENERGY OVER PHYSICAL WITHHOLDING IN CALIFORNIA

Laughlin, Robert B.

382

FEDERAL ENERGY REGULATORY COMMISSION  

E-Print Network [OSTI]

FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT The Federal Energy Regulatory Commission today accepted an agreement between Nevada Power and Sierra Pacific. AGREEMENT ACCEPTED BETWEEN ENRON AND NEVADA COMPANIES SETTLING MATTERS STEMMING FROM WESTERN ENERGY CRISIS

Laughlin, Robert B.

383

FEDERAL ENERGY REGULATORY COMMISSION  

E-Print Network [OSTI]

FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT FERC APPROVES SETTLEMENT WITH RELIANT IN CALIFORNIA CASES; PROCEEDS COULD TOTAL $50 MILLION The Federal Energy Regulatory Commission today approved a settlement between the Commission's enforcement staff

Laughlin, Robert B.

384

FEDERAL ENERGY REGULATORY COMMISSION  

E-Print Network [OSTI]

FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT CRISIS The Federal Energy Regulatory Commission today approved a comprehensive settlement among APX Inc. Coral Power LLC, Puget Sound Energy Inc. and Avista are Supporting Parties. R-07-14 (30) #12;

Laughlin, Robert B.

385

FEDERAL ENERGY REGULATORY COMMISSION  

E-Print Network [OSTI]

FEDERAL ENERGY REGULATORY COMMISSION WASHINGTON, D.C. 20426 NEWS RELEASE NEWS MEDIA CONTACT-95-191 COMMISSION APPROVES TWO WESTERN POWER SETTLEMENTS The Federal Energy Regulatory Commission today approved two markets during the Western energy crisis of 2000-2001. The first case involves a settlement agreement

Laughlin, Robert B.

386

Electricity Advisory Committee - Federal Register Notices | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Federal Register Notices Electricity Advisory Committee - Federal Register Notices Electricity Advisory Committee - Federal Register Notices September 3, 2014 Electricity Advisory...

387

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

388

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

389

Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish Department of Energy (DOE) requirements and responsibilities for reporting cyber security incidents involving classified and unclassified systems and responding to cyber security alerts and advisories; and to implement requirements of DOE N 205.1, Unclassified Cyber Security Program, and DOE M 471.2-2, Classified Information Systems Security Manual. DOE N 205.13, dated 7-6-04, extends this notice until 7-6-05. Cancels DOE M 471.2-2, Chapter III, section 8.

2002-03-18T23:59:59.000Z

390

Quantum Information Science | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Geographic Information Science and Technology Quantum Information Science Quantum Communication and Security Quantum-Enhanced Sensing Quantum Computing Supercomputing and...

391

Annual report to Congress on Federal Government Energy Management and Conservation Programs, Fiscal Year 1997  

SciTech Connect (OSTI)

In fulfillment of statutory requirements, this report provides information on energy consumption in Federal buildings and operations and also documents activities conducted by Federal agencies in fulfilling those requirements during Fiscal Year 1997.

none,

1999-08-13T23:59:59.000Z

392

Annual report to Congress on Federal Government Energy Management and Conservation Programs, Fiscal Year 1998  

SciTech Connect (OSTI)

In fulfillment of statutory requirements, this report provides information on energy consumption in Federal buildings and operations and also documents activities conducted by Federal agencies in fulfilling those requirements during Fiscal Year 1998.

none,

2000-03-20T23:59:59.000Z

393

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

394

Federal Facility Agreement progress report  

SciTech Connect (OSTI)

The (SRS) Federal Facility Agreement (FFA) was made effective by the US. Environmental Protection Agency Region IV (EPA) on August 16, 1993. To meet the reporting requirements in Section XXV of the Agreement, the FFA Progress Report was developed. The FFA Progress Report is the first of a series of quarterly progress reports to be prepared by the SRS. As such this report describes the information and action taken to September 30, 1993 on the SRS units identified for investigation and remediation in the Agreement. This includes; rubble pits, runoff basins, retention basin, seepage basin, burning pits, H-Area Tank 16, and spill areas.

Not Available

1993-10-01T23:59:59.000Z

395

Federal Activities in the Bioeconomy  

Broader source: Energy.gov [DOE]

Plenary V: Federal Activities in the Bioeconomy Federal Activities in the Bioeconomy Zia Haq, Senior Analyst, Technology Manager, Bioenergy Technologies Office, U.S. Department of Energy

396

Executive Order 13514: Federal Leadership in Environmental, Energy, and Economic Performance; Comprehensive Federal Fleet Management Handbook (Book)  

SciTech Connect (OSTI)

A comprehensive Federal Fleet Management Handbook that builds upon the "Guidance for Federal Agencies on E.O. 13514 Section 12-Federal Fleet Management" and provides information to help fleet managers select optimal greenhouse gas and petroleum reduction strategies for each location, meeting or exceeding related fleet requirements, acquiring vehicles to support these strategies while minimizing fleet size and vehicle miles traveled, and refining strategies based on agency performance.

Daley, R.; Ahdieh, N.; Bentley, J.

2014-01-01T23:59:59.000Z

397

Department of Energy Cites Bechtel Jacobs for Classified Information...  

Office of Environmental Management (EM)

Bechtel Jacobs for Classified Information Security and Worker Safety and Health Violations Department of Energy Cites Bechtel Jacobs for Classified Information Security and Worker...

398

Attributes of the Federal Energy Management Program's Federal Site Building Characteristics Database  

SciTech Connect (OSTI)

Typically, the Federal building stock is referred to as a group of about one-half million buildings throughout the United States. Additional information beyond this level is generally limited to distribution of that total by agency and maybe distribution of the total by state. However, additional characterization of the Federal building stock is required as the Federal sector seeks ways to implement efficiency projects to reduce energy and water use intensity as mandated by legislation and Executive Order. Using a Federal facility database that was assembled for use in a geographic information system tool, additional characterization of the Federal building stock is provided including information regarding the geographical distribution of sites, building counts and percentage of total by agency, distribution of sites and building totals by agency, distribution of building count and floor space by Federal building type classification by agency, and rank ordering of sites, buildings, and floor space by state. A case study is provided regarding how the building stock has changed for the Department of Energy from 2000 through 2008.

Loper, Susan A.; Sandusky, William F.

2010-12-31T23:59:59.000Z

399

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

400

Federal Water Use Indices  

Broader source: Energy.gov [DOE]

FEMP provides water use indices as a guide for Federal agencies. Note that each is a rough estimate of water usage at different types of sites. Your site may vary considerably.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Federal Employee Health Services  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities for occupational medical, employee assistance, and workers' compensation programs for Federal employees. Cancels DOE 3790.1B. Canceled by DOE O 341.1A.

2003-12-01T23:59:59.000Z

402

Federal Protective Force  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes requirements for the management and operation of the Department of Energy (DOE) Federal protective forces (FPFs). Cancels DOE M 470.4-3, Chg 1. Canceled by DOE O 473.3.

2009-07-15T23:59:59.000Z

403

Control Systems Security Test Center - FY 2004 Program Summary  

SciTech Connect (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

404

Hawaii Bioenergy Master Plan State, County, and Federal  

E-Print Network [OSTI]

Hawaii Bioenergy Master Plan State, County, and Federal Plans, Policies, Statutes, and Regulations, Policies, Statutes, and Regulations was prepared as part of the Hawaii Bioenergy Master Plan project based on information available as of April 28, 2009. #12;ii Hawaii Bioenergy Master Plan State, County and Federal

405

NREL: Technology Deployment - Other Federal Agency Support  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andData and ResourcesOther Federal Agency Support Photo of a man and a

406

Lecture 13: Control System Cyber Security  

E-Print Network [OSTI]

Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

CERN. Geneva

2013-01-01T23:59:59.000Z

407

SOURCE SELECTION INFORMATION -  

Office of Environmental Management (EM)

on Energy and Water Development U.S. House of Representatives The Honorable Lamar Alexander Ranking Member SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION...

408

SOURCE SELECTION INFORMATION -  

Energy Savers [EERE]

on Energy and Water Development U.S. House of Representatives The Honorable Lamar Alexander SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION REGULATION (FAR)...

409

This report is a part of the College's efforts to provide you with information on security procedures, services, and resources available on  

E-Print Network [OSTI]

Security for Campus Grounds & Buildings ­ P. 2-3 Public Safety Services ­ P. 3 Section Two Reporting Crimes. 7-8 Valuable Property ­ P. 8 Campus Buildings ­ P. 8 Residential Facilities and Policies ­ P. 8. 24-25 NYS Laws and Penalties Regarding Sex Offenses ­ P. 25-26 Sexual Assault Prevention ­ P. 27 Sex

410

Foundations 6% Federal 49%  

E-Print Network [OSTI]

Administration National Renewable Energy Laboratory National Science Foundation National Security Agency Naval Agencies Administration for Children and Families Air Force Office of Scientific Research Air Force Administration Lawrence Livermore National Laboratory NASA Headquarters NASA Jet Propulsion Laboratory National

Ponce, V. Miguel

411

Re: DOE Request for Information - Implementing the National Broadband...  

Broader source: Energy.gov (indexed) [DOE]

the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart Grid Policy (Federal RegisterVol.75, No.90Tuesday May 11,...

412

Re: DOE Request for Information - Implementing the National Broadband...  

Broader source: Energy.gov (indexed) [DOE]

the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy, which was published at 75 Federal Register...

413

Federal Register Notices | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in Review:Department ofDistribution Infrastructure |Federal Long Tern Care2 FederalInformation

414

Federating data sets for use in a map context  

E-Print Network [OSTI]

The goal of this project is to federate data sets containing location information such that they can be used in a map context. There are numerous examples of these data sets around the MIT campus: asset data with the ...

Giovine, Grayson P

2006-01-01T23:59:59.000Z

415

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

416

Security Engineering for Ambient Intelligence: A Manifesto  

E-Print Network [OSTI]

: +34952131397 amg@lcc.uma.es Carsten Rudolph Fraunhofer Institute for Secure Information Technology (SIT), Rheinstrasse 75, D-64295 Darmstadt, Germany Tel: +496151869344 Fax: +496151869224 Carsten.Rudolph@sit.fraunhofer challenges for the design and engineering of secure and dependable systems. This chapter describes SERENITY

Spanoudakis, George

417

FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon  

E-Print Network [OSTI]

FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon A DISSERTATION in Computer and Information Science #12;FOUNDATIONS OF WEB SCRIPT SECURITY COPYRIGHT 2012 Aaron Bohannon #12;Acknowledgements applying reactive noninterference to web browsers. Before I started the final phase of my thesis research

Plotkin, Joshua B.

418

Radiation control coatings installed on federal buildings at Tyndall Air Force Base. Volume 1: Pre-coating monitoring and fresh coating results  

SciTech Connect (OSTI)

The US Department of Energy`s (DOE`s) Federal Energy Management Program (FEMP) supports efforts to reduce energy use and associated expenses in the federal sector. One such effort, the New Technology Demonstration Program (NTDP), seeks to evaluate new energy-saving US technologies and secure their more timely adoption by the US government. Through a partnership with a federal site, the utility serving the site, a manufacturer of an energy-related technology, and other organizations associated with these interests, DOE can evaluate a new technology. The results of the program give federal agency decision makers more hands-on information with which to validate a decision to utilize a new technology in their facilities. The partnership of these interests is secured through a cooperative research and development agreement (CRADA), in this case between Lockheed Martin Energy Research Corporation, the manager of the Oak Ridge National Laboratory (ORNL), Oak Ridge, Tennessee, and ThermShield International, Ltd., the manufacturer of the technology. This is the first volume of a two-volume report that describes the effects of radiation control coatings installed on federal buildings at Tyndall Air Force Base (AFB) in Florida by ThermShield International. ORNL`s Buildings Technology Center (BTC) was assigned the responsibility for gathering, analyzing, and reporting on the data to describe the effects of the coatings. This volume describes the monitoring plan and its implementation, the results of pre-coating monitoring, the coating installation, results from fresh coatings compared to pre-coating results, and a plan to decommission the monitoring equipment. By including results from roofs at Tyndall AFB and from an outdoor test facility at the BTC, the data cover the range from poorly insulated to well-insulated roofs and two kinds of radiation control coatings on various roof membranes.

Petrie, T.W.; Childs, P.W.

1997-02-01T23:59:59.000Z

419

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

420

Federal Register Notice  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResourcesFLASH2011-11-OPAMFY 2007 Total System12Federal Long Tern810 Federal Register

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Delegation as Officially Designated Federal Security Authority - DOE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesData Files Data Files 1B&W Y-12studiesDOE

422

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

423

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

424

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

425

US statutes for enforcement by security inspectors  

SciTech Connect (OSTI)

This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

Cadwell, J.J.; Ruger, C.J.

1995-12-01T23:59:59.000Z

426

Appendix C: Criteria Review and Approach Documents, National Nuclear Security Administration  

Broader source: Energy.gov [DOE]

A section of Appendix C to DOE G 226.1-2A "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of a table of National Nuclear Security Administration Criteria Review and Approach Documents (CRADS).

427

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

428

Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack  

SciTech Connect (OSTI)

On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

2010-02-01T23:59:59.000Z

429

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

430

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

431

Federal Laboratory Technology Transfer  

E-Print Network [OSTI]

Federal Laboratory Technology Transfer Fiscal Year 2009 Prepared by: National Institute to submit this fiscal year 2009 Technology Transfer Summary Report to the President and the Congress in accordance with 15 USC Sec 3710(g)(2) for an annual summary on the implementation of technology transfer

Perkins, Richard A.

432

Federal Laboratory Technology Transfer  

E-Print Network [OSTI]

Federal Laboratory Technology Transfer Fiscal Year 2008 Prepared by: National Institute to submit this fiscal year 2008 Technology Transfer Summary Report to the President and the Congress transfer authorities established by the Technology Transfer Commercialization Act of 2000 (P.L. 106

Perkins, Richard A.

433

632 Appendix Federal Infonnation  

E-Print Network [OSTI]

632 Appendix Federal Infonnation Processing Standards Publication 46 1977 JanuW)' 15 ANNOUNCING. d.,~ !oh)' II. 1973). and P." 6 of Tit\\rCt·Rl. Name (If Standard with a key. The key is generated in such a way that each of the 56 bits used directly by the algori~hrn an' r

Holden, Joshua Brandon

434

da Reitoria UNIVERSIDADE FEDERAL  

E-Print Network [OSTI]

Aperfeiçoamento Institucional. A PRESIDENTE DO CONSELHO UNIVERSITÁRIO da Universidade Federal de Santa Catarina, mudando o nome da Secretaria Especial de Aperfeiçoamento Institucional para "Secretaria de Aperfeiçoamento) Secretaria de Relações Internacionais; c) Secretaria de Gestão de Pessoas; d) Secretaria de Aperfeiçoamento

Floeter, Sergio Ricardo

435

Federal Employee Training  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To plan and establish requirements and assign responsibilities for Department of Energy (DOE) Federal employee training, education, and development (hereafter referred to as "training") under the Government Employees Training Act of 1958. Cancels DOE O 360.1A. Canceled by DOE O 360.1C.

2001-10-11T23:59:59.000Z

436

Federal Employee Training  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To plan and establish requirements and assign responsibilities for Department of Energy (DOE) Federal employee training, education, and development under the Government Employees Training Act of 1958, as amended. Cancels DOE O 360.1. Canceled by DOE O 360.1B.

1999-09-21T23:59:59.000Z

437

Federal Employee Training  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes requirements and responsibilities for DOE Federal employee training in accordance with Chapter 41 of Title 5, United States Code (U.S.C.). Cancels DOE O 360.1B and DOE M 360.1-1B.

2011-07-06T23:59:59.000Z

438

Federal Technical Capability  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To define requirements and responsibilities for meeting the Department of Energy (DOE) commitment to recruiting, deploying, developing, and retaining a technically competent workforce that will accomplish DOE missions in a safe and efficient manner through the Federal Technical Capability Program (FTCP). Chg. 1 dated 9-20-11 Cancels DOE O 426.1. Cancels DOE P 426.1.

2009-11-19T23:59:59.000Z

439

Privacy ANU is subject to the Privacy Act 1988 and the University will take steps to ensure the security of your personal information. The University  

E-Print Network [OSTI]

collects and maintains personal information, please view the policy at https://policies.anu.edu.au/ ppl

Botea, Adi

440

IT Security Plan for Flight Simulation Program  

E-Print Network [OSTI]

Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United States. Compromise insecurity could lead severe consequences. However, technology changes so rapidly that change has to be made to reflect these changes with security in mind. This article outlines a growing technological change (virtualization and cloud computing), and how to properly address IT security concerns within an operating environment. By leveraging a series of encrypted physical and virtual systems, andnetwork isolation measures, this paper delivered a secured high performance computing environment that efficiently utilized computing resources, reduced overall computer processing costs, and ensures confidentia...

Hood, David; 10.5121/ijcsea.2011.1510

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Control Systems Cyber Security Standards Support Activities  

SciTech Connect (OSTI)

The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

442

Federal Memorandum of Understanding for Hydropower/Federal Inland...  

Open Energy Info (EERE)

of Energy Environmental Protection Agency Federal Energy Regulatory Commission Fish and Wildlife Service Forest Service National Oceanic and Atmospheric Administration...

443

Nevada National Security Site Environmental Report 2013 Summary  

SciTech Connect (OSTI)

The information presented in this document is explained in greater detail in the Nevada National Security Site Environmental Report 2013 (DOE/NV/25946--2182).

Wills, C.

2014-09-09T23:59:59.000Z

444

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

445

Trust Model for Security Automation Data 1.0 (TMSAD)  

E-Print Network [OSTI]

Trust Model for Security Automation Data 1.0 (TMSAD) HaroldBooth AdamHalbardier NIST Interagency Report 7802 #12;NIST Interagency Report 7802 Trust Model for Security Automation Data 1.0 (TMSAD) Harold FOR SECURITY AUTOMATION DATA 1.0 (TMSAD) iii Reports on Computer Systems Technology The Information Technology

446

Safeguarding Confidential Information Policy Number: 05-001  

E-Print Network [OSTI]

.) involving confidential information, shall work under an Information Security Plan (ISP) which has been information (confidential, secret and top secret). · Information Security Plan (ISP) is the specific policies

Ickert-Bond, Steffi

447

Guidance: Requirements for Installing Renewable Fuel Pumps at Federal Fleet Fueling Centers under EISA Section 246: Federal Fleet Program, Federal Energy Management Program, U.S. Department of Energy, March 2011  

SciTech Connect (OSTI)

On December 19, 2007, the Energy Independence and Security Act of 2007 (EISA) was signed into law as Public Law 110-140. Section 246(a) of EISA directs Federal agencies to install at least one renewable fuel pump at each Federal fleet fueling center under their jurisdiction by January 1, 2010. Section 246(b) requires the President to submit an annual report to Congress on Federal agency progress in meeting this renewable fuel pump installation mandate. This guidance document provides guidelines to help agencies understand these requirements and how to comply with EISA Section 246.

Not Available

2011-03-01T23:59:59.000Z

448

August 2005 ADVISING USERS ON INFORMATION TECHNOLOGY  

E-Print Network [OSTI]

of secure access control to facilities and to information systems. NIST recently developed supplementary the need for better quality and security of the processes for identifying individuals, Homeland Security quality and security of the processes for identifying individuals, Homeland Security Presidential

449

Federal Emergency Management Agency | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (Smart GridHome Kyoung'sTechnologies JumpEmergency

450

Federal Aviation Administration | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProject JumpTechnologiesAviation

451

Federal Energy Regulatory Commission | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 NoSan Leandro,LawFEMAProject

452

Federal Business Opportunities website | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,Fauquier County,4Opportunities website

453

Federal Energy Subsidies | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,Fauquier County,4OpportunitiesSubsidies

454

Federal Grant Program | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,FauquierGrant Program Jump to:

455

Federal Loan Program | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37.California: Energy Resources44795°,FauquierGrant Program

456

Federal Reporting Recipient Information | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulie A. Reddick|Document that lists someCertification,July,April 3,

457

A common language for computer security incidents  

SciTech Connect (OSTI)

Much of the computer security information regularly gathered and disseminated by individuals and organizations cannot currently be combined or compared because a common language has yet to emerge in the field of computer security. A common language consists of terms and taxonomies (principles of classification) which enable the gathering, exchange and comparison of information. This paper presents the results of a project to develop such a common language for computer security incidents. This project results from cooperation between the Security and Networking Research Group at the Sandia National Laboratories, Livermore, CA, and the CERT{reg_sign} Coordination Center at Carnegie Mellon University, Pittsburgh, PA. This Common Language Project was not an effort to develop a comprehensive dictionary of terms used in the field of computer security. Instead, the authors developed a minimum set of high-level terms, along with a structure indicating their relationship (a taxonomy), which can be used to classify and understand computer security incident information. They hope these high-level terms and their structure will gain wide acceptance, be useful, and most importantly, enable the exchange and comparison of computer security incident information. They anticipate, however, that individuals and organizations will continue to use their own terms, which may be more specific both in meaning and use. They designed the common language to enable these lower-level terms to be classified within the common language structure.

John D. Howard; Thomas A Longstaff

1998-10-01T23:59:59.000Z

458

Federal Utility Partnership Working Group  

Broader source: Energy.gov [DOE]

The Federal Utility Partnership Working Group (FUPWG) establishes partnerships and facilitates communications among Federal agencies, utilities, and energy service companies. The group develops strategies to implement cost-effective energy efficiency and water conservation projects through utility incentive programs at Federal sites.

459

69536 Federal Register / Vol. 69, No. 229 / Tuesday, November 30, 2004 / Rules and Regulations Indiana, with a request that the Indiana  

E-Print Network [OSTI]

Westcott, (410) 786­4515. SUPPLEMENTARY INFORMATION: I. Background We published a final rule in the Federal

460

Federal Agency Hazardous Waste Compliance Docket (docket). Revision 1  

SciTech Connect (OSTI)

The Federal Facilities Hazardous Waste Compliance Docket (``docket``) identifies Federal facilities that may be contaminated with hazardous substances and that must be evaluated to determine if they pose a risk to public health or the environment The docket, required by Section 120(c) of the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA), as amended by the Superfund Amendments and Reauthorization Act of 1986 (SARA), also provides a vehicle for making information about potentially contaminated facilities available to the public. Facilities listed on the docket must complete site assessments that provide the Environmental Protection Agency (EPA) with information needed to determine whether or not the facility should be included on he National Priorities List (NPL). This Information Brief, which revises the previous Federal Agency Hazardous Waste Compiliance Docket Information Brief, provides updated information on the docket listing process, the implications of listing, and facility status after listing.

Not Available

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

462

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

463

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

464

Best Practices: Elements of a Federal Privacy Program  

Energy Savers [EERE]

Pub. L. No. 104- 191) Health Information Technology for Economic and Clinical Health Act (-HITECH Act, 42 U.S.C. 300jj et seq.; 17901 et seq.) Homeland Security...

465

Fritz Technologies is a small company based in Sebastopol, California, specializing in information assurance and data security. Fritz has completed several contracts with the  

E-Print Network [OSTI]

Fritz Technologies is a small company based in Sebastopol, California, specializing in information office in Sebastopol, CA. Fritz Technologies is currently offering the following Internships for Sonoma

Ravikumar, B.

466

Section 4 -Financial Information A. General Information  

E-Print Network [OSTI]

Section 4 - Financial Information A. General Information 1. All University Housing and Dining fees. The security deposit, less any charges for damages, will be returned approximately ten weeks after the end according to Section 5 ­ Termination of Occupancy, will result in the forfeiture of the security deposit

Pantaleone, Jim

467

Twitter Training for Small Business Federal Contractors  

Broader source: Energy.gov [DOE]

Twitter can be used to raise brand awareness, share and obtain information on upcoming federal contract opportunities, to network with peers and government leaders, and to help build a reputation for expertise in your field. Put Twitter to work for you! If you are already on Twitter, just getting started on Twitter, or thinking of joining, you can get super ideas on how to make a positive impression, discover more opportunities, team with colleagues, and drive business growth.

468

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

469

Executive Order 13423- Strengthening Federal Environmental, Energy...  

Energy Savers [EERE]

423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

470

Federal Biomass Activities | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Federal Biomass Activities Federal Biomass Activities Statutory and executive order requirements for Bioproducts and Biofuels federalbiomassactivities.pdf More Documents &...

471

Revised: August 2013 INFORMATION SYSTEMS  

E-Print Network [OSTI]

] as the common security framework baseline to be used by the campuses of the University of North Carolina system implementation standards are the NC IT Security Manual, the Control Objectives for Information and related responsibilities 08.02.02 Information security awareness, education, and training 08.02.03 Disciplinary process 08

Howitt, Ivan

472

Corrective Action Decision Document/Closure Report for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0  

SciTech Connect (OSTI)

This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. This complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The purpose of the CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed.

Matthews, Patrick

2013-11-01T23:59:59.000Z

473

PSH-11-0017- In the Matter of Personnel Security Hearing  

Broader source: Energy.gov [DOE]

This case involves derogatory information developed during the course of a background investigation of the Individual. Unable to resolve the security concerns raised by this derogatory information,...

474

National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat Cornell Batteries &NST DivisionNationalEnergy

475

Federal Geothermal Research Program Update - Fiscal Year 2001  

SciTech Connect (OSTI)

This Federal Geothermal Program Research Update reviews the specific objectives, status, and accomplishments of DOE's Geothermal Program for Federal Fiscal Year (FY) 2001. The information contained in this Research Update illustrates how the mission and goals of the Office of Geothermal Technologies are reflected in each R&D activity. The Geothermal Program, from its guiding principles to the most detailed research activities, is focused on expanding the use of geothermal energy.

Laney, P.T.

2002-08-31T23:59:59.000Z

476

An XML Security Framework that Integrates NIST RBAC, MAC and DAC Policies  

E-Print Network [OSTI]

is to integrate the local security (existing systems) and their associated access control models into a global is to ensure that local security policies (of constituent systems) and access control mechanisms are satisfied. As a result, the XML security framework requires the inclusion of a secure information engineering process

Demurjian, Steven A.

477

The Federal Budget Process - Lessons That Can Be Learned  

ScienceCinema (OSTI)

The talk will provide up-to-date information on the Federal budget process and present three informative case studies regarding the intersection of budget decisions with important National policy decisions. In conclusion, the lecture will provide a preview of topics that may be interest for future study.

Stephen Goldberg

2010-01-08T23:59:59.000Z

478

The Federal Budget Process - Lessons That Can Be Learned  

SciTech Connect (OSTI)

The talk will provide up-to-date information on the Federal budget process and present three informative case studies regarding the intersection of budget decisions with important National policy decisions. In conclusion, the lecture will provide a preview of topics that may be interest for future study.

Goldberg, Stephen (ANL) [ANL

2008-01-30T23:59:59.000Z

479

ORNL/TM-2003/210 THE FEDERAL HIGHWAY ADMINISTRATION  

E-Print Network [OSTI]

ORNL/TM-2003/210 THE FEDERAL HIGHWAY ADMINISTRATION GASOHOL CONSUMPTION ESTIMATION MODEL August January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge by members of the public from the following source. National Technical Information Service 5285 Port Royal

480

ITL Bulletins are published by the Information Technology Laboratory  

E-Print Network [OSTI]

Cryptography in the Federal Government, February 2000 Security Implications of Active Content, March 2000 is an attempt to utilize cryptographic tech niques in a more global solution to the problem of Internet security. Rather than requiring each e-mail program or web browser to implement its own security mechanisms, IPsec

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Direct Federal Financial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesData FilesShape,PhysicsDileepDiracNanotubes . |Federal

482

Federal Financial Report  

Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import96Nebraska NuclearDecade2003 DetailedUsebaseline 12FEDERAL

483

The challenge of information access  

SciTech Connect (OSTI)

Traditional methods of risk communication may not work for large quantities of information. Federal databases are being created to meet the public`s right-to-know.

Travers, L.A. [Environmental Protection Agency, Washington, DC (United States)

1990-12-31T23:59:59.000Z

484

Sales of Fossil Fuels Produced from Federal and Indian Lands, FY 2003 through FY 2011  

Broader source: Energy.gov [DOE]

This paper was prepared in response to recent requests that the U.S. Energy Information Administration (EIA) provide updated summary information regarding fossil fuel production on federal and...

485

Coordination of Federal Transmission Permitting on Federal Lands...  

Office of Environmental Management (EM)

transmission facilities on federal lands. In most instances, the Departments of Agriculture or Interior will be the Lead Agency, since they have jurisdiction over most of the...

486

Determinants of the Informativeness of Analyst Research  

E-Print Network [OSTI]

Analyst research helps prices reflect information about a security's fundamentals. However, analysts' private incentives potentially contribute to misleading research and ...

Kothari, S.P.

2002-06-07T23:59:59.000Z

487

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

488

?Framework for a Risk-Informed Groundwater Compliance Strategy for Corrective Action Unit 98: Frenchman Flat, Nevada National Security Site, Nye County, Nevada, Revision 1  

SciTech Connect (OSTI)

Note: This document was prepared before the NTS was renamed the Nevada National Security Site (August 23, 2010); thus, all references to the site herein remain NTS. Corrective Action Unit (CAU) 98, Frenchman Flat, at the Nevada Test Site (NTS) was the location of ten underground nuclear tests between 1965 and 1971. As a result, radionuclides were released in the subsurface in the vicinity of the test cavities. Corrective Action Unit 98 and other CAUs at the NTS and offsite locations are being investigated. The Frenchman Flat CAU is one of five Underground Test Area (UGTA) CAUs at the NTS that are being evaluated as potential sources of local or regional impact to groundwater resources. For UGTA sites, including Frenchman Flat, contamination in and around the test cavities will not be remediated because it is technologically infeasible due to the depth of the test cavities (150 to 2,000 feet [ft] below ground surface) and the volume of contaminated groundwater at widely dispersed locations on the NTS. Instead, the compliance strategy for these sites is to model contaminant flow and transport, estimate the maximum spatial extent and volume of contaminated groundwater (over a period of 1,000 years), maintain institutional controls, and restrict access to potentially contaminated groundwater at areas where contaminants could migrate beyond the NTS boundaries.

Sam Marutzky

2010-09-01T23:59:59.000Z

489

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

2011-05-16T23:59:59.000Z

490

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

491

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

492

THE CONTENT OF CORPORATE FEDERALISM  

E-Print Network [OSTI]

Federalism in Corporate Governance: Protecting ShareholderCollaborative Corporate Governance: Listing Standards, Stateof Care Stadanrd in Corporate Governance 75 Iowa L. Rev. 1,

Bratton, William W.

2004-01-01T23:59:59.000Z

493

Computing, information, and communications: Technologies for the 21. Century  

SciTech Connect (OSTI)

To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

NONE

1998-11-01T23:59:59.000Z

494

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 4, AUGUST 2012 1315 Temporal Forensics and Anti-Forensics for Motion  

E-Print Network [OSTI]

-mail: mcstamm@umd.edu; kjrliu@umd.edu). W. S. Lin is with the Intel Corporation, Hillsboro, OR 97124 USA (e, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE Abstract--Due to the ease with which digital information of this manuscript and approving it for publication was Dr. Alex ChiChung Kot. M. C. Stamm and K. J. R. Liu

Liu, K. J. Ray

495

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

496

Energy Independence and Security Act of 2007: Summary of Provisions (released in AEO2008)  

Reports and Publications (EIA)

The Energy Independence and Security Act of 2007 was signed into law on December 19, 2007, and became Public Law 110-140. Provisions in EISA2007 that require funding appropriations to be implemented, whose impact is highly uncertain, or that require further specification by federal agencies or Congress are not included in Annual Energy Outlook 2008 (AEO). For example, the Energy Information Administration (EIA) does not try to anticipate policy responses to the many studies required by EISA2007, nor to predict the impact of research and development (R&D) funding authorizations included in the bill. Moreover, AEO2008 does not include any provision that addresses a level of detail beyond that modeled in the National Energy Modeling System (NEMS), which was used to develop the AEO2008 projections. AEO2008 addresses only those provisions in EISA2007 that establish specific tax credits, incentives, or standards.

2008-01-01T23:59:59.000Z

497

Federal Participation in LEED Christopher Payne1  

E-Print Network [OSTI]

1 Federal Participation in LEED Christopher Payne1 Beverly Dyer2 1 Environmental Energy-mail: CTPayne@lbl.gov 2 Federal Energy Management Program, U. S. Department of Energy. Phone: +1 202 586 expectations for ongoing partnership. CERTIFIED FEDERAL BUILDINGS US federal agencies have certified 16 federal

498

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

499

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

500

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage