Sample records for federal information security

  1. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  2. AT&TSecurity Consulting Information Assurance Federal Information Security

    E-Print Network [OSTI]

    Fisher, Kathleen

    AT&TSecurity Consulting Information Assurance ­ Federal Information Security Management Act (FISMA requirements under the Federal Information Security Management Act of 2002, of general support systems the security controls for the information system. The AT&T Consulting methodology is based on National

  3. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  4. Appendix III to OMB Circular No. A-130 -Security of Federal Automated Information Resources

    E-Print Network [OSTI]

    Appendix III to OMB Circular No. A-130 - Security of Federal Automated Information Resources A automated information security programs; assigns Federal agency responsibilities for the security of automated information; and links agency automated information security programs and agency management

  5. Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20, 2013)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20 year (FY) 2013 reporting requirements for the Federal Information Security Management Act (FISMA is steadily working to improve its overall information technology (IT) security posture. Nevertheless

  6. NIST Seeks Input for Planned 2011 Update of Security Control Catalog For Federal Information Systems and Organizations

    E-Print Network [OSTI]

    ; · Supply chain security; · Industrial/process control systems; and · Privacy. NIST SP 80053, Revision 3 Publication 80053, Recommended Security Controls for Federal Information Systems and Organizations webbased access to the security controls for federal information systems and organizations

  7. Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13, 2014)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13) identified for this year's Federal Information Security Management Act (FISMA) review; however, the Agency Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information

  8. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE and expanded its catalog of security controls to help organizations protect their information and information, the revised catalog brings together, for the first time, comprehensive information about security controls

  9. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking of BlytheDepartment of EnergyTreatmentInformationPlanDevelopment |

  10. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  11. Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12-002, October 17, 2011)

    E-Print Network [OSTI]

    Christian, Eric

    Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12's information technology (IT) security posture. For FY 2011, we adopted a risk-based approach in which we required areas of review for FY 2011 Federal Information Security Management Act (FISMA) reporting: · Risk

  12. Federal Information Security Management Act: Fiscal Year 2012 Evaluation (IG-13-001, October 10, 2012)

    E-Print Network [OSTI]

    Federal Information Security Management Act: Fiscal Year 2012 Evaluation (IG-13-001, October 10 Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information that NASA has established a program to address the challenges in each of the areas that the Office

  13. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  14. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  15. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  16. Meeting Federal Energy Security Requirements

    Broader source: Energy.gov [DOE]

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  17. ITL BULLETIN FOR AUGUST 2010 ASSESSING THE EFFECTIVENESS OF SECURITY CONTROLS IN FEDERAL

    E-Print Network [OSTI]

    discusses the process for assessing the security controls in organizational information systems that are implemented in federal information systems. The selection and assessment of appropriate security controls Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans

  18. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  20. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  1. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  3. Federal Register Notice: National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNLNM) Federal Register Notice: National Nuclear Security Administration...

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  6. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  7. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  8. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  9. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  10. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  11. FIPS PUB 188 Federal Information

    E-Print Network [OSTI]

    OF COMMERCE / National Institute of Standards and Technology Standard Security Label for Information Transfer Computer Systems Laboratory Abstract Information Transfer security labels convey information used with semantics provided by the authority establishing the security policy for the protection of the information

  12. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  14. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  15. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  16. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  17. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  18. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  19. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  20. ITL BULLETIN FOR MAY 2013 ITL PUBLISHES SECURITY AND PRIVACY CONTROLS FOR FEDERAL AGENCIES

    E-Print Network [OSTI]

    The selection and implementation of security and privacy controls for information systems and organizations systems and organizations. Controls are also designed to satisfy a set of defined security requirements for federal information systems and organizations. It describes a process for selecting controls to protect

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  2. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  3. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  4. Performing Energy Security Assessments - A How-To Guide for Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers Guide...

  5. NIST Computer Security Division csrc.nist.gov Supplemental Guidance on

    E-Print Network [OSTI]

    -03, Enhancing the Security of Federal Information and Information Systems, stated that, "Our nation's security monitoring, or security authorization. Keywords Federal Information Security Management Act, Information Information For additional information on NIST's Computer Security Division programs, projects

  6. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  7. OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring

    E-Print Network [OSTI]

    Calyam, Prasad

    - driven access to related federated Network Performance Mon- itoring (NPM) services are important federated authorization entitlement policies for timely orches- tration of NPM services. On measurement resources. We validate OnTimeSecure in a federated multi-domain NPM infrastructure by performing

  8. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  9. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  10. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  11. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  12. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  13. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  14. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  15. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  16. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  17. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  18. The Economic Consequences of Sharing Security Information Esther Gal-Or1

    E-Print Network [OSTI]

    Camp, L. Jean

    Information technology (IT) security has emerged as an important issue in the last decade. To promote the disclosure and sharing of cyber-security information amongst firms, the US federal government has encouraged-commerce con- tinues to grow, so does cyber crime. According to Jupiter Media Metrix, cyber-security issues

  19. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  20. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group The principles · The eight principles are: 1. Economy of mechanism 2. FailIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group Objectives

  1. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  2. Tighter security for electronic information

    SciTech Connect (OSTI)

    Moore, T.

    1996-11-01T23:59:59.000Z

    Responding to interest expressed by many member utilities, EPRI is launching strategic core research in information security to help companies better protect power system operations, business-sensitive and private customer data, and networks from unauthorized access or use. Although the threat of computer security breaches has been relatively low and isolated in the past and break-ins have been few, the increasing use of networks for various business activities suggests that such risks will rise. EPRI expects to work through an existing strategic alliance with the Department of Energy to tap the expertise of the national laboratories in beefing up utilities` information security systems and practices. This paper describes these potential threats and strategies to combat them.

  3. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

  4. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01T23:59:59.000Z

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all

  5. Information Security Policy Manual Latest Revision: May 16, 2012

    E-Print Network [OSTI]

    Alpay, S. Pamir

    1 Information Security Policy Manual Latest Revision: May 16, 2012 #12;2 Table of Contents Information Security Policy Manual...............................................................................................................................................17 Information Security Glossary

  6. Federal Register | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV JumpFederal Highway Administration JumpRegister

  7. September 2004 INFORMATION SECURITY

    E-Print Network [OSTI]

    of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used by an organization to effectively develop an information system. A tra ditional SDLC is a linear sequential model. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

  8. Before the Senate Homeland Security and Governmental Affairs...

    Energy Savers [EERE]

    and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland...

  9. Start your information security planning here!

    E-Print Network [OSTI]

    Magee, Joseph W.

    Start your information security planning here! Save the Date July 15, 2008 8:30 am ­ 12:30 pm-technology crimes. For additional information, visit http://csrc.nist.gov/secure iz/b or contact: securebiz developed a workshop to help the small business owner increase information system security. Learn how

  10. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision requirements for the protection of that information on the University. The University has had security of the University. The Information Technology Security Office has created this Incident Response Plan to assist

  11. Information Security 26:198:643:01

    E-Print Network [OSTI]

    Lin, Xiaodong

    Information Security 26:198:643:01 Spring 2012 Rutgers University M 2:30-5:20pm, 1WP-534 Panagiotis and interconnecting networks, raising demands for security measures to protect the information and relevant systems, students will learn the theoretical advancements in information security, state-of-the- art techniques

  12. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, As we write the summer issue, with the hire of Indir Advagic, SEAS is launching an Office of Information Security. Besides assessing the general state of information security at SEAS, one of Indir's first tasks will be to revive the cross

  13. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  14. Information Technology Security for Small Business

    E-Print Network [OSTI]

    Magee, Joseph W.

    Information Technology Security for Small Business (video script) Descriptive Text for the Visually symbolic of information technology security and cyber crime. Narration: "No matter how well you protect, "Information Technology Security for Small Business" and "It's not just good business. It's essential business

  15. Secured Information Flow for Asynchronous Sequential Processes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Secured Information Flow for Asynchronous Sequential Processes Isabelle Attali, Denis Caromel for unauthorized information flows. As a final result, all authorized communication paths are secure: no disclosure a new issue in data confidentiality: authorization of secured information flow transiting (by the mean

  16. Formalizing Information Security Knowledge Stefan Fenz

    E-Print Network [OSTI]

    Formalizing Information Security Knowledge Stefan Fenz Vienna University of Technology Vienna ontology which provides an on- tological structure for information security domain knowl- edge. Besides of the considered organization is incorporated. An evaluation conducted by an information security expert team has

  17. The Department of Energy's National Security Information Fundamental...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental...

  18. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  19. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  20. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  1. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  2. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  3. Federal Register Notice: Proposed Agency Information Collection

    Broader source: Energy.gov [DOE]

    Federal Register Notice on the DOE’s invitation for public comment on its request to the Office of Management and Budget (OMB) to extend for three years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910–5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before November 7, 2011.

  4. Federal Register Notice: Proposed Agency Information Collection

    Broader source: Energy.gov [DOE]

    Federal Register Notice on the DOE’s invitation for public comment on its intent to request the Office of Management and Budget (OMB) to extend for four years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910–5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before October 11, 2011.

  5. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  6. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  7. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    E-Print Network [OSTI]

    Thaw, David Bernard

    2011-01-01T23:59:59.000Z

    assets. Current information security law in the Unitedimplications for information security professionalism inbeing abundant in the information security community: Yes,

  8. Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE

    E-Print Network [OSTI]

    Martin, Jeff

    Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE Demand for technical security and information assurance professionals has risen dramatically in recent years OPPORTUNITIES: TUITION: Required Courses (78 Hours): · Information Assurance and Security Level 1: Information

  9. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved GUIDELINE TITLE: Information Security Incident Response GUIDELINE PURPOSE: The purpose of information security incident response is to: mitigate the effects caused by such an incident

  10. Electronic DOE Information Security System (eDISS) PIA, Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

  11. MSc and Postgraduate Diploma in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    of information security need internationally-recognised qualifications which How will the course help my career and understanding of What do employers say? Worldwide Access | Opportunity | International Standards qualifications. #12;`Attending my first Information Security supplier event after graduating made me reali

  12. Federated Rural Electric Assn | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJumpGerman AerospaceEfficiencyInformation HydropowerFederated

  13. Federal Aviation Administration | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV Jump to:FASFMI-HDFREDJumpInformation jointFederal

  14. Federal Energy Regulatory Commission | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV Jump to:FASFMI-HDFREDJumpInformationFederal

  15. ITL Bulletins are published by the Information Technology Laboratory

    E-Print Network [OSTI]

    Intrusion Detection Systems, July 2003 IT Security Metrics, August 2003 Information Technology Security Security Considerations in the Information System Development Life Cycle, December 2003 Computer Security Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems

  16. University of Warwick Information Security Policy 1. Introduction

    E-Print Network [OSTI]

    Davies, Christopher

    University of Warwick Information Security Policy 1. Introduction The University recognises's strategic objectives. Information security is important to the protection of the University's reputation implications for individuals and is subject to legal obligations. The consequences of information security

  17. Order Code RL33494 Security Classified and Controlled Information

    E-Print Network [OSTI]

    Laughlin, Robert B.

    Order Code RL33494 Security Classified and Controlled Information: History, Status, and Emerging Government and Finance Division #12;Security Classified and Controlled Information: History, Status in the creation, management, and declassification of national security information followed over the succeeding

  18. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute component of every organization's information security program. An effective risk management process enables

  19. USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY

    E-Print Network [OSTI]

    USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute about the security of information systems for the decision makers of organizations. When organizations

  20. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  1. List of Major Information Systems,National Nuclear Security Administra...

    Energy Savers [EERE]

    List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT...

  2. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  3. 06 DEC 2013 1 Information Security Guideline

    E-Print Network [OSTI]

    Queitsch, Christine

    (CISO) and Privacy Assurance and Systems Security Council (PASS Council) provide organizations with the information security and privacy risk management approach overseen by the CISO and PASS Council on behalf of the University. This document is a living document and will be reviewed and revised as necessary. Check the CISO

  4. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved POLICY TITLE: Information Technology Security Policy POLICY PURPOSE: The purpose of this Information Technology Security Policy is to ensure and describe the steps necessary to secure information

  5. Request for Information: Federal Government Power Purchase Agreements...

    Broader source: Energy.gov (indexed) [DOE]

    request for information for federal government power purchase agreement (PPA) issues. pparfi.pdf More Documents & Publications Response Summary: Department of Energy Power...

  6. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  7. Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Information Security Officer (CISO). Click here for the electronic version on Dartmouth's Information Security

  8. Washington and Lee University Guidance on Information Security

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidance on Information Security This guidance addresses common issues that have come up during information security discussions with offices and departments across, Information Security Program Committee Chair (sdittman@wlu.edu) or Dean Tallman, Information Security Officer

  9. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet),EnergyImprovementINDIANManagement Governance

  10. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01T23:59:59.000Z

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  11. Smart Grid Information Security (IS) Functional Requirement

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01T23:59:59.000Z

    It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

  12. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  13. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  14. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  15. When security meets software engineering: A case of modelling secure information systems

    E-Print Network [OSTI]

    When security meets software engineering: A case of modelling secure information systems Engineering: towards the Modeling of Secure Information Systems" paper presented at the 15th International. This is mainly because private information is stored in computer systems and without security, organisations (and

  16. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

    E-Print Network [OSTI]

    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems for information systems. Traditionally, security is considered after the definition of the system. However the health sector to military. As the use of Information Systems arises, the demand to secure those systems

  17. The Center for Information Systems Security Studies and

    E-Print Network [OSTI]

    The Center for Information Systems Security Studies and Research (CISR) has created the ISSE) and the Department of Homeland Security (DHS) have designated NPS as a Center of Academic Excellence in Information developments where cyber security is a concern. Information Systems Security Engineering (ISSE) Certificate

  18. Ontological Mapping of Information Security Best-Practice Guidelines

    E-Print Network [OSTI]

    Ontological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner security knowl- edge. While information security ontologies already exist, no methods have been proposed. Therefore, this paper presents a method for mapping the information security knowledge of the French EBIOS

  19. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28T23:59:59.000Z

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  20. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  1. Principles of Secure Information Flow Analysis Geoffrey Smith

    E-Print Network [OSTI]

    Smith, Geoffrey

    Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

  2. A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Information Security Officer (CISO) within an organisation to ensure that such information is adequately protected. External standards exist to advise CISOs on how to secure infor- mation insecure employee behaviour. CISOs require more information than they are currently provided

  3. Banner Job Installation Security Form Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Job Installation Security Form Office of Information Technology 424 Roy S. Nicks Hall, Box: ______________________________ Job Description: ______________________________ Section 3. Security Information Banner Module 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu Section 1. Requestor Information

  4. Physical and Information Security Policy Category: Campus Life

    E-Print Network [OSTI]

    Physical and Information Security Policy Category: Campus Life Facilities Information Management 1. The Security Office (Bentley Campus) will provide information to assist staff and students in protecting Manager. 2.7 Information security University information must be protected in a manner that is appropriate

  5. NIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4,

    E-Print Network [OSTI]

    and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, which .............................................................. 3 Figure 3: Security Control Selection Process

  6. Quantum non-locality and information security Muhammad Nadeem

    E-Print Network [OSTI]

    1 Quantum non-locality and information security Muhammad Nadeem Department of Basic Sciences-locality, as discussed here, is sufficient to achieve unconditional information security without requiring advanced, integrity, authenticity and availability of information to legitimate users. These information security

  7. Page 1 of 2 Policy Name: Information Technology (IT) Security

    E-Print Network [OSTI]

    Carleton University

    Page 1 of 2 Policy Name: Information Technology (IT) Security Originating/Responsible Department Information Officer (CIO) Policy: Information Technology (IT) Security Purpose: The purpose of this Policy is to outline Carleton University's approach to campus- wide IT security for networks, enterprise information

  8. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03T23:59:59.000Z

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  9. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful with the guidance of their senior administrators. The re-organization in some of the finance offices continues the intranet site. #12;2 Harry Dumay, PhD MBA Chief Financial Officer/ Associate Dean for Finance

  10. PRIVACY AND SECURITY OF PERSONAL INFORMATION

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

  11. Federal government information handbook: formerly utilized sites remedial action program

    SciTech Connect (OSTI)

    Not Available

    1980-12-31T23:59:59.000Z

    This volume is one of a series produced under contract with the DOE, by Politech Corporation to develop a legislative and regulatory data base to assist the FUSRAP management in addressing the institutional and socioeconomic issues involved in carrying out the Formerly Utilized Sites Remedial Action Program. This Information Handbook series contains information about all relevant government agencies at the Federal and state levels, the pertinent programs they administer, each affected state legislature, and current Federal and state legislative and regulatory initiatives. This volume is a compilation of information about the Federal Government. It contains a summary of the organization and responsibilities of agencies within the executive branch of the Federal government which may be relevant to FUSRAP activities; a brief summary of relevant Federal statutes and regulations; a description of the structure of the US Congress, identification of the officers, relevant committees and committee chairmen; a description of the Federal legislative process; a summary of legislation enacted and considered in the recently-adjourned 96th Congress; a description of the Federal budgetary process; a summary of the Carter Administration's comprehensive radioactive waste management program; and excerpts from the text of relevant federal statutes and regulations.

  12. The Promotion of Access to and Protection of National Security Information in South Africa

    E-Print Network [OSTI]

    Klaaren, Jonathan E.

    2003-01-01T23:59:59.000Z

    broadly, a military information security policy has beenfor secrecy and therefore information security measures in asection describes the information security implementation

  13. Federal Reporting Recipient Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers New Training on Energy6 Federal Energy1999;Federal RegisterofSeptember 12,

  14. Federal Reporting Recipient Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers New Training on Energy6 Federal Energy1999;Federal RegisterofSeptember

  15. Federal Reporting Recipient Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers New Training on Energy6 Federal Energy1999;Federal

  16. Federal Reporting Recipient Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers New Training on Energy6 Federal Energy1999;FederalJanurary 5, 2012. ARRA870A

  17. Federal Reporting Recipient Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers New Training on Energy6 Federal Energy1999;FederalJanurary 5, 2012.

  18. Federal Reporting Recipient Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers New Training on Energy6 Federal Energy1999;FederalJanurary 5, 2012.June 6,

  19. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  20. Federal Trade Commission Su acceso a informes de crdito gratuitos

    E-Print Network [OSTI]

    Federal Trade Commission Su acceso a informes de crédito gratuitos Your Access to Free Credit Reports La Ley de Informe Imparcial de Crédito requiere que, a su pedido, cada una de las compañías de informes de los consumidores a nivel nacional -- Equifax, Experian y TransUnion -- le provea cada 12 meses

  1. Office of the CISO, December 2010 Information Security Risk Advisory

    E-Print Network [OSTI]

    Queitsch, Christine

    Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks. The Office of the Chief Information Security Officer (CISO) encourages you to be aware of the following when

  2. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17T23:59:59.000Z

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing Department of Energy (DOE), including National Nuclear Security Administration (NNSA), Federal workers with a safe and healthful workplace. Cancels DOE O 440.1A. Certified 6/17/2011. Canceled by DOE O 440.1B Chg 1.

  3. A Comprehensive and Comparative Metric for Information Security

    E-Print Network [OSTI]

    Breu, Ruth

    A Comprehensive and Comparative Metric for Information Security Steffen Weiß1 , Oliver Weissmann2 security GmbH, Germany Abstract Measurement of information security is important for organizations , Falko Dressler1* 1 Dept. of Computer Science 7, University of Erlangen, Germany 2 atsec information

  4. The Complexity of Synchronous Notions of Information Flow Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Complexity of Synchronous Notions of Information Flow Security Franck Cassez1, , Ron van der flow security is concerned with the ability for agents in a system to deduce information about an information flow security policy has proved to be a subtle matter. A substantial literature has developed

  5. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST METHOD SELECTION LIST;DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST METHOD SELECTION LIST for reasons outside the scope of this document. #12;DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY

  6. A Survey of Interdependent Information Security Games ARON LASZKA1

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    A A Survey of Interdependent Information Security Games ARON LASZKA1 , MARK FELEGYHAZI1 , LEVENTE by the security-related decisions of others. This interdependence between information system operators and users Information security has traditionally been considered a strategic cat-and-mouse game between the defending

  7. Constructivist Approach To Information Security Awareness In The Middle East

    E-Print Network [OSTI]

    Wang, Yongge

    Constructivist Approach To Information Security Awareness In The Middle East Mohammed Boujettif the application of an approach to en- hance information security awareness amongst employees within middle- eastern companies, in effort to improve information security. We aim at surveying the current attitudes

  8. Information Security and Computer Systems: An Integrated Approach

    E-Print Network [OSTI]

    Holliday, Mark A.

    Information Security and Computer Systems: An Integrated Approach Mark A. Holliday Dept curriculum we are developing an Information Security option. Our approach highlights the many topics in information security that build upon concepts the students will already have seen in their computer systems

  9. SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS

    E-Print Network [OSTI]

    Williamson, John

    SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS Maryam Al-Awadi University This paper will explore and identify success factors related to the implementation of information security was to identify those factors required to ensure successful implementation of information security, particularly

  10. Federal Register Notice: National Nuclear Security Administration Site-Wide

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy Chinaof EnergyImpactOnSTATEMENT OF DAVIDThe dataFederal RegisterU.S.Environmental

  11. Federal Business Opportunities website | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazelPennsylvania:57427°, -89.4742177° Show Map LoadingFayston,Federal

  12. Federal Loan Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazelPennsylvania:57427°, -89.4742177° Show MapSubsidiesGuidelines |Federal

  13. Federal Highway Administration | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV JumpFederal Highway Administration Jump to:

  14. Federated Wind Farm | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV JumpFederal Highway Administration JumpRegisterWind

  15. Secure Information Sharing and Dissemination in the Context of Public Security

    E-Print Network [OSTI]

    Secure Information Sharing and Dissemination in the Context of Public Security Professor Nabil R. Adam Director, The Center for Information Management Integration & Connectivity (CIMIC) Executive://cimic.rutgers.edu/~adam/ Abstract In the context of homeland security, one of the key challenges in such environment is achieving

  16. Find It. Delete It. Protect It. Information Technology Security Strategy

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Find It. Delete It. Protect It. Information Technology Security Strategy Executive Summary The general proposed strategy is to optimize risk management for information security incrementally and over that security will be a process rather than project. Achievement of the goal, optimized risk management

  17. ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY

    E-Print Network [OSTI]

    ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY ARCHITECTURE TO PROVIDE INFORMATION SECURITY AND PRIVACY Shirley Radack, Editor Computer Security Division protected. Better management of electronic health information will depend upon its secure exchange between

  18. Modern Quantum Technologies of Information Security

    E-Print Network [OSTI]

    Korchenko, Oleksandr; Gnatyuk, Sergiy

    2010-01-01T23:59:59.000Z

    In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

  19. THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS

    E-Print Network [OSTI]

    THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

  20. Nevada National Security Site Cleanup Information Is Just a Click...

    Office of Environmental Management (EM)

    National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public Nevada National...

  1. ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION AND INFORMATION SYSTEM VIEW Shirley Radack, Editor Computer Security Division Information Technology Laboratory. Managing information security risk is an essential element of the organization's overall risk management

  2. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01T23:59:59.000Z

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  3. Bounds on Information and the Security of Quantum Cryptography

    E-Print Network [OSTI]

    E. Biahm; T. Mor

    1997-01-08T23:59:59.000Z

    Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed states, and we find bounds on the information leaked to an eavesdropper. Our result suggests that quantum cryptography is ultimately secure.

  4. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  5. Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf

    E-Print Network [OSTI]

    Xia, Yu "Brandon"

    1 Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf Information properly and securely. Reason for Policy / Implication Statement Boston University is committed to collecting, handling, storing and using Sensitive Information properly and securely. This Policy establishes

  6. CMAD IV 11/14/96 Information Security

    E-Print Network [OSTI]

    California at Davis, University of

    utilities, power pools, vendors etc.. #12;CMAD IV 11/14/96 #12; #12; GridCo LineCo PoolCo Energy Merchant INFO INFO INFO $ $ $ PWR PWR PWR #12;CMAD IV 11/14/96 "Future" Is At Hand · Federal Energy Regulatory protection and audit practices inadequate. · Internal priorities limiting attention to security concerns

  7. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  8. The systems approach to airport security: The FAA (Federal Aviation Administration)/BWI (Baltimore-Washington International) Airport demonstration project

    SciTech Connect (OSTI)

    Caskey, D.L.; Olascoaga, M.T.

    1990-01-01T23:59:59.000Z

    Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will be completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).

  9. CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT

    E-Print Network [OSTI]

    CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute) security, and the assurance of the confidentiality, integrity, and availability of information

  10. Information Technology Security Training Requirements Appendix E --Training Cross Reference E-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX E Appendix E -- Training Cross Reference E-1 #12;Information Technology Security Training Requirements Appendix E -- Training Cross Reference E-2 #12;Information Technology Security Training Requirements APPENDIX E -- JOB FUNCTION

  11. Washington and Lee University Guidelines for Responding to Information Security Breaches

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidelines for Responding to Information Security Breaches Notifications 1. As further detailed in the university's Guidelines for Reporting Information Security Breaches regarding an actual or suspected data breach should contact: i. the university's Information Security

  12. J. Douglas Streit, Information Security Officer Office of Computing and Communications Services

    E-Print Network [OSTI]

    J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated February 6, 2012 Old Dominion University Information Technology Security Program #12;J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated

  13. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  14. Office of the CISO, February 2011 Information Security and Privacy Risk Advisory

    E-Print Network [OSTI]

    Queitsch, Christine

    Office of the CISO, February 2011 Information Security and Privacy Risk Advisory Phishing Phishing's trust in traditional landline communication. The Office of the Chief Information Security Officer (CISO

  15. Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code: CS3190

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code for and the underlying principles of information security. By introducing students to key information security concepts to the administration, design, development, evaluation and management of secure information systems. Module Learning

  16. USING SECURITY ATTACK SCENARIOS TO ANALYSE SECURITY DURING INFORMATION SYSTEMS DESIGN

    E-Print Network [OSTI]

    is a development methodology tailored to describe both the organisational environment of a system and the system of a soft goal is "the system should be scalable". A task represents a way of doing something. ThusUSING SECURITY ATTACK SCENARIOS TO ANALYSE SECURITY DURING INFORMATION SYSTEMS DESIGN Haralambos

  17. ISM6328 -Boca Raton Campus-Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT

    E-Print Network [OSTI]

    Richman, Fred

    ISM6328 - Boca Raton Campus- Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT FALL 2011 security. Emphasis is on the management of information security efforts as well as progression in adopting, regularity and policy aspects of Information Security Management. We will examine security management

  18. Ninth Annual Cyber and Information Security Research Conference...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ninth Annual Cyber and Information Security Research Conference Apr 08 2014 04-08-2014 08:30 AM - 04-10-2014 04:00 PM Multiple speakers, multiple disciplines, multiple affiliations...

  19. Information Security Framework for Small and Medium Sized Businesses

    E-Print Network [OSTI]

    Michnick, Steven M.

    2009-06-17T23:59:59.000Z

    Information security issues are a challenge to everyone who uses computers. The rise of the personal computer as a common business tool and the Internet as a common means of business communication and commerce have also created an environment...

  20. Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY

    E-Print Network [OSTI]

    Code of Practice for Information Security Management (ISO/IEC 27002:2005) The international standard Electrotechnical Commission (IEC) A global organization that develops and publishes standards, the private sector, consumer groups, professional associations, and others. International Organization

  1. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19T23:59:59.000Z

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  2. Recommended Security Controls for Federal Information Systems and Organizations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Radiation ProtectionRaisingRecentMechanisms Introduction1NIST 800-53

  3. Stay protected when connected Visit security.duke.edu for more information.

    E-Print Network [OSTI]

    McShea, Daniel W.

    Stay protected when connected Visit security.duke.edu for more information. Follow these guidelines Visit security.duke.edu for more information. Follow these tips for securing mobile devices: iOS 6/software/. Windows Mac Another free option: Microsoft Security Essentials: http://windows.microsoft.com/en- US/windows/products/security

  4. Security Forms and Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015ParentsMiddle|Security Enforcement Documents Security EnforcementNew

  5. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  6. Information theoretic security by the laws of classical physics

    E-Print Network [OSTI]

    Mingesz, R; Gingl, Z; Granqvist, C G; Wen, H; Peper, F; Eubank, T; Schmera, G

    2013-01-01T23:59:59.000Z

    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.

  7. Mutual information, bit error rate and security in Wójcik's scheme

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-21T23:59:59.000Z

    In this paper the correct calculations of the mutual information of the whole transmission, the quantum bit error rate (QBER) are presented. Mistakes of the general conclusions relative to the mutual information, the quantum bit error rate (QBER) and the security in W\\'{o}jcik's paper [Phys. Rev. Lett. {\\bf 90}, 157901(2003)] have been pointed out.

  8. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    SciTech Connect (OSTI)

    Koker, Denise; Micheau, Jill M.

    2006-07-01T23:59:59.000Z

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  9. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)

    E-Print Network [OSTI]

    Proceedings of the Third International Symposium on Human Aspects of Information Security the scope of remediation, is a pervasive feature of Information Technology Security Management (ITSM of Information Security & Assurance (HAISA 2009) 120 which is security incident response. We extend those results

  10. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act of 2002 3 Security Management and Assistance Group (SMA) 4 FISMA Implementation Project 4 Publications

  11. Information flow for secure distributed applications

    E-Print Network [OSTI]

    Cheng, Winnie Wing-Yee

    2009-01-01T23:59:59.000Z

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  12. Information Flow for Secure Distributed Applications

    E-Print Network [OSTI]

    Cheng, Winnie Wing-Yee

    2009-08-27T23:59:59.000Z

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  13. Area Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWPAlumni AlumniFederal FacilityAprilAre Earths Rare? Perhaps

  14. Membership Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining the StockpileNational NuclearMembership

  15. Farmland Security Zone | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazelPennsylvania: EnergyExolisFairway,Farmers MutualFarmland Security

  16. Information for the NIH Extramural Grantee Community During the Lapse of Federal Government Funding

    E-Print Network [OSTI]

    Kroll, Kristen L.

    Information for the NIH Extramural Grantee Community During the Lapse of Federal Government Funding and a Notice in the NIH Guide Page 1 of 4NOT-OD-13-126: Information for the NIH Extramural Grantee Community

  17. Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code: CS4520

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code and understanding of the need for and the underlying principles of information security. The module will enable MSc students to take an active role in the design, planning, evaluation and management of secure information

  18. The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute at The Johns Hopkins University (JHUISI) is planning for substantial multi-year growth in the area of

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute of Information Security and Cryptography. Our administration is committed at the highest level to substantially: Applicants in Information Security would also be associated with: · The Information Security Institute

  19. Information Security Analysis Using Game Theory and Simulation

    SciTech Connect (OSTI)

    Schlicher, Bob G [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

  20. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    9 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation In Ubiquitous Environments Mohamed Aymen Chalouf1 make the concerned communications vulnerable to security attacks because of the open medium on which

  1. A Uniform Type Structure for Secure Information KOHEI HONDA

    E-Print Network [OSTI]

    Gay, Simon

    A Uniform Type Structure for Secure Information Flow KOHEI HONDA Queen Mary, University of London . . . . . . . . . . . . . . . . . 13 Author's address: K. Honda, Department of Computer Science, Queen Mary, University of London, Mile, Vol. TBD, No. TDB, Month Year, Pages 1--83. #12; 2 · Kohei Honda and Nobuko Yoshida 2.5 Linear

  2. A Uniform Type Structure for Secure Information KOHEI HONDA

    E-Print Network [OSTI]

    Honda, Kohei

    A Uniform Type Structure for Secure Information Flow KOHEI HONDA Queen Mary, University of London . . . . . . . . . . . . . . . . . 13 Author's address: K. Honda, Department of Computer Science, Queen Mary, University of London, Mile. TBD, No. TDB, Month Year, Pages 1­83. #12;2 · Kohei Honda and Nobuko Yoshida 2.5 Linear/Affine Typing

  3. Roadmap: Computer Science Information Security -Bachelor of Science

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Computer Science ­ Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012­2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

  4. Finance, IT Operations& InformationSecurity Dear Colleagues,

    E-Print Network [OSTI]

    Finance, IT Operations& InformationSecurity Dear Colleagues, Compliance and customer service. Strategic planning and attention to day-to-day operations. Some of our activities during the past quarter awareness, and responding to incidents. Thank you to everyone who has completed a survey or provided

  5. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23T23:59:59.000Z

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Cancels DOE 5639.8.

  6. Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Downing, Timothy R.; Fangman, Patricia M.; Homer, Brian J.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Millard, W. David; Stoops, Lamar R.; Wood, Blanche M.

    1999-03-05T23:59:59.000Z

    Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.6

  7. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01T23:59:59.000Z

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  8. Stateful UML Design with Security Constraints for Information Assurance The design of software applications using UML embodies

    E-Print Network [OSTI]

    Demurjian, Steven A.

    Stateful UML Design with Security Constraints for Information Assurance Abstract The design design state containing security constraints and insures that information assurance with respect. Keywords: RBAC, MAC, UML, access control, information assurance, secure software design. 1. Introduction

  9. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity Date Version Author Comments

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management Information Security Policy 2004 09/2008 D01 Duncan Woodhouse Adaption and consolidation of best practices Registrar for Information Security, Risk Management and Business Continuity 2 University of Warwick

  10. Secure quantum private information retrieval using phase-encoded queries

    E-Print Network [OSTI]

    Olejnik, L

    2011-01-01T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries {[}Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that...

  11. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  12. Information Technology Security Training Requirements Appendix A --Learning Continuum A-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX A Appendix A -- Learning Continuum A-1 #12;Information Technology Security Training Requirements Appendix A -- Learning Continuum A-2 #12;Information Technology Security Training Requirements APPENDIX A -- LEARNING CONTINUUM T R A I N I N G E D U

  13. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series FISMA AND TECHNOLOGY 5 FISMA Strategic Vision We are building a solid foundation of information security across one of the largest information technology infrastructures in the world based on comprehensive security standards

  14. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1 York Road Towson, MD 21252 USA The Maryland Alliance for Information Security Assurance (MAISA universities. We work collaboratively to provide opportunities in Information Security Assurance curriculum

  15. MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

    E-Print Network [OSTI]

    MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology an impact on the security of the systems and operations. In developing information systems, organizations

  16. Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts

    E-Print Network [OSTI]

    Queitsch, Christine

    Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts Page 1 of 16 Document Name: Information Security and Privacy Laws Version #: vF Created By: Ann Nagel, Associate Chief Information Security Officer Date Created: June 2, 2009 Updated By: Melissa Albin-Wurzer, Education

  17. A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng

    E-Print Network [OSTI]

    Zheng, Yuliang

    A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage,chandag,yuliangg@fcit.monash.edu.au Abstract Information security is based on access control models and cryptographic techniques of comprehensive information security within organizations. There is a need to study upper level issues

  18. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    Review your system access with your company's Information Security Officer. Access and downloading of information from laptop computers. Beware that your conversations may not be private or secure to be someone you trust in order to obtain personal or sensitive information. Additional travel security tips

  19. A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp

    E-Print Network [OSTI]

    Bushman, Frederic

    Page 1 I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy OfficerNet) as well as the establishment of information security policies, guidelines, and standards. The Office

  20. University of Connecticut / Jason Pufahl, CISSP, CISM 1 INFORMATION SECURITY STRATEGIC

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 #12;University of Connecticut / Jason Pufahl, CISSP, CISM 2 2 MISSION STATEMENT The mission of the Information Security Office (ISO) is to design

  1. Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.

    E-Print Network [OSTI]

    Lee, Ruby B.

    Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr. Computer Science in one crisis and adversaries in another, raising difficult security issues with respect to information on the information sharing and security risks when coalitions are formed in response to a crisis. This paper defines

  2. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica HighSTARTOperationsInformation | National

  3. Vendor Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrincetonUsing Maps1 - USAFof EnergyVendor Information Vendor

  4. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.5

    SciTech Connect (OSTI)

    Bower, John C. (BATTELLE (PACIFIC NW LAB)); Burnett, Robert A. (BATTELLE (PACIFIC NW LAB)); Carter, Richard J. (BATTELLE (PACIFIC NW LAB)); Downing, Timothy R. (BATTELLE (PACIFIC NW LAB)); Homer, Brian J. (BATTELLE (PACIFIC NW LAB)); Holter, Nancy A. (BATTELLE (PACIFIC NW LAB)); Johnson, Daniel M. (BATTELLE (PACIFIC NW LAB)); Johnson, Ranata L. (BATTELLE (PACIFIC NW LAB)); Johnson, Sharon M. (BATTELLE (PACIFIC NW LAB)); Loveall, Robert M. (BATTELLE (PACIFIC NW LAB)); Ramos Jr., Juan (BATTELLE (PACIFIC NW LAB)); Schulze, Stacy A. (BATTELLE (PACIFIC NW LAB)); Sivaraman, Chitra (BATTELLE (PACIFIC NW LAB)); Stephan, Alex J. (BATTELLE (PACIFIC NW LAB)); Stoops, Lamar R. (BATTELLE (PACIFIC NW LAB)); Wood, Blanche M. (BATTELLE (PACIFIC NW LAB))

    2001-12-01T23:59:59.000Z

    The Federal Emergency Management System (FEMIS) is an emergency management planning and response tool. The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

  5. FOIA 10CFR, Code of Federal Regulations for the Freedom of Information Act

    Office of Energy Efficiency and Renewable Energy (EERE)

    FOIA 10CFR, Code of Federal Regulations (CFR) for the Freedom of Information Act is 10 CFR 1004, as posted on the U.S. Department of Energy website.

  6. 2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID#: ____________________

    E-Print Network [OSTI]

    Mountziaris, T. J.

    2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID YYYY My correct Social Security Number is: ________ - _____ - _________ B. SIGNATURE- For corrections to date of birth. · Signed Social Security card or passport- For corrections to social security

  7. Information Technology Specialist (System Analysis/Information Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will provide the technical direction, planning, programming, implementation and operations of the Information Technology (IT) program for the Carlsbad Field...

  8. Published in IET Information Security Received on 10th December 2009

    E-Print Network [OSTI]

    Ansari, Nirwan

    Published in IET Information Security Received on 10th December 2009 Revised on 19th March 2010 doi: 10.1049/iet-ifs.2009.0261 Special Issue on Multi-Agent & Distributed Information Security ISSN 1751-8709 Survey of security services on group communications P. Sakarindr N. Ansari Advanced Networking Laboratory

  9. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1: it is bad code. This perspective on computer security education informs the design of our new approach, computer security education is often relegated to a secondary role in undergraduate curricula. Exposure

  10. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Ray, Indrakshi

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how}@cs.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  11. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  12. A Virtual Environment for Interactive Visualization of Power System Economic and Security Information

    E-Print Network [OSTI]

    visualization of power system economic and security information. Keywords: Power System Economics, SecurityA Virtual Environment for Interactive Visualization of Power System Economic and Security Information Thomas J. Overbye Raymond P. Klump Jamie D. Weber Senior Member Member Student Member University

  13. UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY

    E-Print Network [OSTI]

    Adali, Tulay

    UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

  14. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F.; Carroll, J.; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30T23:59:59.000Z

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  15. Algorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security

    E-Print Network [OSTI]

    Khisti, Ashish, 1979-

    2009-01-01T23:59:59.000Z

    As modern infrastructure systems become increasingly more complex, we are faced with many new challenges in the area of information security. In this thesis we examine some approaches to security based on ideas from ...

  16. Voluntary Disclosure and Information Asymmetry: Evidence from the 2005 Securities Offering Reform

    E-Print Network [OSTI]

    SHROFF, NEMIT

    In 2005, the Securities and Exchange Commission enacted the Securities Offering Reform (Reform), which relaxes “gun-jumping” restrictions, thereby allowing firms to more freely disclose information before equity offerings. ...

  17. Proceedings of the 7 th World Conference on Information Security Education 910 June 2011, Lucerne, Switzerland

    E-Print Network [OSTI]

    Bishop, Matt

    Proceedings of the 7 th World Conference on Information Security Education 9­10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1­933510­94­3 © IFIP TC11.8 97 moment. Thus, the notion of security varies

  18. Proceedings of the 7th World Conference on Information Security Education

    E-Print Network [OSTI]

    Bishop, Matt

    Proceedings of the 7th World Conference on Information Security Education 9-10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1-933510-94-3 © IFIP TC11.8 97 moment. Thus, the notion of security varies

  19. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect (OSTI)

    Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

    2011-08-15T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  20. GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport inEnergy0.pdfTechnologies ProgramOutfittedof6ExecutiveOfficethe Chairman,

  1. How information resources are used by federal agencies in risk assessment application: Rapporteur summary

    SciTech Connect (OSTI)

    Fenner-Crisp, P. [Environmental Protection Agency, Washington, DC (United States)

    1990-12-31T23:59:59.000Z

    The application of information available for risk assessment from the federal perspective is described. Different federal agencies conduct varying degrees of hazard evaluation, and some also generate empirical data. The role of the Agency for Toxic Substances and Disease Registry in hazard assessments of potential public health impacts of Superfund sites includes identification of the 275 most significant substances. ATSDR is responsible for preparing toxicological profiles. ATSDR also identifies data gaps and needs critical to adequately assessing human health impacts.

  2. CCC Federal License and Permit List | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainable andBucoda,BurkeNebraska: EnergyByronTechnologies IncCBCCC Federal

  3. Category:Federal Oil and Gas Statutes | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovation inOpen EnergyCallawayCaparaAcademic InstitutionsEditsourceFederal

  4. Category:Regulatory Roadmap Federal Sections | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:Power LPInformationCashtonGo Back toFL"projectsORsourceFederal

  5. RAPID/BulkTransmission/Environment/Federal | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I GeothermalPotentialBiopowerSolidGenerationMethod JumpGeorgia: EnergyOnline PermittingAirColorado <Federal

  6. Federal Register - Document Drafting Handbook | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV JumpFederal Highway Administration Jump

  7. Information System Security Manager (ISSM) | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe RankingReformManager (ISSM) Information System Security

  8. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContractElectron-State HybridizationSecurity / Emergency Public Information

  9. automated federal information: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Technologies and Information Sciences Websites Summary: , 2012) This annual report, submitted as a memorandum from the Inspector General to the NASA Administrator,...

  10. Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information prepared by the Office of Security and Public

    E-Print Network [OSTI]

    Collins, Gary S.

    of Security and Public Safety. Information prepared by the Office of Security and Public Safety at WSU Spokane and Security Department Information 3 Reporting, Access and Programs 3-5 Policies and Procedures 6Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office

  11. A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS

    E-Print Network [OSTI]

    Baras, John S.

    A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS several information security goals, such as authentication, integrity and secrecy, have often been and the Institute for Systems Research, University of Maryland, College Park, MD, 20742 ABSTRACT Most information

  12. 6/17/13 (v1.2) Information Security Exit Process

    E-Print Network [OSTI]

    Kay, Mark A.

    6/17/13 (v1.2) Information Security Exit Process All Stanford related PHI, and other Restricted and Prohibited information (see http://dataclass.stanford.edu for details) must be securely may be held liable in the future. Once the applicable Stanford information has been removed

  13. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17T23:59:59.000Z

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12. Cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13.

  14. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V. [NSTec

    2014-05-30T23:59:59.000Z

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  15. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

  16. Security in the Telecommunications Information Networking Architecture --the CrySTINA Approach \\Lambda

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Security in the Telecommunications Information Networking Architecture -- the CrySTINA Approach results of the CrySTINA project. We analyze and structure the security problem domain in the TINA­C architecture and present our approach to pro­ vide the necessary security functionality in the form of self

  17. ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION

    E-Print Network [OSTI]

    Lazos, Loukas

    ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast

  18. SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01T23:59:59.000Z

    SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of threats note of the data security issues covered in these publications. Ask yourself "Is my business vulnerable network with your peers, talk about cyber security issues. Give and get advice, hints, tips, etc. 4. Make

  19. 29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources ­ Portable Devices: Information Security Approved of its established security realm (e.g., authentication mechanism, firewall, or encryption). Information

  20. Worker Protection Program for DOE (Including the National Nuclear Security Administration) Federal Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-17T23:59:59.000Z

    The Order establishes the framework for an effective worker protection program that will reduce or prevent injuries, illnesses, and accidental losses by providing DOE and NNSA Federal workers with a safe and healthful workplace. Chg 1 dated 8-21-12, cancels DOE M 440.1-1A. Admin Chg 1, dated 3-14-13, cancels DOE O 440.1B Chg 1.

  1. RAPID/Solar/Environment/Federal | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I GeothermalPotentialBiopowerSolidGenerationMethodInformatione

  2. Form:Federal Environmental Statute | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489Information HydroFontana,dataset name below to add

  3. Form:Federal Oil and Gas Statute | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489Information HydroFontana,dataset name below to addOil and Gas

  4. Federal University of Sao Carlos | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJumpGerman AerospaceEfficiencyInformation Hydropower

  5. Federal Cave Protection Act of 1988 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV Jump to:FASFMI-HDFREDJumpInformation

  6. Efficient Private Information Retrieval Using Secure Xiangyao Yu, Christopher W. Fletcher

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    attention from the cryptography and security communities. Two main approaches to solve PIR have appearedEfficient Private Information Retrieval Using Secure Hardware Xiangyao Yu, Christopher W. Fletcher, marten, devadas}@mit.edu ABSTRACT Existing crypto-based Private Information Retrieval (PIR) schemes

  7. Security Awareness Programs During orientation in September, students are informed of services offered by the University

    E-Print Network [OSTI]

    Escher, Christine

    Security Awareness Programs During orientation in September, students are informed of services. Video and slide presentations outline ways to maintain personal safety and residence hall security. Students are told about crime on campus and in surrounding neighborhoods. Similar information is presented

  8. Toward a generic model of security in organizational context: exploring insider threats to information infrastructure.

    SciTech Connect (OSTI)

    Martinez-Moyano, I. J.; Samsa, M. E.; Burke, J. F.; Akcam, B. K.; Decision and Information Sciences; Rockefeller Coll. at the State Univ. of New York at Albany

    2008-01-01T23:59:59.000Z

    This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.

  9. 29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE

    E-Print Network [OSTI]

    29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE 29.01.03.M1 Security of Electronic Information Resources Approved May 27, 2002 Revised May 28, 2009 Revised October 15, report and transmit information. Information Security Awareness Assessment and Compliance (ISAAC

  10. Research With Students My principal research activities lie in information systems security with particular emphasis on access control

    E-Print Network [OSTI]

    of security, and secure transaction processing. My recent research has expanded beyond information systemsResearch With Students My principal research activities lie in information systems security and mining, semantic web and multimedia delivery. 1 Major Results · Security solutions for workflow systems

  11. OMB Guidance to Federal Agencies on Data Availability and Encryption OMB has asked that the following information be provided to Federal agencies

    E-Print Network [OSTI]

    OMB Guidance to Federal Agencies on Data Availability and Encryption OMB has asked to the availability of information needed by the agency to reliably meet its mission. Specifically, without access of their IT operations and agency services. In particular, agencies must address information availability and assurance

  12. INFORMATION SECURITY GROUP Course Specification 2013-14

    E-Print Network [OSTI]

    Mitchell, Chris

    with security mechanisms in modern computer systems and will consider: the core concepts: security policies understanding of the role of security mechanisms for modern computer systems, including both hardware in hardware and operating systems; memory management, memory protection and logical protection; access control

  13. The Security Plan: Effectively Teaching How To Write One

    E-Print Network [OSTI]

    1 The Security Plan: Effectively Teaching How To Write One Paul C. Clark Naval Postgraduate School government requires all federal systems to have a customized security plan. In addition, the National Training Standard for Information Systems Security (INFOSEC) Professionals requires programs that meet

  14. Social Security Administration Information Phone: (706) 542-2900 Fax: (706) 583-0123 Web: international.uga.edu Email: issis@uga.edu

    E-Print Network [OSTI]

    Hall, Daniel

    Social Security Administration Information Phone: (706) 542-2900 Fax: (706) 583-0123 Web and return, you will keep the same number. For additional information you may visit the Social Security with your new Social Security information. #12;

  15. Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)

    E-Print Network [OSTI]

    1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS, Acting Chief, Computer Security Division, Information Technology Laboratory (ITL), NIST 9 Data Using Encryption Matthew Scholl, Computer Security Division, Information Technology Laboratory

  16. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  17. 29.01.03.M1.28 Information Resources Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.28 Information Resources ­ Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.28 Information Resources ­ Security Surveillance Approved April 13, 2010 Revised by the University Police Department #12;29.01.03.M1.28 Information Resources ­ Security Surveillance Page 2 of 4

  18. 29.01.03. M1.18 Information Resources Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.18 Information Resources ­ Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.18 Information Resources ­ Security Monitoring Approved July 18, 2005 Revised April 27, etc. Reason for SAP The purpose of the security monitoring policy is to ensure that information

  19. 29.01.03. M1.19 Information Resources Security Awareness Training Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.19 Information Resources ­ Security Awareness Training Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.19 Information Resources ­ Security Awareness and Training Approved July 18 Administrative Procedure Statement Understanding the importance of information security and individual

  20. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    SciTech Connect (OSTI)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08T23:59:59.000Z

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.

  1. SMB Information Security Seminar (2013) Exercise 2 Estimated costs from bad things happening to your

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01T23:59:59.000Z

    SMB Information Security Seminar (2013) Exercise 2 ­ Estimated costs from bad things happening to your important information. First, think about the information used in/by your organization. Second, enter into the table below your top two highest priority information types. Third, enter estimated costs

  2. February 2008 FEDERAL DESKTOP CORE

    E-Print Network [OSTI]

    Computer Security DivisionComputer Security Division Information Technology LaboratoryInformation their information security and reduce the information technology (IT) costs associated with securing their Windows their information security and reduce the information technology (IT) costs associated with securing their Windows

  3. Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

  4. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard

    E-Print Network [OSTI]

    Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard Stefan Fenz an ontology-based framework to improve the preparation of ISO/IEC 27001 audits, and to strengthen the security elaborate on how ISO/IEC 27001 artifacts can be inte- grated into this ontology. A basic introduction

  5. DOE Encourages Utility Sector Nominations to the Federal Communication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Federal Communications Commission's Communications, Security, Reliability, and Interoperability Council DOE Encourages Utility Sector Nominations to the Federal Communications...

  6. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  7. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

    E-Print Network [OSTI]

    Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

    2010-01-01T23:59:59.000Z

    , and in their personal lives. Both corporations and government have responded by creating a new role in their organizations to lead the safeguarding efforts—chief information security officers (CISOs). The role of these officers is still under development. Do...

  8. Restricting information flow in security APIs via typing 

    E-Print Network [OSTI]

    Keighren, Gavin

    2014-06-27T23:59:59.000Z

    Security APIs are designed to enable the storage and processing of confidential data without that data becoming known to individuals who are not permitted to obtain it, and are central to the operation of Automated Teller ...

  9. GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor

    E-Print Network [OSTI]

    , was written by Karen Scarfone and Murugiah Souppaya of NIST, and by Amanda Cody and Angela Orebaugh of Booz Allen Hamilton. The new guide replaces NIST SP 800-42, Guideline on Network Security Testing. NIST SP

  10. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  11. HR System Access Request Form Security Administration, Human Resources (HR) For additional instructions and information, log onto http://hr.vanderbilt.edu/security/

    E-Print Network [OSTI]

    Simaan, Nabil

    instructions and information, log onto http://hr.vanderbilt.edu/security/ Home Department VUnet IDHR EmployeeHR System Access Request Form Security Administration, Human Resources (HR) For additional ID Name Email AddressWork Phone Home Dept Name Effective Date of Access Operator Information I

  12. A Knowledge Base for Justified Information Security Decision-Making D. Stepanova, S. E. Parkin, A. van Moorsel.

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Information Security Officer (CISO) within an organisation to ensure that such information is adequately protected. External standards exist to advise CISOs on how to secure information, but these are essentially insecure employee behaviour. CISOs require more information than they are currently provided

  13. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.2

    SciTech Connect (OSTI)

    Burford, M.J.; Burnett, R.A.; Curtis, L.M. [and others

    1996-05-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS system package. System administrators, database administrators, and general users can use this guide to install, configure, and maintain the FEMIS client software package. This document provides a description of the FEMIS environment; distribution media; data, communications, and electronic mail servers; user workstations; and system management.

  14. Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security

    E-Print Network [OSTI]

    Kim, Kwangjo

    #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID Issues - ICU 5 Mobile RFID Technology (1/2) RFID readers would become ubiquitous Get easy and quick Mobile RFID Technology (2/2) A mobile phone or any portable device Also behaves as RFID reader

  15. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  16. Delegating Network Security with More Information Stanford University

    E-Print Network [OSTI]

    's networks. Delegation makes administrators less of a bottle- neck when policy needs to be modified and allows network administration to follow organizational lines. To enable del- egation, we propose ident authority, the network administrator, that administrator has usually had to configure myriad security

  17. INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu

    E-Print Network [OSTI]

    Shyy, Wei

    what might be lurking there ready to attack. According to the SANS (SysAdmin, Audit, Network, Security the Internet with an administrator's account, your computer is at an even higher risk since most malicious code is designed to infiltrate your computer by using the total access of the administrator's account against you

  18. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Kolda, Tamara G.

    . Samatova, D. Speck, R. Srikant, J. Thomas, M. Wertheimer, P. C. Wong SANDIA REPORT SAND2004-6648 Unlimited Report of the DHS Workshop on Data Sciences September 22-23, 2004 Jointly released by Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  19. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  20. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3

    SciTech Connect (OSTI)

    Burford, M.J.; Burnett, R.A.; Downing, T.R. [and others

    1996-12-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.

  1. On the Computational Practicality of Private Information Retrieval Network Security and Applied Cryptography Lab

    E-Print Network [OSTI]

    Carbunar, Bogdan

    On the Computational Practicality of Private Information Retrieval Radu Sion Network Security of single-server computational pri- vate information retrieval (PIR) for the purpose of preserv- ing client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real

  2. Security in TINA S. Staamann 1 L. Butty'an 2 U. Wilhelm 1

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Security in TINA S. Staamann 1 L. Butty'an 2 U. Wilhelm 1 Swiss Federal Institute of Technology, and information era. Its characteristics most relevant for security are a variety of services, a multitude and provision, and the assumption of advanced costumer premises equipment. Concepts for its security

  3. Implementing Information Security and Its Technology: A LineManagement Perspective

    SciTech Connect (OSTI)

    Barletta, William A.

    2005-08-22T23:59:59.000Z

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  4. Federal Emergency Management Information System (FEMIS) Bill of Materials (BOM) for FEMIS Version 1.4.7

    SciTech Connect (OSTI)

    Arp, Jonathan A. (BATTELLE (PACIFIC NW LAB)); Downing, Timothy R. (BATTELLE (PACIFIC NW LAB)); Gackle, Philip P. (BATTELLE (PACIFIC NW LAB)); Homer, Brian J. (BATTELLE (PACIFIC NW LAB)); Johnson, Daniel M. (BATTELLE (PACIFIC NW LAB)); Johnson, Ranata L. (BATTELLE (PACIFIC NW LAB)); Johnson, Sharon M. (BATTELLE (PACIFIC NW LAB)); Loveall, Robert M. (BATTELLE (PACIFIC NW LAB)); Millard, W David (BATTELLE (PACIFIC NW LAB)); Stoops, Lamar R. (BATTELLE (PACIFIC NW LAB)); Tzemos, Spyridon (BATTELLE (PACIFIC NW LAB)); Wood, Blanche M. (BATTELLE (PACIFIC NW LAB))

    1999-12-01T23:59:59.000Z

    This document describes the hardware and software required for the Federal Emergency Management Information System version 1.4.7 (FEMIS v1.4.7) released by Pacific Northwest National Laboratory (PNNL). Information included in this document about hardware and software requirements is subject to change.

  5. Comprehensive program and plan for federal energy education, extension, and information activities: Fiscal Year 1981. Fifth report to congress

    SciTech Connect (OSTI)

    Not Available

    1981-12-01T23:59:59.000Z

    The activities conducted solely in Fiscal Year (FY) 1981 in the areas of Federal energy education, extension service, and information dissemination are reported. The broad purpose of the FY 1981 activities addressed has been to inform governmental and private sectors about the methods and technologies to conserve energy and to utilize renewable energy sources. With the increase in awareness on the part of energy users and decisionmakers, as well as additional information sources available from the private sector, the emphasis of the various Federal energy information activities is being focused on reporting results of Federal programs. The course of activities related to conservation and renewable energy information has been one of consolidation, both in terms of programmatic substance and methods. The practical impetus has been the redirection of Federal progrms and related budgetary revisions for FY 1981 and FY 1982. Further, products conveying information on conservation and renewable energy technologies have been examined extensively, pursuant to the Administration's directive in April 1981 on elimination of wasteful spending on periodicals, audiovisuals and similar materials. Efforts in coordination of conservation and renewable energy information activities of the Department of Energy (DOE) as well as other Federal agencies have adjusted to timetables for review and redirection of programs initially planned for FY 1981. Mechanisms to coordinate existing Federal energy information activities employed in previous fiscal years were continued in FY 1981 to the extent applicable under current Administration policy and the above-noted circumstances of redirection. Coordinating actions requiring convening of groups were held in abeyance pending resolution of programmatic issues.

  6. 29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.26 Information Resources ­ Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources ­ Information Security Risk Assessment Reviews system and the value and accuracy of their information security risk assessments. Reason Information

  7. NMMSS Information, Reports & Forms | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining theSan Jose-San|NGSI Safeguards|

  8. TEPS/BPA Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmericaAdministration |SecurityNuclearTHE

  9. Evergreen Securities formerly Ethanol Investments | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazelPennsylvania: Energy Resources(RECP)Coolers Jump to:New York,Securities

  10. EcoSecurities Brasil Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazel Crest, Illinois: EnergyEastport, Maine:EauEcoFactor IncEcoSecurities

  11. Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

  12. FY 2011 Honeywell Federal Manufacturing & Technologies, LLC,...

    National Nuclear Security Administration (NNSA)

    Honeywell Federal Manufacturing & Technologies, LLC, PER Summary | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  13. FY 2009 Honeywell Federal Manufacturing & Technologies, LLC,...

    National Nuclear Security Administration (NNSA)

    Honeywell Federal Manufacturing & Technologies, LLC, PER Summary | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  14. FY 2010 Honeywell Federal Manufacturing & Technologies, LLC,...

    National Nuclear Security Administration (NNSA)

    Honeywell Federal Manufacturing & Technologies, LLC, PER Summary | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  15. FY 2007 Honeywell Federal Manufacturing & Technologies, LLC,...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Honeywell Federal Manufacturing & Technologies, LLC, PER Summary | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  16. FY 2008 Honeywell Federal Manufacturing & Technologies, LLC,...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Honeywell Federal Manufacturing & Technologies, LLC, PER Summary | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  17. FY 2006 Honeywell Federal Manufacturing & Technologies, LLC,...

    National Nuclear Security Administration (NNSA)

    Honeywell Federal Manufacturing & Technologies, LLC, PER Summary | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  18. Secure Program Execution Via Dynamic Information Flow Tracking

    E-Print Network [OSTI]

    Suh, G. Edward

    2003-07-21T23:59:59.000Z

    We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...

  19. Private Information Retrieval, Optimal for Users and Secure Coprocessors

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    @dbis.informatik.hu­berlin.de Abstract. A private information retrieval (PIR) protocol allows a user to retrieve one of N records from a database while hiding the identity of the record from the database server. A PIR protocol is optimal Private Information Retrieval (PIR) protocols. Formally, a PIR protocol allows a user to retrieve one of N

  20. An Information Security Education Initiative for Engineering and Computer Science

    E-Print Network [OSTI]

    or cordless telephones. Elements of the U.S. civilian infrastructure such as the banking system, the electric Department of Electrical and Computer Engineering Syracuse University Syracuse, NY 13224 Cynthia Irvine- being of the nation's information infrastructure 14]. The information infrastructure includes

  1. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  2. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  3. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  4. Reliability and the Federal Energy Regulatory Commission

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers the Federal Energy Regulatory Commission (FERC) strategic plan, the Federal Power Act (FPA), current energy security posture, and more.

  5. Information Security Advisory Committee Report on Committee Activities in 2012-2013 Academic Year

    E-Print Network [OSTI]

    O'Toole, Alice J.

    it is the responsibility of the President and the Chief Information Security Officer (CISO) to ensure that the mandate a list of questions that were posed to the campus CISO on February 22, 2013. Responses to these questions were requested within two weeks. The CISO's responses were received on March 4, 2013. Based on its

  6. University of London International Academy MSc/PG Dip in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    from the criminal angle and presenting a study of computer crime and the computer criminal. We criminals. Pre-requisites None Essential Reading Cybercrime: The transformation of crime in the Information should be able to: follow trends in computer crime relate computer security methodologies to criminal

  7. Cloud Service Security Requirements Questionnaire 1. What Cloud service will you be providing

    E-Print Network [OSTI]

    /docs/Exhibit-G/exhibit-g-definitions-acronyms-green.pdf 3. Has the information system been certified for Federal Information Security Management Act (FISMA for security and quality control? If so, please provide evidence. 5. Has your cloud service been industry have a current Configuration Management Plan? If so, please provide evidence. 7. Do you have a current

  8. Federal Emergency Management Information System (FEMIS). Data Management Guide, FEMIS: Phase 1, Version 1.1u

    SciTech Connect (OSTI)

    Burnett, R.A.; Johnson, D.M.; Johnson, S.M. [and others

    1995-06-01T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the U.S. Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system.

  9. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  10. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Arp, J.A.; Bower, J.C.; Burnett, R.A.; Carter, R.J.; Downing, T.R.; Fangman, P.M.; Gerhardstein, L.H.; Homer, B.J.; Johnson, D.M.; Johnson, R.L.; Johnson, S.M.; Loveall, R.M.; Martin, T.J.; Millard, W.D.; Schulze, S.A.; Stoops, L.R.; Tzemos, S.; Wood, B.M.

    1999-06-29T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.

  11. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.4

    SciTech Connect (OSTI)

    Arp, J.A.; Burnett, R.A.; Downing, T.R. [and others] [and others

    1997-11-21T23:59:59.000Z

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via telecommunications links.

  12. Security-Widefield, Colorado: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro Industries Pvt Ltd JumpInformationScotts Corners, New York:YouInformation 4

  13. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20T23:59:59.000Z

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13.

  14. Worker Safety and Health Program for DOE (Including the National Nuclear Security Administration) Federal and Contractor Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-10-20T23:59:59.000Z

    This document was developed to assist the Department of Energy (DOE or the Department) Federal and contractor employees in effectively developing, managing, and implementing a worker safety and health program. Cancels DOE G 440.1-1A and DOE G 440.1-8. Adm Chg 1, dated 3-22-13, cancels DOE G 440.1-1B.

  15. Federal Emergency Management Information System (FEMIS) system administration guide, version 1.4.5

    SciTech Connect (OSTI)

    Arp, J.A.; Burnett, R.A.; Carter, R.J. [and others

    1998-06-26T23:59:59.000Z

    The Federal Emergency Management Information Systems (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication, data distribution, and notification functionality necessary to operate FEMIS in a networked, client/server environment. The UNIX server provides an Oracle relational database management system (RDBMS) services, ARC/INFO GIS (optional) capabilities, and basic file management services. PNNL developed utilities that reside on the server include the Notification Service, the Command Service that executes the evacuation model, and AutoRecovery. To operate FEMIS, the Application Software must have access to a site specific FEMIS emergency management database. Data that pertains to an individual EOC`s jurisdiction is stored on the EOC`s local server. Information that needs to be accessible to all EOCs is automatically distributed by the FEMIS database to the other EOCs at the site.

  16. Federal Register Notices | Department of Energy

    Office of Environmental Management (EM)

    Information Center Library Federal Register Notices Federal Register Notices May 22, 2015 Electricity Advisory Committee Notice of Open Meeting June 29 and 30, 2015: Federal...

  17. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    James M. Chappell; Derek Abbott

    2012-12-31T23:59:59.000Z

    The idealized Kish-Sethuraman (KS) cipher is theoretically known to offer perfect security through a classical information channel. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a physical realization having benefits in increased security with reduced complexity.

  18. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    Chappell, James M

    2012-01-01T23:59:59.000Z

    The idealized Kish-Sethuraman (KS) cipher is known to offer perfect information theoretical security with classical physical means. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a three and four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a classical physical realization having benefits in increased security with reduced complexity.

  19. Putting Security in Context: Visual Correlation of Network Activity with Real-World Information

    SciTech Connect (OSTI)

    Pike, William A.; Scherrer, Chad; Zabriskie, Sean J.

    2008-06-04T23:59:59.000Z

    To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the analyst’s world knowledge that puts these attributes in context. What known exploits or new vulnerabilities might an anomalous traffic pattern suggest? What organizational, social, or geopolitical events help forecast or explain attacks and anomalies? Few visualization tools support creating, maintaining, and applying this knowledge of the threat landscape. Through a series of formative workshops with practicing security analysts, we have developed a visualization approach inspired by the human process of contextualization; this system, called NUANCE, creates evolving behavioral models of network actors at organizational and regional levels, continuously monitors external textual information sources for themes that indicate security threats, and automatically determines if behavior indicative of those threats is present on a network.

  20. TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27

    E-Print Network [OSTI]

    TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27 29.01.03.V1.01 INFORMATION SECURITY, COMPUTER USE AND SOFTWARE INSTALLATION/USE Approved: May 10.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines

  1. EcoSecurities India Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A Potential MicrohydroDistrictInformationEauEcoMotors Jump

  2. Information System Security Officer (ISSO) | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe RankingReformManager (ISSM) Information System

  3. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  4. An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may partner with the

    E-Print Network [OSTI]

    .S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA scaling

  5. Federal Market Information Technology in the Post Flash Crash Era: Roles for Supercomputing

    SciTech Connect (OSTI)

    Bethel, E. Wes; Leinweber, David; Ruebel, Oliver; Wu, Kesheng

    2011-09-16T23:59:59.000Z

    This paper describes collaborative work between active traders, regulators, economists, and supercomputing researchers to replicate and extend investigations of the Flash Crash and other market anomalies in a National Laboratory HPC environment. Our work suggests that supercomputing tools and methods will be valuable to market regulators in achieving the goal of market safety, stability, and security. Research results using high frequency data and analytics are described, and directions for future development are discussed. Currently the key mechanism for preventing catastrophic market action are “circuit breakers.” We believe a more graduated approach, similar to the “yellow light” approach in motorsports to slow down traffic, might be a better way to achieve the same goal. To enable this objective, we study a number of indicators that could foresee hazards in market conditions and explore options to confirm such predictions. Our tests confirm that Volume Synchronized Probability of Informed Trading (VPIN) and a version of volume Herfindahl-Hirschman Index (HHI) for measuring market fragmentation can indeed give strong signals ahead of the Flash Crash event on May 6 2010. This is a preliminary step toward a full-fledged early-warning system for unusual market conditions.

  6. Federal Facility Reporting and Data

    Broader source: Energy.gov [DOE]

    The Federal Energy Management Program (FEMP) provides information and tools to help agencies report annual energy and water consumption and resource management efforts within Federal facilities.

  7. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

    2010-10-01T23:59:59.000Z

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  8. Int. J. Information and Computer Security, Vol. 4, No. 4, 2011 365 Copyright 2011 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    one of the business process security leitmotifs. It defines a mechanism that bridges the gap between workflow and access control systems. Delegation completion and authorisation enforcement are specified in workflow management systems', Int. J. Information and Computer Security, Vol. 4, No. 4, pp.365

  9. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  10. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  11. FOA for Assisting Federal Facilities with Energy Conservation Technologies Informational Webinar

    Broader source: Energy.gov [DOE]

    This webinar will highlight the funding opportunity announcement (FOA) that was issued on March 6, 2015. The AFFECT grant will provide funding for renewable energy projects at federal facilities...

  12. EISA Section 432: Federal Facility Management and Benchmarking Requirements

    Broader source: Energy.gov [DOE]

    The Federal Energy Management Program is responsible for tracking Federal agency progress toward meeting Section 432 of the Energy Independence and Security Act of 2007.

  13. Correct mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme on ping-pong protocol

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-16T23:59:59.000Z

    The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected.

  14. 54432 Federal Register / Vol. 76, No. 170 / Thursday, September 1, 2011 / Notices the contact information above by 5 p.m.

    E-Print Network [OSTI]

    .ohanlon@trade.gov or to the Renewable Energy and Energy Efficiency Advisory Committee, Office of Energy and Environmental Technologies and other Federal agencies to take this opportunity to comment on proposed and/or continuing information54432 Federal Register / Vol. 76, No. 170 / Thursday, September 1, 2011 / Notices the contact

  15. This report is a part of the College's efforts to provide you with information on security procedures, services, and resources available on

    E-Print Network [OSTI]

    's efforts to provide you with information on security procedures, services, and resources available on our and General Counsel. This report will provide you with information on safety and security in complianceAnnual Security and Fire Safety Report BARNARD COLLEGE 2013 This report is a part of the College

  16. Security of quantum bit string commitment depends on the information measure

    E-Print Network [OSTI]

    Harry Buhrman; Matthias Christandl; Patrick Hayden; Hoi-Kwong Lo; Stephanie Wehner

    2006-11-09T23:59:59.000Z

    Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classical and the quantum world. However, when committing to a string of n bits at once, how far can we stretch the quantum limits? In this letter, we introduce a framework of quantum schemes where Alice commits a string of n bits to Bob, in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are two-fold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a+b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we construct schemes where a=4 log n+O(1) and b=4, which is impossible classically. Our findings significantly extend known no-go results for quantum bit commitment.

  17. A Method for Estimating the Financial Impact of Cyber Information Security Breaches Utilizing the Common Vulnerability Scoring System and Annual Loss Expectancy

    E-Print Network [OSTI]

    Lindsey, Michael B.

    2010-05-14T23:59:59.000Z

    Information security is relatively new field that is experiencing rapid growth in terms of malicious attack frequency and the amount of capital that firms must spend on attack defense. This rise in security expenditures has prompted corporate...

  18. Privacy & Security Notice | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy...

  19. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect (OSTI)

    Farnham, Irene; Marutzky, Sam

    2014-12-01T23:59:59.000Z

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  20. Federal Employee Training Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-11T23:59:59.000Z

    This Manual provides detailed requirements to supplement DOE O 360.1B, FEDERAL EMPLOYEE TRAINING. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Cancels DOE M 360.1A-1. Canceled by DOE O 360.1C.

  1. Federal Employee Training Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-09-21T23:59:59.000Z

    This Manual provides detailed requirements to supplement DOE O 360.1A, Federal Employee Training, dated 9-21-99. The information in this Manual is intended to assist in improving Federal workforce performance under Department of Energy (DOE) managed Federal employee training. Canceled by DOE M 360.1-1B.

  2. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  3. 71895Federal Register / Vol. 67, No. 232 / Tuesday, December 3, 2002 / Rules and Regulations For information regarding proper

    E-Print Network [OSTI]

    ; by adding Westbrook, Channel 272A. Federal Communications Commission. John A. Karousos, Assistant Chief71895Federal Register / Vol. 67, No. 232 / Tuesday, December 3, 2002 / Rules and Regulations

  4. Management of Control System Information SecurityI: Control System Patch Management

    SciTech Connect (OSTI)

    Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

    2011-09-01T23:59:59.000Z

    The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

  5. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  6. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation

    E-Print Network [OSTI]

    number 428/11), Cabarnit Cyber Security MAGNET Consortium, Grant from the Institute for Future Defense;1 Introduction Secure multi-party computation (MPC) is a powerful concept in secure distributed computing Theoretically Secure Multi-Party Computation (Preliminary Report) Shlomi Dolev1 and Niv Gilboa2 and Ximing Li1 1

  7. University of London International Academy MSc/PG Dip in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    a computing system secure. This process starts with defining the proper security requirements, which system level. In order to understand these security controls we need to describe some background material systems will be examined as well as security related issues of computer architecture. Specific well

  8. Federal Land Policy and Management Act of 1976 | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV JumpFederal Highway Administration Jump to:6 Jump to:

  9. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  10. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  11. Purdue Homeland Security J. Eric Dietz, PhD, PE

    E-Print Network [OSTI]

    Ginzel, Matthew

    · Establishing a Homeland Security career development pipeline · Developing business security processes ­ Class project developing principles for managing large event security applications ­ Lectures ­ Class project with Purdue Federal Credit Union and Verizon ­ Business Continuity and security · Homeland

  12. Information-theoretic security proof for quantum-key-distribution protocols

    SciTech Connect (OSTI)

    Renner, Renato [Computer Science Department, ETH Zuerich, CH-8092 Zurich (Switzerland); Gisin, Nicolas; Kraus, Barbara [Group of Applied Physics, University of Geneva, CH-1211 Geneva 4 (Switzerland)

    2005-07-15T23:59:59.000Z

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  13. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  14. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  15. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Arp, Jonathan A.; Bower, John C.; Burnett, Robert A.; Carter, Richard J.; Downing, Timothy R.; Fangman, Patricia M.; Gerhardstein, Lawrence H.; Homer, Brian J.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Loveall, Robert M.; Martin, Tonya J.; Millard, W. David; Schulze, Stacy A.; Stoops, Lamar R.; Tzemos, Spyridon; Wood, Blanche M.

    1999-06-24T23:59:59.000Z

    The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

  16. Federal Emergency Management Information System (FEMIS) System Administration Guide Version 1.5.3

    SciTech Connect (OSTI)

    Burnett, Robert A.; Carter, Richard J.; Downing, Timothy R.; Homer, Brian J.; Holter, Nancy A.; Johnson, Daniel M.; Johnson, Ranata L.; Johnson, Sharon M.; Loveall, Robert M.; Schulze, Stacy A.; Sivaraman, Chitra; Stephan, Alex J.; Stoops, LaMar R.; Wood, Blanche M.

    2002-11-20T23:59:59.000Z

    The FEMIS System Administration Guide provides information on FEMIS System Administrator activities as well as the utilities that are included with FEMIS.

  17. The Oak Ridge Technical Information Center: A trailblazer in federal documentation

    SciTech Connect (OSTI)

    Vaden, W.M.

    1992-01-01T23:59:59.000Z

    This document attempts to record the history of US AEC`s Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this document, with 18 chapters arranged into four sections according to different presidential administrations.

  18. The Oak Ridge Technical Information Center: A trailblazer in federal documentation

    SciTech Connect (OSTI)

    Vaden, W.M.

    1992-01-01T23:59:59.000Z

    This softbound book attempts to record the history of US AEC's Technical Information Center, from its conception (1947) to 1977. This organization centralizes and manages the issues related to control and dissemination of technical information, to fulfill the provisions of the Atomic Energy Act of 1946. TIC tried to search out and install efficient and economical systems for servicing the various technical information programs. It coordinated a direct organization-to-organization information exchange program, and it also participated in official bilateral exchange programs and in developing information systems for IAEA and Euratom. The work, planning, and strategies employed to achieve goals are chronicled in this book, whose 18 chapters are arranged into four sections according to different presidential administrations.

  19. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity University of Warwick Statement on the Regulation of Investigatory Powers

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity 1 University of Warwick Statement on the Regulation of Investigatory Powers Act 2000: E Powers (RIP) Act as outlined below. The RIP Act statement is part of the strategic Information Security

  20. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  1. All information-theoretically secure key establishing protocols are quantum protocols

    E-Print Network [OSTI]

    Mario Stipcevic

    2005-03-26T23:59:59.000Z

    A theorem is proved which states that no classical key generating protocol could ever be provably secure. Consequently, candidates for provably secure protocols must rely on some quantum effect. Theorem relies on the fact that BB84 Quantum key distribution protocol has been proven secure.

  2. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  3. Federal Government Energy Management Conservation Programs Reports...

    Office of Environmental Management (EM)

    Policy Act (NECPA, Pub. L. No. 95-619), as amended, and provide information on energy consumption in Federal buildings, operations, and vehicles. Compiled by the Federal...

  4. Activities to Secure Control Systems in the Energy Sector | Department...

    Office of Environmental Management (EM)

    Activities to Secure Control Systems in the Energy Sector Activities to Secure Control Systems in the Energy Sector Presentation-given at the Federal Utility Partnership Working...

  5. TSO-1002 - In the Matter of Personnel Security Hearing | Department...

    Broader source: Energy.gov (indexed) [DOE]

    the Matter of Personnel Security Hearing The individual held a security clearance from 1990 until 2002 while working for government contractors and the federal government. In...

  6. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30T23:59:59.000Z

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  7. U.S. Patent Pending, Information Security Analysis Using Game Theory and Simulation, U.S. Patent Application No.: 14/097,840

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Schlicher, Bob G [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Vulnerability in security of an information system is quantitatively predicted. The information system may receive malicious actions against its security and may receive corrective actions for restoring the security. A game oriented agent based model is constructed in a simulator application. The game ABM model represents security activity in the information system. The game ABM model has two opposing participants including an attacker and a defender, probabilistic game rules and allowable game states. A specified number of simulations are run and a probabilistic number of the plurality of allowable game states are reached in each simulation run. The probability of reaching a specified game state is unknown prior to running each simulation. Data generated during the game states is collected to determine a probability of one or more aspects of security in the information system.

  8. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  9. File:08-FD-a - FederalTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealandORCEncroachment.pdf07ORDExpeditedPlantCommissioningProcess.pdf Jump8 -Information 8-CA-d -8-FD-a -

  10. Filing Information: April 2009, IDC #217829, Volume: 1 Secure Content and Threat Management Products: Vendor Profile

    E-Print Network [OSTI]

    of major vendors, such as IBM, can expect to thrive and diversify their portfolio within this market's security solutions portfolio, which already includes a broad range of solutions spanning a variety solutions into the Tivoli portfolio and introduced an all- in-one low-cost security appliance for small

  11. An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Request for Information

    E-Print Network [OSTI]

    .S. Department of Energy's NNSA ASM-SUB Request for Information Los Alamos National Laboratory Field Instruments by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA General Tasks On

  12. Energy Security Planning for Sustainable Buildings

    Broader source: Energy.gov [DOE]

    For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to...

  13. NNSA Awards Contract for Largest Federal Wind Farm to Siemens...

    National Nuclear Security Administration (NNSA)

    Contract for Largest Federal Wind Farm to Siemens Government Technologies, Inc. | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

  14. Federal Energy Management Program Procedure for Notifying Congress...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Energy Management Program's Procedure for Notifying Congress Prior to Award of Energy Savings Performance Contracts (ESPCs) Although the Energy Independence and Security...

  15. INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment

    SciTech Connect (OSTI)

    None

    2009-05-01T23:59:59.000Z

    The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

  16. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  17. Embedding Security Policies into a Distributed Computing Environment

    E-Print Network [OSTI]

    Kühnhauser, Winfried

    : security policy, multipolicy system, information domain, policy domain, custodian, policy sep- arationD information systems must support information processing under multiple security policies of any complexity information support information processing among users with di erent security attributes employing resources

  18. Secure Operation, Control and Maintenance of Future E-enabled Airplanes

    E-Print Network [OSTI]

    Hochberg, Michael

    -fold increase in airspace capacity. In the USA, the Federal Aviation Administration (FAA) is collaborating, Seattle, WA 98195, USA Abstract--Commercial aviation is at the threshold of the era of the e to the onboard aviation information systems and impede their operation. The emerging security threats

  19. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  20. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  1. Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    is expanding at a rapid rate to enable communication using emerging standards, the software architecture. A medical emergency or disaster preparedness agency imposes relaxed privacy requirements during emergency by the smart grid in the context of cyber-security ­ the real time nature of data and the large scale at which

  2. Post war federal reserve policy

    E-Print Network [OSTI]

    Modrow, William Geoffery

    1953-01-01T23:59:59.000Z

    Direct and Guaranteed 1 p 4 ~ ~ ~ 1 ~ ~ ~ ~ ~ ~ ~ ~ 0 ~ ~ 51 Principal Policy actions of Federal Reserve S3f'stems lg'+i 0 i ~ ~ ~ ~ 0 ~ ~ 4 ~ ~ 0 ~ t ~ ~ ~ ~ XX, Sember Sank Reserves and Determinants& 194S-1949 ~ ~ 69 XXX, Yields on United States... a consequence of such action the amount oi' money in the economy ?as determined by the holders of Govern ment securities, Reasures taken by the Federal Reserve to contract bank credit were largely offset by Federal Reserve purchases of Government...

  3. Meetings of the Federal Utility Partnership Working Group

    Broader source: Energy.gov [DOE]

    The Federal Utility Partnership Working Group (FUPWG) meets twice per year to share success stories, information on Federal Energy Management Program activities and other business.

  4. POLICY FLASH 2015-21 - Federal Acquisition Circulars (FACs) 2005...

    Energy Savers [EERE]

    SUMMARY: Attached for your information is a brief summary of Federal Acquisition Regulation (FAR) amendments, published in the December 15, 2014 Federal Register at 79 FR...

  5. Utility Security & Resiliency: Working Together

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

  6. The Intersection of National Security and Climate Change

    SciTech Connect (OSTI)

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.; Sandusky, Jessica A.

    2014-07-29T23:59:59.000Z

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  7. 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13...

    Energy Savers [EERE]

    HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED...

  8. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  9. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  11. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01T23:59:59.000Z

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  12. FEMP (Federal Energy Management Program) Update, Spring 1989

    SciTech Connect (OSTI)

    Not Available

    1989-04-01T23:59:59.000Z

    The FEMP Update, published quarterly by the Federal Energy Management Program (FEMP), provides information that will assist federal managers in their energy management responsibilities. The Update is distributed primarily to federal facility and energy management personnel.

  13. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  14. Teaching in computer security and privacy The Computer Laboratory's undergraduate and masters programmes

    E-Print Network [OSTI]

    Crowcroft, Jon

    computing security · Economics of cybercrime · Economics of information security · Formal methods · Hardware security · Location and positioning systems · Malware analysis · Medical information security · MobileTeaching in computer security and privacy The Computer Laboratory's undergraduate and masters

  15. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  16. Improving National and Homeland Security through a proposed Laboratory for Information Globalization and Harmonization Technologies (LIGHT)

    E-Print Network [OSTI]

    Choucri, Nazli

    2004-11-30T23:59:59.000Z

    A recent National Research Council study found that: "Although there are many private and public databases that contain information potentially relevant to counter terrorism programs, they lack the ...

  17. Evaluation of the Impact of EISA Federal Project Investments

    SciTech Connect (OSTI)

    Judd, Kathleen S.; Wendel, Emily M.; Morris, Scott L.; Williamson, Jennifer L.; Halverson, Mark A.; Livingston, Olga V.; Loper, Susan A.

    2012-12-31T23:59:59.000Z

    The DOE's Federal Energy Management Program has been charged by Office of Management and Budget to conduct an evaluation on actual and verifiable energy savings and carbon emissions reductions from federal energy management investments made across the Federal government as a result of the Energy Independence and Security Act of 2007. This study presents the findings from that evaluation.

  18. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  19. FINANCIAL INFORMATION SERVICES WWEEBB QQUUIICCKK TTIIPPSSOCTOBER 2006

    E-Print Network [OSTI]

    FINANCIAL INFORMATION SERVICES WWEEBB QQUUIICCKK TTIIPPSSOCTOBER 2006 Security to Web Applications How do I obtain security access to... Financial Information Library (FIL) Security is different for each Information Extract. To find security requirements, click on Details next to the Information

  20. Presidential Documents Federal Register

    E-Print Network [OSTI]

    Presidential Documents 3821 Federal Register Vol. 76, No. 14 Friday, January 21, 2011 Title 3, 1993. As stated in that Executive Order and to the extent permitted by law, each agency must, among, such as user fees or marketable permits, or providing information upon which choices can be made by the public

  1. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  2. Context Interchange Mediation for Semantic Interoperability and Dynamic Integration of Autonomous Information Sources in the Fixed Income Securities Industry

    E-Print Network [OSTI]

    Siegel, Michael

    2003-02-10T23:59:59.000Z

    We examine semantic interoperability problems in the fixed income securities industry and propose a knowledge representation architecture for context interchange ...

  3. Design and Implementation of a Hypervisor-Based Platform for Dynamic Information Flow Tracking in a Distributed Environment

    E-Print Network [OSTI]

    Ermolinskiy, Andrey

    2011-01-01T23:59:59.000Z

    desktop security. Information Security Tech. Report, 11(4):hypervisor-driven information security archi- tecture forPIFT) is a novel information security architecture that

  4. SOCIAL SECURITY NUMBER AND NAME VERIFICATION

    E-Print Network [OSTI]

    Amin, S. Massoud

    SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2014­2015 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2014­2015 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

  5. SOCIAL SECURITY NUMBER AND NAME VERIFICATION

    E-Print Network [OSTI]

    Amin, S. Massoud

    SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2013­2014 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2013­2014 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

  6. Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order with ROTC 1, Revision No. 0

    SciTech Connect (OSTI)

    Lynn Kidman

    2008-02-01T23:59:59.000Z

    Many Federal Facility Agreement and Consent Order (FFACO) Use Restrictions (URs) have been established at various corrective action sites (CASs) as part of FFACO corrective actions (FFACO, 1996; as amended January 2007). Since the signing of the FFACO in 1996, practices and procedures relating to the implementation of risk-based corrective action (RBCA) have evolved. This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: 1. Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria 2. Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria. 3. Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria.

  7. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31T23:59:59.000Z

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  8. International Journal of Information Security manuscript No. (will be inserted by the editor)

    E-Print Network [OSTI]

    Ding, Xuhua

    Ding · Yanjiang Yang · Robert H. Deng · Shuhong Wang A New Hardware-assisted PIR with O(n) Shuffle Cost information re- trieval (PIR) was first formalized by Chor et. al, various constructions have been proposed on practical PIR schemes. In this paper, we propose a hardware-assisted PIR scheme with a novel shuffle

  9. Secure Group-based Information Sharing in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Wang, Yu

    efforts such as joint intrusion detection. As an example, Phoenix Joint Terrorism Task Forces have information. Therefore, in an integrated ad hoc network, group-based data access must be controlled through. First, even with Elliptic Curve Cryptography, symmetric encryption still has its unique advantages

  10. The Evolution of the Federal Monitoring and Assessment Center

    SciTech Connect (OSTI)

    NSTec Aerial Measurement System

    2012-07-31T23:59:59.000Z

    The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal emergency response asset whose assistance may be requested by the Department of Homeland Security (DHS), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Nuclear Regulatory Commission (NRC), and state and local agencies to respond to a nuclear or radiological incident. It is an interagency organization with representation from the Department of Energy’s National Nuclear Security Administration (DOE/NNSA), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Department of Health and Human Services (HHS), the Federal Bureau of Investigation (FBI), and other federal agencies. FRMAC, in its present form, was created in 1987 when the radiological support mission was assigned to the DOE’s Nevada Operations Office by DOE Headquarters. The FRMAC asset, including its predecessor entities, was created, grew, and evolved to function as a response to radiological incidents. Radiological emergency response exercises showed the need for a coordinated approach to managing federal emergency monitoring and assessment activities. The mission of FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment activities during a nuclear or radiological incident within the United States in support of state,local, tribal governments, DHS, and the federal coordinating agency. Radiological emergency response professionals with the DOE’s national laboratories support the Radiological Assistance Program (RAP), National Atmospheric Release Advisory Center (NARAC), the Aerial MeasuringSystem (AMS), and the Radiation Emergency Assistance Center/Training Site (REAC/TS). These teams support the FRMAC to provide: ? Atmospheric transport modeling ? Radiation monitoring ? Radiological analysis and data assessments ? Medical advice for radiation injuries In support of field operations, the FRMAC provides geographic information systems, communications, mechanical, electrical, logistics, and administrative support. The size of the FRMAC is tailored to the incident and is comprised of emergency response professionals drawn from across the federal government. State and local emergency response teams may also integrate their operations with FRMAC, but are not required to.

  11. 6 Enterprise information risk management: Dealing with cloud computing

    E-Print Network [OSTI]

    Pym, David J.

    6 Enterprise information risk management: Dealing with cloud computing Adrian Baldwin HP Labs for the enterprise risk and security management lifecycle. Specifically, the economies of scale that large providers federated assurance for the cloud. 6.1 Introduction Managing IT risks remains a significant challenge

  12. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  13. Take Action Now: Empower a Secure Energy Future 2

    Broader source: Energy.gov [DOE]

    Document features a Federal Energy Management Program (FEMP) template for creating a Take Action Now: Empower a Secure Energy Future 2 handout.

  14. Take Action Now: Empower a Secure Energy Future

    Broader source: Energy.gov [DOE]

    Document features a Federal Energy Management Program (FEMP) template for creating a Take Action Now: Empower a Secure Energy Future campaign handout.

  15. Securities Law Issues Relating to Community Solar Projects

    Broader source: Energy.gov [DOE]

    The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

  16. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  17. Information retrieval system: impacts of water-level changes on uses of federal storage reservoirs of the Columbia River.

    SciTech Connect (OSTI)

    Fickeisen, D.H.; Cowley, P.J.; Neitzel, D.A.; Simmons, M.A.

    1982-09-01T23:59:59.000Z

    A project undertaken to provide the Bonneville Power Administration (BPA) with information needed to conduct environmental assessments and meet requirements of the National Environmental Policy Act (NEPA) and the Pacific Northwest Electric Power Planning and Conservation Act (Regional Act) is described. Access to information on environmental effects would help BPA fulfill its responsibilities to coordinate power generation on the Columbia River system, protect uses of the river system (e.g., irrigation, recreation, navigation), and enhance fish and wildlife production. Staff members at BPA identified the need to compile and index information resources that would help answer environmental impact questions. A computer retrieval system that would provide ready access to the information was envisioned. This project was supported by BPA to provide an initial step toward a compilation of environmental impact information. Scientists at Pacific Northwest Laboratory (PNL) identified, gathered, and evaluated information related to environmental effects of water level on uses of five study reservoirs and developed and implemented and environmental data retrieval system, which provides for automated storage and retrieval of annotated citations to published and unpublished information. The data retrieval system is operating on BPA's computer facility and includes the reservoir water-level environmental data. This project was divided into several tasks, some of which were conducted simultaneously to meet project deadlines. The tasks were to identify uses of the five study reservoirs, compile and evaluate reservoir information, develop a data entry and retrieval system, identify and analyze research needs, and document the data retrieval system and train users. Additional details of the project are described in several appendixes.

  18. Watermarking Security Part One: Theory Francois Cayrea, Caroline Fontaineb, and Teddy Furona

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    's mutual information and Fisher's information matrix) can measure this leakage of information. The security atermarking, Security, Equivocation, Fisher information matrix. 1. INTRODUCTION Digital watermarking studies information security) despite its robustness. However, they only deal with dedicated attacks relevant

  19. Federal Buildings Supplemental Survey 1993

    SciTech Connect (OSTI)

    NONE

    1995-11-01T23:59:59.000Z

    The Energy Information Administration (EIA) of the US Department of Energy (DOE) is mandated by Congress to be the agency that collects, analyzes, and disseminates impartial, comprehensive data about energy including the volume consumed, its customers, and the purposes for which it is used. The Federal Buildings Supplemental Survey (FBSS) was conducted by EIA in conjunction with DOE`s Office of Federal Energy Management Programs (OFEMP) to gain a better understanding of how Federal buildings use energy. This report presents the data from 881 completed telephone interviews with Federal buildings in three Federal regions. These buildings were systematically selected using OFEMP`s specifications; therefore, these data do not statistically represent all Federal buildings in the country. The purpose of the FBSS was threefold: (1) to understand the characteristics of Federal buildings and their energy use; (2) to provide a baseline in these three Federal regions to measure future energy use in Federal buildings as required in EPACT; and (3) to compare building characteristics and energy use with the data collected in the CBECS.

  20. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  1. Cool Roof Resource Guide for Federal Agencies (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2009-07-01T23:59:59.000Z

    Resource guide containing information and links for the evaluation and installation of cool roofs within the Federal Government

  2. 3593Federal Register / Vol. 79, No. 14 / Wednesday, January 22, 2014 / Notices to read and prepare the information. No

    E-Print Network [OSTI]

    Rau, Don C.

    Poverty Guidelines AGENCY: Department of Health and Human Services. ACTION: Notice. SUMMARY: This notice provides an update of the Department of Health and Human Services (HHS) poverty guidelines to account that is responsible for that program. For information about poverty figures for immigration forms, the Hill

  3. Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking

    E-Print Network [OSTI]

    Vahlenkamp, Matthias Wählisch Thomas C Schmidt Markus

    2012-01-01T23:59:59.000Z

    Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

  4. John. F. O'Leary Appointed to Lead Federal Energy Administration...

    National Nuclear Security Administration (NNSA)

    John. F. O'Leary Appointed to Lead Federal Energy Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  5. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  6. M.. Uyar, A.Y. Duale, and M.A. Fecko (Eds.): TestCom 2006, LNCS 3964, pp. 103 117, 2006. IFIP International Federation for Information Processing 2006

    E-Print Network [OSTI]

    Kim, Yong Jung

    International Federation for Information Processing 2006 Generating Test Cases for Web Services Using Extended}@icu.ac.kr Abstract. Web services utilize a standard communication infrastructure such as XML and SOAP to communicate through the Internet. Even though Web ser- vices are becoming more and more widespread as an emerging

  7. The U.S. Department of Energy, National Nuclear Security Agency's Use of Geographic Information Systems for Nuclear Emergency Response Support

    SciTech Connect (OSTI)

    A. L. Guber

    2001-06-01T23:59:59.000Z

    The U.S, Department of Energy (DOE), National Nuclear Security Agency's (NNSA) Remote Sensing Laboratory (RSL) provides Geographic Information System (GIS) support during nuclear emergency response activities. As directed by the NNSA, the RSL GIS staff maintains databases and equipment for rapid field deployment during an emergency response. When on location, GIS operators provide information products to on-site emergency managers as well as to emergency managers at the DOE Headquarters (HQ) Emergency Operations Center (EOC) in Washington, D.C. Data products are derived from multiple information sources in the field including radiological prediction models, field measurements taken on the ground and from the air, and pertinent information researched on the Internet. The GIS functions as a central data hub where it supplies the information to response elements in the field, as well as to headquarters officials at HQ during emergency response activities.

  8. A Formal model to aid documenting and harmonizing of information

    E-Print Network [OSTI]

    Zheng, Yuliang

    A Formal model to aid documenting and harmonizing of information security requirements Jussipekka Information security development, harmonization of information security, organizational modeling 1 INTRODUCTION A formal top down model to harmonize and document information security requirements shall

  9. TRANSFER AGREEMENT SCHOOL OF INFORMATION STUDIES AT UNIVERSITY OF WISCONSIN

    E-Print Network [OSTI]

    Saldin, Dilano

    CERTIFICATES: 1) Computer Information Security 2) Multimedia for the Web 3) Web Programming SCHOOL RATIONALE: Computer Information Security Advanced Technical Certificate: The Computer Information Security the Computer Information Security, Multimedia for the Web, and/or Web Programming advanced technical

  10. Federal Employment | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHall A This photo showsEmployment | National

  11. federal budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 |0/%2A0/%2A en6/%2A en2/%2A

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  13. Federal Trade Commission Necesita Crdito o Seguro?

    E-Print Network [OSTI]

    Comisión Federal de Comercio (Federal Trade Commission, FTC), la agencia nacional de protección del sus cuentas, es recolecta- da de su informe de crédito. A través de programas estadísticos, los a tiempo y en forma. Algunas compañías de seguros también usan la información en los informes de crédito

  14. Reimbursable Work for Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-02-28T23:59:59.000Z

    To authorize a modified process for the acceptance, performance, and administration of work from the Department of Homeland Security (DHS) by Department of Energy (DOE) contractor and federally operated laboratories, sites, and other facilities.

  15. Partnering with Utilities for Energy Efficiency & Security

    Broader source: Energy.gov [DOE]

    Presentation covers partnering with utilities for energy efficiency and security and presenting it at the Federal Utility Partnership Working Group (FUPWG) meeting, held on November 18-19, 2009.

  16. Energy Citations Database (ECD) - Security/Disclaimer

    Office of Scientific and Technical Information (OSTI)

    Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

  17. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  18. Federal Energy Management Program Contacts | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Contact information is available for Federal Energy Management Program (FEMP) leadership and staff members. The program is directed by Dr. Timothy Unruh. General Information...

  19. Federal Register

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers New Training on Energy6 Federal Energy1999; Exceeds Goal |of65541 Vol. 79,

  20. Federal Register

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic Plan| Department of.pdf6-OPAMDepartment6Awards »Facilities |Federal29853 Vol.

  1. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby/%2AO 474.2Y-12 Press989 Federal Register

  2. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby/%2AO 474.2Y-12 Press989 Federal

  3. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby/%2AO 474.2Y-12 Press989 Federal49

  4. Federal Register

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby/%2AO 474.2Y-12 Press989 Federal4954

  5. Federated search

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget » FYU.S. DOE Office of SciencedefaultFederated

  6. AT&T Consulting Security Services for Mergers and Acquisitions

    E-Print Network [OSTI]

    Fisher, Kathleen

    . This presents an increasing risk for the security of personally identifiable information entrusted the combined strengths and create a larger economic value. While doing so, overlooking information security Espionage · Misuse of Information · Theft, Fraud Security in the M&A Process Information Security needs

  7. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    Reporting Criteria (Tables III-3 & III-4) ...9 * Classified Information Security Noncompliance Reporting Criteria (Table III- 5) ...12 *...

  8. New Mexico Federal Executive Board awards NNSA Supervisory Contract...

    National Nuclear Security Administration (NNSA)

    instrumental to meeting various NNSA missions through acquiring and managing information technology, engineering, research and development, security, environmental, maintenance,...

  9. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  10. Facilitating Sound, Cost-Effective Federal Energy Management (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-03-01T23:59:59.000Z

    This fact sheet is an overview of the U.S. Department of Energy's Federal Energy Management Program (FEMP). The Federal Government, as the nation's largest energy consumer, has a tremendous opportunity and acknowledged responsibility to lead by example. The U.S. Department of Energy's (DOE's) Federal Energy Management Program (FEMP) plays a critical role in this effort. FEMP facilitates the Federal Government's implementation of sound, cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. FEMP does this by focusing on the needs of its Federal customers, delivering an array of services across a variety of program areas.

  11. Developmental Integrative BiologyCyber Security UNT is recognized by the National Security Agency and the Department of

    E-Print Network [OSTI]

    Tarau, Paul

    security. Information and computer security, trust and information assurance, systems architecture to identify and address a range of changing information sources and security vulnerabilities. UNT brings experts to address next generation challenges. The UNT-based Center for Information and Computer Security

  12. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  13. A Software Engineering Perspective for Services Security

    E-Print Network [OSTI]

    Han, Jun

    A Software Engineering Perspective for Services Security Jun Han School of Information Technology. We have seen much work in the traditional area of information and network security, focusing such as encryption algo- rithms and key exchange protocols has been the main topic of the information security

  14. Ordering Copies of PITAC Reports This report is published by the National Coordination Office for Information

    E-Print Network [OSTI]

    Anderson, Richard

    effects. Thus, it is a prime target for cyber terrorism as well as criminal acts. The IT infrastructure of Federally developed cutting-edge cyber security technologies to the private sector. · Strengthen it under the Networking and Information Technology Research and Development (NITRD) Program. These actions

  15. Is security a lost cause? Chris J Mitchell

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Is security a lost cause? Chris J Mitchell c.mitchell@rhul.ac.uk Information Security Group Royal security, namely: (a) what do current technological trends mean for future information security, and (b) what effect do conflicts between security/privacy requirements and economic and technological pressures

  16. Publication and Protection of Sensitive Site Information in a Grid Infrastructure

    E-Print Network [OSTI]

    Cholia, Shreyas

    2008-01-01T23:59:59.000Z

    privacy and security of sensitive information. an analysisspecific problem. Security incident information is perhapsprovide more information to the OSG GOC and security team,

  17. Dynamic Information Flow Analysis for JavaScript in a Web Browser

    E-Print Network [OSTI]

    Austin, Thomas Howard

    2013-01-01T23:59:59.000Z

    languages for information security. PhD thesis, CornellInternational Journal of Information Security, 2009. [36]Workshop on Information and System Security, 2008. [35

  18. Let The People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    Acting Director of the Information Security Oversight OfficeActing Director, Information Security Oversight Office,Chemical Safety Information, Site Security and Fuels

  19. Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies

    E-Print Network [OSTI]

    Fleming, Charles

    2013-01-01T23:59:59.000Z

    Information SecurityACM Transactions on Information Security, 2011. [25] D. E.network. Of course, information security policies ap- ply to

  20. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  1. FEDERAL EMERGENCY MANAGEMENT AGENCY ARE YOU READY? 83

    E-Print Network [OSTI]

    Tullos, Desiree

    FEDERAL EMERGENCY MANAGEMENT AGENCY ARE YOU READY? 83 National Security Emergencies I n addition uncomfortable or if something does not seem right. #12;84 ARE YOU READY? FEDERAL EMERGENCY MANAGEMENT AGENCY 4- rupted--electricity, telephone, natural gas, gasoline pumps, cash registers, ATM machines, and internet

  2. Federal Utility Partnership Working Group Spring 2009 Meeting Welcome

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—covers the Federal Energy Management Program (FEMP) mission and services; Energy Independence and Security Act (EISA) Section 432 guidance; and American Reinvestment and Recovery Act (ARRA).

  3. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  4. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Energy Savers [EERE]

    include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive unclassified information,...

  5. Sales of Fossil Fuels Produced from Federal and Indian Lands...

    Gasoline and Diesel Fuel Update (EIA)

    on Indian lands. Offshore federal only includes areas in federal waters. Source: U.S. Energy Information Administration based on U.S. Department of the Interior, Office of Natural...

  6. Introducing Abuse Frames for Analysing Security Requirements Luncheng Lin Bashar Nuseibeh Darrel Ince Michael Jackson Jonathan Moffett

    E-Print Network [OSTI]

    Nuseibeh, Bashar

    a focus for early security threat analysis. Traditional information security development methods haveIntroducing Abuse Frames for Analysing Security Requirements Luncheng Lin Bashar Nuseibeh Darrel using Jackson's Problem Frames to analyse security problems in order to determine security

  7. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  8. Presented to: Federal Aviation

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    Aviation Administration 2 Briefing Agenda · Federal Aviation Administration (FAA) Overview · Chicago Federal Aviation Administration 5 FAA relationship with Airport Sponsors · Regulatory ­ airport Federal Aviation Administration 8 FAA involvement with the O'Hare Modernization Program · Special Projects

  9. Presented to: Federal Aviation

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    Administration 2 Briefing Agenda · Federal Aviation Administration (FAA) Overview · Chicago/Chicago Department of Aviation (CDA) and the O'Hare Modernization Program (OMP) · Federal Aviation Administration (FAA) actions Federal Aviation Administration 5 FAA relationship with Airport Sponsors · Regulatory ­ airport

  10. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the U.S. Department of Energy. Quarter ending September 30, 1996

    SciTech Connect (OSTI)

    Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-10-01T23:59:59.000Z

    The paper describes tasks undertaken in each of the following areas: Safeguards technology program (STP); Safeguards and material accountability (SMA); Computer security, distributed systems; Complex-wide access control system (CWAC); and Standardization of security systems (SSS). The STP develops advanced, nondestructive analysis technology for measurement of special nuclear materials. Work focuses on R and D relating to X- and gamma-ray spectrometry and to development of computer codes for interpreting the spectral data obtained by these techniques. The SMA is concerned with four areas: insider protection; material accountability; planning and evaluation; and information security. The Computer Security Technology Center provides expertise and solutions to the many information security problems present in today`s computer systems and networks. Incidents of intrusions, computer viruses, the purposeful replacement of legitimate software for illegal purposes, and similar acts are being addressed by the creation of security software, the delivery of incident response expertise, and research and development into secure systems. The purpose of the CWAC is to develop an approach that will allow visitors to use their DOE standard badge in access control systems throughout the DOE complex. The purpose of the SSS project is to support the standardization of security systems to meet DOE orders and requirements, and to support the DOE in offering relevant security technology and capabilities to Federal standardization efforts.

  11. Estimating the Effects of Climate Change on Federal Hydropower and Power Marketing

    SciTech Connect (OSTI)

    Sale, Michael J [ORNL; Kao, Shih-Chieh [ORNL; Uria Martinez, Rocio [ORNL; Wei, Yaxing [ORNL

    2011-01-01T23:59:59.000Z

    The U.S. Department of Energy is currently preparing an assessment of the effects of climate change on federal hydropower, as directed by Congress in Section 9505 of the Secure Water Act of 2009 (P.L. 111-11). This paper describes the assessment approach being used in a Report to Congress currently being prepared by Oak Ridge National Laboratory. The 9505 assessment will examine climate change effects on water available for hydropower operations and the future power supplies marketed from federal hydropower projects. It will also include recommendations from the Power Marketing Administrations (PMAs) on potential changes in operation or contracting practices that could address these effects and risks of climate change. Potential adaption and mitigation strategies will also be identified. Federal hydropower comprises approximately half of the U.S. hydropower portfolio. The results from the 9505 assessment will promote better understanding among federal dam owners/operators of the sensitivity of their facilities to water availability, and it will provide a basis for planning future actions that will enable adaptation to climate variability and change. The end-users of information are Congressional members, their staff, the PMAs and their customers, federal dam owners/operators, and the DOE Water Power Program.

  12. advancing nuclear security: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    private information within the system Paris-Sud XI, Universit de 183 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

  13. Federal Express | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEurope BV Jump

  14. New Account Information page

    E-Print Network [OSTI]

    Information for new account holders ... for faculty, staff and students; Secure Purdue, including security news and tips and antivirus software downloads.

  15. 2011 WSU SPOKANE ANNUAL Security/Fire Safety

    E-Print Network [OSTI]

    Collins, Gary S.

    Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information Information and Preparation of Statistics 1 Director's Letter 2 Mission Statement and Security Department INFORMATION The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (also

  16. 2012 WSU SPOKANE ANNUAL Security/Fire Safety

    E-Print Network [OSTI]

    Collins, Gary S.

    Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information Information and Preparation of Statistics 1 Director's Letter 2 Mission Statement and Security Department INFORMATION The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (also

  17. Measuring the Economic Impacts of Federal Investments in Research

    SciTech Connect (OSTI)

    Olson, S; Merrill, S

    2011-08-31T23:59:59.000Z

    Measuring the Economic Impacts of Federal Investments in Research evaluates approaches to measuring the returns on federal research investments. This report identifies new methodologies and metrics that can be developed and used for assessing returns on research across a wide range of fields (biomedical, information technology, energy, agriculture, environment, and other biological and physical sciences, etc.), while using one or more background papers that review current methodologies as a starting point for the discussion. It focuses on tools that are able to exploit available data in the relatively near term rather than on methodologies that may require substantial new data collection. Over the last several years, there has been a growing interest in policy circles in identifying the payoffs from federal agency research investments, especially in terms of economic growth, competitiveness, and jobs. The extraordinary increase in research expenditures under the American Recovery and Reinvestment Act (ARRA) of 2009 and the President�������¢����������������s commitment to science and technology (S&T) funding increases going forward have heightened the need for measuring the impacts of research investments. Without a credible analysis of their outcomes, the recent and proposed increases in S&T funding may not be sustained, especially given competing claims for federal funding and pressures to reduce projected federal budget deficits. Motivated by these needs and requirements, Measuring the Economic Impacts of Federal Investments in Research reviews and discusses the use of quantitative and qualitative data to evaluate the returns on federal research and development (R&D) investments. Despite the job-focused mandate of the current ARRA reporting requirements, the impact of S&T funding extend well beyond employment. For instance, federal funding in energy research may lead to innovations that would reduce energy costs at the household level, energy imports at the national level, and greenhouse gas emissions at the global level. In principle, these benefits can be measured as a return on research investments, with appropriate consideration of time lags to research outcomes and attribution to private as well as public expenditure. With appropriate metrics, the same could be true for benefits to public health, environmental quality, and food productivity and security. Federal funding of research leads to the development of human capital that is deployed in a variety of occupations with economic and social impacts. Research also produces information that is used in formal (e.g., regulatory and judicial) and informal (e.g., firm and consumer) decision making processes. In addition to reviewing the range of work (by academics, consultants, and research agencies themselves) that has been done in measuring research outcomes and providing a forum to discuss their methods, this report also considers the different methodologies used across fields of research (e.g., agriculture and energy research) to identifies which are applicable to a range of federal S&T funding.

  18. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  19. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  20. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04T23:59:59.000Z

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.