Powered by Deep Web Technologies
Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

2

Federal Information Security Management Act (FISMA) ...  

Science Conference Proceedings (OSTI)

Federal Information Security Management Act (FISMA) Implementation Project. Summary: The FISMA Implementation Project ...

2013-01-15T23:59:59.000Z

3

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

4

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

... of the Federal Information Systems Security Educator's ... and those involved in instructional design and curriculum ... NIST that is designed to improve ...

2012-02-07T23:59:59.000Z

5

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

6

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... Jim Wiggins, Federal IT Security Institute ... Gale Warshawsky, Department of Energy: Lawrence Livermore ... Notice & Privacy Policy Send comments or ...

7

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... to two CISOs at the US Department of Energy. ... Prior to EES, Al worked for Keane Federal Systems, Inc ... the FBI on all matters of cyber security policy. ...

8

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations Appendix F ...

2013-05-09T23:59:59.000Z

9

Security and Privacy Controls for Federal Information Systems  

Science Conference Proceedings (OSTI)

NIST Special Publication 800-53. Revision 4. Security and Privacy Controls for Federal Information Systems. and Organizations. JOINT TASK FORCE ...

2013-06-18T23:59:59.000Z

10

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... 9:15 NIST Welcome William Barker, NIST Computer Security Division NO BIO and Presentation Available. ... BIO & Abstract Presentation. ...

11

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... Newsletter Winner: Susan Farrand, Department of Energy Training Exercise ... Newsletter Winner (PDF): Rian Campbell, Federal Reserve Bank of ...

12

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

13

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... JOINT TASK FORCE TRANSFORMATION INITIATIVE ... aspects of information security (ie, technical ... physical, personnel, cyber-physical); and 4. Is ...

2013-05-09T23:59:59.000Z

14

MINIMUM SECURITY REQUIREMENTS FOR FEDERAL  

E-Print Network (OSTI)

March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

15

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

16

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

17

Program Review for Information Security Management ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

2013-01-15T23:59:59.000Z

18

Meeting Federal Energy Security Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Markel Markel SRA International Lawrence_Markel@sra.com Federal Utility Partnership Working Group Fall 2012 - October 16-17 Mobile, AL Sponsored by Alabama Power Theme Meeting energy security requirements in federal facilities provides opportunities for additional types of cooperation between utilities and the federal agencies. However, there are significant barriers to pursuing these opportunities - constraints on utilities and on federal agencies, as well as sometimes-competing objectives. Energy security encompasses sufficiency, surety, and sustainability.  Above all, energy security means having adequate power to conduct critical operations for the duration required (sufficiency).  Secondarily, and leading to sufficiency, is ensuring resilient energy supplies that are accessible when

19

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

20

Federal Communications Commission Cyber Security ...  

Science Conference Proceedings (OSTI)

... Chief Information Officer for 25 Years ... the United Nations Under Secretary General and CIO ... after he hacked into a federal investigation database. ...

2011-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Federal Information Processing Standards  

Science Conference Proceedings (OSTI)

... Federal Information Processing Standards Publications (FIPS PUBS). ... Replacement Standards for Withdrawn FIPS on Geographic Codes.

2013-07-30T23:59:59.000Z

22

Federal ID Credential Security Standard Strengthens ...  

Science Conference Proceedings (OSTI)

Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices. From NIST Tech Beat: September 5, 2013. ...

2013-09-17T23:59:59.000Z

23

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

24

Guidelines for Secure Use of Social Media by Federal Departments...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidelines for Secure Use of Social Media by Federal Departments and Agencies Guidelines for Secure Use of Social Media by Federal Departments and Agencies Guidelines for Secure...

25

Federal Register Notice: National Nuclear Security Administration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNLNM) Federal Register Notice:...

26

Federal Employment | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Employment | National Nuclear Security Administration Employment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Federal Employment Home > Federal Employment Federal Employment NNSA offers exciting opportunities for professionals with diverse educational backgrounds and experience. You may have a college degree in

27

Federal Employment | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Employment | National Nuclear Security Administration Employment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Federal Employment Home > Federal Employment Federal Employment NNSA offers exciting opportunities for professionals with diverse educational backgrounds and experience. You may have a college degree in

28

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

29

FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) Form provides information on the federal assistance budget for...

30

Federal Energy Management Program: Energy Independence & Security Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence & Security Act to someone by E-mail Share Federal Energy Management Program: Energy Independence & Security Act on Facebook Tweet about Federal Energy Management Program: Energy Independence & Security Act on Twitter Bookmark Federal Energy Management Program: Energy Independence & Security Act on Google Bookmark Federal Energy Management Program: Energy Independence & Security Act on Delicious Rank Federal Energy Management Program: Energy Independence & Security Act on Digg Find More places to share Federal Energy Management Program: Energy Independence & Security Act on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act

31

Federal Energy Management Program: Energy Independence and Security Act,  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements to someone by E-mail Share Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Facebook Tweet about Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Twitter Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Google Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Delicious

32

Energy Independence and Security Act, Section 432: Federal Facility  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Independence and Security Act, Section 432: Federal Facility Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements October 8, 2013 - 2:02pm Addthis Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. The Federal Energy Management Program (FEMP) is responsible for tracking Federal agency progress toward meeting Section 432 of the Energy Independence and Security Act (EISA) of 2007 for Federal facility energy and water management and benchmarking. The EISA 432 Compliance Tracking System (EISA 432 CTS) tracks agency

33

Federal Register | Open Energy Information  

Open Energy Info (EERE)

Register Register Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Reference Material: Federal Register Details Activities (0) Areas (0) Regions (0) Abstract: The Office of the Federal Register informs citizens of their rights and obligations, documents the actions of Federal agencies, and provides a forum for public participation in the democratic process. The publications provide access to a wide range of Federal benefits and opportunities for funding and contain comprehensive information about the various activities of the United States Government. The Federal Register is updated daily by 6 a.m. and is published Monday through Friday, except Federal holidays, and consists of four types of entries. Presidential Documents, including Executive orders and proclamations.

34

Emergency Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Emergency Information Home > Field Offices > Welcome to the Sandia Field Office > Emergency Information Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to

35

Customer Name: (First name, middle initial, last name) Social Security Number or Federal ID Number TAMU Customer Number (if assigned) Customer Information: Persons authorized to make purchases on this account  

E-Print Network (OSTI)

Customer Name: (First name, middle initial, last name) Social Security Number or Federal ID Number TAMU Customer Number (if assigned) Customer Information: Persons authorized to make purchases: Email Address: Phone: Fax: Phone: Fax: Name: Title: Customer Representative Signature: Date: This form

Meagher, Mary

36

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

37

Security Forms and Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » New Employee Orientation » Security Forms and Services » New Employee Orientation » Security Forms and Information Security Forms and Information Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees assigned to the DOE Headquarters complex are required to present two identity source documents (i.e., U.S. Passport, driver's license, identification card with photograph issued by a Federal, state, or local government agency, etc.), have their fingerprints taken, and undergo a background investigation (the identity proofing process) prior to reporting for duty or being issued a DOE standard badge (identity or PIV badge). Most likely, your HR representative and/or administrative personnel have

38

Energy Independence and Security Act, Section 432: Federal Facility  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facility Reporting » Energy Independence and Facility Reporting » Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements October 8, 2013 - 2:02pm Addthis Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. Section 432 of the Energy Independence and Security Act of 2007 requires agencies to report Federal facility energy and water use. The Federal Energy Management Program (FEMP) is responsible for tracking Federal agency progress toward meeting Section 432 of the Energy Independence and Security Act (EISA) of 2007 for Federal facility energy and water management and benchmarking.

39

Security classification of information  

Science Conference Proceedings (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

40

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contact Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Contact Information Contact Information At each of NNSA's eight sites, leading-edge research and development is

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

42

Proposed Agency Information Collection: Federal Register Notice...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No....

43

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

44

Site Information | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

45

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

46

Federal Computer Security Program Managers' Forum June ...  

Science Conference Proceedings (OSTI)

... Page 7. Google Google Apps Cloud Core Applications Available in Google ... 11 Page 12. Google Security Differentiators Configuration management ...

2012-06-21T23:59:59.000Z

47

Public Safety and Security Information in MML  

Science Conference Proceedings (OSTI)

Public Safety and Security Information in MML. ... MML plays a key role in enhancing the nation's homeland security. Through ...

2010-10-05T23:59:59.000Z

48

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness  

Science Conference Proceedings (OSTI)

Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information ... Keywords: behavioral issues of information security, compliance, information security awareness, information security management, information security policy, theory of planned behavior

Burcu Bulgurcu; Hasan Cavusoglu; Izak Benbasat

2010-09-01T23:59:59.000Z

49

Information technology - Security techniques - Information security management systems - Requirements  

E-Print Network (OSTI)

ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

International Organization for Standardization. Geneva

2005-01-01T23:59:59.000Z

50

Certification and Accreditation Process for Federal Information ...  

Science Conference Proceedings (OSTI)

... Process for Federal Information Systems Transformed. ... is focused on transforming the episodic ... the Joint Task Force Transformation Initiative, which ...

2010-11-05T23:59:59.000Z

51

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of future of gov Network 2020/MTIPS/TIC Earl Crane, Director for Federal Cybersecurity, National Security Staff, The White House Tim Polk ...

2013-06-17T23:59:59.000Z

52

Federal Register Notice: National Nuclear Security Administration Site-Wide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Register Notice: National Nuclear Security Administration Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM) Federal Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM) Federal Register / Vol. 76, No. 156 / Friday, August 12, 2011 / Notices. National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM). NNSA.SWEIS_.SNL_.NM_.pdf More Documents & Publications EIS-0466: Re-opening of Public Scoping Period and Announcement of Additional Public Scoping Meetings EIS-0466: Notice of Intent to Prepare an Environmental Impact Statement EIS-0281: Notice of Intent to Prepare a Site-Wide Environmental Impact

53

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 OAS-M-12-01 November 2011 Department of Energy Washington, DC 20585 November 15, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011" INTRODUCTION AND OBJECTIVE The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for regulating the Nation's oil pipeline, natural gas, hydroelectric and wholesale electric industries. The Commission relies on a wide range of information technology (IT) resources in achieving its mission of assisting consumers in

54

NMMSS Information, Reports & Forms | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information, Reports & Forms | National Nuclear Security Information, Reports & Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Information, Reports & Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms NMMSS Information, Reports & Forms

55

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

56

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

57

The National Information Systems Security Conference ...  

Science Conference Proceedings (OSTI)

The National Information Systems Security Conference announces its Keynote and Banquet Speakers. August Bequai, Esq ...

1996-10-28T23:59:59.000Z

58

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for, among other things, regulating interstate transmission of the Nation's electricity, natural gas and oil. In addition, the Commission licenses and inspects private, municipal and state hydroelectric projects. To achieve its mission, the Commission relies

59

Information Technology (IT) Security Day, Boulder  

Science Conference Proceedings (OSTI)

Information Technology (IT) Security Day, Boulder. Purpose: The NIST ... Agenda: 9:00am- 10:00am Mobile Device Security. 10:30am ...

2013-06-10T23:59:59.000Z

60

Federal Energy Management Program: Energy Security Planning for Sustainable  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

62

Applied Information Security, 1st edition  

Science Conference Proceedings (OSTI)

Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability ...

Randy Boyle

2009-07-01T23:59:59.000Z

63

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

NLE Websites -- All DOE Office Websites (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

64

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

65

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

66

EEO Complaints Information for Managers | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information for Managers | National Nuclear Security Information for Managers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Complaints Information for Managers Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Complaints Information for Managers EEO Complaints Information for Managers

67

NIST Launches New Information Technology Security Effort  

Science Conference Proceedings (OSTI)

... project focuses on cybersecurity for the electrical power grid by developing a prototype secure information architecture for substations and control ...

2010-10-05T23:59:59.000Z

68

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

69

A metadata calculus for secure information sharing  

Science Conference Proceedings (OSTI)

In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to information sharing that rely on security labels (e.g., Multi-Level Security (MLS)) ... Keywords: access control, information flow, risk management

Mudhakar Srivatsa; Dakshi Agrawal; Steffen Reidt

2009-11-01T23:59:59.000Z

70

TEPS/BPA Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

TEPS/BPA Information | National Nuclear Security Administration TEPS/BPA Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog TEPS/BPA Information Home > About Us > Our Operations > Acquisition and Project Management > Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs) > TEPS/BPA Information

71

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues  

NLE Websites -- All DOE Office Websites (Extended Search)

Request for Information Request for Information Federal Government Power Purchase Agreements (PPA) Issues BACKGROUND: In order to respond to increasing demand for long term renewable energy, stemming from renewable goals established in the Energy Policy Act of 2005, Executive Order 13423, and the Energy Independence and Security Act of 2007, federal agencies are attempting to facilitate project development and the purchase of electricity from renewable sources on federal facilities. One means of execution is through the use of long term Power Purchase Agreements (PPAs), whereby a third party funds, develops, operates, maintains and owns a renewable energy project, and the Government commits to purchase the renewable power from the project owner. This method reduces the overall risk to the Government, since it will avoid having to build, own and

72

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information Request for Information Federal Government Power Purchase Agreements (PPA) Issues BACKGROUND: In order to respond to increasing demand for long term renewable energy, stemming from renewable goals established in the Energy Policy Act of 2005, Executive Order 13423, and the Energy Independence and Security Act of 2007, federal agencies are attempting to facilitate project development and the purchase of electricity from renewable sources on federal facilities. One means of execution is through the use of long term Power Purchase Agreements (PPAs), whereby a third party funds, develops, operates, maintains and owns a renewable energy project, and the Government commits to purchase the renewable power from the project owner. This method reduces the overall risk to the Government, since it will avoid having to build, own and

73

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

74

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

75

V-192: Symantec Security Information Manager Input Validation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security...

76

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY  

E-Print Network (OSTI)

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

77

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

NLE Websites -- All DOE Office Websites (Extended Search)

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

78

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

79

Towards an ethical code for information security?  

Science Conference Proceedings (OSTI)

Most computer scientists reflexively reject the idea of a malicious universe due to its conflict with the dominant scientific paradigm of a non-teleological impartially disinterested universe. While computer scientists might not view the universe as ... Keywords: Kuhn, NSPW, code of ethics, command and control, computer security, cybersecurity, ethical code, ethics, information security, new security paradigms workshop, paradigm, professional ethics, regulation

Steven J. Greenwald; Brian D. Snow; Richard Ford; Richard Thieme

2009-08-01T23:59:59.000Z

80

Convergence of Corporate and Information Security  

E-Print Network (OSTI)

As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper reports on how organizations have traditionally managed asset protection, why that is changing and how to establish convergence to optimize security value to the business within an enterprise.

Syed,; Donahue, Shannon E

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube Contact Information | National Nuclear Security Administration Our Mission Managing the Stockpile...

82

Enterprise Information Security Management Framework [EISMF  

E-Print Network (OSTI)

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

83

Request for Information: Federal Government Power Purchase Agreements (PPA) Issues  

Energy.gov (U.S. Department of Energy (DOE))

Document describes the request for information for federal government power purchase agreement (PPA) issues.

84

Federal Spectrum Management at the National Telecommunications and Information Administration  

Energy.gov (U.S. Department of Energy (DOE))

Slides from National Telecommunications and Information Administration's presentation on Federal spectrum management.

85

Towards evaluating security implementations using the Information Security Maturity Model (ISMM).  

E-Print Network (OSTI)

??Information security is a common and ever-present concern for both private and public sector organizations. Information security protects information from a wide range of threats, (more)

Alaboodi, Saad Saleh

2007-01-01T23:59:59.000Z

86

New NIST Pub Can Help IT Managers Assess Security ...  

Science Conference Proceedings (OSTI)

... the security controls in federal information systems ... with respect to meeting organizational security policies. ... the Departments of Energy, Justice and ...

2011-05-03T23:59:59.000Z

87

Proposal Information Questionnaire (PIQ) for WFO Non-Federal ...  

proposal no. _____ brookhaven national laboratory. proposal information questionnaire (piq) non-federal or act sponsors. i. general information

88

Electronic DOE Information Security System (eDISS) PIA, Office...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

89

Secure naming in information-centric networks  

Science Conference Proceedings (OSTI)

In this paper, we present a secure naming system to locate resources in information-centric networks. The main goal is to allow secure content retrieval from multiple unknown or untrusted sources. The proposal uses a new, flexible naming scheme that ... Keywords: architecture, information networking, naming system

Walter Wong; Pekka Nikander

2010-11-01T23:59:59.000Z

90

Request for Information on Improving Performance of Federal Permitting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and...

91

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

92

Federal Energy Management Program: Best Management Practice: Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

93

Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach  

Science Conference Proceedings (OSTI)

Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. However, each security technology only addresses specific vulnerabilities and ... Keywords: Genetic algorithms, Information security

Mukul Gupta; Jackie Rees; Alok Chaturvedi; Jie Chi

2006-03-01T23:59:59.000Z

94

Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach  

Science Conference Proceedings (OSTI)

Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. However, each security technology only addresses specific vulnerabilities and ... Keywords: genetic algorithms, information security

Mukul Gupta; Jackie Rees; Alok Chaturvedi; Jie Chi

2006-03-01T23:59:59.000Z

95

Argonne's National Security Information Systems  

E-Print Network (OSTI)

was asked by the DOE National Nuclear Security Administration (NNSA) to install the ARG-US RFID equipment in the NNSA vehicles (a Peterbilt truck and a Dodge Sprinter van) and integration with the in-vehicle Omni about the DOE/NNSA's Global Threat Reduction Initiative (GTRI) for voluntary security enhancements

Kemner, Ken

96

Port security and information technology  

E-Print Network (OSTI)

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

97

Audit Report, Evaluation of Classified Information Systems Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report, Evaluation of Classified Information Systems Security Program, DOEIG-0518 Audit Report, Evaluation of Classified Information Systems Security Program, DOEIG-0518 All...

98

Verifying a secure information flow analyzer  

Science Conference Proceedings (OSTI)

Denotational semantics for a substantial fragment of Java is formalized by deep embedding in PVS, making extensive use of dependent types. A static analyzer for secure information flow for this language is proved correct, that is, it enforces noninterference.

David A. Naumann

2005-08-01T23:59:59.000Z

99

US, UK, Russian Federation Hold Trilateral Nuclear Security Best...  

National Nuclear Security Administration (NNSA)

improve the security of nuclear materials around the world." The trilateral workshop was led by the NNSA Acting Chief of the Office of Defense Nuclear Security, the Rosatom Deputy...

100

Information sharing and security in dynamic coalitions  

Science Conference Proceedings (OSTI)

Today, information sharing is critical to almost every institution. There is no more critical need for information sharing than during an international crisis, when international coalitions dynamically form. In the event of a crisis, whether it is humanitarian ... Keywords: access control, distributed systems, dynamic coalitions, information security

Charles E. Phillips, Jr.; T.C. Ting; Steven A. Demurjian

2002-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Freedom of Information Act (FOIA) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

(FOIA) | National Nuclear Security (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information Act (FOIA) Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The FOIA establishes the premise that people should have access to

102

Information Security Policies Made Easy Version 11, Version 11 edition  

Science Conference Proceedings (OSTI)

Information Security Policies Made Easy, Version 11 is the new and updated version of the gold standard information security policy resource used by over 7000 organizations worldwide. Based on the 25 year consulting and security experience of Charles ...

Charles Cresson Wood; Dave Lineman

2009-09-01T23:59:59.000Z

103

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

104

Federal Energy Management Program: Information Resources on Purchasing...  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Resources on Purchasing Renewable Power to someone by E-mail Share Federal Energy Management Program: Information Resources on Purchasing Renewable Power on Facebook...

105

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network (OSTI)

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

106

Smart Grid Information Security (IS) Functional Requirement  

E-Print Network (OSTI)

It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

107

FIPS 199, Standards for Security Categorization of Federal ...  

Science Conference Proceedings (OSTI)

... ii) consistent reporting to the Office of Management and Budget (OMB) and ... The generalized format for expressing the security category, SC, of an ...

2012-02-27T23:59:59.000Z

108

Quantum-safe cryptography and information security  

E-Print Network (OSTI)

Quantum-safe cryptography and information security 2 August 2013 Michele Mosca #12;2 Information;6 Next generation cryptographic infrastructure · Must be quantum-safe · Should have algorithmic agility built-in #12;7 Quantum-safe cryptographic infrastructure quantum cryptography+ Both sets

Le Roy, Robert J.

109

Verified implementations of the information card federated identity-management protocol  

Science Conference Proceedings (OSTI)

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity ... Keywords: CardSpace, cryptographic protocol verification, federated identity management, verified implementations, web services security

Karthikeyan Bhargavan; Cdric Fournet; Andrew D. Gordon; Nikhil Swamy

2008-03-01T23:59:59.000Z

110

Federal Register Notice: Proposed Agency Information Collection |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 10, 2011 - 2:21pm August 10, 2011 - 2:21pm Addthis Federal Register Notice (PDF Version) on the DOE's invitation for public comment on its intent to request the Office of Management and Budget (OMB) to extend for four years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before October 11, 2011. SUMMARY: The Department of Energy (DOE) invites public comment on DOE's intent to request OMB to renew Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 for an additional four years that DOE is developing for submission to the Office of Management and Budget (OMB) pursuant to the Paperwork Reduction

111

Federal Register Notice: Proposed Agency Information Collection |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 11, 2011 - 10:57am October 11, 2011 - 10:57am Addthis Federal Register Notice (PDF Version) on the DOE's invitation for public comment on its request to the Office of Management and Budget (OMB) to extend for three years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before November 7, 2011. OMB Form 83-I (PDF 70 KB). ICR Supporting Statement (PDF 85 KB). SGIG Reporting Guidance (PDF 99 KB). SUMMARY: The Department of Energy (DOE) invites public comment on DOE's request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act

112

FTCP Site Specific Information - Office of Health, Safety & Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security FTCP Site Specific Information - Office of Health, Safety & Security FTCP Agent Organization Name Phone E-Mail HSS HQ Pat Worthington Bradley Davy 301903-6929 301...

113

NIST SP 800-16 (Draft), Information Security Training ...  

Science Conference Proceedings (OSTI)

... security concepts that are fundamental for the ... 800-100, Information Security Handbook: A Guide ... Formative evaluation answers the question: Are ...

2013-04-25T23:59:59.000Z

114

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

115

DHS/Federal Network Security :FISMA Metrics Deep Dive  

Science Conference Proceedings (OSTI)

... shared situational awareness Orient Exposing information to users and autonomous capabilities to inform decision making Decide ...

2013-02-22T23:59:59.000Z

116

Definition: Federal Register | Open Energy Information  

Open Energy Info (EERE)

Definition Definition Edit with form History Facebook icon Twitter icon » Definition: Federal Register Jump to: navigation, search Dictionary.png Federal Register The official journal of the federal government of the United States that contains most routine publications and public notices of government agencies. It is a daily (except holidays) publication.[1] View on Wikipedia Wikipedia Definition The Federal Register (since March 14, 1936), abbreviated FR, or sometimes Fed. Reg. , is the official journal of the federal government of the United States that contains most routine publications and public notices of government agencies. It is a daily publication. The Federal Register is compiled by the Office of the Federal Register and is printed by the Government Printing Office. The final rules promulgated by a federal

117

Federal Energy Management Program: Information and Feedback Institutio...  

NLE Websites -- All DOE Office Websites (Extended Search)

Feedback Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Information and Feedback Institutional Change Principle on Facebook Tweet...

118

Federal Power Act | Open Energy Information  

Open Energy Info (EERE)

Federal Power Act Federal Power Act Year 1920 Url [[File:|160px|link=http://www.fws.gov/laws/lawsdigest/FEDPOWR.HTML]] Description References Federal Power Act[1] The original Federal Power Act provides for cooperation between the Federal Energy Regulatory Commission (Commission) and other Federal agencies, including resource agencies, in licensing and relicensing power projects. The President is required to appoint the five commissioners with the advice and consent of the Senate (16 U.S.C. 792). The President is also authorized, at the request of the Commission, to detail engineers from the Departments of Agriculture or Interior for field work (16 U.S.C. 793). "Navigable waters" (for which the Commission has jurisdiction under the Commerce Clause) are defined to include "streams or other bodies of water

119

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

120

Federal Energy Management Program: Information Resources  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

associated with energy management in the Federal sector. Frequently Asked Questions: Database of frequently asked questions (FAQs) across FEMP programs. News FEMP Launches New...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Request for Information on Improving Performance of Federal Permitting and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information on Improving Performance of Federal Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 The Department of Energy's Office of Electricity Delivery and Energy Reliability, in collaboration with the Member Agencies of the Steering Committee (Member Agencies) created under Executive Order 13604 of March 22, 2012, and pursuant to the June 7, 2013 Transmission Presidential Memorandum, is seeking information on a draft Integrated, Interagency Pre-Application (IIP) Process for significant onshore electric transmission projects requiring Federal Authorization(s).

122

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

123

ITL Bulletin - ITL Updates Glossary of Key Information Security ...  

Science Conference Proceedings (OSTI)

... ITL UPDATES GLOSSARY OF KEY INFORMATION SECURITY TERMS ... ITL plans to keep the glossary current by providing updates online. ...

2013-06-12T23:59:59.000Z

124

Current News and Information | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

News and Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

125

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

126

The Federal Advisory Committee Act of 1972 | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. Department of Energy: Advisory Committee Charter, August 9, 2012 Policies and Procedures Information Security: Coordination of Federal Cyber Security Research and Development...

127

22nd National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... Techniques Dr. Roshan Thomas, NAI Labs ... Kubic, National Security Agency Tom Shake, MIT ... Security Implementations Bret Hartman, Concept Five ...

2000-10-25T23:59:59.000Z

128

Fifth Annual Health Information Security Conference Runs ...  

Science Conference Proceedings (OSTI)

... conference is an opportunity for HIPAA security rule implementers; security, privacy and compliance officers; assessment teams and audit staff in ...

2012-04-17T23:59:59.000Z

129

Can we fix the security economics of federated authentication? (transcript of discussion)  

Science Conference Proceedings (OSTI)

OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this is stuff that I did while I was at Google in January and February. I'm on sabbatical this year and so I'm visiting various ...

Ross Anderson

2011-03-01T23:59:59.000Z

130

House of Security House of Security: Locale, Roles and Resources for Ensuring Information Security Research-in-Progress  

E-Print Network (OSTI)

In this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information custodians view to include information consumers and managers views), and resource (beyond technical dimensions to include managerial dimensions). Based on our definition, we develop a model of information security, which we call the House of Security.

Wee Horng Ang; Yang W. Lee; Stuart E. Madnick; Michael Siegel; Diane M. Strong; Richard Y. Wang; Chrisy Yao; Wee Horng Ang; Stuart E. Madnick; Michael Siegel; Richard Y. Wang; Yang W. Lee; Dinsha Mistress; Diane M. Strong; Chrisy Yao

2006-01-01T23:59:59.000Z

131

Federal Energy Subsidies | Open Energy Information  

Open Energy Info (EERE)

Federal Energy Subsidies Federal Energy Subsidies Jump to: navigation, search Does wind energy receive federal subsidies, and if so how much? Do other forms of energy receive subsidies? Do fossil fuels receive more subsidies than renewables? Anyone engaged in stakeholder education and outreach will be asked these questions. According to a study by the Environmental Law Institute, the federal government's subsidies to fossil fuels totaled approximately $72 billion during 2002-2008, while subsidies for renewable fuels totaled $29 billion over the same period.[1] The Production Tax Credit (PTC) has been a major driver of wind power development over the past decade. It provides a 2.2 cent per kilowatt-hour tax credit for the first 10 years of electricity production from utility-scale turbines. Congress has allowed the PTC to lapse five times

132

Federated Wind Farm | Open Energy Information  

Open Energy Info (EERE)

Wind Farm Wind Farm Jump to: navigation, search Name Federated Wind Farm Facility Federated Sector Wind energy Facility Type Commercial Scale Wind Facility Status In Service Owner Federated Developer Federated Location MN Coordinates 46.729553°, -94.6858998° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":46.729553,"lon":-94.6858998,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

133

National Security Information Classification Guidance Fundamental Review, June 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Information Fundamental Classification Guidance Review Report to the Information Security Oversight Office June 2012 United States Department of Energy Washington, DC 20585 Department of Energy | June 2012 National Security Information Fundamental Classification Guidance Review | Page iii Executive Summary Section 1.9 of Executive Order (E.O.) 13526, Classified National Security Information, dated December 29, 2009, directs agency heads to complete a comprehensive review of agency classification guides to ensure they reflect current circumstances and to identify classified information that no longer requires protection and can be declassified. To meet this requirement, the Department of Energy (DOE), under the direction of the Senior Agency Official, devoted

134

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senate Homeland Security and Governmental Affairs Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen

135

Privacy - Information Protection Task Force - Charter | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Framework for a 21st Century Grid: Enabling our Secure Energy Future (July 12, 2011) Information Security: Coordination of Federal Cyber Security Research and Development...

136

Glossary of Key Information Security Terms (Draft)  

E-Print Network (OSTI)

Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by Federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, Federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and

Richard Kissel; Richard Kissel

2012-01-01T23:59:59.000Z

137

Federal Loan Program | Open Energy Information  

Open Energy Info (EERE)

Federal Loan Program Federal Loan Program Jump to: navigation, search Loan programs provide financing for the purchase of renewable energy or energy efficiency systems or equipment. Low-interest or zero-interest loans for energy efficiency projects are a common demand-side management (DSM) strategy for electric utilities. State governments also offer low-interest loans for a broad range of renewable energy and energy efficiency measures. These programs are commonly available to the residential, commercial, industrial, transportation, public and nonprofit sectors. Loan rates and terms vary by program; in some cases, they are determined on an individual project basis. Loan terms are generally 10 years or less. In recent years, the federal government has offered loans for renewables and energy

138

Department of Energy Proposed Agency Information Collection: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

00 - May 25, 2010 00 - May 25, 2010 Department of Energy Proposed Agency Information Collection: Federal Register Notice Volume 75, No. 100 - May 25, 2010 Department of Energy Proposed Agency Information Collection. The Department of Energy (DOE) invites public comments on DOE's intent to request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Federal Register Volume 75 No 100. Federal Register notice for the Department of Energy Proposed Agency Information Collection, May 25, 2010. More Documents & Publications Department of Energy Proposed Agency Information Collection: Federal

139

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

140

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

RSA SecurID User Guide VPN Home What is RSA SecurID? RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

List of Major Information Systems,National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

142

Informing Federal Policy Decisions on Energy Efficiency and Smart...  

NLE Websites -- All DOE Office Websites (Extended Search)

Informing Federal Policy Decisions on Energy Efficiency and Smart Grid through Analysis and Research Speaker(s): Priya Sreedharan Date: August 25, 2010 - 12:00pm Location: 90-3122...

143

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

Science Conference Proceedings (OSTI)

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

144

Federated Rural Electric Assn | Open Energy Information  

Open Energy Info (EERE)

Federated Rural Electric Assn Federated Rural Electric Assn Place Minnesota Utility Id 6258 Utility Location Yes Ownership C NERC Location MRO NERC MRO Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png General Service (Multiphase) - Commercial Commercial General Service (Multiphase)- Residential Residential General Service (Multiphase)-Commercial-Wind Energy Electric Service Commercial General Service (Multiphase)-Residential-Wind Energy Electric Service Residential General Service - Commercial Commercial General Service - Residential Residential General Service(Multiphase)- Commercial-Temporary Service Commercial

145

Federal Aviation Administration | Open Energy Information  

Open Energy Info (EERE)

Aviation Administration Aviation Administration Jump to: navigation, search Logo: Federal Aviation Administration Name Federal Aviation Administration Address 800 Independence Ave., SW Place Washington, District of Columbia Zip 20591 Year founded 1958 Website http://www.faa.gov/ Coordinates 38.8872756°, -77.0230138° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8872756,"lon":-77.0230138,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

146

Federal Energy Regulatory Commission | Open Energy Information  

Open Energy Info (EERE)

Energy Regulatory Commission Energy Regulatory Commission Jump to: navigation, search Logo: Federal Energy Regulatory Commission Name Federal Energy Regulatory Commission Address 888 First Street, N.E. Place Washington, District of Columbia Zip 20426 Phone number 1-866-208-3676 Website http://www.ferc.gov/contact-us Coordinates 38.90145°, -77.006248° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.90145,"lon":-77.006248,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

147

Federal Emergency Management Agency | Open Energy Information  

Open Energy Info (EERE)

Emergency Management Agency Emergency Management Agency Jump to: navigation, search Logo: Federal Emergency Management Agency Name Federal Emergency Management Agency Address 500 C Street SW Place Washington, District of Columbia Zip 20472 Year founded 1979 Website http://www.fema.gov/ Coordinates 38.8858427°, -77.0182049° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8858427,"lon":-77.0182049,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

148

NIST SP 800-53 Revision 3, Recommended Security Controls ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 3 Recommended Security Controls for Federal Information Systems and Organizations ...

2012-02-06T23:59:59.000Z

149

Information Security Policy & Guidelines and provides minimum policies and  

E-Print Network (OSTI)

guidelines for agencies to follow in their implementation of the Tasmanian Government Information Security Charter. This document outlines a Risk Assessment and Management process agencies can use to support their information security planning. The methodology expands on AS/NZS 4360:2004 Risk Management to provide a consistent framework for agencies to assess their information security risks. The standard is an essential reference document to the methodology.

unknown authors

2005-01-01T23:59:59.000Z

150

Freedom of Information Act (FOIA) | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

151

List of Major Information Systems,National Nuclear Security Administra...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

152

DOE O 471.6 Admin Chg. 1, Information Security  

Directives, Delegations, and Requirements

The protection and control of classified information is critical to our nation??s security. This Order establishes requirements and responsibilities for ...

2011-06-20T23:59:59.000Z

153

Proposed Agency Information Collection: Federal Register Notice Volume 76,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95 - Oct. 7, 2011 95 - Oct. 7, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 The Department of Energy (DOE) invites public comment on DOE's request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is submitting to OMB pursuant to the Paperwork Reduction Act of 1995. Comments regarding this proposed information collection must be received on or before November 7, 2011 2011-26061 OE FRN ARRA ICR 30.pdf More Documents & Publications Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 Department of Energy Proposed Agency Information Collection: Federal

154

Proposed Agency Information Collection: Federal Register Notice Volume 76,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54 - Aug. 10, 2011 54 - Aug. 10, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 The Department of Energy (DOE) invites public comment on DOE's intent to request OMB to renew Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 for an additional four years that DOE is developing for submission to the Office of Management and Budget (OMB) pursuant to the Paperwork Reduction Act of 1995. Comments regarding this proposed information collection must be received on or before October 11, 2011. ICR, OMB1910.5149.pdf More Documents & Publications Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 Department of Energy Proposed Agency Information Collection: Federal

155

Selection of Model in Developing Information Security Criteria for Smart Grid Security System  

E-Print Network (OSTI)

At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

156

Antivirus Procedures, Cyber Security, Information Technology...  

NLE Websites -- All DOE Office Websites (Extended Search)

Anti-virus Software Trend OfficeScan for PCs & Trend Micro Security for Mac Anti-Virus procedures are an important component of BNL's host-based security architecture. Anti-Virus...

157

Delegating Network Security with More Information  

E-Print Network (OSTI)

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

158

Proposed Agency Information Collection: Federal Register Notice...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Department of Energy (DOE) invites public comment on DOE's request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection...

159

Federal Information Processing Standards Publication 190 ...  

Science Conference Proceedings (OSTI)

... of the trusted third party than does SPX. ... Access Control System (ASACS), Proceedings of the ... Information Service, Springfield, VA, April 1, 1981. 41. ...

2012-12-20T23:59:59.000Z

160

NISTIR 7359, Information Security Guide For Government ...  

Science Conference Proceedings (OSTI)

... These benefits include: Business success/resilience. Effective security ensures that vital services are delivered in all operating conditions. ...

2012-02-29T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Federal Grant Program | Open Energy Information  

Open Energy Info (EERE)

Grant Program Grant Program Jump to: navigation, search States offer a variety of grant programs to encourage the use and development of renewable energy technologies and energy efficiency measures. Most programs offer support for a broad range of technologies, while a few programs focus on promoting one particular technology, such as photovoltaic (PV) systems. Grants are available primarily to the commercial, industrial, utility, education and government sectors. Most grant programs are designed to pay down the cost of eligible systems or equipment. Others focus on research and development, or support project commercialization. In recent years, the federal government has offered grants for renewables and energy efficiency projects for end-users. Grants are typically available on a competitive basis. [1]

162

WHO SHOULD REALLY MANAGE INFORMATION SECURITY ...  

Science Conference Proceedings (OSTI)

... Thus, the elimination of the TEMPEST individual workstation electronic shielding requirement saved the Federal government millions of dollars and ...

1997-10-15T23:59:59.000Z

163

Notices FOR FURTHER INFORMATION CONTACT: Jessica Trice, Office of Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

309 Federal Register 309 Federal Register / Vol. 78, No. 36 / Friday, February 22, 2013 / Notices FOR FURTHER INFORMATION CONTACT: Jessica Trice, Office of Federal Activities, Mail Code 2252A, Environmental Protection Agency, 1200 Pennsylvania Ave., NW., Washington, DC 20460; telephone number: (202) 564-6646; fax number: (202) 564-0072; email address: trice.jessica@epa.gov. SUPPLEMENTARY INFORMATION: Supporting documents which explain in detail the information that the EPA will be collecting are available in the public docket for this ICR. The docket can be viewed online at www.regulations.gov or in person at the EPA Docket Center, EPA West, Room 3334, 1301 Constitution Ave., NW., Washington, DC. The telephone number for the Docket Center is 202-566-1744. For additional information about EPA's

164

Quantum Public-Key Encryption with Information Theoretic Security  

E-Print Network (OSTI)

We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

Jiangyou Pan; Li Yang

2010-06-02T23:59:59.000Z

165

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

166

Knowledge management within information security: the case of Barings Bank  

Science Conference Proceedings (OSTI)

Managing the growing problem of computer fraud within organisations has led researchers and practitioners to emphasise the need to take into account the 'social' aspects of information security. In addition, wider organisational issues such as ... Keywords: Barings Bank, KM, computer fraud, information security management, knowledge management, manager awareness, opportunities, organisational functions, social aspects, tacit knowledge, technical aspects

Shalini Kesar

2008-07-01T23:59:59.000Z

167

The Board's Role: Executive and board roles in information security  

Science Conference Proceedings (OSTI)

Corporate information in all its forms is a business asset and needs to be recognised as such. This implies that the ultimate responsibility for security must be accepted by the business and not merely delegated to a chief information security officer ...

Paul Williams

2007-08-01T23:59:59.000Z

168

Revision 1 Glossary of Key Information Security Terms  

E-Print Network (OSTI)

We have received numerous requests to provide a summary glossary for our publications and other relevant sources, and to make the glossary available to practitioners. As a result of these requests, this glossary of common security terms has been extracted from NIST Federal

Richard Kissel; Patrick D. Gallagher; Director Introduction

2011-01-01T23:59:59.000Z

169

Site Information | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

nonproliferation, bio threats, global climate modeling and other critical problems. NTS Nevada National Security Site (NNSS), near Las Vegas, Nev., is where the U.S....

170

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... simulated testing set up in fifteen government facilities. ... It is essential to understand the relationship ... to present his paper on Cyber Security Doctrine. ...

2011-07-20T23:59:59.000Z

171

CGI Information Technology Security Evaluation & Test Facility  

Science Conference Proceedings (OSTI)

... [17CMH2/02] Test methods for Physical Security Level 4, in accordance with FIPS 140-2. Cryptographic Modules Software 1 Testing. ...

2013-08-02T23:59:59.000Z

172

20th National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... NIST does not accept any other credit cards. ... and CD-ROM of the conference proceedings will be ... In January 1981, the National Computer Security ...

173

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... Enhance user interface with REST design, Migrate database and web ... E-Gov Update Lisa Schlosser, Deputy CIO, Federal Government, OMB ...

2013-03-11T23:59:59.000Z

174

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

175

Index of Energy Security Risk | Open Energy Information  

Open Energy Info (EERE)

Index of Energy Security Risk Index of Energy Security Risk Jump to: navigation, search Tool Summary Name: Index of Energy Security Risk Agency/Company /Organization: United States Chamber of Commerce, Institute for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.energyxxi.org/images/Energy_Index_2011_FINAL.pdf Cost: Free Index of Energy Security Risk Screenshot References: Index of Energy Security Risk[1] "This 2011 edition of the Index incorporates the most current energy data, including the Energy Information Administration's (EIA) Annual Energy Outlook 2011 (AEO 2011), to provide an up-to-date assessment of the trends having the greatest impact on energy security since the first Index was

176

Federal Regulations | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Regulations Federal Regulations Federal Regulations NOTE: Adobe Acrobat Reader may be necessary to view PDF documents listed below. Accessibility Section 508 of the Rehabilitation Act - Electronic and Information Technology Accessibility Standards Section 504 of the Rehabilitation Act - Nondiscrimination Under Federal Grants and Programs Federal Records Act Freedom of Information Act (as amended) Freedom of Information Act Updates Privacy Act of 1974 (as amended) Privacy Act Overview Cyber Security Atomic Energy Act of 1954 (PDF) Computer Fraud and Abuse Act of 1986 (PDF) Electronic Communications Privacy Act of 1986 Federal Information Security Management of 2002 ( Title III of E-Gov) Homeland Security Act of 2002 ( includes Cyber Security Act of 2002 and Critical Infrastructure Act of 2002)

177

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements  

Science Conference Proceedings (OSTI)

This paper proposes a new approach for assessing the organization's vulnerability to information-security breaches. Although much research has been done on qualitative approaches, the literature on numerical approaches to quantify information-security ... Keywords: Information security, Information-security measurement, Risk analysis, Security threats, Vulnerability measurement

Sandip C. Patel; James H. Graham; Patricia A. S. Ralston

2008-12-01T23:59:59.000Z

178

Information Security Architecture: An Integrated Approach to Security in the Organization, 2nd edition  

Science Conference Proceedings (OSTI)

By providing clear and organized methods, this text incorporates the knowledge developed during the past decade that has pushed the information security lifecycle from infancy to a more mature, understandable, and manageable state.

Jan Killmeyer

2006-01-01T23:59:59.000Z

179

Office of Headquarters Security Operations - Headquarters Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

180

Benchmarking e-business security: A model and framework, Proceedings of 3rd Australian information security management conference  

E-Print Network (OSTI)

The dynamic nature of threats and vulnerabilities within the E-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, E-business security has to become proactive, by reviewing and continuously improving security to strengthen E-business security measures and policies. This can be achieved through benchmarking the security measures and policies utilised within the Ebusiness, against recognised information technology (IT) and information security (IS) security standards.

Graeme Pye; Matthew J. Warren

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Information-Theoretically Secure Communication Under Channel Uncertainty  

E-Print Network (OSTI)

Secure communication under channel uncertainty is an important and challenging problem in physical-layer security and cryptography. In this dissertation, we take a fundamental information-theoretic view at three concrete settings and use them to shed insight into efficient secure communication techniques for different scenarios under channel uncertainty. First, a multi-input multi-output (MIMO) Gaussian broadcast channel with two receivers and two messages: a common message intended for both receivers (i.e., channel uncertainty for decoding the common message at the receivers) and a confidential message intended for one of the receivers but needing to be kept asymptotically perfectly secret from the other is considered. A matrix characterization of the secrecy capacity region is established via a channel-enhancement argument and an extremal entropy inequality previously established for characterizing the capacity region of a degraded compound MIMO Gaussian broadcast channel. Second, a multilevel security wiretap channel where there is one possible realization for the legitimate receiver channel but multiple possible realizations for the eavesdropper channel (i.e., channel uncertainty at the eavesdropper) is considered. A coding scheme is designed such that the number of secure bits delivered to the legitimate receiver depends on the actual realization of the eavesdropper channel. More specifically, when the eavesdropper channel realization is weak, all bits delivered to the legitimate receiver need to be secure. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We show that the key to achieving efficient security embedding is to jointly encode the low-security and high-security bits. In particular, the low-security bits can be used as (part of) the transmitter randomness to protect the high-security ones. Finally, motivated by the recent interest in building secure, robust and efficient distributed information storage systems, the problem of secure symmetrical multilevel diversity coding (S-SMDC) is considered. This is a setting where there are channel uncertainties at both the legitimate receiver and the eavesdropper. The problem of encoding individual sources is first studied. A precise characterization of the entire admissible rate region is established via a connection to the problem of secure coding over a three-layer wiretap network and utilizing some basic polyhedral structure of the admissible rate region. Building on this result, it is then shown that the simple coding strategy of separately encoding individual sources at the encoders can achieve the minimum sum rate for the general S-SMDC problem.

Ly, Hung Dinh

2012-05-01T23:59:59.000Z

182

Information Security Management Handbook, Volume 1, 6th edition  

Science Conference Proceedings (OSTI)

Promoting the view that the management, ethics, and values of an organization leads directly to its information security program, this guide addresses up-to-date issues in this increasingly important area.

Harold F. Tipton; Micki Krause

2007-02-01T23:59:59.000Z

183

PARS II New Contractor Information for Interconnection Security Agreement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Contractor Information for Interconnection Security Agreement New Contractor Information for Interconnection Security Agreement V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System (PARS) II System Owner and the contractor sign an Interconnection Security Agreement (ISA). The requirement for an Interconnection Security Agreement can be found on page 182 of the PCSP. The ISA template is available for review on the PARS II portal (http://management.energy.gov/online_resources/pars2.htm) under Contractor Documents. Before the contractor begins sending data to PARS II, DOE will send the ISA to the contractor for review and signature. In order to prepare the ISA for review and signature, the PARS II Support Team needs

184

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

185

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

186

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

187

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... with the requirements of the Office of Management and Budget (OMB) Circular ... D-6 05-07-2013 Editorial Change SC-18 Priority Code from P1 to P2 ...

2013-05-08T23:59:59.000Z

188

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... AU-15 Alternate Audit Capability P0 Not Selected Not Selected Not Selected AU-16 Cross-Organizational Auditing P0 Not Selected Not Selected ...

2013-05-09T23:59:59.000Z

189

Membership Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Membership Information "Promoting Equal Opportunity and Cultural Diversity for APAs in Government" The FAPAC - New Mexico membership application form is...

190

National information security policy and its implementation: A case study in Taiwan  

Science Conference Proceedings (OSTI)

Cyberspace is no longer safe. From business organizations to countries, the requirements of information security and assurance have become one of the most important functions to ensure continued operations. The goal of this study is twofold. First, we ... Keywords: BS7799, ISO27001, Information security, Information security management system (ISMS), National information security policy

Cheng-Yuan Ku; Yi-Wen Chang; David C. Yen

2009-08-01T23:59:59.000Z

191

Form:Federal Oil and Gas Regulation | Open Energy Information  

Open Energy Info (EERE)

Federal Oil and Gas Regulation Jump to: navigation, search Federal Oil and Gas Regulation This is the "Federal Oil and Gas Regulation" form. To create a page with this form, enter...

192

Form:Federal Oil and Gas Statute | Open Energy Information  

Open Energy Info (EERE)

Federal Oil and Gas Statute Jump to: navigation, search Federal Oil and Gas Statute This is the "Federal Oil and Gas Statute" form. To create a page with this form, enter the page...

193

Information Security and Privacy Advisory Board (ISPAB)  

Science Conference Proceedings (OSTI)

... Institute of Standards and Technology (NIST), the Secretary of Commerce and the Director of the Office of Management and Budget on information ...

2013-01-15T23:59:59.000Z

194

20th National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... 7 and banquet on Oct. 8. The fee for the pre-conference workshops on Oct. 6 is $100. To receive registration information, contact: ...

195

Category:Federal Oil and Gas Regulations | Open Energy Information  

Open Energy Info (EERE)

| Sign Up Search Category Edit History Facebook icon Twitter icon Category:Federal Oil and Gas Regulations Jump to: navigation, search Add a new Federal Oil and Gas...

196

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services, and International Security Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications Major Management Challenges and Program Risks : Department of Energy GAO/OCG-99-6 GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects

197

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

198

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

199

Information Security Management Handbook, Sixth Edition, Volume 2, 6th edition  

Science Conference Proceedings (OSTI)

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered ...

Harold F. Tipton; Micki Krause

2008-03-01T23:59:59.000Z

200

Information Security Analysis Using Game Theory and Simulation  

SciTech Connect

Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

Schlicher, Bob G [ORNL; Abercrombie, Robert K [ORNL

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

OFFICE OF HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE  

NLE Websites -- All DOE Office Websites (Extended Search)

HEALH, SAFETY AND SECURITY HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE OMB 1910-0300: ES&H Reporting Systems Description of Collections April 10, 2012 The information obtained from DOE contractors by this information collection is used by Department management at the appropriate levels to manage the work pertaining to environment, safety and health throughout DOE and will include automated reporting of information into the following systems: Computerized Accident/Incident Reporting System (CAIRS) - The CAIRS is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE operations as described in DOE O 231.1B, Environment, Safety and Health Reporting. This system contains information from reporting contractors and

202

Federal Facility Reporting | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Facility Reporting Federal Facility Reporting Federal Facility Reporting October 8, 2013 - 1:59pm Addthis Various legal authorities require agencies to report data on energy and water consumption and resource management efforts within Federal facilities. The Federal Energy Management Program collects this data to assess agency performance toward mandated goals on agency Energy/Sustainability Scorecards and presents it in annual reports to Congress. Find Federal facility reporting information related to: Energy Independence and Security Act (EISA) of 2007, Section 432, Federal Facility Management and Benchmarking Requirements: View information about requirements and data collected to track Federal facility compliance with requirements for performing facility evaluations, implementing and

203

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach  

Science Conference Proceedings (OSTI)

Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%--75% of security incidents originate from within an organization. ... Keywords: IS misuse, IS security, end-user security, general deterrence theory, security countermeasures, security management

John D'Arcy; Anat Hovav; Dennis Galletta

2009-03-01T23:59:59.000Z

204

Area Information | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Visiting Us / Area Information Visiting Us / Area Information Area Information Guides, Area Maps, Airport... Airport, About: McGhee Tyson Airport Airport: map to Oak Ridge/Knoxville Oak Ridge: City Guide for City of Oak Ridge, Tennessee Knoxville: maps for visitors Oak Ridge: area map with location of Y-12 Visitor's Center Oak Ridge: map of city streets Roane County: Roane County Guide Resources: News, History... Knoxville: Knoxville, Tennessee Knoxville: Museums Knoxville: Knoxville News-Sentinel Oak Ridge: City of Oak Ridge Oak Ridge: Chamber of Commerce Oak Ridge: Convention and Visitors Bureau Oak Ridge: Oak Ridger Oak Ridge: Secret City History Area Attractions: To Do and See Knoxville: Clarence Brown Theater Knoxville: Frank H. McClung Museum Knoxville: Knoxville Opera Company, Francis Graffeo, General

205

An efficient approach to support querying secure outsourced XML information  

Science Conference Proceedings (OSTI)

Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption proposals treat confidential parts of an XML document as whole blocks of text and apply ...

Yin Yang; Wilfred Ng; Ho Lam Lau; James Cheng

2006-06-01T23:59:59.000Z

206

federal agency  

Science Conference Proceedings (OSTI)

Federal Agency Information. ... Information on Biometric Standards. Analysis Model for Selection of Concensus Standards.

2013-07-25T23:59:59.000Z

207

CMAD IV 11/14/96 Information Security  

E-Print Network (OSTI)

utilities, power pools, vendors etc.. #12;CMAD IV 11/14/96 #12; #12; GridCo LineCo PoolCo Energy Merchant INFO INFO INFO $ $ $ PWR PWR PWR #12;CMAD IV 11/14/96 "Future" Is At Hand · Federal Energy Regulatory Commission (FERC) 889 ­ information on transmission availability and prices. ­ equal access for wholesale

California at Davis, University of

208

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

SciTech Connect

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

209

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

210

Property Accountability and Protection of Federal Sensitive Unclassified Information Under the Cooperative Agreement with the Incorporated County of Los Alamos, IG-0859  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection Report Property Accountability and Protection of Federal Sensitive Unclassified Information Under the Cooperative Agreement with the Incorporated County of Los Alamos DOE/IG-0859 February 2012 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 17, 2012 MEMORANDUM FOR THE SECRETARY FROM Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Inspection Report on "Property Accountability and Protection of Federal Sensitive Unclassified Information Under the Cooperative Agreement with the Incorporated County of Los Alamos" BACKGROUND On September 30, 2008, the National Nuclear Security Administration entered into a 5-year

211

Choice and Chance: A Conceptual Model of Paths to Information Security Compromise  

Science Conference Proceedings (OSTI)

No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from ... Keywords: computer crime, information security management, information systems risk management

Sam Ransbotham; Sabyasachi Mitra

2009-03-01T23:59:59.000Z

212

Quantifying and managing the risk of information security breaches participants in a supply chain  

E-Print Network (OSTI)

Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

Bellefeuille, Cynthia Lynn

2005-01-01T23:59:59.000Z

213

Federal Advisory Committee Act of 1972 | Open Energy Information  

Open Energy Info (EERE)

Act of 1972 Act of 1972 Jump to: navigation, search Statute Name Federal Advisory Committee Act of 1972 Year 1972 Url [[File:|160px|link=http://www.gsa.gov/portal/content/100916]] Description The Federal Advisory Committee Act became law in 1972 and is the legal foundation defining how federal advisory committees operate. The law has special emphasis on open meetings, chartering, public involvement, and reporting. References Federal Advisory Committee Act of 1972 (annotated and un-annotated)[1] The Federal Advisory Committee Act became law in 1972 and is the legal foundation defining how federal advisory committees operate. The law has special emphasis on open meetings, chartering, public involvement, and reporting. References ↑ "Federal Advisory Committee Act of 1972 (annotated and

214

Ensuring a Secure and Robust Cyber Infrastructure (+$43.4 ...  

Science Conference Proceedings (OSTI)

... the Federal Information Security Management Act are ... the President's FY 2012 budget calls for ... National Program Office for the National Strategy for ...

2011-02-14T23:59:59.000Z

215

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

216

Cyberwar and the Russian Federation: the usual suspect  

Science Conference Proceedings (OSTI)

The evolution of the technology and the changes in the organisation and control of the critical infrastructures of nations are creating a new combat front. The cases studied in this paper are related to the attack to the information systems and services ... Keywords: Estonia, Georgia, Russia, Russian Federation, South Ossetia, cyberwar, electronic security, information security, information services security, information systems security, information warfare, people', s cyberwar, s war

Sergio Tenreiro De Magalhaes; Henrique M. Dinis Santos; Leonel Duarte Dos Santos; Hamid Jahankhani

2010-06-01T23:59:59.000Z

217

Firms' information security investment decisions: Stock market evidence of investors' behavior  

Science Conference Proceedings (OSTI)

In the information society, it is important for firms to manage their core information resources securely. However, the difficulty of measuring the return on an IT security investment is one of the critical obstacles for firms in making such investment ... Keywords: Abnormal returns, Event methodology, Information security investment, Investors' behavior, Market value, Sarbanes-Oxley Act (SOX)

Sangmi Chai; Minkyun Kim; H. Raghav Rao

2011-03-01T23:59:59.000Z

218

Federal Renewable Energy Screening Assistant | Open Energy Information  

Open Energy Info (EERE)

Federal Renewable Energy Screening Assistant Federal Renewable Energy Screening Assistant Jump to: navigation, search Tool Summary Name: Federal Renewable Energy Screening Assistant (FRESA) Agency/Company /Organization: NREL Sector: Energy Focus Area: Biomass, Solar, Wind Topics: Implementation Resource Type: Software/modeling tools Website: analysis.nrel.gov/fresa/ OpenEI Keyword(s): EERE tool, FRESA, Federal Renewable Energy Screening Assistant References: FRESA homepage [1] Logo: Federal Renewable Energy Screening Assistant (FRESA) FRESA, is designed to help identify which renewable energy technologies are appropriate for implementation at both the facility and building scale. The Federal Renewable Energy Screening Assistant, or FRESA, is designed to help identify which renewable energy technologies are appropriate for

219

CLASS DEVIATION FINDINGS AND DETERMINATION Federal Awardee Performance and Integrity Information Systems (FAPIIS) Requirement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Awardee Performance and Integrity Information Systems (FAPIIS) Requirement Federal Awardee Performance and Integrity Information Systems (FAPIIS) Requirement at Federal Acquisition Regulation (FAR) 9.406-3(f)(1) and 9.407-3(e)(1) Findings 1. On March 23,2010, the FAR Council published a final rule in the Federal Register (75FR 14058), which amended FAR 9.4 to implement section 872 of the Duncan Hunter National Defense Authorization Act for FISCAL Year 2009. Section 872 requires the establishment of a data system containing specific information on the integrity and performance of covered Federal agency contractors and grantees. The data system created for this purpose is entitled Federal Awardee Performance and Integrity Information Systems (FAPIIS), and it can be located at www.ppirs.gov and www.cpars.csd.disa.mil.

220

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

US DOE Federal Energy Management Program (FEMP) | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Jump to: navigation, search Logo: Federal Energy Management Program (FEMP) Name Federal Energy Management Program (FEMP) Agency/Company /Organization U.S. Department of Energy Sector Energy Focus Area Energy Efficiency Topics Pathways analysis, Resource assessment Website http://www1.eere.energy.gov/fe Country United States Northern America References FEMP homepage[1] Abstract The U.S. Department of Energy (DOE) Federal Energy Management Program (FEMP) provides services, tools, and expertise to Federal agencies to help them achieve their legislated and executive-ordered energy, greenhouse gas, and water goals. These are delivered through project, technical, and program services. The U.S. Department of Energy (DOE) Federal Energy Management Program

222

Secure quantum private information retrieval using phase-encoded queries  

Science Conference Proceedings (OSTI)

We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

2011-08-15T23:59:59.000Z

223

Secure Retrieval of FFTF Testing, Design, and Operating Information  

Science Conference Proceedings (OSTI)

One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.

Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

2009-10-01T23:59:59.000Z

224

Circuits of power in creating de jure standards: shaping an international information systems security standard  

Science Conference Proceedings (OSTI)

This paper addresses the role of power and politics in setting standards. It examines the interaction of external contingencies, powerful agents, resources, meaning, and membership of relevant social and institutional groupings in generating successful ... Keywords: information systems security management, information systems security standards, institutionalization, power and politics, security management code of practice

James Backhouse; Carol W. Hsu; Leiser Silva

2006-08-01T23:59:59.000Z

225

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

226

Chapter_3_Personnel_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

227

Federated Rural Electric Assn (Iowa) | Open Energy Information  

Open Energy Info (EERE)

Assn (Iowa) Jump to: navigation, search Name Federated Rural Electric Assn Place Iowa Utility Id 6258 References EIA Form EIA-861 Final Data File for 2010 - File220101 LinkedIn...

228

Category:Federal Oil and Gas Statutes | Open Energy Information  

Open Energy Info (EERE)

Statutes Statutes Jump to: navigation, search Add a new Federal Oil and Gas Statute You need to have JavaScript enabled to view the interactive timeline. Further results for this query.DECADEFederal Oil and Gas Royalty Simplification and Fairness Act of 19961996-01-010Year: 1996 Federal Onshore Oil and Gas Leasing Reform Act of 1987 (FOOGLRA)1987-01-010Year: 1987 Federal Oil and Gas Royalty Management Act of 19821982-01-010Year: 1982 Indian Mineral Development Act of 19821982-01-010Year: 1982 Federal Land Policy and Management Act of 19761976-01-010Year: 1976 Mining and Minerals Policy Act of 19701970-01-010Year: 1970 Mineral Leasing Act for Acquired Lands of 19471947-01-010Year: 1947 Indian Mineral Leasing Act of 19381938-01-010Year: 1938 Mineral Leasing Act of 19201920-01-010Year: 1920

229

Proceedings of the 2nd international conference on Security of information and networks  

Science Conference Proceedings (OSTI)

It is our great pleasure to welcome you to the 2nd International Conference on Security of Information and Networks -- SIN 2009, this year organized in technical cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC). ...

Atilla Eli; Oleg Makarevich; Mehmet Orgun; Alexander Chefranov; Josef Pieprzyk; Yuri Anatolievich Bryukhomitsky; S?dd?ka Berna rs

2009-10-01T23:59:59.000Z

230

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

231

Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government  

E-Print Network (OSTI)

This paper mainly depicts the conceptual overview of vertical integration, semantic interoperability architecture such as Educational Sector Architectural Framework (ESAF) for New Zealand government and different interoperability framework solution for digital government. In this paper, we try to develop a secure information sharing approach for digital government to improve home land security. This approach is a role and cooperation based approach for security personnel of different government departments. In order to run any successful digital government of any country in the world, it is necessary to interact with their citizen and to share secure information via different network among the citizen or other government. Consequently, in order to smooth the progress of users to cooperate with and share information without darkness and flawlessly transversely different networks and databases universally, a safe and trusted information-sharing environment has been renowned as a very important requirement and t...

Headayetullah, Md; Biswas, Sanjay; Puthal, B

2011-01-01T23:59:59.000Z

232

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgwindex.php?titleEnergyIndependenceandSecurityActof2007&oldid255460" Category: Stubs...

233

3-Year Renewal Request of OMB 1910-0818, Security, Information Request  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Topical Areas HSS Topical Areas Quality Assurance Enforcement / Oversight Environment HSS Outreach and Communications HSPD-12 Nuclear Materials Management & Safeguards System (NMMSS) HSS Internal Operations Council on Environmental Quality (CEQ) Office of Health, Safety and Security Collection Package Human Reliability Program OMB 1910-5122 Description of Collections 1. Human Reliability Program Certification (DOE F 470.3). Under the Department of Energy Human Reliability Program (HRP), individuals who are applicants for or incumbents in designated positions must be evaluated to ensure that they meet the requirements for certification in the program. This form documents that each part of the evaluation has been completed and records the determination by the HRP Certifying Official. The collection and documentation of this information is required by the HRP regulation found in the Code of Federal Regulations at 10 CFR 712. Form may be viewed at: http://energy.gov/cio/downloads/doe-f-4703

234

Technical Services | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Technical Services Technical Services Technical services spans Y-12 disciplines that support manufacturing at Y-12. Information Systems (National Security Systems Development) Provide solutions for information security, including the protection of national security, proprietary and any other class of highly sensitive information. Develop highly integrated, enterprise level software applications for use within the federal space and adaptable to commercial application. Leverage the transformative information technology capabilities of the NNSA to a broad spectrum of federal applications for rapidly deployed, cost effective and reproducible technical solutions. Develop virtual collaborative networks for cluster manufacturing. Develop, test, and implement operational cyber security strategies

235

Category:Regulatory Roadmap Federal Sections | Open Energy Information  

Open Energy Info (EERE)

Category Category Edit History Facebook icon Twitter icon » Category:Regulatory Roadmap Federal Sections Jump to: navigation, search GRR-logo.png Looking for the Geothermal Regulatory Roadmap? Click here for a user-friendly list of Geothermal Regulatory Roadmap pages. This is the Regulatory Roadmap Federal Sections category. Add.png Add an Section Pages in category "Regulatory Roadmap Federal Sections" The following 48 pages are in this category, out of 48 total. G GRR/Section 1-FD-a - Land Use Planning Process GRR/Section 1-FD-b - Land Use Plan Amendment Process GRR/Section 11-FD-a - NHPA Section 106 - Resource Survey GRR/Section 11-FD-b - Tribal Consultation GRR/Section 11-FD-c - NHPA Section 106 - Effects Assessment GRR/Section 11-FD-d - NHPA Section 106 - Consultation

236

Federated States of Micronesia: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Federated States of Micronesia: Energy Resources Federated States of Micronesia: Energy Resources Jump to: navigation, search Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"TERRAIN","zoom":5,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"390px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":5,"lon":152,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

237

7/26/2011 University of Texas at Austin Information Technology Services ITS Security Operations A. Security Consultant Scope of Work  

E-Print Network (OSTI)

7/26/2011 University of Texas at Austin ­ Information Technology Services ITS Security;7/26/2011 University of Texas at Austin ­ Information Technology Services ITS Security Operations 2 ii. Document of Texas at Austin ­ Information Technology Services ITS Security Operations 3 iii. Attend

Texas at Austin, University of

238

Chapter_10_Security_Awareness_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: * Title 32, CFR, Part 2001, Classified National Security Information * Executive Order 13526, Classified National Security Information * DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 * DOE Order 475.2A, Identifying Classified Information * DOE Order 475.1, Counterintelligence Program The Security Awareness Program Manager, within HS-92, manages the HQ security awareness program. The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, and security procedures specific to HQ. This goal is accomplished by providing HQ employees

239

In defense of the realm: understanding the threats to information security  

Science Conference Proceedings (OSTI)

The popular press is replete with information about attacks on information systems. Viruses, worms, hackers, and employee abuse and misuse have created a dramatic need for understanding and implementing quality information security. In order to accomplish ...

Michael E. Whitman

2004-02-01T23:59:59.000Z

240

Security in the Telecommunications Information Networking Architecture --the CrySTINA Approach \\Lambda  

E-Print Network (OSTI)

Security in the Telecommunications Information Networking Architecture -- the CrySTINA Approach results of the CrySTINA project. We analyze and structure the security problem domain in the TINA­C architecture and present our approach to pro­ vide the necessary security functionality in the form of self

Bencsáth, Boldizsár

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Taking 'control': Federal energy regulatory Commission policy on acquisitions of electric utility securities  

SciTech Connect

Section 203 of the Federal Power Act remains subject to considerable uncertainty. Therefore, it is important to keep several rules in mind. Each potential acquisition must be separately analyzed under Section 203(a)(1) and 203(a)(2) of the Act. A proposed acquisition that is exempt or preapproved under one provision may still require prior FERC approval under the other one. (author)

Bloom, David I.; O'Brien, Angela D.

2009-05-15T23:59:59.000Z

242

A VIKOR technique based on DEMATEL and ANP for information security risk control assessment  

Science Conference Proceedings (OSTI)

As companies and organizations have grown to rely on their computer systems and networks, the issue of information security management has become more significant. To maintain their competitiveness, enterprises should safeguard their information and ... Keywords: Analytic network process (ANP), DEMATEL, Information security, Multiple criteria decision making (MCDM), Risk control assessment, VIKOR

Yu-Ping Ou Yang; How-Ming Shieh; Gwo-Hshiung Tzeng

2013-05-01T23:59:59.000Z

243

NIST SP 800-100, Information Security Handbook: A Guide for ...  

Science Conference Proceedings (OSTI)

... The handbook is therefore useful to any manager who requires a ... Agency information security policy should address the fundamentals of agency ...

2013-06-11T23:59:59.000Z

244

Denver Federal Center Solar Park | Open Energy Information  

Open Energy Info (EERE)

Center Solar Park Center Solar Park Jump to: navigation, search Name Denver Federal Center Solar Park Facility Denver Federal Center Sector Solar Facility Type Photovoltaic Owner SunEdison Solar Developer SunEdison Solar Energy Purchaser Xcel Energy Address West 6th Ave & Kipling Street Location Lakewood, Colorado Zip 80225 Coordinates 39.7247982353°, -105.118432045° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.7247982353,"lon":-105.118432045,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

245

Category:Federal Environmental Statutes | Open Energy Information  

Open Energy Info (EERE)

Statutes Statutes Jump to: navigation, search Add a new Federal Environmental Statute You need to have JavaScript enabled to view the interactive timeline. Further results for this query.DECADEPaleontological Resources Preservation Act2007-01-010Year: 2007 Healthy Forests Restoration Act of 20032003-01-010Year: 2003 Oil Pollution Act1990-01-010Year: 1990 Native American Graves Protection Act1990-01-010Year: 1990 Federal Cave Resources Protection Act1988-01-010Year: 1988 Sole Source Aquifer Demonstration Program1986-01-010Year: 1986 Coastal Barrier Resources Act1982-01-010Year: 1982 Farmland Protection Policy Act1981-01-010Year: 1981 CERCLA1980-01-010Year: 1980 Archaeological Resources Protection Act1979-01-010Year: 1979 Archaeological Resource Protection Act1979-01-010Year: 1979

246

Federal Way, Washington: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

(Redirected from Federal Way, WA) (Redirected from Federal Way, WA) Jump to: navigation, search Equivalent URI DBpedia Coordinates 47.3223221°, -122.3126222° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.3223221,"lon":-122.3126222,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

247

Briefings on Physical Security of Electricity Substations  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

248

Securing a Wireless Networked Control System Using Information Fusion  

Science Conference Proceedings (OSTI)

Security of a wireless sensor network practically governs its usability in several applications. Especially, in applications like Industrial control systems which use NCS and SCADA systems, the security affects the stability of the system. We propose ...

Brijesh Kashyap Chejerla, Sanjay Madria

2012-10-01T23:59:59.000Z

249

Information Model for Policy-Based Network Security Management  

Science Conference Proceedings (OSTI)

Policy Based Network Management (PBNM) for network security has been paid much attention as a solution to consistent and unified management of security systems including IDS (Intrusion Detection System) and Firewall. In this paper, we define NSPIM (Network ...

Sook-Yeon Kim; Myung-Eun Kim; Kiyoung Kim; Jongsoo Jang

2002-01-01T23:59:59.000Z

250

Lighting recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA  

SciTech Connect

Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.

Rubinstein, Francis M.

1999-10-25T23:59:59.000Z

251

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

252

Implementing information-theoretically secure oblivious transfer from packet reordering  

Science Conference Proceedings (OSTI)

If we assume that adversaries have unlimited computational capabilities, secure computation between mutually distrusting players can not be achieved using an error-free communication medium. However, secure multi-party computation becomes possible when ... Keywords: delay, noisy channels, oblivious transfer, packet reordering, secure multi-party computation

Paolo Palmieri; Olivier Pereira

2011-11-01T23:59:59.000Z

253

For Profit Audits - Information Related to 12/21/11 Federal Register Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

For Profit Audits - Information Related to 12/21/11 Federal For Profit Audits - Information Related to 12/21/11 Federal Register Notice For Profit Audits - Information Related to 12/21/11 Federal Register Notice Attached are copies of the 7 comments received to Federal Register notice Document Number 2011-32622, a copy of the matrix of the comments, a copy of DOE's responses to the comments, and marked up versions of the draft guidance showing the content changes to Parts I and II of guidance which were made as a result of the comments received. There were no changes to Parts III and IV of the guidance as a result of the comments received. For-profit comments and responses_final april 2012.pdf For-Profit_Audit_Guidance_(Part_I)_2011 editted 042612_1.pdf For-Profit_Audit_General_Compliance_Supplement_(Part_II)_2011 editted

254

Comments on the Request for Information on Improving Performance of Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the Request for Information on Improving Performance of on the Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects Comments on the Request for Information on Improving Performance of Federal Permitting and Review of Infrastructure Projects On August 29, 2013, the U.S. Department of Energy (DOE) published a Request for Information seeking information on a draft Integrated, Interagency Pre-Application (IIP) Process for significant onshore electric transmission projects requiring Federal authorizations. On September 25, the public comment period was extended to October 31, 2013. Comments received are available below. Comments from Lee Cunningham, sent September 23, 2013 Comments from Patrick Ledger of Arizona's G&T Cooperatives, sent September 25, 2013

255

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

256

Headquarters Personnel Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Personnel Security Operations Headquarters Personnel Security Operations Headquarters Personnel Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems. Functions The primary function of the Office of Headquarters Personnel

257

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

258

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems  

Science Conference Proceedings (OSTI)

In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, ... Keywords: Information confinement, Privacy, Probabilistic algorithm, RFID systems, Security

Roberto Di Pietro; Refik Molva

2011-05-01T23:59:59.000Z

259

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Practices: Best Practices: Elements of a Federal Privacy Program Version 1.0 Sponsored By: Federal CIO Council Privacy Committee June 2010 Best Practices: Elements of a Federal Privacy Program June 2010 Page i Contents Acknowledgements __________________________________________________________________ ii Purpose ____________________________________________________________________________ 1 Introduction: Privacy Stewardship and Governance _________________________________________ 3 Element 1 -Leadership ________________________________________________________________ 6 Element 2 - Privacy Risk Management and Compliance Documentation _________________________ 9 Element 3 - Information Security _______________________________________________________ 14

260

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

262

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

263

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

264

A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis  

Science Conference Proceedings (OSTI)

With the increasing organizational dependence on information systems, information systems security has become a very critical issue in enterprise risk management. In information systems, security risks are caused by various interrelated internal and ... Keywords: Ant colony optimization, Bayesian networks, Information systems, Security risk, Vulnerability propagation

Nan Feng, Harry Jiannan Wang, Minqiang Li

2014-01-01T23:59:59.000Z

265

U-200: Red Hat Directory Server Information Disclosure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Successful exploitation of the security issue requires that the audit log is enabled (disabled by default). 2) The vulnerability is caused due to an error when changing password...

266

ITL Bulletin Information Security in the System Development ...  

Science Conference Proceedings (OSTI)

... 800-17) c. CC product reevaluation (Additional References: CC) d. Assessment ... Security into the Capital Planning and Investment Control Process ...

2012-04-05T23:59:59.000Z

267

Guidelines for System Security and Information System Management  

Science Conference Proceedings (OSTI)

This document provides a concise set of guidelines and best practices for performing risk assessment, security management, and system management within utility automation networks.

2008-06-09T23:59:59.000Z

268

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002, IG-0569 THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002,...

269

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

270

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

271

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

272

A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry  

Science Conference Proceedings (OSTI)

The power industry faces the implementation of smart grids, which will introduce new information security threats to the power automation systems. The ability to appropriately prepare for, and respond to, information security incidents, is of utmost ... Keywords: Information security, incident respons, smart grids

Maria B. Line

2013-03-01T23:59:59.000Z

273

Nevada National Security Site Cleanup Information Is Just a Click Away with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Cleanup Information Is Just a Click Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public December 27, 2012 - 12:00pm Addthis Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. LAS VEGAS, NV - For decades, the Nevada Site Office (NSO) has been investigating, characterizing, identifying, and performing corrective

274

Cutting the Federal Governments Energy Bill: An Examination of the Sustainable Federal Government Executive Order  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RICHARD KIDD PROGRAM MANAGER FEDERAL ENERGY MANAGEMENT PROGRAM OFFICE OF ENERGY EFFICIENCY AND RENEWABLE ENERGY U.S. DEPARTMENT OF ENERGY BEFORE THE SUBCOMMITTEE ON FEDERAL FINANCIAL MANAGEMENT, GOVERNMENT INFORMATION, FEDERAL SERVICES AND INTERNATIONAL SECURITY COMMITTEE ON HOMELAND SECURITY AND GOVERNMENT AFFAIRS U.S. SENATE JANUARY 27, 2010 INTRODUCTION Good afternoon Chairman Carper, Ranking Member McCain, and other distinguished members of the subcommittee. I lead the Department of Energy's (DOE) Federal Energy Management Program (FEMP), which is part of the Office of Energy Efficiency and Renewable Energy. FEMP's mission is to facilitate the Federal Government's implementation of sound, cost-effective, energy management and investment practices to

275

Information Management, Analytics & Optimization Services IMS Security Health Check Service Offering  

E-Print Network (OSTI)

Offering The IMS Security Health Check is a special service offering from the IMS Laboratory TechnicalInformation Management, Analytics & Optimization Services IMS Security Health Check Service two to three weeks after the conclusion of the on-site visit. · Service from the IMS Laboratory

276

Remote Access to the BNL Network, Cyber Security, Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecureID tokens as soon as possible....

277

How to Lock Your Computer, Cyber Security, Information Technology...  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Lock Your Computer One way to increase security on your computer is to use a password-protected screen saver. All Brookhaven computers are now required to run a...

278

Current News and Information | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

279

Feature: Information Security, Business and the Internet - Part 2  

Science Conference Proceedings (OSTI)

This article considers the perception of a selected number of small to medium-sized enterprises towards the security problems of E-commerce. It emphasizes the need for common sense and personal responsibility of individual business users. The centralized ...

Clive Blatchford

2000-02-01T23:59:59.000Z

280

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Chapter_1_Physical_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

282

DOE Order Self Study Modules - DOE O 440.1B, Worker Protection Management for DOE (Including the National Nuclear Security Administration) Federal Employees  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0.1B 0.1B WORKER PROTECTION PROGRAM FOR DOE (INCLUDING THE NATIONAL NUCLEAR SECURITY ADMINISTRATION) FEDERAL EMPLOYEES DOE O 440.1B Familiar Level June 2011 1 DOE O 440.1B WORKER PROTECTION MANAGEMENT FOR DOE (INCLUDING THE NATIONAL NUCLEAR SECURITY ADMINISTRATION) FEDERAL EMPLOYEES FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to answer the following questions: 1. What are the objectives of DOE O 440.1B? 2. What are the requirements that DOE elements must meet according to DOE O 440.1B? 3. What is the hazard prevention/abatement process that must be implemented according to DOE O 440.1B? 4. What are three responsibilities assigned by DOE O 440.1B for heads of field elements?

283

Federal Register Notices Archive  

Science Conference Proceedings (OSTI)

... Federal Register Notice of TIP 2009 Competition ...more. White Papers: Federal Register Notice Proposed Information Collection; Comment Request ...

2011-04-12T23:59:59.000Z

284

Federal Register Notices  

Science Conference Proceedings (OSTI)

... Federal Register Notice of 2010 TIP Competition ...more. White Papers: Federal Register Notice Proposed Information Collection; Comment Request ...

2011-04-25T23:59:59.000Z

285

The Security Plan: Effectively Teaching How To Write One  

E-Print Network (OSTI)

1 The Security Plan: Effectively Teaching How To Write One Paul C. Clark Naval Postgraduate School government requires all federal systems to have a customized security plan. In addition, the National Training Standard for Information Systems Security (INFOSEC) Professionals requires programs that meet

286

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

287

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

288

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

289

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS NEW YORK, NY  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

290

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS BOSTON, MA  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

291

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS DENVER, CO  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

292

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS HOUSTON, TX  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

293

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS TAMPA, FL  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

294

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS CHICAGO, IL  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

295

A framework for federated two-factor authentication enabling cost-effective secure access to distributed cyberinfrastructure  

Science Conference Proceedings (OSTI)

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus ... Keywords: OTP, XSEDE, authentication, radius

Matthew A. Ezell; Gary L. Rogers; Gregory D. Peterson

2012-07-01T23:59:59.000Z

296

Secure distribution of confidential information via self-destructing data  

Science Conference Proceedings (OSTI)

Control and ownership of data is difficult in any environment and with the increase in electronic data and records, the need to maintain ownership and control redistribution of data is becoming increasingly important. We propose a first-level protection ... Keywords: computer networks, data retrieval, data security

Jason Croft; Robert Signorile

2009-11-01T23:59:59.000Z

297

Federal Register notice for the Department of Energy Proposed Agency Information Collection, July 22, 2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

726 Federal Register 726 Federal Register / Vol. 75, No. 140 / Thursday, July 22, 2010 / Notices e.g. new, revision, extension, existing or reinstatement; (2) Title; (3) Summary of the collection; (4) Description of the need for, and proposed use of, the information; (5) Respondents and frequency of collection; and (6) Reporting and/or Recordkeeping burden. OMB invites public comment. The Department of Education is especially interested in public comment addressing the following issues: (1) Is this collection necessary to the proper functions of the Department; (2) will this information be processed and used in a timely manner; (3) is the estimate of burden accurate; (4) how might the Department enhance the quality, utility, and clarity of the information to be collected; and (5) how might the

298

824 Implementation Guide, Enforcement of DOE Classified Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPLEMENTATION GUIDANCE Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 March 2006 (updated April 2007 to...

299

Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies To Meet The Cyber Security And Information Intelligence Challenges Ahead  

Science Conference Proceedings (OSTI)

As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of the workshop was to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlined a strategy for cyber security and information intelligence that is founded on sound principles and technologies. We aimed to discuss novel theoretical and applied research focused on different aspects of software security/dependability, as software is at the heart of the cyber infrastructure.

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2008-01-01T23:59:59.000Z

300

EEO Complaints Information for Managers | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Complaints Information for Managers Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Complaints Information for Managers EEO Complaints...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Security-Widefield, Colorado: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Security-Widefield, Colorado: Energy Resources Security-Widefield, Colorado: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 38.7640957°, -104.7404269° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.7640957,"lon":-104.7404269,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

302

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and information intelligence challenges and strategies  

SciTech Connect

As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2010-01-01T23:59:59.000Z

303

Y-12 National Security Complex's Waste Diversion Efforts, OAS-L-12-08  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex's Y-12 National Security Complex's Waste Diversion Efforts OAS-L-12-08 July 2012 Department of Energy Washington, DC 20585 July 20, 2012 MEMORANDUM FOR THE MANAGER, NATIONAL NUCLEAR SECURITY ADMINISTRATION PRODUCTION OFFICE FROM: Daniel M. Weeber, Director Eastern Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "Y-12 National Security Complex's Waste Diversion Efforts" BACKGROUND Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management, mandates that each Federal facility maintain a cost-effective waste prevention and recycling program. Further, Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance, requires that Federal agencies achieve a 50 percent

304

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

305

I have reviewed your Request for Information published in the Federal Register o  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

have reviewed your Request for Information published in the Federal Register on February 27, 2012. I have reviewed your Request for Information published in the Federal Register on February 27, 2012. I would suggest that these are very difficult questions to answer and really vary by the developer, the region and the type of project. There are no canned answers that would fit for responses to the questions raised. I would suggest that a joint workshop be set up with a cross section of industry representatives to meet with members of the Rapid Response Team and explore these questions and the range of answers together. I think it is more important that the RRT understand what developers must go through for generation and transmission projects. It is clear that RRT does understand the variation in schedules between transmission and certain forms of generation. This schedule difference

306

Implementing Information Security and Its Technology: A LineManagement Perspective  

Science Conference Proceedings (OSTI)

Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

Barletta, William A.

2005-08-22T23:59:59.000Z

307

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

308

Application of autonomic agents for global information grid management and security  

Science Conference Proceedings (OSTI)

In the near future, the U.S. DoD will activate a newly created Global Information Grid (GIG) providing an agile, robust, interoperable and collaborative communication network. This GIG is viewed as the single most important contributor to combat power ... Keywords: autonomia, autonomic agents, global information grid, net-centric warfare, network security

Don P. Cox; Youssif Al-Nashif; Salim Hariri

2007-07-01T23:59:59.000Z

309

Securing information gateways with derivation-constrained access control  

Science Conference Proceedings (OSTI)

In pervasive computing environments, information gateways derive specific information, such as a person's location, from raw data provided by a service, such as a videostream offered by a camera. Here, access control to confidential raw data provided ...

Urs Hengartner; Peter Steenkiste

2006-04-01T23:59:59.000Z

310

From Federal Computer Week:  

National Nuclear Security Administration (NNSA)

Federal Computer Week: Energy agency launches performance-based pay system By Richard W. Walker Published on March 27, 2008 The Energy Department's National Nuclear Security...

311

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

SciTech Connect

The Annual Cyber Security and Information Intelligence Research Workshop [CSIIRW] was be held at Oak Ridge National Laboratory in Oak Ridge, TN on April 21 - 23, 2010. The aim of this workshop is to introduce and discuss novel theoretical and empirical research focused on (the many) different aspects of software security/dependability, because as we know, the heart of the cyber infrastructure is software. As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value (wiki). The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. Cyber crime is a very serious and growing problem which now has an annual global turnover in the criminal world of more than 1000 BUSD [recent numbers from an FBI white paper] with the hardest hit industries being the banks and the insurance companies. A recent EU study of the banking world showed that more than 60% of cyber crime in banks was carried out by insiders of which ~65% by senior managers. Moreover, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require a transformation in computing and communication systems architecture and new capabilities that do not merely solve today s plethora of security enigmas, but enable comprehensive game-changing strategies [A Scientific R&D Approach to Cyber Security, C. Catlett, et al., Community-driven report submitted to the DOE, Dec. 2008]. The aim of this workshop is to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. We encourage the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the ever evolving context of cyberspace.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2010-01-01T23:59:59.000Z

312

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

313

National Security Studies Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security Studies Program National Security Studies Program National Security Studies Program Objective The National Security Studies Program (NSSP) is designed to prepare future leaders of civilian agencies for high-level policy, command, and staff responsibilities. The NSSP focuses on international environments and commercial partnerships. All students successfully completing the program are awarded a Master's degree. The program does not involve a promotion or a change in position. Benefits to the Organization The program prepares federal civilian employees for high-level policy, command, and staff responsibilities. Participants will gain valuable experience in leadership, information strategy, national security studies, military strategy, logistics, economics, industry studies, and more. The

314

GAO-11-879T Federal Real Property: Overreliance on Leasing Contributed to High-Risk Designation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Financial Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Government Affairs, U.S. Senate FEDERAL REAL PROPERTY Overreliance on Leasing Contributed to High-Risk Designation Statement of David J. Wise, Director Physical Infrastructure Issues For Release on Delivery Expected at 2:30 p.m. EDT Thursday, August 4, 2011 GAO-11-879T United States Government Accountability Office Highlights of GAO-11-879T, a testimony before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate August 4, 2011 FEDERAL REAL PROPERTY Overreliance on Leasing Contributed to High-Risk

315

DOE Cites Battelle Energy Alliance, LLC for Classified Information Security Violations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 25,2011 February 25,2011 CERTIFIED MAIL RETURN RECEIPT REQUESTED Mr. John 1. Grossenbacher Director, Idaho National Laboratory and President, Battelle Energy Alliance, LLC P. O. Box 1625 Idaho Falls, Idaho 83415-3695 SEA-20ll-01 Dear Mr. Grossenbacher: The Office of Health, Safety and Security's Office of Enforcement has completed its investigation into the facts and circumstances associated with an incident of security concern regarding the introduction of classified information into unapproved information systems (security event) at the U.S. Department of Energy's (DOE) Idaho National Laboratory (INL). Based on the on-site investigation and evaluation of the evidence in this matter, and in consideration of information presented by you and other Battelle Energy Alliance, LLC (BEA)

316

DOE/EA-1471: Environmental Assessment for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex and Finding of No Significant Impact (January 2004)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EA for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex EA for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex i FINDING OF NO SIGNIFICANT IMPACT FOR THE TRANSPORTATION OF HIGHLY ENRICHED URANIUM FROM THE RUSSIAN FEDERATION TO THE Y-12 NATIONAL SECURITY COMPLEX ISSUED BY: United States Department of Energy ACTION: Finding of No Significant Impact SUMMARY: The United States (U.S.) Department of Energy (DOE) proposes to transport highly enriched uranium (HEU) from Russia to a secure storage facility in Oak Ridge, TN. This proposed action would allow the United States and Russia to accelerate the disposition of excess nuclear weapons materials in the interest of promoting nuclear disarmament, strengthening nonproliferation, and combating terrorism. The HEU

317

Freedom of Information Act Related Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

agency established by Congress in 1988 to provide safety oversight of the nuclear weapons complex operated by the DOE. National Technical Information Service A centralized...

318

Secure communication of static information by electronic means  

DOE Patents (OSTI)

A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

Gritton, Dale G. (Pleasanton, CA)

1994-01-01T23:59:59.000Z

319

Disable Automatic Login, Cyber Security, Information Technology Division,  

NLE Websites -- All DOE Office Websites (Extended Search)

Disable Automatic Login Disable Automatic Login Automatic Login MUST be disabled... Follow the steps below to verify that auto login is disabled. Verify Security Settings Select Personal Section: Click Make sure the following required boxes are checked. - Require password to wake this computer from sleep or screen saver - Disable automatic login If so, close panel. If not, continue... Note: Mac users should have the panel locked at all times. Click the lock image to lock the panel if its open to prevent further changes. To unlock the above panel, click the lock image to bring up the login box. Insert your username & password, click . You should now be able to make changes to the panel.

320

Secure communication of static information by electronic means  

DOE Patents (OSTI)

This invention is comprised of a method and apparatus for the secure transmission of static data from a tag to a remote reader. Each time the static data is to be transmitted to the reader, the 10 bits of static data are combined with 54 bits of binary data, which constantly change from one transmission to the next, into a 64-bit number. This number is then encrypted and transmitted to the remote reader where it is decrypted to produce the same 64 bit number that was encrypted in the tag. With a continual change in the value of the 64 bit number in the tag, the encrypted numbers transmitted to the reader will appear to be dynamic in character rather than being static.

Gritton, D.G.

1991-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

Science Conference Proceedings (OSTI)

Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Sheldon, Frederick T [ORNL; Peterson, Greg D [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2009-01-01T23:59:59.000Z

322

All Other Editions Are Obsolete U.S. DEPARTMENT OF ENERGY FEDERAL ASSISTANCE BUDGET INFORMATION  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0.2 0.2 (08-93) All Other Editions Are Obsolete U.S. DEPARTMENT OF ENERGY FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) OMB Control No. 1910-0400 OMB Burden Disclosure on Last Page SECTION A - GENERAL 1. PROGRAM/PROJECT IDENTIFICATION NO. 2. PROGRAM/PROJECT TITLE 3. NAME AND ADDRESS SECTION B - CALCULATION OF FEDERAL AWARD Cost Classification Use Only for Revisions Latest Approved Amount Adjustment + or (-) Total Amount Required 1. Administration Expense 2. Preliminary Expense 3. Land, Structures, Right-of-way 4. Architectural Engineering Basic Fees 5. Other Architectural Engineering Fees 6. Project Inspection Fees 7. Land Development 8. Relocation Expenses 9. Relocation Payments to Individuals and Businesses 10. Demolition and Removal 11. Construction and Project Improvement

323

A decision support system for secure information sharing  

Science Conference Proceedings (OSTI)

In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundaries. Risk optimal decisions to disseminate mission critical tactical intelligence ... Keywords: description logic, flexible information sharing, justification for non-shareability, semantic reasoner

Achille Fokoue; Mudhakar Srivatsa; Pankaj Rohatgi; Peter Wrobel; John Yesberg

2009-06-01T23:59:59.000Z

324

Security Policy, CMPC Marking Resource | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy, CMPC Marking Resource Policy, CMPC Marking Resource Security Policy, CMPC Marking Resource June 2012 Examples illustrate markings for matter that contains classified information. A strong and cohesive information security program is integral to national security. The U.S. Government requires certain information to be maintained in confidence to protect our citizens, democratic institutions, and activities within the international security community. Marking notifies holders of classified matter of the protection requirements for the information. Markings and designations serve two primary purposes: Alert holders to the presence of classified information. Warn holders of special access or safeguarding requirements. This resource was developed to assist Federal and contractor employees by

325

Office of Headquarters Personnel Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Personnel Headquarters Personnel Director's Perspective Welcome to the Office of Headquarters Personnel Security Operations Stephanie Scott Grimes, Director The Office of Headquarters Personnel Security Operations serves the Department by providing a comprehensive Personnel Security Program for the DOE Headquarters complex. Our goal is to ensure that DOE classified information and materials are safeguarded from compromise by assuring that only trustworthy individuals are granted security clearances. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes aimed at ensuring only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information and materials.

326

Contribution of corporate social responsibility to information security management  

Science Conference Proceedings (OSTI)

Contemporary societies develop scepticism about the social responsibility of businesses. There are expectations that firms/corporations/industries/companies make more than just economic contributions. In the area of information technology, more and more ...

Theodosios Tsiakis

2009-11-01T23:59:59.000Z

327

PARS II New Contractor Information for Interconnection Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the tables below and return this form to the PARS II Support Team at DL-CF-40PARS2Support@hq.doe.gov. Contractor Point of Contact Information Name Position CompanyOrganization...

328

Information Assurance: Dependability and Security in Networked Systems  

Science Conference Proceedings (OSTI)

In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, ... Keywords: Networking

Yi Qian; David Tipper; Prashant Krishnamurthy; James Joshi

2007-11-01T23:59:59.000Z

329

Microsoft Word - Social Media Security Guidelines-v01-A.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidelines for Secure Use of Social Media by Guidelines for Secure Use of Social Media by Federal Departments and Agencies Information Security and Identity Management Committee (ISIMC) Network and Infrastructure Security Subcommittee (NISSC) Web 2.0 Security Working Group (W20SWG) Version 1.0 September 2009 This document is publicly releasable Guidelines for Secure Use of Social Media by Federal Departments and Agencies Page 2 Intended Audience This document is intended as guidance for any federal agency that uses social media services to collaborate and communicate among employees, partners, other federal agencies, and the public. Note: The Federal CIO Council does not endorse the use or imply preference for any vendor commercial products or services mentioned in this document.

330

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

331

File:08-FD-a - FederalTransmission.pdf | Open Energy Information  

Open Energy Info (EERE)

FederalTransmission.pdf FederalTransmission.pdf Jump to: navigation, search File File history File usage File:08-FD-a - FederalTransmission.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 20 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 16:30, 25 October 2012 Thumbnail for version as of 16:30, 25 October 2012 1,275 × 1,650 (20 KB) Dklein2012 (Talk | contribs) 09:55, 8 June 2012 Thumbnail for version as of 09:55, 8 June 2012 1,275 × 1,650 (49 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information)

332

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

333

Privacy & Security Notice | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

334

2011 DOE Safety and Security Enforcement Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

2011 DOE Safety and Security Workshop 2011 DOE Safety and Security Workshop Enforcement Home Registration - CLOSED Agendas Day 1 Agenda and Presentations Day 2 Agenda and Presentations Hotel Information Enforcement Home 2011 DOE Safety and Security Enforcement Workshop Office of Enforcement and Oversight The Office of Health, Safety and Security's (HSS) Office of Enforcement will be hosting its 2011 DOE Safety and Security Enforcement Workshop on the dates and location provided below. When: April 5 - 7, 2011 April 5 and 6 are open to Federal employees and contractors (8 am - 5 pm) April 7 is a half-day session for Federal participants only (8 - 11:30 am) The Energy Facility Contractors Group (EFCOG) Enforcement Coordination Working Group will be holding a meeting on April 7 at the Nevada Support Facility. For more information about that meeting, click here.

335

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

336

Security in TINA S. Staamann 1 L. Butty'an 2 U. Wilhelm 1  

E-Print Network (OSTI)

Security in TINA S. Staamann 1 L. Butty'an 2 U. Wilhelm 1 Swiss Federal Institute of Technology, and information era. Its characteristics most relevant for security are a variety of services, a multitude and provision, and the assumption of advanced costumer premises equipment. Concepts for its security

Bencsáth, Boldizsár

337

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

338

Technical Advisory Committee to Develop a Federal ...  

Science Conference Proceedings (OSTI)

Technical Advisory Committee to Develop a Federal Information Processing Standard for the Federal Key Management Infrastructure. ...

339

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

340

141111111111111111 Federal Energy Regulatory Commission  

E-Print Network (OSTI)

347) requires federal agencies to annually report their security and privacy programs. The Office of Management and Budget (OMB) provides instructions on complying with the requirements of FISMA. On July 17, 2006, OMB issued a memorandum for heads of executive departments and agencies, M-06-20, FY 2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management requiring each agency to determine continued compliance with its public websites posted privacy policy. To that end, FERC will compare its information collection practices on its website with its posted FERC website privacy policy annually to ensure compliance with its stated website privacy policy. 2.0 PURPOSE The purpose of this document is to establish FERC policy and procedures on auditing its compliance with its posted website privacy policy.

unknown authors

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

342

Spatially Informed Plant PRA Models for Security Assessment  

SciTech Connect

Traditional risk models can be adapted to evaluate plant response for situations where plant systems and structures are intentionally damaged, such as from sabotage or terrorism. This paper describes a process by which traditional risk models can be spatially informed to analyze the effects of compound and widespread harsh environments through the use of 'damage footprints'. A 'damage footprint' is a spatial map of regions of the plant (zones) where equipment could be physically destroyed or disabled as a direct consequence of an intentional act. The use of 'damage footprints' requires that the basic events from the traditional probabilistic risk assessment (PRA) be spatially transformed so that the failure of individual components can be linked to the destruction of or damage to specific spatial zones within the plant. Given the nature of intentional acts, extensive modifications must be made to the risk models to account for the special nature of the 'initiating events' associated with deliberate adversary actions. Intentional acts might produce harsh environments that in turn could subject components and structures to one or more insults, such as structural, fire, flood, and/or vibration and shock damage. Furthermore, the potential for widespread damage from some of these insults requires an approach that addresses the impacts of these potentially severe insults even when they occur in locations distant from the actual physical location of a component or structure modeled in the traditional PRA. (authors)

Wheeler, Timothy A. [Sandia National Laboratories, PO Box 5800, Albuquerque, NM 87185 (United States); Thomas, Willard [Omicron Safety and Risk Technologies, Inc., 2500 Louisiana Boulevard, Suite 410. Albuquerque, NM 87110 (United States); Thornsbury, Eric [U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001 (United States)

2006-07-01T23:59:59.000Z

343

Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty  

E-Print Network (OSTI)

Modern distributed communication networks like the Internet and censorship-resistant networks (also a part of the Internet) are characterized by nodes (users) interconnected with one another via communication links. In this regard, the security of individual nodes depend not only on their own efforts, but also on the efforts and underlying connectivity structure of neighboring network nodes. By the term 'effort', we imply the amount of investments made by a user in security mechanisms like antivirus softwares, firewalls, etc., to improve its security. However, often due to the large magnitude of such networks, it is not always possible for nodes to have complete effort and connectivity structure information about all their neighbor nodes. Added to this is the fact that in many applications, the Internet users are selfish and are not willing to co-operate with other users on sharing effort information. In this paper, we adopt a non-cooperative game-theoretic approach to analyze individual user security in a co...

Pal, Ranjan

2011-01-01T23:59:59.000Z

344

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

345

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

346

DOE O 5639.8A, Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities  

Directives, Delegations, and Requirements

The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities ...

1993-07-23T23:59:59.000Z

347

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA Briefings on Physical Security of Electricity Substations The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations. The session for FEMA Region IX will be held in San Jose, CA and hosted by

348

Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}  

SciTech Connect

The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

NONE

1998-05-01T23:59:59.000Z

349

Office of Headquarters Personnel Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

350

Federal Energy Management Program: Sustainable Federal Fleets  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Fleets Federal Fleets The Federal Fleet Program Overview outlines FEMP services and assistance available to Federal fleet managers to increase the use of alternative fuels and advanced vehicles. FEMP's Sustainable Federal Fleets website provides guidance and assistance to help implement Federal legislative and regulatory requirements mandating reduced petroleum consumption and increased alternative fuel use. FEMP's efforts include assisting agencies with implementing and managing energy-efficient and alternative fuel vehicles and facilitating a coordinated effort to reduce petroleum consumption and increase alternative fuel use annually. Content on Sustainable Federal Fleets spans Federal requirements and reporting compliance, alternative fuels and advanced vehicles, fleet performance data, analysis services, information resources, and FEMP contacts.

351

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09 09 Federal Register / Vol. 62, No. 99 / Thursday, May 22, 1997 / Notices collection on the respondents, including through the use of information technology. Dated: May 16, 1997. Gloria Parker, Director, Information Resources Management Group. Office of Management Type of Review: New. Title: Department of Education Federal Cash Award Certification Statement and Department of Education Federal Cash Quarterly Confirmation Statement. Frequency: Annually. Affected Public: Business or other for- profit; Not for Profit institutions; Federal Government; State, Local or Tribal Government, SEAs or LEAs. Annual Reporting and Recordkeeping Hour Burden: Responses: 12,000. Burden Hours: 38,160. Abstract: The collection of the Federal Cash Award Statement is necessary for the Agency to monitor cash advanced to

352

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

353

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

354

Federal Emergency Management Information System (FEMIS), Installation Guide for FEMIS 1.4.6  

Science Conference Proceedings (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.

Arp, J.A.; Burnett, R.A.; Carter, R.J.; Downing, T.R.; Dunkle, J.R.; Fangman, P.M.; Gackle, P.P.; Homer, B.J.; Johnson, D.M.; Johnson, R.L.; Johnson, S.M.; Loveall, R.M.; Stephan, A.J.; Millard, W.D.; Wood, B.M.

1999-06-29T23:59:59.000Z

355

Federal Energy Management Program: Services  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

facilitate the Federal Government's implementation of sound, cost-effective energy management and investment practices to enhance the nation's energy security and...

356

Federal Digital Strategy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Digital Strategy Federal Digital Strategy Federal Digital Strategy New expectations require the Federal Government to be ready to deliver and receive digital information and services anytime, anywhere and on any device. It must do so safely, securely, and with fewer resources. To build for the future, the Federal Government has developed a Digital Strategy that embraces the opportunity to innovate more with less, and enables entrepreneurs to better leverage government data to improve the quality of services to the American people. The Energy Department has responded to this challenge through key initiatives that make high-value data sets available through API's that allow programmers to use data to reveal new opportunities and trends, websites that follow best practices for mobile design, and applications

357

Federal Digital Strategy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Digital Strategy Federal Digital Strategy Federal Digital Strategy New expectations require the Federal Government to be ready to deliver and receive digital information and services anytime, anywhere and on any device. It must do so safely, securely, and with fewer resources. To build for the future, the Federal Government has developed a Digital Strategy that embraces the opportunity to innovate more with less, and enables entrepreneurs to better leverage government data to improve the quality of services to the American people. The Energy Department has responded to this challenge through key initiatives that make high-value data sets available through API's that allow programmers to use data to reveal new opportunities and trends, websites that follow best practices for mobile design, and applications

358

Federal Emergency Management Information Systems (FEMIS), System Administration Guide FEMIS: Phase 1, Version 1.1u  

SciTech Connect

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package.

Cerna, P.A.; Conner, W.M.; Curtis, L.M. [and others

1995-06-01T23:59:59.000Z

359

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

360

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Federal Offshore, Gulf of Mexico OCS - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

Federal Offshore, Gulf of Mexico OCS. Due to this modification, the effective productive capacity is not parallel to the wellhead productive capacity curve for the ...

362

Federal Market Information Technology in the Post Flash Crash Era: Roles for Supercomputing  

SciTech Connect

This paper describes collaborative work between active traders, regulators, economists, and supercomputing researchers to replicate and extend investigations of the Flash Crash and other market anomalies in a National Laboratory HPC environment. Our work suggests that supercomputing tools and methods will be valuable to market regulators in achieving the goal of market safety, stability, and security. Research results using high frequency data and analytics are described, and directions for future development are discussed. Currently the key mechanism for preventing catastrophic market action are circuit breakers. We believe a more graduated approach, similar to the yellow light approach in motorsports to slow down traffic, might be a better way to achieve the same goal. To enable this objective, we study a number of indicators that could foresee hazards in market conditions and explore options to confirm such predictions. Our tests confirm that Volume Synchronized Probability of Informed Trading (VPIN) and a version of volume Herfindahl-Hirschman Index (HHI) for measuring market fragmentation can indeed give strong signals ahead of the Flash Crash event on May 6 2010. This is a preliminary step toward a full-fledged early-warning system for unusual market conditions.

Bethel, E. Wes; Leinweber, David; Ruebel, Oliver; Wu, Kesheng

2011-09-16T23:59:59.000Z

363

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

364

Federal Land Policy and Management Act of 1976 | Open Energy Information  

Open Energy Info (EERE)

Land Policy and Management Act of 1976 Land Policy and Management Act of 1976 Jump to: navigation, search Statute Name Federal Land Policy and Management Act of 1976 Year 1976 Url Landpolicy1976.jpg Description FLPMA, also called the BLM Organic Act, consolidated and articulated BLM management responsibilities and delegated many management responsibilities pertaining to federal land from the Secretary of the Interior to the Director of the BLM, including oversight of oil and gas leases. References Federal Land Policy and Management Act of 1976[1] The Federal Land Policy and Management Act of 1976 (43 U.S.C. §1701 et seq.) - FLPMA, also called the BLM Organic Act, consolidated and articulated BLM management responsibilities and delegated many management responsibilities pertaining to federal land from the Secretary of the

365

Federal Railroad Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation Transportation Federal Railroad Administration Overview of Proposed Rail Safety & Security Rulemakings Kevin R. Blackwell FRA Hazmat Division Washington, DC Federal Authority DOT Authority to regulate safety and security of hazardous materials transportation Hazardous Materials Transportation Law (49 U.S.C. 5101 et.seq.) Federal Railroad Safety Act (49 U.S.C. 20101 et.seq.) TSA Authority to regulate security of hazardous material transportation Aviation Transportation Security Act (Pub. L. 107-71, 115 Stat. 597) Routing as a Part of the Transportation Cycle Routing decisions are continually made as a part of the transportation cycle for a variety of reasons. E c o n o m i c s Security S a f e t y Routing Decision Pyramid DOT NPRM HM-232E NPRM published on December 21, 2006.

366

An Introduction to Computer Security: the NIST Handbook  

Science Conference Proceedings (OSTI)

An Introduction to Computer Security: the NIST Handbook Keywords: computer security, contingency planning, cryptography, guidance, information assurance, risk management, security audit, security controls, security policy

Barbara Guttman; Edward A. Roback

1995-10-01T23:59:59.000Z

367

Our Jobs | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Our Jobs Home > Federal Employment > Our Jobs Our Jobs NNSA's...

368

Procurement | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement | National Nuclear Security Administration Procurement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Procurement Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Procurement Procurement NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

369

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

370

Federal Railroad Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety & Security Safety & Security Rulemakings Kevin R. Blackwell FRA Hazmat Division Washington, DC Federal Authority DOT Authority to regulate safety and security of hazardous materials transportation Hazardous Materials Transportation Law (49 U.S.C. 5101 et.seq.) Federal Railroad Safety Act (49 U.S.C. 20101 et.seq.) TSA Authority to regulate security of hazardous material transportation Aviation Transportation Security Act (Pub. L. 107-71, 115 Stat. 597) Routing as a Part of the Transportation Cycle Routing decisions are continually made as a part of the transportation cycle for a variety of reasons. Security Routing Decision Pyramid DOT NPRM HM-232E NPRM published on December 21, 2006. Seeks to clarify and enhance existing regulations. Rail Carriers who transport carloads of more than 5000 lbs of 1.1, 1.2, or 1.3

371

For Profit Audits - Information Related to 12/21/11 Federal Register...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comments received to Federal Register notice Document Number 2011-32622, a copy of the matrix of the comments, a copy of DOE's responses to the comments, and marked up versions of...

372

NMMSS Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reports | National Nuclear Security Administration Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Reports Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > NMMSS Reports NMMSS Reports U.S. Department of Energy / U.S. Nuclear Regulatory Commission

373

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Action Codes Table | National Nuclear Security Administration Action Codes Table | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Action Codes Table Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Code Tables > Action Codes Table

374

Countering Nuclear Terrorism | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Countering Nuclear Terrorism | National Nuclear Security Administration Countering Nuclear Terrorism | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Countering Nuclear Terrorism Home > Our Mission > Countering Nuclear Terrorism Countering Nuclear Terrorism NNSA provides expertise, practical tools, and technically informed policy

375

Change Request Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Change Request Forms | National Nuclear Security Administration Change Request Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Change Request Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Change Request Forms Change Request Forms

376

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

377

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

378

Federal Spectrum Management at the National Telecommunications...  

NLE Websites -- All DOE Office Websites (Extended Search)

Slides from National Telecommunications and Information Administration's presentation on Federal spectrum management. Federal Spectrum Management at the National...

379

Federal Energy Management Program: Federal Fleet Reporting  

NLE Websites -- All DOE Office Websites (Extended Search)

legislation requires agencies to annually report information on Federal motor vehicle usage and the makeup of their motor vehicle fleets. Agencies must also report the use of...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

382

GRR/Section 3-FD-a - Federal Land Leasing | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 3-FD-a - Federal Land Leasing GRR/Section 3-FD-a - Federal Land Leasing < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-FD-a - Federal Land Leasing 03FDAFederalLandLeasing.pdf Click to View Fullscreen Contact Agencies Bureau of Land Management United States Forest Service Regulations & Policies National Environmental Policy Act Energy Policy Act of 2005 Geothermal Steam Act of 1970 Federal Power Act Mineral Leasing Act of 1920 Outer Continental Shelf Lands Act 40 CFR 1506.1 43 CFR 1610.5-3 43 CFR 1610.5-5 43 CFR 3000.12 43 CFR 3200 43 CFR 3201.10 43 CFR 3201.11 43 CFR 3202.10 43 CFR 3203 43 CFR 3203.12 43 CFR 3206.12 10 U.S.C. 2917 Triggers None specified Click "Edit With Form" above to add content 03FDAFederalLandLeasing.pdf 03FDAFederalLandLeasing.pdf

383

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

384

Quantification, Optimization and Uncertainty Modeling in Information Security Risks: A Matrix-Based Approach  

Science Conference Proceedings (OSTI)

In this paper, the authors present a quantitative model for estimating security risk exposure for a firm. The model includes a formulation for the optimization of controls as well as determining sensitivity of the exposure of assets to different threats. ... Keywords: Cost Benefit Analysis, Data Simulation, Decision Models, IS Risk Management, Investment Justification, Security Management, Security Risk

Sanjay Goel; Eitel J.M. Laura

2010-04-01T23:59:59.000Z

385

Federal Register/Vol. 78, No. 38/Tuesday, February 26, 2013 ...  

Science Conference Proceedings (OSTI)

... Security Strategy,'' 2011 ''Cyberspace Policy Review,'' ''International ... Federal Register/Vol. ... including telecommunications, energy, financial services ...

2013-02-26T23:59:59.000Z

386

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

387

References | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog References Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management &...

388

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

389

Energy Security and Restoration Exercise Program/Best Practices and Information Sharing  

Science Conference Proceedings (OSTI)

The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

Barbara McCabe; John Kovach

2009-03-30T23:59:59.000Z

390

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

391

Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets  

E-Print Network (OSTI)

T ABULAR C OMPARISON OF NRC R EPORT I NFORMATION S ECURITY Security (none) Corresponding NRC Report Practice Areas63 Utilizing and Improving the NRC

Thaw, David Bernard

2011-01-01T23:59:59.000Z

392

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09 09 Federal Register / Vol. 64, No. 93 / Friday, May 14, 1999 / Notices technological collection techniques or other forms of information technology, e.g., permitting electronic submission of responses. Burden Statement: The annual public reporting and recordkeeping burden for this collection of information is estimated to average 3.03 hours per response. It is estimated that any individual may respond to synopses or market research questions 5 times per year. EPA anticipates publicizing approximately 260 contract actions per year, and conducting 3790 market research inquiries. Burden means the total time, effort, or financial resources expended by persons to generate, maintain, retain, or disclose or provide information to or for a Federal agency. This includes the time needed to review

393

DOE G 440.1-1B Admin Chg 1, Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees  

Directives, Delegations, and Requirements

This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, ...

2011-10-20T23:59:59.000Z

394

Port Security: Improving Emergency Response Capabilities at the Ports of Los Angeles and Long Beach  

E-Print Network (OSTI)

PORT SECURITY: IMPROVING EMERGENCY RESPONSE CAPABILITIES ATMaritime Transportation Security Act of 2002, Pub. L. No.the Federal Maritime Security Coordinator for his respective

Zegart, Amy B; Hipp, Matthew C; Jacobson, Seth K

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

402

Proceedings of the 2006 IEEE Workshop on Information Assurance and Security  

E-Print Network (OSTI)

Military Academy, West Point, NY, 21­23 June 2006 PalProtect: A Collaborative Security Approach to Comment the design and implementation of PalPro- tect, a plug-in for the popular WordPress blogging soft- ware. PalProtect of peers. PalProtect is a concrete example of a collaborative security system. II. Related Work

Locasto, Michael E.

403

PSH-12-0044 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44 - In the Matter of Personnel Security Hearing 44 - In the Matter of Personnel Security Hearing PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. Because the PSI and further investigation indicated that the Individual had not filed state and federal tax returns for several years and had a number of delinquent financial accounts, the LSO informed the Individual in a March 2012 notification

404

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

405

Safety and Security Enforcement Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Security Enforcement Program Safety and Security Enforcement Program Safety and Security Enforcement Program About Us The Office of Health, Safety and Security's Office of Enforcement and Oversight is responsible for enforcing Federal regulatory requirements pertaining to worker safety and health, nuclear safety, and classified information security programs at Department of Energy (DOE) sites. The United States Congress mandated that the Secretary of Energy promulgate these requirements in order to provide assurance that workers are protected from hazards in the workplace, the potential danger to life and property from the operation of DOE nuclear facilities is minimized, and classified matter is protected from disclosure to sustain our national security. These mandates are reflected in amendments to the Atomic Energy Act of 1954 in

406

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities IAJIT First Online Publication  

E-Print Network (OSTI)

Abstract: In order to perform the analysis and mitigation efforts related with the Information Security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts. So ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. Also in the modelling of the threat domain, attack trees are frequently utilized. However the execution of attack tree modelling is costly from the effort and timing requirements and also has inherent scalability issues. So within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined.

Bugra Karabey; Nazife Baykal

2011-01-01T23:59:59.000Z

407

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

408

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

409

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

410

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

411

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

412

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

413

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

414

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

415

The Oak Ridge Technical Information Center: A trailblazer in federal documentation  

SciTech Connect

This softbound book attempts to record the history of US AEC's Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this book, whose 18 chapters are arranged into four sections according to different presidential administrations.

Vaden, W.M.

1992-01-01T23:59:59.000Z

416

The Oak Ridge Technical Information Center: A trailblazer in federal documentation  

SciTech Connect

This document attempts to record the history of US AEC`s Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this document, with 18 chapters arranged into four sections according to different presidential administrations.

Vaden, W.M.

1992-01-01T23:59:59.000Z

417

Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets  

E-Print Network (OSTI)

with the advent of Smart Grid technology. 264 I identifiedpaper. See, e.g. , Smart Grid, http://www.oe.energy.gov/such as electric Smart Grids. Second, the security

Thaw, David Bernard

2011-01-01T23:59:59.000Z

418

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13 13 Federal Register / Vol. 64, No. 223 / Friday, November 19, 1999 / Notices numbers for EPA's regulations are listed in 40 CFR part 9 and 48 CFR Chapter 15. The EPA would like to solicit comments to: (i) Evaluate whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (ii) Evaluate the accuracy of the agency's estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; (iii) Enhance the quality, utility, and clarity of the information to be collected; and (iv) Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated electronic,

419

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09 09 Federal Register / Vol. 62, No. 182 / Friday, September 19, 1997 / Notices Information Officer, publishes this notice containing proposed information collection requests at the beginning of the Departmental review of the information collection. Each proposed information collection, grouped by office, contains the following: (1) Type of review requested, e.g., new, revision, extension, existing or reinstatement; (2) Title; (3) Summary of the collection; (4) Description of the need for, and proposed use of, the information; (5) Respondents and frequency of collection; and (6) Reporting and/or Recordkeeping burden. ED invites public comment at the address specified above. Copies of the requests are available from Patrick J. Sherrill at the address specified above. The Department of Education is

420

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Georgia Technology Information Security Center (GTISC); Idaho State University National Center of Academic Excellence in Information Assurance: ...

422

TSO-1116 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing The individual is an employee of a Department of Energy (DOE) contractor who has held a security clearance for several years. During a routine reinvestigation, the local security office (LSO) discovered that the individual had not filed federal taxes for the tax years 2008 and 2009. In July 2011, the LSO interviewed the individual during a Personnel Security Interview (PSI), but that interview did not resolve the security concerns. The LSO suspended his clearance and, in August 2011, the LSO informed the individual that it had received derogatory information that created a doubt regarding his continued eligibility for access authorization. See

423

January 2012 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

2 | National Nuclear Security Administration 2 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > January 2012 January 2012 NNSA Blog Bob Osborn selected as 2012 Federal 100 Award winner Posted By Office of Public Affairs Bob Osborn Bob Osborn, NNSA Associate Administrator for Information Management and Chief Information Officer, has been selected as one of

424

Homeland Security Chemical/Biological/Radiological/Nuclear ...  

Science Conference Proceedings (OSTI)

... Information at NIST. Homeland Security Chemical/Biological/Radiological/ Nuclear/Explosives (CBRNE) Information at NIST. ...

2010-09-24T23:59:59.000Z

425

Federal Acquisition Regulation; Federal Acquisition Circular  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Federal Acquisition Circular (FAC) 2005-40 Federal Register /Vol. 75, No. 55 /Tuesday, March 23, 2010 /page 14059 A summary for the FAR rule follows. Federal Awardee Performance and Integrity Information System (FAPIIS) (FAR case 2008-027) Effective Date: April 22, 2010. This final rule amends the FAR to implement section 872 of the Duncan Hunter National Defense Authorization Act for Fiscal Year 2009. Section 872 requires the establishment of a data system, Federal Awardee Performance and Integrity Information System (FAPIIS), containing specific information on the integrity and performance of covered Federal agency contractors and grantees. FAPIIS is available for use in award decisions at www.ppirs.gov. Government input to FAPIIS is accomplished at www.cpars.csd.disa.mil.

426

Smart Grid Federal Advisory Committee  

Science Conference Proceedings (OSTI)

NIST Director's Update Smart Grid Federal Advisory Committee ... NAESB Standardized Energy Usage Information Model [PAP10] ... Standards Policy ...

2013-01-09T23:59:59.000Z

427

Reasonable Accommodations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reasonable Accommodations | National Nuclear Security Administration Reasonable Accommodations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Reasonable Accommodations Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > Reasonable Accommodations Reasonable Accommodations For information and guidance on Reasonable Accommodations, contact the

428

Small Business | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Home > About Us > Our Operations > Acquisition and Project Management > Small Business Small Business NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

429

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

430

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

431

Users Frequently Asked Questions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Users Frequently Asked Questions | National Nuclear Security Administration Users Frequently Asked Questions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Users Frequently Asked Questions Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Frequently Asked Questions > Users Frequently Asked Questions

432

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

433

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

434

V-196: Microsoft Security Bulletin Advance Notification for July...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

provides additional information about security in Microsoft products. Consumers can visit Security At Home, where this information is also available by clicking "Latest Security...

435

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

436

New Tools to Help Configure Secure Operating Systems  

Science Conference Proceedings (OSTI)

... assist federal agencies in complying with computer security requirements mandated by the government's Office of Management and Budget (OMB). ...

2013-07-08T23:59:59.000Z

437

Detection of Multiple-Duty-Related Security Leakage in ...  

Science Conference Proceedings (OSTI)

... ARCHON is a digital library that federates physics ... on Software Engineering (ICSE 2005), pages ... formation Security Conference (ISC 2005), pages ...

2009-11-16T23:59:59.000Z

438

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

439

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

440

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Federal Register / Vol. 68, No. 220 / Friday, November 14, 2003 / Notices 1 Because the plants' refueling schedules determine the availability for lead assembly use, Duke Power Company has submitted a license amendment request to the NRC to allow irradiation of MOX lead assemblies at Catawba. The SA also analyzes the use of the McGuire Nuclear Station (McGuire) in North Carolina, which could be used in lieu of Catawba, if a license amendment request were submitted and approved. SUMMARY: The Leader, Regulatory Information Management Group, Office of the Chief Information Officer, invites comments on the proposed information collection requests as required by the Paperwork Reduction Act of 1995. DATES: Interested persons are invited to submit comments on or before January

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87 87 Federal Register / Vol. 61, No. 173 / Thursday, September 5, 1996 / Notices of burden accurate, (4) how might the Department enhance the quality, utility, and clarity of the information to be collected, and (5) how might the Department minimize the burden of this collection on the respondents, including through the use of information technology. Dated: August 29, 1996. Gloria Parker, Director, Information Resources Group. Office of Elementary and Secondary Education Type of Review: New. Title: Guidance on the Goals 2000 Amendments (Draft). Frequency: One-time submission. Affected Public: State, local or Tribal Gov't, SEAs or LEAs. Reporting and Recordkeeping Hour Burden: Responses: 30 Burden Hours: 3,000 Abstract: The Omnibus Consolidated Rescissions and Appropriations Act of

442

Amending the Federal power act: a key step toward an ''Energy Security and Supply Act of 2009'' for the new administration  

Science Conference Proceedings (OSTI)

The single most important action on energy that the next Congress should take is to create a pathway to get right the conversion and expansion of our electric infrastructure. It is time to place plenary authority over electric transmission facilities in the hands of the Federal Energy Regulatory Commission. The author offers draft legislation in this spirit. (author)

Zipp, Joel F.

2008-12-15T23:59:59.000Z

443

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

444

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

445

Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid ...

Frederick T. Sheldon; Robert Abercrombie; Axel Krings

2011-10-01T23:59:59.000Z

446

Renewable-Based Energy Secure Communities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities U.S. Department of Energy (DOE) Community Renewable Energy Deployment (CommRE) projects receive financial assistance and support from numerous federal and state agencies and partnering organizations. The University of California at Davis CommRE project is not only being funded by DOE, but also by the California Energy Commission's (CEC) Renewable-Based Energy Secure Communities (RESCO) program. Below are summaries of select RESCO projects and links to additional information. About Renewable-Based Energy Secure Communities RESCO projects are funded by the CEC's Public Interest Energy Research (PIER) Program, which supports public interest energy research, development, and demonstration. The goal of RESCO is to develop and

447

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

448

PSH-11-0036 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0036 - In the Matter of Personnel Security Hearing 1-0036 - In the Matter of Personnel Security Hearing PSH-11-0036 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held an access authorization for several years. DOE Exhibit (Ex.) 6 at 1. Pursuant to an investigation, it was discovered that the Individual, for a second period of time, had not filed state or federal tax returns. Ex. 4 at 1-2. This discovery prompted the Local Security Office (LSO) to conduct a Personnel Security Interview (PSI) with the Individual in October 2011. Ex. 5. After conducting the October 2011 PSI with the Individual, the LSO informed the Individual in a November 2011 notification letter (Notification Letter) that derogatory information existed that raised security concerns under 10

449

PSH-11-0039 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0039 - In the Matter of Personnel Security Hearing 1-0039 - In the Matter of Personnel Security Hearing PSH-11-0039 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. On September 8, 2011, the individual notified the DOE that the Internal Revenue Service (IRS) began garnishing his wages in August 2011, due to his failure to file a 2006 federal tax return. Exhibit 7. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on September 28, 2011. Exhibit 7. After the PSI, the LSO determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth the DOE's security concerns and the reasons for

450

Federal Energy Management Program: Covered Product Category:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Purchases Buying Energy-Efficient Clothes Washers Buyer Tips User Tips Estimating Energy and Cost Savings For More Information Performance Requirements for Federal...

451

Federal Energy Management Program: Federal Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Requirements to someone by E-mail Share Federal Energy Management Program: Federal Requirements on Facebook Tweet about Federal Energy Management Program: Federal...

452

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

247 247 Federal Register / Vol. 61, No. 138 / Wednesday, July 17, 1996 / Notices by the Secretary of Commerce. The purpose of this meeting is to review the 1996 Award applications and to select applications to be considered in the site visit stage of the evaluation. The applications under review contain trade secrets and proprietary commercial information submitted to the Government in confidence. DATES: The meeting will convene August 7, 1996, at 8:00 a.m. and adjourn at 5:00 p.m. on August 7, 1996. The entire meeting will be closed. ADDRESS: The meeting will be held at the National Institute of Standards and Technology, Administration Building, Gaithersburg, Maryland 20899. FOR FURTHER INFORMATION CONTACT: Dr. Harry Hertz, Director for Quality Programs, National Institute of

453

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

78 78 Federal Register / Vol. 70, No. 158 / Wednesday, August 17, 2005 / Notices requirements and practices for institutions participating in the Title IV, Higher Education Act (HEA) programs. The public is alerted that this package is a request for an extension of a currently approved collection. Until the anticipated reauthorization of the Higher Education Act and any resulting changes to the implementing regulations, the existing paperwork collection is simply extended, rather than revised. Requests for copies of the proposed information collection request may be accessed from http://edicsweb.ed.gov, by selecting the ''Browse Pending Collections'' link and by clicking on link number 2853. When you access the information collection, click on ''Download Attachments'' to view.

454

Photo Gallery | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Photo Gallery Home > Media Room > Photo Gallery Photo Gallery The...

455

Research and Development | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Research and Development Home > About Us > Our Programs >...

456

Collaboration Topics - Visualization | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - Visualization Home > About Us > Our...

457

Sample Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Sample Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management &...

458

Recapitalizing Our Infrastructure | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Recapitalizing Our Infrastructure Home > Our Mission >...

459

High Explosives Application Facility | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration High Explosives Application Facility Home > About Us > Our...

460

Press Releases | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Press Releases Home > Media Room > Press Releases Press Releases...

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Managing the Stockpile | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Managing the Stockpile Home > Our Mission > Managing the Stockpile...

462

Infrastructure Security and Energy Restoration (ISER) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

resiliency and survivability of key energy assets and critical energy infrastructure at home and abroad. We work with the Department of Homeland Security, the Federal Energy...

463

Collaboration Topics - System Software | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our...

464

Institutional Research & Development | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Institutional Research & Development Home > About Us > Our...

465

Media Room | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Media Room Home > Media Room Media Room NNSA's Office of...

466

Small Business Opportunity Sessions | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

General Federal contracting experience Experience within the NNSA, the Department of Energy (DOE), or Management & Operating environment Personnel with security clearances...

467

Nonproliferation & Homeland Security Field Support | Global and...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Homeland Security Field Support Group provides radiological assistance to federal and state agencies under the DOE Radiological Assistance Program (RAP), field support for...

468

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

469

Threat based risk management in the federal sector  

Science Conference Proceedings (OSTI)

The United States federal government has many regulations and laws today that require federal agencies to implement a risk management program. Despite these efforts, computer security intrusions and data loss continue to rise. The need for a adaptable ... Keywords: FISMA, NIST, computer security, cybersecurity, risk, risk management, security programs

Nathan Volk

2010-10-01T23:59:59.000Z

470

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

471

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

472

Response to Request for Additional Information regarding Request for Approval of the Cyber Security Plan San Onofre Nuclear Generating Station, Units 2 and 3  

E-Print Network (OSTI)

By letter dated July 22, 2010 (Reference) Southern California Edison submitted a license amendment request for approval of the Cyber Security Plan for San Onofre Nuclear Generating Station (SONGS) in accordance with 10 CFR 73.54. The purpose of this license amendment was to provide an Implementation Schedule, provide a table of SONGS deviations from NEI 08-09 Revision 6, and add a sentence to the existing Facilities Operating Licenses (FOL) license condition for Physical Security to require SCE to fully implement and maintain in effect all provisions of the Commission approved Cyber Security Plan. By e-mail dated March 1, 2011, the NRC requested additional information through three generic questions developed by the NRC staff following discussions with the Nuclear Energy Institute and the industry Cyber Security Task Force. Responses to the NRC request for additional information are provided in the Enclosure to this letter.

Southern Edison; Douglas R. Bauder

2011-01-01T23:59:59.000Z

473

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

474

Fact Sheets | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Fact Sheets | National Nuclear Security Administration Fact Sheets | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Fact Sheets Home > Media Room > Fact Sheets Fact Sheets Find out more information about key NNSA programs, initiatives and accomplishments. Fact Sheet Nov 13, 2013 Highly Enriched Uranium Transparency Program

475

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

476

TSO-1108 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1108 - In the Matter of Personnel Security Hearing TSO-1108 - In the Matter of Personnel Security Hearing TSO-1108 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and held an access authorization until it was recently suspended. During a routine reinvestigation of the individual, he informed an Office of Personnel Management (OPM) investigator on February 16, 2011, that he had not filed federal or state income tax returns for several years. Exhibit 6 at 13. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on June 23, 2011. Exhibit 9. The LSO ultimately determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth

477

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

478

Homeland Security Issues for Facilities  

E-Print Network (OSTI)

The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure and systems. After assessments are complete, the results should be compared with guidelines and recommendations produced by government agencies or professional organizations. Areas to address to enhance security and safety include ventilation, control systems, air filtration, alarm systems, building access, and surveillance. This paper will look at the objectives of task forces, sources of information, and measures owners can take in schools and other facilities. Although actions involving increased awareness, structural reinforcement, and emergency water supplies are important, this discussion will focus on mechanical and security systems and related items. The authors' experiences in assisting Texas school districts will also be shared.

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

479

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

480

FEDERAL INFORMATION PROCESSING STANDARDS ...  

Science Conference Proceedings (OSTI)

... This Standard specifies use of a symmetric-key encryption ... definition of "escrow", the key component holders provide the components of a ...

2012-12-20T23:59:59.000Z

Note: This page contains sample records for the topic "federal information security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

482

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

483

Reliability and the Federal Energy Regulatory Commission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and the Federal Reliability and the Federal and the Federal Reliability and the Federal Energy Regulatory Energy Regulatory Commission Commission Michael Peters Michael Peters Energy Infrastructure & Cyber Security Advisor Energy Infrastructure & Cyber Security Advisor Federal Energy Regulatory Commission Federal Energy Regulatory Commission 202 202 - - 502 502 - - 8461 8461 Michael.Peters@FERC.GOV Michael.Peters@FERC.GOV The views expressed in this The views expressed in this presentation do not represent the presentation do not represent the views of the Federal Energy views of the Federal Energy Regulatory Commission or the United Regulatory Commission or the United States. States. These views are the personal opinion These views are the personal opinion of Mike Peters!!!! of Mike Peters!!!! ☺ ☺ ☺ ☺ ☺ ☺

484

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NNSA to meet its mission. b. NNSA provides Federal and NNSA specific demographic information regarding workforce and demographic trends, attrition, and the trends in the...

485

THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.  

E-Print Network (OSTI)

to funeral directors as necessary to carry out their duties. National Security and Intelligence Activities. The Plan may release medical information about you to authorized federal officials for intelligence, counterintelligence, and other national security activities authorized by law. Inmates. If you are an inmate

Alabama in Huntsville, University of

486

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

487

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07 07 Federal Register / Vol. 69, No. 146 / Friday, July 30, 2004 / Notices assessment; and (f) environmental statistics. Process and Deadline for Submitting Nominations Any interested person or organization may nominate individuals qualified in the areas of expertise described above to serve on the Subcommittee. Nominations should be submitted in electronic format through the Form for Nominating Individuals to Panels of the EPA Science Advisory Board provided on the SAB Web site, http:// www.epa.gov/sab. The form can be accessed through a link on the blue navigational bar on the SAB Web site, http://www.epa.gov/sab. To be considered, all nominations must include the information required on that form. Anyone who is unable to submit nominations using this form, and any

488

Federal Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 9 Federal Register / Vol. 61, No. 17 / Thursday, January 25, 1996 / Notices Department of Energy Organization Act (Public Law 95-91), and rules and regulations issued in implementation of those Acts. Further information regarding this Advisory Board may be obtained from Rachel Murphy Samuel at (202) 586- 3279. Issued in Washington, DC, on January 18, 1996. JoAnne Whitman, Deputy Advisory Committee Management Officer. [FR Doc. 96-1197 Filed 1-24-96; 8:45 am] BILLING CODE 6450-01-P Alternative Strategies for the Long- Term Management and Use of Depleted Uranium Hexafluoride AGENCY: Department of Energy ACTION: Notice of Intent (NOI). SUMMARY: The Department of Energy (DOE) announces its intent to prepare a programmatic environmental impact statement (PEIS) pursuant to the National Environmental Policy Act

489

Information, Alternative Markets, and Security Price Processes: A Survey of Literature  

E-Print Network (OSTI)

In this paper, we survey a wide range of theoretical and empirical papers on derivatives markets to address the information contents of trading activities in derivatives markets. Both theoretical and empirical research on options market and futures market indicate that the presence of alternative markets may be a factor for informed traders presence in one of or in both markets to trade on their information. One group of researchers support the hypothesis that information reflects in derivatives market first and underlying stock market lags in information transmission. Another group of researchers support the hypothesis that information reflects in stock markets first and trading activities in derivatives markets are not significant. Since researchers are not in agreement in this issue, it raises a potential for further research on different activities of derivatives market.

Rafiqul Bhuyan

2002-01-01T23:59:59.000Z

490

Improving National and Homeland Security through a proposed Laboratory for Information Globalization and Harmonization Technologies (LIGHT)  

E-Print Network (OSTI)

A recent National Research Council study found that: "Although there are many private and public databases that contain information potentially relevant to counter terrorism programs, they lack the ...

Choucri, Nazli

2004-11-30T23:59:59.000Z

491

Fenix Secure Operating System: Principles, Models and Architecture  

Science Conference Proceedings (OSTI)

The paper introduces design principles of Secure Operating System Fenix developed in Information Security Centre of Saint-Petersburg Technical University. Fenix is a special purpose secure operating system supposed to be a basis for secure information ...

Dmitry P. Zegzhda; Pavel G. Stepanov; Alexey D. Otavin

2001-05-01T23:59:59.000Z

492

Federal Energy Management Program: 2001 Federal Energy and Water...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Federal Energy Management Program Search...

493

Federal Energy Management Program: 2010 Federal Energy and Water...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Federal Energy Management Program Search...

494

Federal Energy Management Program: 2002 Federal Energy and Water...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Federal Energy Management Program Search...

495

Federal Energy Management Program: 2004 Federal Energy and Water...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Federal Energy Management Program Search...

496

Federal Energy Management Program: 2003 Federal Energy and Water...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Federal Energy Management Program Search...

497

Federal Energy Management Program: 2012 Federal Energy and Water...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Federal Energy Management Program Search...

498

Federal Energy Management Program: 2009 Federal Energy and Water...  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip to Content U.S. Department of Energy Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Federal Energy Management Program Search...

499

TSO-1006 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1006 - In the Matter of Personnel Security Hearing TSO-1006 - In the Matter of Personnel Security Hearing TSO-1006 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and holds a DOE access authorization, now in suspension. He provided inconsistent information on four separate occasions to the Local Security Office (LSO) concerning his diagnosis and treatment for mental health issues: in his responses to two Questionnaires for National Security Positions (QNSPs) in 2003 and 2009, during a background investigation interview conducted by the Federal Bureau of Investigation (FBI) in 2006, and during a Personnel Security Interview (PSI) in 2010. The LSO could not resolve these discrepancies to its satisfaction, so it referred the individual to a DOE

500

Risk Analysis & Security Rule Compliance Activities  

Science Conference Proceedings (OSTI)

... Risk Analysis & Security Rule Compliance Activities Marissa Gordon- Nguyen, JD, MPH Health Information Privacy Specialist ...

2010-05-13T23:59:59.000Z