Powered by Deep Web Technologies
Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

2

Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security  

Science Journals Connector (OSTI)

The cyber attack risks are threatening the smart grid security. Malicious worm could spread from meter to ... ) has thus developed several iterations of cyber security standards. According to the NERC cyber stand...

Yong Wang; Da Ruan; Jianping Xu; Mi Wen; Liwen Deng

2010-01-01T23:59:59.000Z

3

CyberPhysical System Security for the Electric Power Grid  

E-Print Network [OSTI]

INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally­physical systems (CPS); cyber security; electric grid; smart grid; supervisory control and data acquisi- tion

Manimaran, Govindarasu

4

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Broader source: Energy.gov (indexed) [DOE]

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

5

On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem  

E-Print Network [OSTI]

1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

Johansson, Karl Henrik

6

Cyber security in the Smart Grid: Survey and challenges  

Science Journals Connector (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the silent features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we present a comprehensive survey of cyber security issues for the Smart Grid. Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid. We aim to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security.

Wenye Wang; Zhuo Lu

2013-01-01T23:59:59.000Z

7

GridStat Cyber Security and Regional Deployment Project Report  

SciTech Connect (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

8

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

9

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

10

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

11

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid  

E-Print Network [OSTI]

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa stability in the smart grid in the face of cyber-physical attack. We model the smart grid as a networked the proposed framework. I. INTRODUCTION It is well known that the smart grid promises increased reliability

Kundur, Deepa

12

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer  

E-Print Network [OSTI]

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer Dept security challenges for a fu- ture power grid. It highlights deficiencies and shortcom- ings of existing and fault resilience of power as a utility must be a prime objective for power grids. Security compromises

Mueller, Frank

13

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

14

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

15

Survey Paper Cyber security in the Smart Grid: Survey and challenges q  

E-Print Network [OSTI]

), and renewable energy resources (e.g., solar and hydro) [2]. Therefore, the National Institute of StandardsSurvey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu importantly, with the integration of advanced computing and communication technologies, the Smart Grid

Wang, Wenye

16

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network [OSTI]

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

17

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

18

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

19

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

20

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

22

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

23

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

24

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems  

Science Journals Connector (OSTI)

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack ... Keywords: cyber-physical, cyber-security, experimental research, overlay network, smart grid, testbed

Ryan Goodfellow; Robert Braden; Terry Benzel; David E. Bakken

2013-01-01T23:59:59.000Z

25

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

26

Sandia National Laboratories: Cyber Security for Electric Infrastructu...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

advancements in phasor measurement units (PMUs), distributed energy resources (DER), smart-grid technologies, and cloud computing services represent significant cyber security...

27

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

28

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

29

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

30

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

31

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

32

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

33

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network [OSTI]

curity mechanisms, it benefits smart grid communications inin the smart grid offers significant benefits over wired,

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

34

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Broader source: Energy.gov (indexed) [DOE]

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

35

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network [OSTI]

intrinsic issues. First, the power grid is losing control tochanges. The existing power grid was not designed to connectmodel, making the existing power grid more intelligent and

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

36

Cyber-security analysis in smart grid SCADA systems: A game theoretic approach.  

E-Print Network [OSTI]

??Power grid systems deliver electricity from suppliers that generate the power to be transmitted through grids of interconnected networks and distributed to customers. Smart grids (more)

Rudrapattana, Sudeeptha Ranganath 1989-

2013-01-01T23:59:59.000Z

37

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

38

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

39

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Broader source: Energy.gov (indexed) [DOE]

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

40

CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS .  

E-Print Network [OSTI]

??Cyber intrusions into substations of a power grid are a source of vulnerability since most substations are unmanned and with limited protection of the cyber (more)

[No author

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Office of Environmental Management (EM)

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

42

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

43

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

44

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

45

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

46

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

47

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical  

Broader source: Energy.gov (indexed) [DOE]

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of sustainable energy systems. The second webinar, Cyber-Physical Systems Security for the Smart Grid, will be held on Fecruary 7, 2012 by Manimaran Govindarasu, Professor if Electrical and Computer Engineering at Iowa State University. Govindarasu_PSERC_Webinar_Feb_2012.pdf More Documents & Publications April 2012 PSERC Webinars on Issues in Designing the Future Grid

48

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

49

Cyber Security Standards.PDF  

Broader source: Energy.gov (indexed) [DOE]

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

50

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

51

Cyber Security Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

52

Architecture-driven smart grid security management  

Science Journals Connector (OSTI)

The introduction of smart grids goes along with an extensive use of ICT technologies in order to support the integration of renewable energy sources. However, the use of ICT technologies bears risks in terms of cyber security attacks which could negatively ... Keywords: risks, security, security management, smart grid

Markus Kammerstetter; Lucie Langer; Florian Skopik; Wolfgang Kastner

2014-06-01T23:59:59.000Z

53

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network [OSTI]

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security in Engineering, ACE-CS immerses students in the cyber-security discipline through a combination of intense in Engineering on Cyber Security (ACE-CS) [1] is to develop the next generation of cyber-security leaders

Older, Susan

54

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

55

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

56

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

57

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

58

Strengthening Cyber Security  

Broader source: Energy.gov (indexed) [DOE]

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

59

Security and Cyber Guidance | Department of Energy  

Office of Environmental Management (EM)

April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Performance Testing Guidance & Information Composite Adversary Team Brochure - April 9, 2008...

60

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

62

INL Cyber Security Research (2008) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

INL Cyber Security Research (2008) INL Cyber Security Research (2008) Cybersecurity research at INL will help protect critical infrastructure control system computers against worms...

63

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA Cybersecurity Program Manager (CSPM...

64

Report of the Cyber Security Research Needs for Open Science...  

Energy Savers [EERE]

Report of the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while...

65

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

66

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

67

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Broader source: Energy.gov (indexed) [DOE]

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

68

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network [OSTI]

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security Advanced Course in Engineering, ACE-CS immerses students in the cyber-security discipline through for the program. Key words: Cyber-security education, technical leadership, learning community. 1. INTRODUCTION

69

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network [OSTI]

7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked

Johansson, Karl Henrik

70

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

71

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

72

A Two-Constraint Approach to Risky CyberSecurity  

E-Print Network [OSTI]

A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab #12;Risky CyberSecurity Research CyberSecurity systems becoming more;Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity

Faber, Ted

73

The Science, Engineering, and Business of Cyber Security  

E-Print Network [OSTI]

's nuclear football © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Cyber Security Goal ManyThe Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas at San

Sandhu, Ravi

74

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

75

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect (OSTI)

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

76

Security and Cyber Evaluations | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

77

DOE Cyber Security Role, Competency and Functional Matrix  

Broader source: Energy.gov (indexed) [DOE]

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

78

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

79

Chapter 20 - Cyber Security Countermeasures to Combat Cyber Terrorism  

Science Journals Connector (OSTI)

Abstracts: In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

Lachlan MacKinnon; Liz Bacon; Diane Gan; Georgios Loukas; David Chadwick; Dimitrios Frangiskatos

2013-01-01T23:59:59.000Z

80

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

cyber security | OpenEI Community  

Open Energy Info (EERE)

and discussion of smart grid technologies, tools, and techniques. The Smart Grid Investment Grant (SGIG) program is authorized by the Energy Independence and Security Act of...

82

Cyber Assessment Methods for SCADA Security  

Broader source: Energy.gov (indexed) [DOE]

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

83

Cyber-security Research Ethics Dialogue & Strategy Erin Kenneally  

E-Print Network [OSTI]

Cyber-security Research Ethics Dialogue & Strategy Workshop Erin Kenneally CAIDA/UC, San Diego La The inaugural Cyber-security Research Ethics Dialogue & Strat- egy Workshop was held on May 23, 2013

California at San Diego, University of

84

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

85

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems Kyriakos G. Vamvoudakis, Jo~ao P. Mission-centric cyber-security analysts require a complete overview and understanding of the state. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion, iCTF 1 Introduction Guaranteeing

Hespanha, João Pedro

86

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

87

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

88

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems? Kyriakos G. Vamvoudakis1 , Jo~ao P,vigna}@cs.ucsb.edu Abstract. Mission-centric cyber-security analysts require a complete overview and understanding The Flag (iCTF) hacking competition. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion

Vigna, Giovanni

89

Industrial and Grid Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

90

Cyber Security Guidelines, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

91

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

2011-05-16T23:59:59.000Z

92

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

2011-05-16T23:59:59.000Z

93

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

SciTech Connect (OSTI)

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

94

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Broader source: Energy.gov (indexed) [DOE]

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

95

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

96

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

97

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network [OSTI]

these requirements, some technologies such as Phasor Measurement Unit (PMU), Flexible AC Transmission System (FACTS. Therefore, cyber physical security is vitally important for smart grid infrastructure. The data representing on the U.S. infrastructure increased 17-fold from 2009 to 2011 [4]. The Supervisory Control and Data

Kundur, Deepa

98

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

99

Office of Security and Cyber Evaluations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

100

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Broader source: Energy.gov (indexed) [DOE]

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

102

Integrated Learning Environment for Smart Grid Security Kewen Wang, Yi Pan, Wen-Zhan Song  

E-Print Network [OSTI]

Integrated Learning Environment for Smart Grid Security Kewen Wang, Yi Pan, Wen-Zhan Song-- Cyber Security of smart grids becomes more and more important to our everyday life for its wide of this important area. We believe that simulation systems designed for research purposes in the smart grid security

Wang, Weichao

103

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

2011-05-16T23:59:59.000Z

104

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

2011-05-16T23:59:59.000Z

105

Control Systems Cyber Security: Defense in Depth Strategies ...  

Broader source: Energy.gov (indexed) [DOE]

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

106

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

107

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

108

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

109

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

110

Cyber Security Requirements for Wireless Devices and Information Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

111

Cyber security best practices for the nuclear industry  

SciTech Connect (OSTI)

When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

2012-07-01T23:59:59.000Z

112

Cyber security analysis testbed : combining real, emulation, and simulation.  

SciTech Connect (OSTI)

Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

2010-07-01T23:59:59.000Z

113

Ant-Based Cyber Security  

SciTech Connect (OSTI)

We describe a swarming-agent-based, mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries. The system places human administrators at the appropriate level where they provide system guidance while lower-level agents carry out tasks humans are unable to perform quickly enough to mitigate todays security threats. Cooperative Infrastructure Defense (CID) uses our ant-based approach to enable dialogue between humans and agents to foster a collaborative problem-solving environment, increase human situational awareness and influence using visualization and shared control. We discuss theoretical implementation characteristics along with results from recent proof-of-concept implementations.

Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Templeton, Steven J.; Fulp, Errin W.

2011-07-12T23:59:59.000Z

114

Location Based Security for Smart Grid Applications  

Science Journals Connector (OSTI)

Abstract Smart Grid (SG) promises efficient, sustainable, green and reliable electrical delivery by combining the existing electrical distribution network assets with modern information and communications technologies (ICT) in order to transfer information and energy in both directions. Introduction of these intelligent devices will help the grid monitor, protect, and automatically optimise the operation of interconnected elements, in addition to interaction between energy suppliers and consumers. However, this exposes the future grid to new security challenges and risks. In this paper, a framework for protecting Smart Grid applications using geographic location of the devices connected to it is proposed. With this framework, each device on the grid adds an extra layer of security. The proposed scheme is not application or device specific which means it can be implemented on any communication node on the grid. The scheme uses an algebraic code based cryptosystems known as GPT (Gabidulin -Paramonov-Trejtakov), which provides a very strong protection while utilising the smallest key size as compared to other cryptosystems based on algebraic codes. As with other code based cryptosystems, the proposed security framework protects grid information against cyber threats as well as against channel impairments in the form of error protection codes.

Eraj Khan; Bamidele Adebisi; Bahram Honary

2013-01-01T23:59:59.000Z

115

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Broader source: Energy.gov (indexed) [DOE]

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

116

The Department's Cyber Security Incident Management Program, IG-0787 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

117

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Broader source: Energy.gov (indexed) [DOE]

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

118

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Broader source: Energy.gov (indexed) [DOE]

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

119

CYBER SECURITY Software firm identifies hacking program against chemical makers  

Science Journals Connector (OSTI)

A cyber-attack campaign emanating from China targeted private companies involved in the research, development, and manufacture of chemicals and advanced materials between July and September of this year, according to a report from the computer security ...

RICK MULLIN

2011-11-07T23:59:59.000Z

120

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Broader source: Energy.gov (indexed) [DOE]

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Evaluation Report on The Department's Unclassified Cyber Security Program  

Broader source: Energy.gov (indexed) [DOE]

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

122

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

123

Reducing Cyber Risk to Critical Infrastructure: NIST Framework...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

The Vulnerability Analysis of Energy Delivery Control Systems Report Guidelines for Smart Grid Cyber Security (3.4 MB PDF) A Guide to Developing a Cyber Security and Risk...

124

Deriving Policies from Grid Security Requirements Model  

Science Journals Connector (OSTI)

The emerging Grid applications require rigorous approaches to handle security management issues as their scale, heterogeneity, ... , we propose a rigorous method of deriving security policies for grid application...

Syed Naqvi; Alvaro E. Arenas

2008-01-01T23:59:59.000Z

125

Gamification for Measuring Cyber Security Situational Awareness  

SciTech Connect (OSTI)

Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

2013-03-01T23:59:59.000Z

126

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Broader source: Energy.gov (indexed) [DOE]

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

127

Cyber Security Vulnerability Impact on I&C Reliability  

SciTech Connect (OSTI)

We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities.

Hadley, Mark D.; McBride, Justin B.

2006-11-01T23:59:59.000Z

128

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles  

E-Print Network [OSTI]

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles Large, and Definitions of Cybersecurity.... 8 Conventional Wisdom is Inadequate....................................... 9 Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles." The workshop

Feigenbaum, Joan

129

Enhancing Grid Security Using Trusted Virtualization  

Science Journals Connector (OSTI)

Grid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving the user comparati...

Hans Lhr; HariGovind V. Ramasamy; Ahmad-Reza Sadeghi

2007-01-01T23:59:59.000Z

130

Overcoming performance collapse for 100Gbps cyber security  

Science Journals Connector (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

131

Secure control systems with application to cyber-physical systems  

Science Journals Connector (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power ... Keywords: SCADA systems, cyber-physical systems, secure control, security

Jin Dong; Seddik. M. Djouadi; James J. Nutaro; Teja Kuruganti

2014-04-01T23:59:59.000Z

132

CYSEP --A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao  

E-Print Network [OSTI]

1 of 9 CYSEP -- A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao.2Interface Memory Controller Cyber-Security Processor SPI4.2Interface To PCI Bus To Memory ToFramer To NP or End Sy stem Figure 1. Cyber-Security Processor (CYSEP) architecture The Firewall and Intrusion

Chao, Jonathan

133

of Western Area Power Administration's Cyber Security Program  

Broader source: Energy.gov (indexed) [DOE]

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

134

Cyber Security Evaluation of II&C Technologies  

SciTech Connect (OSTI)

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

135

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Broader source: Energy.gov (indexed) [DOE]

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

136

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Broader source: Energy.gov (indexed) [DOE]

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

137

The National Weather Sensor Grid: a large-scale cyber-sensor infrastructure for environmental monitoring  

Science Journals Connector (OSTI)

A sensor grid integrates sensor networks with grid infrastructures to enable the real-time collection of sensor data, and the sharing of computational and storage resources for sensor data processing and management. We have developed a sensor grid architecture framework, called the Scalable Proxy-based aRchItecture for seNsor Grid (SPRING). Based on the SPRING framework, we designed the National Weather Sensor Grid (NWSG), a large-scale cyber-sensor infrastructure for environmental monitoring. The NWSG integrates mini weather stations deployed geographically across Singapore for weather data collection, processing and management. We have designed and implemented core sensor grid middleware components and services such as resource discovery, meta scheduling, job migration and security. The NWSG is designed to support long-term weather monitoring. The performance of the NWSG has been demonstrated in terms of reduction in latency for end-user response, significant improvement in overall system throughput, and even load balance across the sensor grid infrastructure.

Hock Beng Lim; Mudasser Iqbal; Wenqiang Wang; Yuxia Yao

2010-01-01T23:59:59.000Z

138

A Comparison of Cross-Sector Cyber Security Standards  

SciTech Connect (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

139

DOE Issues Energy Sector Cyber Organization NOI  

Broader source: Energy.gov (indexed) [DOE]

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

140

The Future of Cyber Security Prof. Ravi Sandhu  

E-Print Network [OSTI]

! Net-centric military Intelligence Smart grid Electronic health records and healthcare Smart! Productivity Security Let's build it Cash out the benefits Next generation can secure it Let's not build it Let

Sandhu, Ravi

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Grid Security: Expecting the Mingchao Ma  

E-Print Network [OSTI]

Grid Security: Expecting the Unexpected Mingchao Ma STFC � Rutherford Appleton Laboratory, UK #12;Slide 2 Overview � Security Service Challenges (SSC) Review � Grid Security Incident � What had happened of the LCG/EGEE Grid Sites (Dec 2008) http://www.gridpp.ac.uk/security/ssc/ https

University College London

142

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

143

Intrinsic security in SORCER (Service Oriented) grid.  

E-Print Network [OSTI]

??A grid is a vast repository of virtual services. SORCER is a computational grid environment based on the Service Oriented Paradigm. Security and trust, in (more)

Rai, Abhijit

2006-01-01T23:59:59.000Z

144

Grid Security Loopholes with Proposed Countermeasures  

Science Journals Connector (OSTI)

Grid computing is an emergent computing innovation which ... to research on attribute based access control for grid computing, security mechanism to authorize and authenticate users, before accessing information ...

Nureni Ayofe Azeez; Tiko Iyamu; Isabella M. Venter

2012-01-01T23:59:59.000Z

145

Intrinsic security in SORCER (service oriented) grid.  

E-Print Network [OSTI]

??A grid is a vast repository of virtual services. SORCER is a computational grid environment based on the Service Oriented Paradigm. Security and trust, in (more)

Rai, Abhijit

2005-01-01T23:59:59.000Z

146

Wireless Policy, Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

147

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Broader source: Energy.gov (indexed) [DOE]

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

148

Security Issues of Grid Resource Management  

Science Journals Connector (OSTI)

Secure management of Grid resources presents many challenges. This chapter will examine the security requirements that are essential to Grids and some of the software that is ... them. We will discuss how well th...

Mary R. Thompson; Keith R. Jackson

2004-01-01T23:59:59.000Z

149

On the usability of grid middleware and security mechanisms  

Science Journals Connector (OSTI)

...Paul Watson On the usability of grid middleware and security mechanisms Stefan J. Zasada...computational-grids. grid usability|grid security|Application Hosting Environment...essential for the uptake of any grid security solution. The problems stem...

2011-01-01T23:59:59.000Z

150

Cyber Assessment Methods for SCADA Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

151

Cyber Security Incidents, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

152

Security for Grid Services Frank Siebenlist2  

E-Print Network [OSTI]

Security for Grid Services Von Welch1 Frank Siebenlist2 Ian Foster1,2 John Bresnahan2 Karl organizations. #12;Grid computing research has produced security technologies based not on direct-API [23]. The Grid Security Infrastructure (GSI) is the name given to the portion of the Globus Toolkit

Wiseman, Yair

153

Department of Energy's July 2013 Cyber Security Breach  

Broader source: Energy.gov (indexed) [DOE]

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

154

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

155

MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS  

E-Print Network [OSTI]

novel aspects of networked systems that include integrating dis- tributed computing systems with monitoring and controlling entities in the physical environment. For example, in real-time control systems stations. Other examples include smart grid systems and supervisory control and data acquisition (SCADA

Burmester, Mike

156

Fuzzy Trust Integration for Security Enforcement in Grid Computing  

Science Journals Connector (OSTI)

How to build the mutual trust among Grid resources sites is crucial to secure distributed Grid applications. We suggest enhancing the trust index...fuzzy-logic trust model for securing Grid resources. Grid security

Shanshan Song; Kai Hwang; Mikin Macwan

2004-01-01T23:59:59.000Z

157

Research on Security Architecture and Protocols of Grid Computing System  

Science Journals Connector (OSTI)

This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstract of grid computing system at Grid

Xiangming Fang; Shoubao Yang; Leitao Guo; Lei Zhang

2004-01-01T23:59:59.000Z

158

Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System  

E-Print Network [OSTI]

, or for sporadic reasons, for example a power plant goes offline unexpectedly (e.g., due to an earthquake or stagnant winds to propel wind turbines). Dur- ing an episode, the power grid operators must contend1 Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System Mary

159

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network [OSTI]

of the level of their security defense processes' efficiency and the impact of their investment. Modeling and characterization of the dynamics of cyber security management are essential to risk prediction, damage assessment, and resource allocations...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

160

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect (OSTI)

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security and Certification Issues in Grid Computing  

Science Journals Connector (OSTI)

Grid computing is concerned with the sharing and ... virtual organizations. The dynamic nature of Grid environments introduces challenging security concerns that demand new technical approaches. In this brief o...

Ian Foster; Frank Siebenlist; Steven Tuecke

2003-01-01T23:59:59.000Z

162

Innovations for Grid Security from Trusted Computing  

Science Journals Connector (OSTI)

A central problem for Grid (or web) services is how to ... or system) will behave as expected. In Grid security practice at present, issues of confidentiality and ... insufficient for a large class of problems in...

Wenbo Mao; Andrew Martin; Hai Jin; Huanguo Zhang

2009-01-01T23:59:59.000Z

163

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

164

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect (OSTI)

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

165

A Distributed Honeypot System for Grid Security  

Science Journals Connector (OSTI)

In this paper, we propose a distributed honeypot model for grid computing system security. Based on the IDS Snort and the...

Geng Yang; Chunming Rong; Yunping Dai

2004-01-01T23:59:59.000Z

166

Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure  

Science Journals Connector (OSTI)

The advanced electric power grid is a cyber-physical system comprised of ... of the device and the reliability of the power grid on which they are deployed. The IEEE118...

Ayman Z. Faza; Sahra Sedigh

2009-01-01T23:59:59.000Z

167

Secure control systems with application to cyber-physical systems  

SciTech Connect (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

168

A framework model for grid security  

Science Journals Connector (OSTI)

Computational grids can be considered as tiered objects; following a widespread terminology, cluster grids may be grouped into enterprise grids, that in turn may belong to global grids. Therefore, computing grid security has to be tiered too, with the ground level remaining the OS one. In this work, we introduce a sort of unified approach, an overall architectural framework for access control to grid resources, and one that adheres as much as possible to current security principles. Current grid security implementations are viewed in the light of this model, their main drawbacks are described, and we show how our proposal is able to avoid them. We believe that a main strategy could be to adopt both PKI and PMI infrastructures at the grid layer, ensuring that an adequate transfer of authentication and authorization will be made between the Virtual Organization and Resource Provider layers. This can be achieved by extending those features at the OS layer as system applications and services.

G. Laccetti; G. Schmid

2007-01-01T23:59:59.000Z

169

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

170

The Smart Electricity Grid and Scientific Research  

Science Journals Connector (OSTI)

...this early and critical stage of the smart grid's development, with legislation...States for information management of smart grid devices (www.nist.gov/smartgrid...Standards and Technology (NIST) , Smart Grid Cyber Security Strategy and Requirements...

Jan Beyea

2010-05-21T23:59:59.000Z

171

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

172

Cyber Friendly Fire: Research Challenges for Security Informatics  

SciTech Connect (OSTI)

This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a systems topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approachesare discussed.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2013-06-06T23:59:59.000Z

173

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber-physical solutions Cybersecurity for energy delivery systems outreach AMI smart metering upgradeability test framework Practical quantum security for grid automation...

174

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Broader source: Energy.gov (indexed) [DOE]

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

175

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network [OSTI]

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

176

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big Data  

E-Print Network [OSTI]

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big to cybersecurity and big data. Outstanding candidates from all areas of software engineering and computer science

Carver, Jeffrey C.

177

Security in Service?oriented Grid  

Science Journals Connector (OSTI)

Service?oriented architecture (SOA) is the most common used approach for building architectural decisions of a system. SOA is an architectural model for developing reliable distributed systems which functionality is provided as services. Features from this approach are services interoperability loose?coupling reusability and discoverability. Grid is a new technology for using computers network and devices. The Grid is infrastructure for coordinate use of distributed resources shared by different institutes computational centers and organizations. Grid is dynamic and heterogeneous system beyond any institutional or organization boundaries. Considering this the development and integration of Gird application in such dynamic and heterogeneous environment is a great challenge. Something more developing of Grid application is still tightly related with the underlying middleware and its security. Service?oriented Grids are one step further in integration of Grid application because of the SOA features. These benefits from Grid and SOA however will require and new security approaches for building application. In this article we will briefly describe some known security approaches in SOA and Grid and how they are applied in security models of two well known service?oriented grid architecturesOGSA and EGA.

R. Goranova

2008-01-01T23:59:59.000Z

178

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Broader source: Energy.gov (indexed) [DOE]

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

179

Deployment-Based security for grid applications  

Science Journals Connector (OSTI)

Increasing complexity of distributed applications and commodity of resources through grids are making harder the task of deploying those applications. There is a clear need for a versatile deployment of distributed applications. In the same time, a security ...

Isabelle Attali; Denis Caromel; Arnaud Contes

2005-05-01T23:59:59.000Z

180

Threat Model for Grid Security Services  

Science Journals Connector (OSTI)

The grid computing paradigm involves both the availability of ... systems heavily rely upon the provision of adequate security. It is imperative that techniques be developed ... trustworthy, and is an established...

Syed Naqvi; Michel Riguidel

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Deployment-Based Security for Grid Applications  

Science Journals Connector (OSTI)

Increasing complexity of distributed applications and commodity of resources through grids are making harder the task of deploying ... distributed applications. In the same time, a security architecture must be a...

Isabelle Attali; Denis Caromel; Arnaud Contes

2005-01-01T23:59:59.000Z

182

Trusted Grid Computing with Security Assurance and Resource Optimization  

E-Print Network [OSTI]

Trusted Grid Computing with Security Assurance and Resource Optimization Shanshan Song and Kai The security of Grid sites can be enhanced by upgrading its intrusion defense capabilities against its previous security enforcement across multiple Grid resources sites. The design is aimed at securing Grid resources

Hwang, Kai

183

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Broader source: Energy.gov (indexed) [DOE]

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

184

Security Modeling of Grid Systems Using Petri Nets  

Science Journals Connector (OSTI)

The paper reviews the security problem with computing and information resources in Grid systems. It discusses security relative characteristics of Grid architecture and provides a common threat model of Grid. It ...

Peter D. Zegzhda; Dmitry P. Zegzhda; Maxim O. Kalinin

2012-01-01T23:59:59.000Z

185

A Grid Security Infrastructure Based on Behaviors and Trusts  

Science Journals Connector (OSTI)

Computational Grids need support the distributed high performance computing with security and reliability. While the fact is when ... destroy the whole system. For solving these security problems in Grids, a Grid

Xiaolin Gui; Bing Xie; Yinan Li; Depei Qian

2004-01-01T23:59:59.000Z

186

A Data Grid Security System Based on Shared Context  

Science Journals Connector (OSTI)

Data grid system supports uniform and secure access of ... administrative domains, each with its own local security policy. The security challenge has been a focus in a data grid environment. This paper mainly pr...

Nong Xiao; Xiaonian Wu; Wei Fu; Xiangli Qu

2004-01-01T23:59:59.000Z

187

User-Friendly Grid Security Architecture and Protocols  

Science Journals Connector (OSTI)

My talk which includes some background information about grid computing, grid security, security infrastructure, and also some of the limitations, our proposal on some security protocols, what are the improvement...

Hoon Wei Lim

2007-01-01T23:59:59.000Z

188

A Formal Model for the Grid Security Infrastructure  

Science Journals Connector (OSTI)

The Grid Security Infrastructure (GSI) proposed and implemented in ... has been a widely accepted solution for the security of grids in recent years. But there is no formal analysis or modelling on security mecha...

Baiyan Li; Ruonan Rao; Minglu Li; Jinyuan You

2004-01-01T23:59:59.000Z

189

Consolidated Edison Company of New York, Inc. Smart Grid Demonstration...  

Open Energy Info (EERE)

is based in New York, New York. Overview Demonstrate a scalable, cost-effective smart grid prototype that promotes cyber security, reduces electricity demand and peak energy...

190

GIVS: integrity validation for grid security  

Science Journals Connector (OSTI)

In recent years, grid computing has been recognised as the next step in the evolution of distributed systems. However, only limited efforts have been made to address the security issues involved in these architectures. Questions like 'What happens if a user of the grid is interested in making the overall computation fail?' are still unanswered. In this paper, we address the problem of granting the correctness of grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence of malicious hosts through statistical sampling of computational results. Performance overheads of GIVS strategies are evaluated using statistical models and simulation.

Stefano Zanero; Giuliano Casale

2008-01-01T23:59:59.000Z

191

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Broader source: Energy.gov (indexed) [DOE]

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

192

Grid Security and Integration with Minimal Performance Degradation Sugata Sanyal  

E-Print Network [OSTI]

Grid Security and Integration with Minimal Performance Degradation Sugata Sanyal School of computational grids becoming a reality. However, the question of grid security remains one of the important open research issues. Here, we present some novel ideas about how to implement grid security, without

Sanyal, Sugata

193

Abstract --Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities  

E-Print Network [OSTI]

1 Abstract -- Securing a Grid environment presents a distinctive set of challenges. This paper the security requirements of Grids more completely. Index Terms -- Grid security, authentication, authorization, trust management, secure communication, security policy I. INTRODUCTION The goal of Grid Computing

194

Security services architecture for Secure Mobile Grid Systems  

Science Journals Connector (OSTI)

Mobile Grid, is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices. A Grid infrastructure that supports the participation of mobile nodes and incorporates security aspects will thus play a significant role in the development of Grid computing. The idea of developing software through systematic development processes to improve software quality is not new. However, many information systems such as those of Grid Computing are still not developed through methodologies which have been adapted to their most differentiating features. The lack of adequate development methods for this kind of systems in which security is taken into account has encouraged us to build a methodology to develop them, offering a detailed guide for their analysis, design and implementation. It is important to use software V&V techniques, according to IEEE Std. 1012 for Software Verification and Validation, to ensure that a software system meets the operational needs of the user. This ensures that the requirements for the system are correct, complete, and consistent, and that the life-cycle products correctly design and implement system requirements. This paper shows part of a development process that we are elaborating for the construction of information systems based on Grid Computing, which are highly dependent on mobile devices in which security plays a highly important role. In the design activity of the process, we design a security architecture which serves as a reference for any mobile Grid application that we wish to build since this security architecture defines a complete set of security services which will be instantiated depending on the requirements and features found in previous activities of the process. A V&V task is also defined in the design activity to validate and verify both the architecture built and the traceability of the artifacts generated in this activity. In this paper, we will present the service-oriented security architecture for Mobile Grid Systems which considers all possible security services that may be required for any mobile Grid application.

David G. Rosado; Eduardo Fernndez-Medina; Javier Lpez

2011-01-01T23:59:59.000Z

195

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

196

Dartmouth College Computer Science Technical Report TR2010-668 Creating Large Disturbances in the Power Grid  

E-Print Network [OSTI]

in the Power Grid: Methods of Attack After Cyber Infiltration Senior Honors Thesis June 2010 Loren Sands are pursuing methods of securing the cyber aspect of the U.S. power grid, one of the country's most critical attacks. In this paper I discuss the physical and cyber systems that compose the power grid, and I explore

197

Good Things in Small Packages: Micro Worlds and Cyber Security  

SciTech Connect (OSTI)

Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

David I Gertman

2013-11-01T23:59:59.000Z

198

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

SciTech Connect (OSTI)

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

199

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect (OSTI)

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

200

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Broader source: Energy.gov (indexed) [DOE]

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

An improved grid security infrastructure by trusted computing  

Science Journals Connector (OSTI)

Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, ... treated...

Yan Fei; Zhang Huanguo; Sun Qi; Shen Zhidong

2006-11-01T23:59:59.000Z

202

A PKI-Based Scalable Security Infrastructure for Scalable Grid  

Science Journals Connector (OSTI)

Scalable security is a vital important issue for scalable Grid. There are several issues to be solved for scalable Grid security such as mapping from global subjects to ... center, large number of users, many het...

Lican Huang; Zhaohui Wu

2004-01-01T23:59:59.000Z

203

An Identity-Based Model for Grid Security Infrastructure  

Science Journals Connector (OSTI)

In this paper, we propose a grid security infrastructure based on identity cryptography. We mainly discuss the grid security authentication and authorization architecture by using Tate Pairing. We propose a priva...

Xiaoqin Huang; Lin Chen; Linpeng Huang; Minglu Li

2005-01-01T23:59:59.000Z

204

A New Grid Security Framework with Dynamic Access Control  

Science Journals Connector (OSTI)

In this paper, a new Grid security framework based on dynamic access control is introduced to address some security problem in Grid. Based on the dynamic evaluating results about ... levels to access rights. In o...

Bing Xie; Xiaolin Gui; Yinan Li; Depei Qian

2004-01-01T23:59:59.000Z

205

A Hybrid Machine Learning/Statistical Model of Grid Security  

Science Journals Connector (OSTI)

Most current Grid security techniques concentrate on traditional security aspects such as authentication, authorization, etc. ... in the historical data corpus denoting the user-Grid interactions has been largely...

Guang Xiang; Ge Yu; Xiangli Qu; Xiaomei Dong

2004-01-01T23:59:59.000Z

206

G-PASS: Security Infrastructure for Grid Travelers  

Science Journals Connector (OSTI)

Grid travelers are special mobile processes responsible for ... virtual organizations (VOs). We propose a security infrastructure called G-PASS to provide security support for grid travelers during their trip and...

Tianchi Ma; Lin Chen; Cho-Li Wang

2004-01-01T23:59:59.000Z

207

Trusted Grid Computing with Security Binding and Trust Integration  

Science Journals Connector (OSTI)

Trusted Grid computing demands robust resource allocation with security assurance at all resource sites. Large-scale Grid applications are being hindered by lack of security assurance from remote resource sites. ...

Shanshan Song; Kai Hwang; Yu-Kwong Kwok

2005-06-01T23:59:59.000Z

208

An Identity-Based Grid Security Infrastructure Model  

Science Journals Connector (OSTI)

Grid security is a wide topic, touching many of the core issues in information security. It is an area that has been overlooked by the established grid community. In this paper, We explore ... roles of identity-b...

Xiaoqin Huang; Lin Chen; Linpeng Huang

2005-01-01T23:59:59.000Z

209

Security Policy Configuration Issues in Grid Computing Environments  

Science Journals Connector (OSTI)

A computational Grid is a hardware and software infrastructure that ... However, without an adequate understanding of the security implications of a Grid, both the owner who contributes resources to the Grid and ...

George Angelis; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

210

Agent-Based Smart Grid Protection and Security  

Science Journals Connector (OSTI)

The vision of a smart grid is to provide a modern, resilient, and secure electric power grid as it boasts up with a highly ... , the control and operation of a smart grid which integrate the distributed energy re...

Md Shihanur Rahman; H. R. Pota

2014-01-01T23:59:59.000Z

211

TCP/IP Security Protocol Suite for Grid Computing Architecture  

Science Journals Connector (OSTI)

Grid computing is a term referring to the ... domains to attain a common goal. The grid can be thought of as a distributed ... paper, we propose a solution for various security issues found in High Performance Grid

Vikas Kamra; Amit Chugh

2011-01-01T23:59:59.000Z

212

A Novel Grid Node-by-Node Security Model  

Science Journals Connector (OSTI)

In this paper, we present a novel grid Node by Node security model. We partition the numerous grid nodes into different autonomy areas and each ... key, integrity and encrypt algorithm between the grid nodes are ...

Zhengyou Xia; Yichuan Jiang

2004-01-01T23:59:59.000Z

213

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Broader source: Energy.gov (indexed) [DOE]

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

214

Federated Grids and their Security Geoffrey Fox and Marlon Pierce  

E-Print Network [OSTI]

Federated Grids and their Security Geoffrey Fox and Marlon Pierce Draft 0.4 Introduction We examine the consequences, requirements, and possible implementation issues needed to support security in federated grids that user identity in current Grid security implementations has two major shortcomings: it does not scale

215

Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid  

E-Print Network [OSTI]

Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid R and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community in the education domain. We believe that this federated VO security model for fine grained access to Grid services

Kent, University of

216

Our Solution Securing Grid Data Transfer Services with  

E-Print Network [OSTI]

Motivation Our Solution Summary Securing Grid Data Transfer Services with Active Network Portals by in part by the NSF under award numbers EIA 9911099 and CNS 0454298 Michael R. Head Securing Grid Data/Implementation Experiments Results Michael R. Head Securing Grid Data Transfer Services with Active Network Portals #12

217

Security Implications of Typical Grid Computing Usage Scenarios Marty Humphrey  

E-Print Network [OSTI]

Security Implications of Typical Grid Computing Usage Scenarios Marty Humphrey Computer Science. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing. 1 easy and secure ac- cess to the Grid's diverse resources. Infrastructure software such as Legion [6

Thompson, Mary R.

218

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Broader source: Energy.gov (indexed) [DOE]

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

219

Security-oriented Data Grids for Microarray Expression Profiles  

E-Print Network [OSTI]

Security-oriented Data Grids for Microarray Expression Profiles Richard SINNOTT a,1 Christopher and comparison of microarray experiment results. Keywords. Microarray Expression Profiles, Grid security shedding light and understanding for ex- ample on biological processes. The BBSRC funded Grid enabled

Glasgow, University of

220

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron  

E-Print Network [OSTI]

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron Kevin Wood Operations techniques for analyzing the security and resilience of electrical power grids against disruptions caused analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks

Baldick, Ross

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

E-Print Network 3.0 - analytical resources securely Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Computational Science Collection: Mathematics 28 ITL BULLETIN FOR OCTOBER 2010 CYBER SECURITY STRATEGIES FOR THE SMART GRID: PROTECTING THE Summary: Standards, Release 1.0....

222

Chapter 5 - Security Models for SCADA, ICS, and Smart Grid  

Science Journals Connector (OSTI)

Abstract This chapter describes security models for different Smart Grid protocols, including SCADA and ICS protocols. Many protocols are explained, along with their security models, interoperability, and methods and models of organizing them within an integrated system. Security methodologies are compared in order to create a working model for Smart Grid systems.

Eric D. Knapp; Raj Samani

2013-01-01T23:59:59.000Z

223

Security Working Group Marty Humphrey GRID FORUM DRAFT University of Virginia  

E-Print Network [OSTI]

Security Working Group Marty Humphrey GRID FORUM DRAFT University of Virginia Mary Thompson] Security Implications of Typical Grid Computing Usage Scenarios security-implications-01 ways to access the immense computational power of a Computational Grid, each with unique security

Lee, Ruby B.

224

Secure the edge? Understanding the risk towards wireless grids Edgeware technology  

Science Journals Connector (OSTI)

This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.

Tyson Brooks; Michelle Kaarst-Brown; Carlos Caicedo; Joon Park; Lee W. McKnight

2014-01-01T23:59:59.000Z

225

Avaki Data Grid Secure Transparent Access to Data Andrew Grimshaw  

E-Print Network [OSTI]

1 of 27 Avaki Data Grid ­ Secure Transparent Access to Data Andrew Grimshaw Mike Herrick Anand and development by the Grid community we see Grids (then called Metasystems [3]) being deployed around the world both in academic settings, and more tellingly, in production commercial settings. What is a Grid? What

Grimshaw, Andrew

226

Security Implications of Typical Grid Computing Usage Scenarios  

Science Journals Connector (OSTI)

Grid Computing consists of a collection of heterogeneous ... many ways to access the resources of a Grid, each with unique security requirements and implications for both the resource ... the resource provider. A...

Marty Humphrey; Mary R. Thompson

2002-07-01T23:59:59.000Z

227

Security considerations based on PKI/CA in manufacturing grid  

Science Journals Connector (OSTI)

In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions ... more complex, therefore these problems in manufacturing grid can't longer be addres...

Yin Yong; Li Yu

2006-11-01T23:59:59.000Z

228

An Analysis of Security Services in Grid Storage Systems  

Science Journals Connector (OSTI)

With the wide-spread deployment of Data Grids, storage services are becoming a critical aspect of the Grid infrastructure. Due to the sensitive and critical nature of the data being stored, security issues relate...

Jesus Luna; Michail D. Flouris; Manolis Marazakis

2008-01-01T23:59:59.000Z

229

Computer Security Division 2009 Annual Report  

E-Print Network [OSTI]

Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

230

A secure mechanism of group communication for pervasive grid  

Science Journals Connector (OSTI)

Cooperative processing is a representative application in pervasive grid and group communication is the key technique in this application. It is a great challenge to ensure the security of group communication in pervasive grid. In this paper, we first describe the service infrastructure of middleware for pervasive grid. Then, we present a secure mechanism of group communication and analyse the correctness and the security of the mechanism. Finally, we verify the validity of this mechanism by experiments. Results show that our proposed mechanism is efficient to ensure the security of group communication in pervasive grid.

Yunfa Li; Hai Jin; Zongfen Han; Sanmin Liu

2009-01-01T23:59:59.000Z

231

Proposed platform for improving grid security by trust management system  

E-Print Network [OSTI]

With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

Siadat, Safieh; Mohsenzadeh, Mehran

2009-01-01T23:59:59.000Z

232

Quantum cryptography put to work for electric grid security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Quantum cryptography put to work Quantum cryptography put to work for electric grid security LANL's quantum cryptography team successfully completed the first-ever demonstration of...

233

An Advanced Security Infrastructure for Heterogeneous Relational Grid Data Sources  

Science Journals Connector (OSTI)

In this paper we deal with the problem of secure access to metadata information in Grid computing environments. The heterogeneity of the eventual ... database management systems) and the enforcement of security p...

Javier Jan Martnez; JosH. Cans

2004-01-01T23:59:59.000Z

234

Hardware Security for Device Authentication in the Smart Grid  

Science Journals Connector (OSTI)

Secure communication between devices is a key aspect of smart grid security. In the future smart home...environment, various smart devices, appliances and energy management systems will communicate with each othe...

Andrew J. Paverd; Andrew P. Martin

2013-01-01T23:59:59.000Z

235

Security Requirements Model for Grid Data Management Systems  

Science Journals Connector (OSTI)

In this paper, we present our ongoing work of a policy-driven approach to security requirements of grid data management systems (GDMS). We analyse the security functionalities of existing GDMS to determine their ...

Syed Naqvi; Philippe Massonet; Alvaro Arenas

2006-01-01T23:59:59.000Z

236

A Security Policy Implementation Model in Computational GRID  

Science Journals Connector (OSTI)

This paper analyzes the necessity of building a security policy implementation model in the Computational GRID. By choosing and establishing the functional entity ... course, we finally put forward a feasible security

Feng Li; Junzhou Luo

2004-01-01T23:59:59.000Z

237

Improving Grid Services Security with Fine Grain Policies  

Science Journals Connector (OSTI)

Grid computing is a continuously growing research field ... of resources among untrusted entities poses non trivial security problems. This paper proposes an approach to improve the security of computational serv...

Fabrizio Baiardi; Fabio Martinelli

2004-01-01T23:59:59.000Z

238

An inter-realm, cyber-security infrastructure for virtual supercomputing  

SciTech Connect (OSTI)

Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

Al-Muhtadi, J. (Jalal); Feng, W. C. (Wu-Chun); Fisk, M. E. (Mike E. )

2001-01-01T23:59:59.000Z

239

(MS WORD TEMPLATE for Submission in Fusion Engineering and Design) Security on the US Fusion Grid  

E-Print Network [OSTI]

(MS WORD TEMPLATE for Submission in Fusion Engineering and Design) Security on the US Fusion Grid J, FusionGrid, grid computing 1. Introduction Critical to the success of any computational grid is security to improve security for the US Fusion Grid (FusionGrid) [1]. Collaboratory workers have adapted secure

Thompson, Mary R.

240

Defining and Computing a Valued Based Cyber-Security Measure  

SciTech Connect (OSTI)

In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Office of Cyber and Security Assessments | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

security policies and programs throughout the Department, including protection of special nuclear material, and classified and sensitive information. The Office has established and...

242

Applications for cyber security - System and application monitoring  

SciTech Connect (OSTI)

Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

2006-07-01T23:59:59.000Z

243

Remote Access to the BNL Network, Cyber Security, Information Technology  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

244

CyberCrime - A Clear and Present Danger The Ceo's Guide to Cyber Security  

Science Journals Connector (OSTI)

Is Your Information Easy to Steal? Every business has something it needs to protect. Whether it's top-secret Ip, an exclusive client list, or a secure payment portal, your data is what sets you apart from the competition. But most businesses aren't doing ...

Roger Smith

2014-06-01T23:59:59.000Z

245

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Broader source: Energy.gov (indexed) [DOE]

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

246

Towards a secure and available smart grid using intrusion tolerance  

Science Journals Connector (OSTI)

In this paper, we propose an intrusion tolerant architecture to enhance the security of smart grid control centers. The proposed architecture is mainly composed of several modules, including replication and diversity, auditing, compromised/faulty replica ... Keywords: SCADA, availability, critical infrastructure, intrusion tolerance, smart grid security

Maryam Tanha; Fazirulhisyam Hashim

2012-11-01T23:59:59.000Z

247

Secure wireless communication platform for EV-to-Grid research  

Science Journals Connector (OSTI)

"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper is to design and develop a secure wireless communication platform for V2G research, ... Keywords: authentication protocol, electric vehicle, power grid, secure wireless communication

Huaqun Guo; Fan Yu; W. C. Wong; Vivy Suhendra; Y. D. Wu

2010-06-01T23:59:59.000Z

248

Study on Grid Access Control Strategy Based on Trust and Security Grade  

Science Journals Connector (OSTI)

The grid security is an important component, and it directly affects the development of the grid and the practical application of grid system software. As a kind of tool, GSI(Grid Security Infrastructure) provide...

Yihe Liu

2011-01-01T23:59:59.000Z

249

Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology  

Science Journals Connector (OSTI)

A critical problem for grid security is how to gain secure solution for Grid virtual organization (VO). In Grid practice at present, issues of VO security rely on non-distributed policy management and ... as a st...

Fei Yan; Weizhong Qiang; Zhidong Shen; Chunrun Chen

2006-01-01T23:59:59.000Z

250

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

251

Security, energy, and performance-aware resource allocation mechanisms for computational grids  

Science Journals Connector (OSTI)

Distributed Cyber Physical Systems (DCPSs) are networks of computing systems that utilize information from their physical surroundings to provide important services, such as smart health, energy efficient grid and cloud computing, and smart security-aware grids. Ensuring the energy efficiency, thermal safety, and long term uninterrupted computing operation increases the scalability and sustainability of these infrastructures. Achieving this goal often requires researchers to harness an understanding of the interactions between the computing equipment and its physical surroundings. Modeling these interactions can be computationally challenging with the resources on hand and the operating requirements of such systems. In this paper, we define the independent batch scheduling in Computational Grid (CG) as a three-objective global optimization problem with makespan, flowtime and energy consumption as the main scheduling criteria minimized according to different security constraints. We use the Dynamic Voltage Scaling (DVS) methodology for reducing the cumulative power energy utilized by the system resources. We develop six genetic-based single- and multi-population meta-heuristics for solving the considered optimization problem. The effectiveness of these algorithms has been empirically justified in two different grid architectural scenarios in static and dynamic modes.

Joanna Ko?odziej; Samee Ullah Khan; Lizhe Wang; Marek Kisiel-Dorohinicki; Sajjad A. Madani; Ewa Niewiadomska-Szynkiewicz; Albert Y. Zomaya; Cheng-Zhong Xu

2014-01-01T23:59:59.000Z

252

Security Issues in Virtual Grid Environments  

Science Journals Connector (OSTI)

Computational Grids (or simply Grids) enable access to a large number of ... processing, memory, and storage devices. Usually, Grids are used for running very specific applications ... not much attention has been...

Jose L. Muoz; Josep Pegueroles; Jordi Forn

2004-01-01T23:59:59.000Z

253

Survey of Security Challenges in Grid Environment  

Science Journals Connector (OSTI)

Use of grid systems has increased tremendously since their inception in 90s. With grids, users execute the jobs without knowing which ... run their jobs. An important aspect of grids is Virtual Organization (VO)...

Usman Ahmad Malik; Mureed Hussain

2011-01-01T23:59:59.000Z

254

Security in grid computing: A review and synthesis  

Science Journals Connector (OSTI)

This paper provides an extensive survey of the different methods of addressing security issues in the grid computing environment, and specifically contributes to the research environment by developing a comprehensive framework for classification of these research endeavors. The framework presented classifies security literature into System Solutions, Behavioral Solutions, Hybrid Solutions and Related Technologies. Each one of these categories is explained in detail in the paper to provide insight as to their unique methods of accomplishing grid security, the types of grid and security situations they apply best to, and the pros and cons for each type of solution. Further, several areas of research were identified in the course of the literature survey where more study is warranted. These avenues for future research are also discussed in this paper. Several types of grid systems exist currently, and the security needs and solutions to address those needs for each type vary as much as the types of systems themselves. This research framework will aid in future research efforts to define, analyze, and address grid security problems for the many varied types of grid setups, as well as the many security situations that each grid may face.

Erin Cody; Raj Sharman; Raghav H. Rao; Shambhu Upadhyaya

2008-01-01T23:59:59.000Z

255

Grid of security: a new approach of the network security Olivier FLAUZAC, Florent NOLOT, Cyril RABAT, Luiz-Angelo STEFFENEL  

E-Print Network [OSTI]

Grid of security: a new approach of the network security Olivier FLAUZAC, Florent NOLOT, Cyril. With this new approach, called grid of security, a community of devices ensures that a device is trustworthy and decentralized enforcement of the network security: the grid of security. This new approach can be described

Paris-Sud XI, Université de

256

Meeting security and user behavior requirements in Grid scheduling  

Science Journals Connector (OSTI)

Most of current research in Grid computing is still focused on the improvement of the performance of Grid schedulers. However, unlike traditional scheduling, in Grid systems there are other important requirements to be taken into account. One such a requirement is the secure scheduling, namely achieving an efficient allocation of tasks to reasonable trustful resources. In this paper we formalize the Grid scheduling problem as a non-cooperative non-zero sum game of the Grid users in order to address the security requirements. The premise of this model is that in a large-scale Grid, the cooperation among all users in the system is unlikely to happen. The users cost of playing the game is interpreted as a total cost of the secure job execution in Grid. The game cost function is minimized, at global (Grid) and local (users) levels, by using four genetic-based hybrid meta-heuristics. We have evaluated the proposed model under the heterogeneity, the large-scale and dynamics conditions using a Grid simulator. The relative performance of four hybrid schedulers is measured by the makespan and flowtime metrics. The obtained results suggested that it is more resilient for the Grid users to pay some additional scheduling cost, due to verification of the security conditions, instead of taking the risk of assigning their tasks to unreliable resources.

Joanna Ko?odziej; Fatos Xhafa

2011-01-01T23:59:59.000Z

257

Microsoft Word - Blue Cover Report - FERC Power Grid  

Broader source: Energy.gov (indexed) [DOE]

Federal Energy Regulatory Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security DOE/IG-0846 January 2011 Department of Energy Washington, DC 20585 January 26, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on the "Federal Energy Regulatory Commission's Monitoring of Power Grid Cyber Security" BACKGROUND Congress passed the Energy Policy Act of 2005 (Energy Policy Act), giving the Federal Energy Regulatory Commission (Commission) jurisdiction to conduct oversight of the bulk power system, commonly referred to as the bulk electric system or power grid, including the approval of mandatory cyber security reliability standards. The bulk electric system consists of

258

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01  

Broader source: Energy.gov (indexed) [DOE]

1 1 OAS-M-12-01 November 2011 Department of Energy Washington, DC 20585 November 15, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011" INTRODUCTION AND OBJECTIVE The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for regulating the Nation's oil pipeline, natural gas, hydroelectric and wholesale electric industries. The Commission relies on a wide range of information technology (IT) resources in achieving its mission of assisting consumers in

259

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01  

Broader source: Energy.gov (indexed) [DOE]

2 2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for, among other things, regulating interstate transmission of the Nation's electricity, natural gas and oil. In addition, the Commission licenses and inspects private, municipal and state hydroelectric projects. To achieve its mission, the Commission relies

260

Shopping For Danger: E-commerce techniques applied to collaboration in cyber security  

SciTech Connect (OSTI)

Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

Bruce, Joseph R.; Fink, Glenn A.

2012-05-24T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Disable Automatic Login, Cyber Security, Information Technology Division,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disable Automatic Login Disable Automatic Login Automatic Login MUST be disabled... Follow the steps below to verify that auto login is disabled. Verify Security Settings Select Personal Section: Click Make sure the following required boxes are checked. - Require password to wake this computer from sleep or screen saver - Disable automatic login If so, close panel. If not, continue... Note: Mac users should have the panel locked at all times. Click the lock image to lock the panel if its open to prevent further changes. To unlock the above panel, click the lock image to bring up the login box. Insert your username & password, click . You should now be able to make changes to the panel.

262

Data-Intensive Visual Analysis for Cyber Security  

SciTech Connect (OSTI)

Protecting communications networks against attacks where the aim is to steal information, disrupt order, or harm critical infrastructure can require the collection and analysis of staggering amounts of data. The ability to detect and respond to threats quickly is a paramount concern across sectors, and especially for critical government, utility and financial networks. Yet detecting emerging or incipient threats in immense volumes of network traffic requires new computational and analytic approaches. Network security increasingly requires cooperation between human analysts able to spot suspicious events through means such as data visualization and automated systems that process streaming network data in near real-time to triage events so that human analysts are best able to focus their work.

Pike, William A.; Best, Daniel M.; Love, Douglas V.; Bohn, Shawn J.

2013-01-29T23:59:59.000Z

263

Grid Security and Integration with Minimal Performance Degradation  

E-Print Network [OSTI]

Computational grids are believed to be the ultimate framework to meet the growing computational needs of the scientific community. Here, the processing power of geographically distributed resources working under different ownerships, having their own access policy, cost structure and the likes, is logically coupled to make them perform as a unified resource. The continuous increase of availability of high-bandwidth communication as well as powerful computers built of low-cost components further enhance chances of computational grids becoming a reality. However, the question of grid security remains one of the important open research issues. Here, we present some novel ideas about how to implement grid security, without appreciable performance degradation in grids. A suitable alternative to the computationally expensive encryption is suggested, which uses a key for message authentication. Methods of secure transfer and exchange of the required key(s) are also discussed.

Sanyal, Sugata; Abraham, Ajith; Paprzycki, Marcin

2011-01-01T23:59:59.000Z

264

Security and Privacy in Smart Grid Demand Response Systems  

Science Journals Connector (OSTI)

Various research efforts have focussed on the security and privacy concerns arising from the introduction of smart energy meters. However, in addition to smart metering, the ultimate vision of the smart grid incl...

Andrew Paverd; Andrew Martin; Ian Brown

2014-01-01T23:59:59.000Z

265

Energy and Security Awareness in Evolutionary-Driven Grid Scheduling  

Science Journals Connector (OSTI)

Ensuring the energy efficiency, thermal safety, and security-awareness in todays large-scale distributed ... local access and management policies such as computational grids and clouds. In this chapter, we appro...

Joanna Ko?odziej; Samee U. Khan; Lizhe Wang

2013-01-01T23:59:59.000Z

266

Fine-Grain Access Control for Securing Shared Resources in Computational Grids*  

E-Print Network [OSTI]

Fine-Grain Access Control for Securing Shared Resources in Computational Grids* Abstract, grid environments, grid security, Unix accessmodel. providing an active enforcement of the security. Introduction Grid environments of the future will require an abil- ity to provide a secure execution

Lee, Ruby B.

267

GIVS: Integrity Validation for Grid Security  

Science Journals Connector (OSTI)

In this paper we address the problem of granting the correctness of Grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence of malicious hosts by statistical samp...

Giuliano Casale; Stefano Zanero

2005-01-01T23:59:59.000Z

268

Daonity Grid security from two levels of virtualization  

Science Journals Connector (OSTI)

The service oriented architecture of grid computing has been thoughtfully engineered to achieve a service level virtualization: not only should a grid be a virtual machine (also known as a virtual organization, VO) of unbounded computational power and storage capacity, but also should the virtual machine be serviceable in all circumstances independent from serviceability of any of its component. At present, a grid VO as a result of service level virtualization only is more or less confined to participants from scientific computing communities, i.e., can have a limited scale. It is widely agreed that for a grid to pool resources of truly unbounded scale, commercial enterprises and in particular server-abundant financial institutions, should also go for the grid, i.e., open up their servers for being used by grid VO constructions. We believed that it is today's inadequate strength of the grid security practice that is the major hurdle to prevent commercial organizations from serving and participating the grid. This article presents the work of Daonity which is our attempt to strengthening grid security. We identify that a security service which we name behavior conformity be desirable for grid computing. Behavior conformity for grid computing is an assurance that ad hoc related principals (users, platforms or instruments) forming a grid VO must each act in conformity with the rules for the VO constitution. We apply trusted computing technologies to achieve two levels of virtualization: resource virtualization and platform virtualization. The former is about behavior conformity in a grid VO and the latter, that in an operating system. With these two levels of virtualization working together it is possible to build a grid of truly unbounded scale by VO including servers from commercial organizations.

Haibo Chen; Jieyun Chen; Wenbo Mao; Fei Yan

2007-01-01T23:59:59.000Z

269

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Broader source: Energy.gov (indexed) [DOE]

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

270

A Grid Portal Model Based on Security and Storage Resource Proxy  

Science Journals Connector (OSTI)

Grid computing is recently developed concept in high performance computing. Security and resource management is the two key technologies in a grid. In this paper, we describe a grid portal model based on security

Quan Zhou; Geng Yang

2005-01-01T23:59:59.000Z

271

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Broader source: Energy.gov (indexed) [DOE]

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

272

IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010 99 Security Technology for Smart Grid Networks  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010 99 Security Technology for Smart Grid for a smart grid system, including public key infrastructures and trusted computing. Index Terms--Attestation, public key infrastructure (PKI), Su- pervisory Control And Data Acquisition (SCADA), security, smart grid

Hu, Fei

273

A Security Based Data Mining Approach in Data Grid  

E-Print Network [OSTI]

Grid computing is the next logical step to distributed computing. Main objective of grid computing is an innovative approach to share resources such as CPU usage; memory sharing and software sharing. Data Grids provide transparent access to semantically related data resources in a heterogeneous system. The system incorporates both data mining and grid computing techniques where Grid application reduces the time for sending results to several clients at the same time and Data mining application on computational grids gives fast and sophisticated results to users. In this work, grid based data mining technique is used to do automatic allocation based on probabilistic mining frequent sequence algorithm. It finds frequent sequences for many users at a time with accurate result. It also includes the trust management architecture for trust enhanced security.

Vidhya, S

2010-01-01T23:59:59.000Z

274

Security Aspects of Smart Grid Communication.  

E-Print Network [OSTI]

??As the grid becomes highly interconnected, power protection, control, and monitoring in transmission and distribution substations are increasingly relying on digital controls and digital communication. (more)

Weerathunga, Pubudu E

2012-01-01T23:59:59.000Z

275

Grid security enhancement using access control models; -.  

E-Print Network [OSTI]

??Grid computing is the collaboration of computer resources newlinedistributed across institutional borders to increase the number of computer newlineprocessing cycles and process large amount of (more)

Nithya, M

2014-01-01T23:59:59.000Z

276

Chapter 4 - Smart Grid Considerations: Energy Efficiency vs. Security  

Science Journals Connector (OSTI)

The Smart Grid is expected to increase the efficiency of the current power grid, to cope with volatile power production based on renewable resources, to reduce the need for fossil-based energy resources, and to guarantee the stability of power supply. To achieve these objectives, todays power grid is enhanced by information and communication technology to increase the information flow and to enable a sophisticated power production and power demand management. However, as the power grid is extended to a network of networks, it does not only become smarter, but also more vulnerable to security threats. This chapter discusses the current status and future developments of the Smart Grid and its challenges. Enhancements in terms of energy efficiency and new energy management approaches are covered as well as novel security challenges in different parts of the Smart Grid architecture. In short, this chapter analyzes some of the most striking risks and threats concerning the new Smart Grid infrastructure and discusses interdependencies between energy efficiency and security in the Smart Grid.

Andreas Berl; Michael Niedermeier; Hermann de Meer

2013-01-01T23:59:59.000Z

277

Cyber Security  

Office of Environmental Management (EM)

Advisor Robert Green Staff Action Control Officer Gale Mitchell Deputy Chief Information Officer Donald Adcock Deputy Associate IT Policy & Governance (IM-20) Russell Pereira...

278

Cyber Security  

Broader source: Energy.gov (indexed) [DOE]

(IM-21) Robin Crisp Director Policy & Performance Management Division (IM-22) Russell Pereira Director Records & Privacy Management Division (IM-23) Troy Manigault Director...

279

Cyber Security  

Office of Environmental Management (EM)

Policy & Performance Management Division (IM-22) Russell Pereira Director, Acting Records & Privacy Management Division (IM-23) Troy Manigault Director Associate CIO for IT...

280

A Kerberos security architecture for web services based instrumentation grids  

Science Journals Connector (OSTI)

Instrumentation Grids aim at controlling and managing heterogeneous resources & instruments securely, reliably and in near real-time. Within this context, we present a Web Services based Security Architecture that aims at improving security performance maintaining at the same time interoperability with legacy Grid Security Infrastructure (GSI). Our architecture utilizes GSI X.509 Certificates or Proxy Certificates (RFC3820) for the initial authentication of a user. However, it subsequently maps this identity to a Kerberos one and utilizes WS Security Kerberos Token Profile for embedding user credentials within WS exchange mechanisms. It then provides user authorization, thus realizing a complete AAI (Authentication & Authorization Infrastructure). In order to demonstrate and quantify the performance improvement achieved by our approach over a message exchange using X.509 Certificate Token Profile, we present comparative measurements on implementations of the two options. Our results demonstrate that the Kerberos message exchange schema exhibits up to 50% message throughput improvement, under high CPU load on the server.

Athanasios Moralis; Vassiliki Pouli; Symeon Papavassiliou; Vasilis Maglaris

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Negotiation of Multilateral Security Decisions for Grid Computing Li Zhou Clifford Neuman  

E-Print Network [OSTI]

Negotiation of Multilateral Security Decisions for Grid Computing Li Zhou Clifford Neuman Architecture that facilitates the collaboration in making security decisions for grid services. In particular security decisions according to the level of trust among grid service providers. 1. Introduction The grid

Hwang, Kai

282

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access  

E-Print Network [OSTI]

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access Marko University of Technology March 17, 2004 Keywords: Grid security, virtual organizations, Grid use case. This paper describes the European Data Grid's (EDG's) java security system and Spitfire database access

Haak, Hein

283

Enhancing Security of Real-Time Applications on Grids through Dynamic Scheduling  

E-Print Network [OSTI]

Enhancing Security of Real-Time Applications on Grids through Dynamic Scheduling Tao Xie Xiao Qin on Grids require security protections to completely fulfill their security-critical needs. Unfortunately to seamlessly integrate security into real-time scheduling for applications running on Grids. In this paper we

Feitelson, Dror

284

A Security Architecture for Computational Grids* Ian Foster* Carl Kessekan2 Gene Tsudik2 Steven Tueckel  

E-Print Network [OSTI]

A Security Architecture for Computational Grids* Ian Foster* Carl Kessekan2 Gene Tsudik2 Steven (grid) computing and develops a security policy and a corresponding security architecture. An implemen to apphcation execution. Fmdy, the interdomaiu security solutions used for grids must be able to irtteroperate

Lee, Ruby B.

285

GEMSS: Privacy and security for a Medical Grid Jean A.M. Herveg1  

E-Print Network [OSTI]

GEMSS: Privacy and security for a Medical Grid Jean A.M. Herveg1 , Federico Crazzolara2 , Stuart E the GEMSS Grid middleware. The security technology employed is based on a public key infrastructure (PKI providers are sufficiently secure. 2. Keywords Grid, Legal, Medical, Personal Data, Security 3. Introduction

Middleton, Stuart E.

286

Secured and trusted three-tier grid architecture  

Science Journals Connector (OSTI)

Grid aims at utilising resources efficiently through coordinated resource sharing and problem solving in a virtual organisation spanning geographical boundaries. A three-tier grid architecture consisting of Service Providers or Resource Provider (SP/RP), brokers and Regional Resource Administrators (RRA), is secured using DDoS attack defense mechanism and spam filtering mechanisms that endeavour to optimise the resource utilisation. An overlay network of Anomaly Detection Agents (ADA) is set up at the RRA level which enables deployment of collaborative defense mechanisms. The presence of these mechanisms minimises the wastage of resources which can be put to effective use in grid applications.

P. Varalakshmi; S. ThamaraiSelvi

2010-01-01T23:59:59.000Z

287

Application-aware secure multicast for power grid communications  

Science Journals Connector (OSTI)

We propose an application-aware approach to setting up secure multicast groups for power grid communications that automatically derives group memberships and verifies configuration conformance from data dependencies in system specifications. We design an abstract multicast model, analysis algorithms, and configuration derivation techniques. These are implemented in a prototype system, SecureSCL. We also provide experimental evidence that IPsec multicast can address latency constraints in power substation networks.

Jianqing Zhang; Carl A. Gunter

2011-01-01T23:59:59.000Z

288

Security Driven Scheduling Model for Computational Grid Using NSGA-II  

Science Journals Connector (OSTI)

Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in...

Rekha Kashyap; Deo Prakash Vidyarthi

2013-12-01T23:59:59.000Z

289

The CIP Report, Vol.11, No. 2 (August 2012): Smart Grid Security...  

Broader source: Energy.gov (indexed) [DOE]

The CIP Report, Vol.11, No. 2 (August 2012): Smart Grid Security The CIP Report, Vol.11, No. 2 (August 2012): Smart Grid Security The August 2012 issue of The CIP Report highlights...

290

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security  

Science Journals Connector (OSTI)

Security is a vital part of an integrated grid application in which heterogeneous services and resources ... dynamically. Authentication and authorization are the major security concerns in grid environment. Most...

V. Ruckmani; G. Sudha Sadasivam

2010-01-01T23:59:59.000Z

291

Building Security System Based on Grid Computing To Convert and Store Media Files  

Science Journals Connector (OSTI)

In the recent years, Grid Computing (GC) has made big steps ... This paper introduces an approach to integrate the security mechanisms, Grid Security Infrastructure (GSI) of the open source...

Hieu Nguyen Trung; Duy Nguyen; Tan Dang Cao

2010-01-01T23:59:59.000Z

292

Ironstack: Performance, Stability and Security for Power Grid Data Networks  

Science Journals Connector (OSTI)

Operators of the nationwide power grid use proprietary data networks to monitor and manage their power distribution systems. These purpose-built, wide area communication networks connect a complex array of equipment ranging from PMUs and synchrophasers ... Keywords: software-defined networking, SDNs, network performance, high-assurance computing, security

Zhiyuan Teo, Vera Kutsenko, Ken Birman, Robbert Van Renesse

2014-06-01T23:59:59.000Z

293

Automation and security of Supply (Smart Grid Project) | Open Energy  

Open Energy Info (EERE)

Automation and security of Supply (Smart Grid Project) Automation and security of Supply (Smart Grid Project) Jump to: navigation, search Project Name Automation and security of Supply Country Denmark Coordinates 56.26392°, 9.501785° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":56.26392,"lon":9.501785,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

294

The CIP Report: Smart Grid Security (August 2012)  

Broader source: Energy.gov (indexed) [DOE]

this month's issue of The this month's issue of The CIP Report, we highlight the signiThcance of and the challenges with securing the smart grid. fle critical role of the smart grid was recently displayed in India, when more than half of its population lost power due to the failure of its energy infrastructure, and in Virginia, where power companies and residents were unprepared for the consequences of an unexpected, violent "derecho" storm. To further complicate the matter, the various companies and governments responsible for protecting this critical infrastructure are challenged by its interdependencies with other sectors, including cybersecurity and supply chain security, which introduces new stakeholders into the legislative and security fray. First, the Deputy Assistant Secretary for Research and Development (R&D),

295

Performance Comparison of Security Mechanisms for Grid Services Satoshi Shirasuna Aleksander Slominski Liang Fang Dennis Gannon  

E-Print Network [OSTI]

Performance Comparison of Security Mechanisms for Grid Services Satoshi Shirasuna Aleksander Security is one of the most important features for Grid services. There are several specifications used, since most of the security mechanisms involve slow XML manipulations, adding secu- rity to Grid services

296

Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura  

E-Print Network [OSTI]

Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura is a key requirement. Current grid security mechanisms support individual users who are members of well-defined virtual organizations. Recent research seeks to provide manageable grid security services for self

Kafura, Dennis

297

Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson  

E-Print Network [OSTI]

Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information.paterson}@rhul.ac.uk Abstract The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource alloca- tion to these members. Identity

Paterson, Kenny

298

Web Services Security and Load Balancing in Grid Environment Liang Fang, Aleksander Slominski, and Dennis Gannon  

E-Print Network [OSTI]

Web Services Security and Load Balancing in Grid Environment Liang Fang, Aleksander Slominski}@cs.indiana.edu Abstract Web services security has some crucial problems to be solved in building Grid applications and commercial Grid applications. The complexity of Web services security has come to the point that the process

299

On-the-y Dynamic Virtual Organizations in a Secured Grid Environment  

E-Print Network [OSTI]

On-the-y Dynamic Virtual Organizations in a Secured Grid Environment Sylvain Jeuland, Christine built dynamic Virtual Organizations. They manage the security congurations on behalf of grid users their security credentials and upload grid resources for sharing. This work about DVOs is a rst step to manage

Paris-Sud XI, Université de

300

CLOUD-BASED SOFTWARE PLATFORM FOR DATA-DRIVEN SMART GRID MANAGEMENT Yogesh Simmhan, Saima Aman, Alok Kumbhare, Rongyang Liu, Sam Stevens, Qunzhi Zhou and  

E-Print Network [OSTI]

and data networks into national power grids. This Smart Grid offers deep monitoring and controls, but needs. 1. THE SMART GRID CYBER-PHYSICAL SYSTEM Energy security and environmental sustainability are global and reliable power grid [2]. However, this transformation is not without challenges. Existing grid operations

Prasanna, Viktor K.

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Advanced Security Acceleration Project for Smart Grid (ASAP-SG) | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Advanced Security Acceleration Project for Smart Grid (ASAP-SG) Advanced Security Acceleration Project for Smart Grid (ASAP-SG) June 12, 2013 Problem Statement: The goal of this project is to develop a set of computer and network security requirements for the smart grid deployment. The key problem addressed in this project is to provide actionable security guidance to utilities for secure deployment of smart grid systems. Technical Approach: This is a utility-driven, public-private collaborative project to develop system-level security requirements for smart grid technology. The set of requirements developed in the project can be used by utilities at various stages of deployment including procurement, configuration, deployment, commissioning, and operation of smart grid systems. The ASAP SG project develops security profiles for Smart Grid applications on the basis

302

Microsoft Word - OE Cyber Release 10 18 07.doc  

Broader source: Energy.gov (indexed) [DOE]

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

303

This Thursday: Google+ Hangout on Securing the Smart Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

This Thursday: Google+ Hangout on Securing the Smart Grid This Thursday: Google+ Hangout on Securing the Smart Grid This Thursday: Google+ Hangout on Securing the Smart Grid May 14, 2013 - 1:54pm Addthis April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs Sign up at the Google+ Event page. Tweet questions to @ENERGY with the hashtag #AskEnergy. Ask us on Facebook and Google+. Email questions to newmedia@hq.doe.gov. Happening now on energy.gov/live Join us this Thursday, May 16 at 2:00pm EDT for a Google+ Hangout on Securing the Smart Grid. Panelists from across the power systems industry will discuss a critical element of a secure and resilient electric power system, the smart grid cybersecurity workforce. Grid security professionals are the workers at the core of a secure and resilient national electric system. As part of the Energy Department's

304

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid  

E-Print Network [OSTI]

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

Wang, Wenye

305

Towards a Secure and Efficient Model for Grid Computing using Mobile Code  

E-Print Network [OSTI]

for a Grid infrastructure which addresses issues such as customizable distribution of computation, securityTowards a Secure and Efficient Model for Grid Computing using Mobile Code Walter Binder 1 mentioned as an attractive technol­ ogy for distributing computations inside a Grid consisting

Di Marzo Serugendo, Giovanna

306

On the Application of Identity-Based Cryptography in Grid Security  

E-Print Network [OSTI]

infrastructures for grid applications. In this thesis, we propose a fully identity-based key infrastructureOn the Application of Identity-Based Cryptography in Grid Security Hoon Wei Lim Technical Report the Application of Identity-Based Cryptography in Grid Security Hoon Wei Lim Thesis submitted to the University

Dent, Alexander W.

307

MetaData for Efficient, Secure and Extensible Access to Data in a Medical Grid  

E-Print Network [OSTI]

1 MetaData for Efficient, Secure and Extensible Access to Data in a Medical Grid Jean-Marc Pierson1 to access data and to secure the transactions. Keywords: metadata management, access control, medical grids imaging project grid. Metadata represent data about the data: In our case, the data are medical images

Paris-Sud XI, Université de

308

A Secure Grid Medical Data Manager Interfaced to the gLite Middleware.  

E-Print Network [OSTI]

A Secure Grid Medical Data Manager Interfaced to the gLite Middleware. Johan Montagnat (johan@i3s. Keywords: Secure grid storage, gLite middleware, medical data management 1. Context 1.1. Objectives Many archiving, processing and analysis is needed. Grid infrastructures are promising for dealing with challenges

Paris-Sud XI, Université de

309

Los Alamos director echoes cyber concerns  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

310

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

311

Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment  

Science Journals Connector (OSTI)

A central security requirement for grid computing can be referred to as behaviour ... (users, platforms or instruments) forming a grid virtual organisation (VO) must each act ... the rules for the VO constitution...

Wenbo Mao; Fei Yan; Chuanjiang Yi; Haibo Chen

2010-01-01T23:59:59.000Z

312

A Dynamic Management Framework for Security Policies in Open Grid Computing Environments  

Science Journals Connector (OSTI)

A computational grid is a kind of open and distributed ... dynamic virtual organization (VO) membership. Dynamic security policy management for multiple VOs in grids is challenging due to the heterogeneous nature...

Chiu-Man Yu; Kam-Wing Ng

2004-01-01T23:59:59.000Z

313

Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes  

Science Journals Connector (OSTI)

In this paper results from research on security policy enforcement for cross-domain defined business ... in BPEL are transferred to the field of Grid computing, where BPEL is used to define Grid processes. In ord...

Klaus-Peter Fischer; Udo Bleimann

2007-01-01T23:59:59.000Z

314

GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks  

Science Journals Connector (OSTI)

The USC GridSec project develops distributed security infrastructure and self-defense capabilities to secure ... wide-area networked resource sites participating in a Grid application. We report new developments ...

Kai Hwang; Yu-Kwong Kwok; Shanshan Song

2005-01-01T23:59:59.000Z

315

DHT-based security infrastructure for trusted internet and grid computing  

Science Journals Connector (OSTI)

We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.

Kai Hwang; Min Cai; Yu-Kwong Kwok; Shanshan Song; Yu Chen; Ying Chen

2006-01-01T23:59:59.000Z

316

Sandboxing for a free-to-join grid with support for secure site-wide storage area  

E-Print Network [OSTI]

Sandboxing for a free-to-join grid with support for secure site-wide storage area Edjozane to provide security for OurGrid, an easy-to-use free-to-join grid that sup- ports Bag-of-Tasks applications. OurGrid poses in- teresting security challenges. It is free-to-join (which means one runs unknown

Cirne, Walfredo

317

A Security Auditing Approach Based on Mobile Agent in Grid Environments  

Science Journals Connector (OSTI)

Due to the dynamic and multi-institutional nature, auditing is fundamental and difficult to solve in grid computing. In this paper, we identify security-auditing requirements, and propose a Cross-Domain Security ...

Zhenghong Xiao; Changqin Huang; Fuyin Xu

2006-01-01T23:59:59.000Z

318

Enhancing the Hierarchical Clustering Mechanism of Storing Resources Security Policies in a Grid Authorization System  

Science Journals Connector (OSTI)

Many existing grid authorization systems adopt an inefficient structure of storing security policies for the available resources, which reduces ... scalability and leads to huge repetitions in checking security r...

Mustafa Kaiiali; Rajeev Wankar; C. R. Rao

2010-01-01T23:59:59.000Z

319

Secure outsourcing of DNA sequences comparisons in a Grid environment RACHEL AKIMANA, OLIVIER MARKOWITCH and YVES ROGGEMAN  

E-Print Network [OSTI]

Secure outsourcing of DNA sequences comparisons in a Grid environment RACHEL AKIMANA, OLIVIER power and/or storage resources. To be really attractive, Grids must provide secured environments (in by a third untrusted server. Key-Words: Grid systems, Secure outsourcing, Secure approximate matching 1

Markowitch, Olivier

320

Pacific Basin Nuclear Conference (PBNC 2012), BEXCO, Busan, Korea, March 18 ~ 23, 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS  

E-Print Network [OSTI]

PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea.kim@kustar.ac.ae Abstract Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing improvement. 1. Introduction Nuclear Power Plants (NPPs) become one of the most important infrastructures

Kim, Kwangjo

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

An Integrated XML Security Mechanism for Mobile Grid Application  

Science Journals Connector (OSTI)

Mobile Grid, or Wireless Grid Services refers to value-added Grid Service by processing in Mobile environment. Besides ... a conceptual shift from Client-Server model to Grid and Peer-to-Peer computing models. As...

Kiyoung Moon; Namje Park; Jongsu Jang

2004-01-01T23:59:59.000Z

322

XML-Based Security Acceleration Methods Supporting Fast Mobile Grid  

Science Journals Connector (OSTI)

Mobile grid, or wireless grid services refers to value-added grid service by processing in mobile environment. Besides ... a conceptual shift from client-server model to grid and peer-to-peer computing models. As...

Namje Park; Kiyoung Moon; Howon Kim; Seungjoo Kim

2005-01-01T23:59:59.000Z

323

A POLICY FRAMEWORK FOR THE 21st CENTURY GRID: Enabling Our Secure Energy  

Broader source: Energy.gov (indexed) [DOE]

A POLICY FRAMEWORK FOR THE 21st CENTURY GRID: Enabling Our Secure A POLICY FRAMEWORK FOR THE 21st CENTURY GRID: Enabling Our Secure Energy Future A POLICY FRAMEWORK FOR THE 21st CENTURY GRID: Enabling Our Secure Energy Future This policy framework focuses on the deployment of information and communications technologies in the electricity sector. As they are developed and deployed, these smart grid technologies and applications will bring new capabilities to utilities and their customers. In tandem with the development and deployment of high-capacity transmission lines, which is a topic beyond the scope of this report, smart grid technologies will play an important role in supporting the increased use of clean energy. A POLICY FRAMEWORK FOR THE 21st CENTURY GRID: Enabling Our Secure Energy Future More Documents & Publications

324

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

325

Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid  

E-Print Network [OSTI]

Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid Mohammad: Smart Grid, Energy Consumption Schedule, Privacy. I. INTRODUCTION Energy is critically important varying energy prices, giving incentive for using energy at off-peak hours. Smart grids provide innovative

Shehab, Mohamed

326

Demonstration of Shibboleth in Action across a Range of Security focused Grid Projects  

E-Print Network [OSTI]

Demonstration of Shibboleth in Action across a Range of Security focused Grid Projects Prof. R. O of the critical factors to the success of Grid technologies is ease of use. To encourage wider uptake, the access to large scale computational and data resources such as the National Grid Service (NGS) (www

Glasgow, University of

327

User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid 1 User-oriented Security Supporting Inter-  

E-Print Network [OSTI]

User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid 1 User-oriented Security Supporting Inter- disciplinary Life Science Research across the Grid Professor Richard SINNOTT Glasgow, G12 8QQ, UK r.sinnott@nesc.gla.ac.uk Keywords Grids, Security, Shibboleth, Clinical Trials

Glasgow, University of

328

Smart Grid | Open Energy Information  

Open Energy Info (EERE)

Smart Grid Smart Grid (Redirected from Smart Grid) Jump to: navigation, search US Recovery Act Smart Grid Projects * US Recovery Act Smart Grid Investment Grant Projects (98) The Smart Grid Investment Grant (SGIG) program is authorized by the Energy Independence and Security Act of 2007, Section 1306, as amended by the Recovery Act. The purpose of the grant program is to accelerate the modernization of the nation's electric transmission and distribution systems and promote investments in smart grid technologies, tools, and techniques that increase flexibility, functionality, interoperability, cyber security, situational awareness, and operational efficiency. Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":500,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"","intro":"","outro":"","searchlabel":"\u2026

329

Controlling Energy-Efficient Buildings in the Contextof Smart Grid: A Cyber Physical System Approach  

E-Print Network [OSTI]

regulation service to the power grid using at-scalesimplified model of the power grid with uncertain demand andsimplified model of the power grid with uncertain demand and

Maasoumy, Mehdi

2014-01-01T23:59:59.000Z

330

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

331

Energy Cyber Other Degree Program  

E-Print Network [OSTI]

Rev. Energy Cyber Other Yes No Degree Program States National Security Implications of Energy & Environmental Stress New Theories of Cross-Advisor: Graduation Date: Curric Num: Power and Energy New Approaches to Understanding Dimensions of National Security

332

A security framework for a workflow-based grid development platform  

Science Journals Connector (OSTI)

This paper describes the security framework that is to be developed for the generic grid platform created for the project GREDIA. This platform is composed of several components that need to be secured. The platform uses the OGSA standards, so that the security framework will follow GSI, the portion of Globus that implements security. Thus, we will show the security features that GSI already provides and we will outline which others need to be created or enhanced.

Jos L. Vivas; Carmen Fernndez-Gago; Javier Lopez; Andrs Benjumea

2010-01-01T23:59:59.000Z

333

Application of Grid Security to Personal Distributed Environments  

Science Journals Connector (OSTI)

As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile devices ... of the PDE and compa...

Allan Tomlinson; Scarlet Schwiderski-Grosche

2004-01-01T23:59:59.000Z

334

Security and privacy in demand response systems in smart grid.  

E-Print Network [OSTI]

??Demand response programs are used in smart grid to improve stability of the electric grid and to reduce consumption of electricity and costs during peak (more)

Paranjpe, Mithila

2011-01-01T23:59:59.000Z

335

Cyber Crime, Cyber Security and Cyber Warfare  

Science Journals Connector (OSTI)

The digital world has become a battleground for the forces of good and evil. There is an ever increasing awareness that the digital world provides an unlimited opportunity to further ones goals.

Mark A. Gregory; David Glance

2013-01-01T23:59:59.000Z

336

Cyber - Protection for utilities ... | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber - Protection for utilities ... Hackers hoping to disrupt the power grid, water or natural gas service may be foiled by an intrusion detection system developed by researchers...

337

Transmission and Distribution World March 2007: DOE Focuses on Cyber Security  

Broader source: Energy.gov [DOE]

Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed.

338

Protecting grids from cross-domain attacks using security alert sharing mechanisms  

Science Journals Connector (OSTI)

In single administrative domain networks there is only one security policy which can be evaluated by the IT security manager, thanks to monitoring and reporting tools. Grid networks are often composed of different administrative domains owned by different organizations dispersed globally. Such networks are referred to as multi-administrative domain networks. Each domain might have its own security policy and may not want to share its security data with less-protected networks, making it more complex to ensure the security of such networks and protecting them from cross-domain attacks. We propose a Security Event Manager (SEM) called the Grid Security Operation Center (GSOC), which facilitates IT security managers in giving a view of the security of the whole grid network without compromising confidentiality of security data. To do so, GSOC provides a security evaluation of each administrative domain (AD) and a parametric security alert sharing scheme. Alert sharing can then be tuned in order to meet local security policy rules.

Raheel Hassan Syed; Maxime Syrame; Julien Bourgeois

2013-01-01T23:59:59.000Z

339

Multilayered IT Security Requirements and Measures for the Complex Protection of Polish Domain-Specific Grid Infrastructure  

Science Journals Connector (OSTI)

The security of the Polish Domain-Specific Grid Infrastructure relies on applying appropriate security standards and practices by five Polish HPC ... We review both aspects of assuring in-depth security in the Po...

Bart?omiej Balcerek; Gerard Frankowski

2014-01-01T23:59:59.000Z

340

Usability and Security of Gaze-Based Graphical Grid Passwords  

Science Journals Connector (OSTI)

We present and analyze several gaze-based graphical password schemes based on recall and cued-recall of grid points; eye-trackers are used to record ... that success rate and entry time for the grid-based schemes...

Majid Arianezhad; Douglas Stebila

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security Challenges of Reconfigurable Devices in the Power Grid  

Science Journals Connector (OSTI)

Control systems used in the electrical power grid cover large geographic areas with hundreds or ... alternative for replacing legacy communication devices in power grid control systems. The advantages include a l...

Suvda Myagmar; Roy Campbell; Marianne Winslett

2008-01-01T23:59:59.000Z

342

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Broader source: Energy.gov (indexed) [DOE]

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

343

Weight-balanced security-aware scheduling for real-time computational grid  

Science Journals Connector (OSTI)

Security-aware scheduling for real-time grid applications is an important task and a little work has been done to accomplish this. In this paper, we propose two scheduling algorithms for real-time grid applications with stringent security requirements, and the proposed algorithms are compared with a few existing scheduling algorithms, i.e. MinMin, MaxMin, EDF/ECT, SPMinMin and SPMaxMin. Security overhead computation for existing and proposed models is done on the basis of security level demand of the tasks. Performance of WB-EDFMin on success rate performance metric is considered to be the best among all the contemporary scheduling algorithms. SFWB-EDFMin compromises on the overall success rate of the grid application but its task scheduling is uniformly spread over the tasks of all security levels.

Rekha Kashyap; Deo Prakash Vidyarthi

2011-01-01T23:59:59.000Z

344

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security, 1st edition  

Science Journals Connector (OSTI)

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security ...

Stephen D. Gantz; Daniel R. Philpott

2012-12-01T23:59:59.000Z

345

A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid  

Science Journals Connector (OSTI)

......weaknesses from the perspective of security. Since the smart grid is related to money and power, both of which...are likely to attack the underlying WMN of the smart grid to obtain monetary benefit or disrupt the power system. Note that the lack......

Hyejin Son; Taeyoon Kang; Hwangnam Kim; Jong-Bae Park; Jae Hyung Roh

2012-10-01T23:59:59.000Z

346

Fuzzy Trust Integration for Security Enforcement in Grid Computing*  

E-Print Network [OSTI]

was verified by simulation experiments. Our results show up to 90% enhancement in site security. Compared

Hwang, Kai

347

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)...

348

Sandia National Laboratories: Sandia Cyber Engineering Research...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyberdefenders * CERL * computer security * Cyber Engineering Research Laboratory * cybersecurity * SAND2013-2827P * Sandia computing expertise * Sandia Science & Technology Park...

349

Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security  

Science Journals Connector (OSTI)

In recent years, the Grid development focus is transitioning from resources to services. A Grid Service is defined as a Web Service ... different entities. This provides interoperability between different security

Dongkyoo Shin; Jongil Jeong; Dongil Shin

2004-01-01T23:59:59.000Z

350

Smart Grid | Open Energy Information  

Open Energy Info (EERE)

US Recovery Act Smart Grid Projects US Recovery Act Smart Grid Projects * US Recovery Act Smart Grid Investment Grant Projects (98) The Smart Grid Investment Grant (SGIG) program is authorized by the Energy Independence and Security Act of 2007, Section 1306, as amended by the Recovery Act. The purpose of the grant program is to accelerate the modernization of the nation's electric transmission and distribution systems and promote investments in smart grid technologies, tools, and techniques that increase flexibility, functionality, interoperability, cyber security, situational awareness, and operational efficiency. Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":500,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"","intro":"","outro":"","searchlabel":"\u2026

351

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network [OSTI]

terms of the DR service. Energy Market - Power Trading. Withwholesale and/or retail energy market. He can choose to buyGeneration Microgrid Energy market Carbon Emission Market

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

352

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network [OSTI]

lighting) Solar panel and Energy storage Electric from the solar panels, into a virtual energy storage whose

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

353

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network [OSTI]

ESI to maintain any information for access control such as user id-ESI or the EMCS authenticates users using its own database of ID-

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

354

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network [OSTI]

Power generation [KW] on a solar panel in summer andpole, a desk lamp, or a solar panel at home. Challenge:Electric Vehicle (EV) and solar panel to smart light and

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

355

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network [OSTI]

Data logger Measurement MP (ADR client) loads Power ?data over 7 days (168 hours) Figure 3.8: Microgrid operation with power generation, load,power of the submeters. Then, the load drop is measured and compared with CBL data.

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

356

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network [OSTI]

station * Solar panel Figure 3.2: Energy resources incapability Energy resource Specification solar panel 1 5KWh,new types of energy resources like a solar panel or a

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

357

Recommendations on U. S. Grid Security - EAC 2011 | Department...  

Broader source: Energy.gov (indexed) [DOE]

for DOE Action Regarding U.S. Electric Grid Resiliency - March 2014 DOE Responses to EAC Work Products - June 2014 "Cybersecurity for State Regulators" - NARUC Primer (June 2012)...

358

Security issues in distributed energy resources (DER) in smart grid.  

E-Print Network [OSTI]

??One of the main goals of smart grid is to create a decentralized and consumer controlled power system which can increase efficiency, reliability and reduce (more)

Vyas, Mruga

2011-01-01T23:59:59.000Z

359

Security issues in system development life cycle of Smart Grid.  

E-Print Network [OSTI]

??Smart Grid includes critical hardware and software applications that can be misused by an unauthorized person or a hacker. Failures can bring critical parts of (more)

Kahlon, Parminder

2011-01-01T23:59:59.000Z

360

Smart grid powers up on NNSA land in Los Alamos | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Smart grid powers up on NNSA land in Los Alamos | National Nuclear Security Smart grid powers up on NNSA land in Los Alamos | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Smart grid powers up on NNSA land ... Smart grid powers up on NNSA land in Los Alamos Posted By Office of Public Affairs A $53 million state-of-the-art, international smart grid project has been

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Smart grid powers up on NNSA land in Los Alamos | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Smart grid powers up on NNSA land in Los Alamos | National Nuclear Security Smart grid powers up on NNSA land in Los Alamos | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Smart grid powers up on NNSA land ... Smart grid powers up on NNSA land in Los Alamos Posted By Office of Public Affairs A $53 million state-of-the-art, international smart grid project has been

362

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment  

E-Print Network [OSTI]

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

Ruckmani, V

2010-01-01T23:59:59.000Z

363

Quantifiably secure power grid operation, management, and evolution : a study of uncertainties affecting the grid integration of renewables.  

SciTech Connect (OSTI)

This report summarizes findings and results of the Quantifiably Secure Power Grid Operation, Management, and Evolution LDRD. The focus of the LDRD was to develop decisionsupport technologies to enable rational and quantifiable risk management for two key grid operational timescales: scheduling (day-ahead) and planning (month-to-year-ahead). Risk or resiliency metrics are foundational in this effort. The 2003 Northeast Blackout investigative report stressed the criticality of enforceable metrics for system resiliency - the grid's ability to satisfy demands subject to perturbation. However, we neither have well-defined risk metrics for addressing the pervasive uncertainties in a renewable energy era, nor decision-support tools for their enforcement, which severely impacts efforts to rationally improve grid security. For day-ahead unit commitment, decision-support tools must account for topological security constraints, loss-of-load (economic) costs, and supply and demand variability - especially given high renewables penetration. For long-term planning, transmission and generation expansion must ensure realized demand is satisfied for various projected technological, climate, and growth scenarios. The decision-support tools investigated in this project paid particular attention to tailoriented risk metrics for explicitly addressing high-consequence events. Historically, decisionsupport tools for the grid consider expected cost minimization, largely ignoring risk and instead penalizing loss-of-load through artificial parameters. The technical focus of this work was the development of scalable solvers for enforcing risk metrics. Advanced stochastic programming solvers were developed to address generation and transmission expansion and unit commitment, minimizing cost subject to pre-specified risk thresholds. Particular attention was paid to renewables where security critically depends on production and demand prediction accuracy. To address this concern, powerful filtering techniques for spatio-temporal measurement assimilation were used to develop short-term predictive stochastic models. To achieve uncertaintytolerant solutions, very large numbers of scenarios must be simultaneously considered. One focus of this work was investigating ways of reasonably reducing this number.

Gray, Genetha Anne; Watson, Jean-Paul [Sandia National Laboratories, Albuquerque, NM; Silva Monroy, Cesar Augusto [Sandia National Laboratories, Albuquerque, NM; Gramacy, Robert B. [University of Chicago, Chicago, IL

2013-09-01T23:59:59.000Z

364

New Article on Cybersecurity Discusses DOEs Partnership with the Energy Sector to Keep the Grid Reliable and Secure  

Broader source: Energy.gov [DOE]

An article by OEs Carol Hawk and Akhlesh Kaushiva in The Electricity Journal discusses cybersecurity for the power grid and how DOE and the energy sector are partnering to keep the smart grid reliable and secure.

365

Cautionary tales from real world failures for managing security in the cyber world  

Science Journals Connector (OSTI)

Any field of endeavor benefits from a body of knowledge of failures that provide guidance on what to avoid. As a relatively young discipline whose failures can often be handled privately, information security professionals do not have access to the volume ... Keywords: bridges, catastrophic failure, civil engineering, failure, lessons learned

Bill Naber

2010-10-01T23:59:59.000Z

366

Advanced Security Infrastructures for Grid Education Prof R.O. Sinnott, A.J. Stell, Dr J.P. Watt, Prof D.W. Chadwick,  

E-Print Network [OSTI]

Advanced Security Infrastructures for Grid Education Prof R.O. Sinnott, A.J. Stell, Dr J.P. Watt domain. Keywords: Grid, education, Security, PERMIS, Shibboleth. 1. Introduction As Grid technology addressing these challenges. This is one of the first full Grid computing courses available today. Security

Kent, University of

367

The Technology of Cyber Operations Symposium on Cyber Operations and National  

E-Print Network [OSTI]

operations can be conducted with plausible deniability But adversaries make mistakes too, and allThe Technology of Cyber Operations Herb Lin Symposium on Cyber Operations and National Security not acknowledge role of offensive operations. · Offensive cyber operations can also have non-defensive purposes

368

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

369

GS3: a Grid Storage System with Security Features  

Science Journals Connector (OSTI)

Technological trend and the advent of worldwide networks, such as the Internet, made computing systems more and more powerful, increasing both processing and storage capabilities. In Grid computing infrastructure...

Vincenzo D. Cunsolo; Salvatore Distefano; Antonio Puliafito

2010-09-01T23:59:59.000Z

370

Communication and Network Security Requirements for Smart Grid  

Science Journals Connector (OSTI)

To relieve the problems of climate change due to global warming, increased renewable energy generation based on wind and solar has been advocated in the power grid. Due to the intermittent nature of such ... ener...

Victor O. K. Li

2014-01-01T23:59:59.000Z

371

Communications and Security Aspects of Smart Grid Networks Design  

Science Journals Connector (OSTI)

The article explores a global principle of communication in Smart Grid networks with a focus on specific communication infrastructure aspects. The paper is divided in two main parts. First part focuses on a de...

Josef Horalek; Vladimir Sobeslav; Ondrej Krejcar

2014-01-01T23:59:59.000Z

372

Security and stability control system for offshore platforms power grid  

Science Journals Connector (OSTI)

The key technology for offshore platform power grid interlinked-Energy Management System (EMS) is studied in this article. The perfect EMS control solutions are formulated and carried on by the studies of the control strategies of frequency control, voltage control, precedence load shedding, high frequency trip generator, communication failure, and so on according to the power flow and fault simulation calculations against all kinds of working modes of the grid. The power supply effects before and after using the power grid interlink and EMS control are contrasted. Their application has improved the power supply reliability, boosted up the ability against impacts, decreased the spare capability of generators, reduced the maintenance work, and saved the investment.

Zhang Jifen; Hu Peng; Liu Jun

2009-01-01T23:59:59.000Z

373

NISTIR 7916 Proceedings of the Cybersecurity in Cyber-  

E-Print Network [OSTI]

NISTIR 7916 Proceedings of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24 of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24, 2012 Editor: Tanya Brewer Computer Security

374

On the usability of grid middleware and security mechanisms  

Science Journals Connector (OSTI)

...their behalf. AHE can be seen using hybrid Software as a Service (SaaS)/Platform...Solo1999RFC 2459-Internet X.509 public key infrastructure certificate and CRL profileSee http...Many resource providers on a grid infrastructure deploy a standard middleware stack and...

2011-01-01T23:59:59.000Z

375

A situational awareness framework for securing the smart grid using monitoring sensors and threat models  

Science Journals Connector (OSTI)

Security, access control and risk mitigation in the smart grid are matters of great impact for this important sector of the critical infrastructure. Situational awareness requires a means of aggregating information and presenting that information in a manner conducive to assessing risk. While major components of the electric power grid were traditionally deployed in physically isolated networks, they are now utilising IP-based, open, interconnected networks to transmit and manage the supervisory control and data acquisition (SCADA) messages. Unfortunately, SCADA protocols used for communications and the systems that implement those protocols were not originally designed with security in mind. Therefore, in order to enhance security and detect potential malicious behaviour, smart grid operators need detailed and accurate information about the status, integrity, configuration and network topology of SCADA devices as well as information about any threats that may impact the grid. This paper describes a comprehensive framework that provides situational awareness (SA) for SCADA devices and their operations in a smart grid environment. Situational awareness is achieved by processing information collected by monitoring sensors and understanding threats that may affect operations. The proposed framework employs a threat modelling methodology to support this mission.

Anastasia Mavridou; Victor Zhou; Jerald Dawkins; Mauricio Papa

2012-01-01T23:59:59.000Z

376

Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes  

E-Print Network [OSTI]

Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes. Developing novel schemes for demand response in smart electric gird is an increasingly active research area/SCADA for demand response in smart infrastructures face the following dilemma: On one hand, in order to increase

Sastry, S. Shankar

377

Developing a Secure Grid Computing Environment Shell Engine: Containers and Services  

E-Print Network [OSTI]

Developing a Secure Grid Computing Environment Shell Engine: Containers and Services Mehmet A consists of a shell engine that serves as a container environment for managing GCEShell commands, which environments. 2. GCE SHELL ENGINE The shell engine is the core application that interprets commands, runs

378

Assessing security threat scenarios for utility-based reputation model in grids  

Science Journals Connector (OSTI)

Trust and reputation models play an important role in enabling trusted computations over large-scale distributed grids. Many models have been recently proposed and implemented within trust management systems. Nevertheless, the existing approaches usually assess performance of models in terms of resource management while less attention is paid to the analysis of security threat scenarios for such models. In this paper, we assess the most important and critical security threats for a utility-based reputation model in grids. The existing model is extended to address these threat scenarios. With simulations that were run using data collected from the EGEE Grid-Observatory project, we analyse efficiency of the utility-based reputation model against these threats.

Olga Kussul; Nataliia Kussul; Sergii Skakun

2013-01-01T23:59:59.000Z

379

Enhancing security of electronic health records through grid-based user authentication scheme  

Science Journals Connector (OSTI)

Medical research and electronic health record (EHR) maintenance involves large databases that are geographically distributed which calls naturally for a grid computing environment. Huge data in medical image analysis, storage and genome processing demand large medical data storage and computing power. Data sharing, software specialisation and data processing which occur in a heterogeneous way tend to make use of the grid computing environment for the medical field. The security solution for authentication in the existing grid environment is non-scalable. This major drawback can hinder the growth of the user community in the medical field. A simple user authentication scheme is proposed, which enhances the security of the overall system but takes less time for execution and lesser communication cost.

G. Jaspher Willsie Kathrine; E. Kirubakaran; Elijah Blessing Rajsingh

2014-01-01T23:59:59.000Z

380

Wind energy and system security the grid connection moratorium in Ireland  

Science Journals Connector (OSTI)

This examines the interaction between technical challenges and policy choices that are made regarding wind power, and uses the grid connection moratorium in Ireland as a case study. While total installed wind capacity in Ireland is low compared with Germany, Spain and Denmark, wind power penetration is higher in the Irish system than in either the British, UCTE or NORDEL systems. In December 2003 the system operators expressed concerns about high wind power penetration, in particular the challenges of maintaining power system stability, security and reliability, resulting in a moratorium on new grid connection agreements. Significant progress has since been made in grid codes and dynamic models for wind turbines. In March 2006, there remain almost 3000 MW of proposed wind capacity awaiting a grid connection agreement. This paper investigates the technical issues underpinning this moratorium, monitors progress made since its introduction and suggests alternative technical solutions to the moratorium.

B.P. O Gallachoir; P. Gardner; H. Snodin; E.J. McKeogh

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Securing RDS broadcast messages for smart grid applications  

Science Journals Connector (OSTI)

Efforts to reduce peak electrical demand have led to the introduction of demand response (DR) programmes for residences. DR programmes allow customers to reduce or shift consumption to off-peak periods in response to price signals. The RDS network is a strong candidate for delivering DR messages due to its low-cost nature and ubiquitous coverage. However, security concerns arise due to the wireless nature of the communication channel. We present evaluations of three candidate cryptographic methods that could be employed to offer source authentication over the RDS network: BiBa, HORSE and elliptic curve digital signature algorithm (ECDSA). We compare the security offered by the protocols, the bandwidth overhead, computational costs and message reception probability. Simulation results show that, up to a distance of 90 km, all authentication schemes do not affect message reception by the receivers. Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE. ECDSA and HORSE outperform BiBa in terms of message reception beyond 90 km. ECDSA, however, offers higher security than HORSE and BiBa but at the cost of increased computational complexity, in particular, at the receivers. In addition, has the highest bandwidth overhead.

Monageng Kgwadi; Thomas Kunz

2011-01-01T23:59:59.000Z

382

STEM Incubator in Cyber Security (Haxor) Wednesdays 4:00 5:00pm, Manchester 244 Spring 2014  

E-Print Network [OSTI]

curity. Students will experiment with ethical hacking, cyber defense, and reverse engineering techniques: Demonstrable Outcomes . Understanding of ethical hacking approaches and awareness of laws concerning hacking code . The end of semester hacking challenge There is not a single text book that is best suited

Fulp, Errin W.

383

STEM Incubator in Cyber Security (Haxor) Wednesdays 4:00 -5:00pm, Manchester 244 Spring 2014  

E-Print Network [OSTI]

curity. Students will experiment with ethical hacking, cyber defense, and reverse engineering techniques:Demonstrable Outcomes · Understanding of ethical hacking approaches and awareness of laws concerning hacking code · The end of semester hacking challenge There is not a single text book that is best suited

Fulp, Errin W.

384

Prospects of Smart Grid Technologies for a Sustainable and Secure Power  

Open Energy Info (EERE)

Prospects of Smart Grid Technologies for a Sustainable and Secure Power Prospects of Smart Grid Technologies for a Sustainable and Secure Power Supply Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Prospects of Smart Grid Technologies for a Sustainable and Secure Power Supply Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.worldenergy.org/documents/p001546.pdf Equivalent URI: cleanenergysolutions.org/content/prospects-smart-grid-technologies-sus Language: English Policies: "Deployment Programs,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Technical Assistance Regulations: "Resource Integration Planning,Enabling Legislation,Net Metering & Interconnection" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

385

Security Issues and Challenges for the IoT-based Smart Grid  

Science Journals Connector (OSTI)

Abstract Internet of Things (IoT) is the next step evolution of our today Internet, where any physical object/thing having/equipped with computation and communication capabilities could be seamlessly integrated, at different levels, to the Internet. The Smart Grid (SG), which is considered as one of the most critical Infrastructures, is defined as the classical power grid augmented with a large-scale ICT and renewable energy integration, can be seen as one of the largest IoT network. The SG will involve billions of smart objects/things: smart meters, smart appliances, sensors, actuators-cars, etc. in addition to several communication infrastructures whether public (most often) or private. However, security is seen as one of the major factors hampering the rapid and large scale adoption and deployment of both the IoT vision and the Smart Grid. In this paper we investigate the security issues and challenges on the IoT-based SG, and define the major security services that we should consider when dealing with SG security

Chakib Bekara

2014-01-01T23:59:59.000Z

386

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

387

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Broader source: Energy.gov (indexed) [DOE]

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

388

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Broader source: Energy.gov (indexed) [DOE]

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

389

Deception used for Cyber Defense of Control Systems  

SciTech Connect (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

390

Autonomous, Decentralized Grid Architecture: Prosumer-Based Distributed Autonomous Cyber-Physical Architecture for Ultra-Reliable Green Electricity Networks  

SciTech Connect (OSTI)

GENI Project: Georgia Tech is developing a decentralized, autonomous, internet-like control architecture and control software system for the electric power grid. Georgia Techs new architecture is based on the emerging concept of electricity prosumerseconomically motivated actors that can produce, consume, or store electricity. Under Georgia Techs architecture, all of the actors in an energy system are empowered to offer associated energy services based on their capabilities. The actors achieve their sustainability, efficiency, reliability, and economic objectives, while contributing to system-wide reliability and efficiency goals. This is in marked contrast to the current one-way, centralized control paradigm.

None

2012-01-11T23:59:59.000Z

391

Security and Trust Convergence: Attributes, Relations and Provenance  

E-Print Network [OSTI]

-World Impact! State of Cyber Security Cyber should be "controllable" Nuclear, chemical, biological have beenSecurity and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas

Sandhu, Ravi

392

Security and Trust Convergence: Attributes, Relations and Provenance  

E-Print Network [OSTI]

-World Impact! State of Cyber Security Cyber should be "controllable" Nuclear, chemical, biological have been1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas

Sandhu, Ravi

393

The QUANTGRID Project (RO)Quantum Security in GRID Computing Applications  

Science Journals Connector (OSTI)

The QUANTGRID Project financed through the National Center for Programme Management (CNMP?Romania) is the first attempt at using Quantum Crypted Communications (QCC) in large scale operations such as GRID Computing and conceivably in the years ahead in the banking sector and other security tight communications. In relation with the GRID activities of the Center for Computing & Communications (Nat.l Inst. Nucl. Phys.IFIN?HH) the Quantum Optics Lab. (Nat.l Inst. Plasma and LasersINFLPR) and the Physics Dept. (University PolytechnicaUPB) the project will build a demonstrator infrastructure for this technology. The status of the project in its incipient phase is reported featuring tests for communications in classical security mode: socket level communications under AES (Advanced Encryption Std.) both proprietary code in C ++ technology. An outline of the planned undertaking of the project is communicated highlighting its impact in quantum physics coherent optics and information technology.

M. Dima; M. Dulea; M. Petre; C. Petre; B. Mitrica; M. Stoica; M. Udrea; R. Sterian; P. Sterian

2010-01-01T23:59:59.000Z

394

770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System Design for a Secure  

E-Print Network [OSTI]

Design for a Secure and Reconfigurable Power Grid Hairong Qi, Senior Member, IEEE, Xiaorui Wang, Member architecture design that can help assure the security and reliability of the power grid. In this paper, we770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System

Tolbert, Leon M.

395

2012 SG Peer Review - Recovery Act: Secure Interoperable Open Smart Grid Demonstration Project - Tom Magee, ConEd NY  

Broader source: Energy.gov (indexed) [DOE]

Demonstration Project Demonstration Project Patricia Robison Con Edison June 8, 2012 December 2008 Smart Grid Demonstration Project Objective Life-cycle Funding FY10 - FY13 $45.4 m Technical Scope (Insert graphic here) 2 *Integrate Legacy and Smart Grid information systems *Integrate external DR into distribution grid systems: - EV/Battery storage - Building Management Systems (BMS) - Standby generation - Photovoltaic Demonstrate secure interoperable services between utility distribution systems and customer owned distributed resources (DR) December 2008 Needs and Project Targets Integrate customer owned resources into distribution operations to enable customer participation and defer capital investment *Integrate DR resources into operator platform *Implement secure communications to DR resources

396

Cyber Innovation Technology Summit | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

397

Cyber Incidents Involving Control Systems  

SciTech Connect (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

398

An integrated security-aware job scheduling strategy for large-scale computational grids  

Science Journals Connector (OSTI)

All existing fault-tolerance job scheduling algorithms for computational grids were proposed under the assumption that all sites apply the same fault-tolerance strategy. They all ignored that each grid site may have its own fault-tolerance strategy because each site is itself an autonomous domain. In fact, it is very common that there are multiple fault-tolerance strategies adopted at the same time in a large-scale computational grid. Various fault-tolerance strategies may have different hardware and software requirements. For instance, if a grid site employs the job checkpointing mechanism, each computation node must have the following ability. Periodically, the computational node transmits the transient state of the job execution to the server. If a job fails, it will migrate to another computational node and resume from the last stored checkpoint. Therefore, in this paper we propose a genetic algorithm for job scheduling to address the heterogeneity of fault-tolerance mechanisms problem in a computational grid. We assume that the system supports four kinds fault-tolerance mechanisms, including the job retry, the job migration without checkpointing, the job migration with checkpointing, and the job replication mechanisms. Because each fault-tolerance mechanism has different requirements for gene encoding, we also propose a new chromosome encoding approach to integrate the four kinds of mechanisms in a chromosome. The risk nature of the grid environment is also taken into account in the algorithm. The risk relationship between jobs and nodes are defined by the security demand and the trust level. Simulation results show that our algorithm has shorter makespan and more excellent efficiencies on improving the job failure rate than the MinMin and sufferage algorithms.

Chao-Chin Wu; Ren-Yi Sun

2010-01-01T23:59:59.000Z

399

Building the TeraGrid  

Science Journals Connector (OSTI)

...improved service. (a) Security in a Grid environment Keeping computer...optical networking, Grid software compatibility, security and the performance of...users to manipulate their security credentials. Coordinated Grid middleware. The TeraGrid...

2005-01-01T23:59:59.000Z

400

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Service task partition and distribution in star topology computer grid subject to data security constraints  

Science Journals Connector (OSTI)

The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the \\{EBs\\} and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented.

Yanping Xiang; Gregory Levitin

2011-01-01T23:59:59.000Z

402

Cyber-Physical Systems CPS Program  

E-Print Network [OSTI]

prosthetics Critical Infrastructure More reliable and efficient power grid Highways that allow denser traffic hybridization of computational (logical), physical, and human action." Examples of cyber-physical systems devices and systems, next-generation power grid, future defense systems, next-generation automobiles

Rajkumar, Ragunathan "Raj"

403

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Broader source: Energy.gov (indexed) [DOE]

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

404

This paper appeared in Proc. IEEE/ACM 6th Int'l Symp. Cluster Computing and the Grid (CCGrid), 2nd Int'l Workshop on Cluster Security, May 2006.  

E-Print Network [OSTI]

for data grids are inadequate to meet the security needs of data- intensive applications. To remedy improves security and performance over two existing scheduling algorithms. 1. Introduction A grid on security for applications running on grids [4][5][10]. Our proposed scheduling scheme for security

Qin, Xiao

405

Enhancing grid security by fine-grained behavioral control and negotiation-based authorization  

Science Journals Connector (OSTI)

Nowadays, Grid has become a leading technology in distributed computing. Grid poses a seamless sharing of heterogeneous computational ... to different domains and conducts efficient collaborations between Grid us...

Hristo Koshutanski; Aliaksandr Lazouski

2009-08-01T23:59:59.000Z

406

A XKMS-Based Security Framework for Mobile Grid into the XML Web Services  

Science Journals Connector (OSTI)

Mobile Grid, or Wireless Grid Services refers to value-added Grid Service by processing in Mobile environment. Besides ... a conceptual shift from Client-Server model to Grid and Peer-to-Peer computing models. As...

Namje Park; Kiyoung Moon; Jongsu Jang; Sungwon Sohn

2004-01-01T23:59:59.000Z

407

Sandia National Laboratories: National Security Missions: Defense...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering...

408

Power grid simulation, evaluation, and test framework.  

E-Print Network [OSTI]

??The Virtual Power System Testbed (VPST) at the University of Illinois at Urbana-Champaign is part of the Trustworthy Cyber Infrastructure for the Power Grid (TCIP) (more)

Bergman, David C.

2010-01-01T23:59:59.000Z

409

Fundamental Limits of Cyber-Physical Security in Smart Power Grids Yue Zhao, Andrea Goldsmith, and H. Vincent Poor  

E-Print Network [OSTI]

) for detecting such attacks, while attackers devise attacks that are unobservable by such PMU networks attacks leads to a natural characterization of their potential impacts. With optimized PMU deployment there be data attacks on measurements that disrupt situation awareness [1], but also control signals of many

Zhao, Yue

410

Cyber-physical energy systems: focus on smart buildings  

Science Journals Connector (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

411

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Broader source: Energy.gov (indexed) [DOE]

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

412

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

413

Security constrained generation scheduling for grids incorporating wind, photovoltaic and thermal power  

Science Journals Connector (OSTI)

Abstract In this paper, security constrained generation scheduling (SCGS) problem for a grid incorporating thermal, wind and photovoltaic (PV) units is formulated. The formulation takes into account the stochastic nature of both wind and PV power output and imbalance charges due to mismatch between the actual and scheduled wind and PV power outputs. A hybrid technique in which the basic elements are a genetic algorithm (GA) with artificial neural network (ANN) and a priority list (PL) is used to minimize the total operating costs while satisfying all operational constraints considering both conventional and renewable energy generators. Numerical results are reported and discussed based on the simulation performed on the IEEE 24-bus reliability test system. The results demonstrate the efficiency of the proposed approach to reduce the total production cost for real time operation. Moreover, the results verified that the proposed approach can be applied to different problem dimensions and can score more favorably compared with analytical techniques.

Azza A. ElDesouky

2014-01-01T23:59:59.000Z

414

UK Workshop on Grid Security Experiences, Oxford 8th and 9th July 2004 Multilayer Privilege Management for Dynamic Collaborative  

E-Print Network [OSTI]

UK Workshop on Grid Security Experiences, Oxford 8th and 9th July 2004 Multilayer Privilege will witness on-demand creation of dynamically-evolving, scalable Virtual Organisations (VO) spanning national satellite imagery). Being a large project, it would have several work packages involving different parts

Kent, University of

415

Integration of task abortion and security requirements in GA-based meta-heuristics for independent batch grid scheduling  

Science Journals Connector (OSTI)

Scheduling and resource allocation in large scale distributed environments, such as Computational Grids (CGs), arise new requirements and challenges not considered in traditional distributed computing environments. Among these new requirements, task abortion and security become needful criteria for Grid schedulers. The former arises due to the dynamics of the Grid systems, in which resources are expected to enter and leave the system in an unpredictable way. The latter requirement appears crucial in Grid systems mainly due to a multi-domain nature of CGs. The main aim of this paper is to develop a scheduling model that enables the aggregation of task abortion and security requirements as additional, together with makespan and flowtime, scheduling criteria into a cumulative objective function. We demonstrate the high effectiveness of genetic-based schedulers in finding near-optimal solutions for multi-objective scheduling problem, where all criteria (objectives) are simultaneously optimized. The proposed meta-heuristics are experimentally evaluated in static and dynamic Grid scenarios by using a Grid simulator. The obtained results show the fast reduction of the values of basic scheduler performance metrics, especially in the dynamic case, that confirms the usefulness of the proposed approach in real-life scenarios.

Joanna Ko?odziej; Fatos Xhafa

2012-01-01T23:59:59.000Z

416

Introduction to NISTIR 7628 Guidelines for  

E-Print Network [OSTI]

Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security The Smart Grid................................................................................................................3 2. Cyber Security Context: Today's Grid, Tomorrow's Smart Grid...........................................................17 4.1 Research and Development Themes for Smart Grid Cyber Security

417

Grid Energy Storage December 2013 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Grid Energy Storage December 2013 Grid Energy Storage December 2013 Grid Energy Storage December 2013 Modernizing the electric grid will help the nation meet the challenge of handling projected energy needs-including addressing climate change by relying on more energy from renewable sources-in the coming decades, while maintaining a robust and resilient electricity delivery system. By some estimates, the United States will need somewhere between 4 and 5 tera kilowatt-hours of electricity annually by 2050. Those planning and implementing grid expansion to meet this increased electric load face growing challenges in balancing economic and commercial viability, resiliency, cyber-security, and impacts to carbon emissions and environmental sustainability. Energy storage systems (ESS) will play a

418

Smart Grid Investment Grant Recipient Information | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Technology Development » Smart Grid » Recovery Act Technology Development » Smart Grid » Recovery Act SGIG » Smart Grid Investment Grant Recipient Information Smart Grid Investment Grant Recipient Information BACKGROUND The Department of Energy's Office of Electricity Delivery and Energy Reliability's goal was to expeditiously negotiate the Smart Grid Investment Grant awards so each recipient could begin implementing their project in a timely fashion. Each recipient can: review presentations on the SGIG negotiating process; review the special clauses and reporting requirements of the American Recovery and Reinvestment Act; review the Department's cost and benefit data collection and reporting template; present issues and activities for ensuring cyber security protections; review the Department's project management philosophy.

419

Static Security Analysis of the Regional Power Grid Based on the Busbar Automatic Transfer Switch  

Science Journals Connector (OSTI)

In order to solve the inapplicability of the transmission grid N-1 criterion in the regional power grid which is running with a large number ... BATS device into use after the regional power grid failure, we come...

Liang Zhao; Jian Zhang; He Zhu

2014-01-01T23:59:59.000Z

420

A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services  

Science Journals Connector (OSTI)

Todays grid architecture encompasses a far greater breadth of applications than the traditional grid, which focused on distributed applications processing large amounts of data. Newer grid applications are more ...

Namje Park; Kiyoung Moon; Kyoil Chung; Dongho Won; Yuliang Zheng

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment  

Science Journals Connector (OSTI)

Grid Computing is information technology which used to ... data, sensors and other resources across global. Grid Computing Environment provides the services like Job ... Environment and web services as well. So Grid

Raghavendra Prabhu; Basappa B. Kodada

2012-01-01T23:59:59.000Z

422

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

423

January 2014 Cybersecurity Awareness Campaign - Secure Online...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping The primary cyber theme for the...

424

Time-based intrusion detection in cyber-physical systems  

Science Journals Connector (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

425

Smart Energy Grid Resources | OSTI, US Dept of Energy, Office of Scientific  

Office of Scientific and Technical Information (OSTI)

Smart Energy Grid Resources Smart Energy Grid Resources Find government research information related to smart energy grid technologies through OSTI collections. Find full text technical reports, citations, project summaries and more. OSTI makes R&D information rapidly available to researchers and the public so that discovery can be accelerated. Research from Information Bridge Open Automated Demand Response Communications Specification (Version 1.0) High Penetration of Photovoltaic (PV) Systems into the Distribution Grid, Workshop Report Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues Estimated Value of Service Reliability for Electric Utility Customers in the U.S. Weather forecast-based optimization of integrated energy systems. Building America System Research Plan for Reduction of Miscellaneous

426

Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.  

SciTech Connect (OSTI)

Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

2005-12-01T23:59:59.000Z

427

Cloud-Based Software Platform for Big Data Analytics in Smart Grids  

Science Journals Connector (OSTI)

This article focuses on a scalable software platform for the Smart Grid cyber-physical system using cloud technologies. Dynamic Demand Response is a challenge-application to perform intelligent demand-side management and relieve peak load in Smart Power Grids. The platform offers an adaptive information integration pipeline for ingesting dynamic data; a secure repository for researchers to share knowledge; scalable machine-learning models trained over massive datasets for agile demand forecasting; and a portal for visualizing consumption patterns and validated at the University of Southern California's campus microgrid. The article examines the role of clouds and their tradeoffs for use in the Smart Grid Cyber-Physical System.

Yogesh Simmhan; Saima Aman; Alok Kumbhare; Rongyang Liu; Sam Stevens; Qunzhi Zhou; Viktor Prasanna

2013-01-01T23:59:59.000Z

428

Smart Grid | OpenEI Community  

Open Energy Info (EERE)

out, brown out, bulk power system, electricity grid, future grid, grid history, security, Smart Grid, transmission Dc The Internet of Things Helping Utilities Posted by: Dc 16 Oct...

429

Cyber Train Videos | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Train Videos 1. Cyber Train Overview 2. Cyber Train Opt-Out Process 3. Cyber Train Complete Training 4. Submitting Course Completion Materials...

430

2012 SG Peer Review - Recovery Act: LADWP Smart Grid Regional Demonstration Project - Mukhlesur Bhuiyan, City of Los Angeles Dept. of Water & Power  

Broader source: Energy.gov (indexed) [DOE]

Peer Review Meeting Peer Review Meeting San Diego, CA Los Angeles Department of Water and Power - Smart Grid Regional Demonstration Program Mukhles Bhuiyan Program Director June 8, 2012 December 2008 Smart Grid Regional Demonstration Program Objective Life-cycle Funding ($K) FY10/11 - FY15/16 $60,280K Match Grant Technical Scope *Integrate Electric Vehicles into the LADWP grid *Demonstrate integrated Demand Response operation and technology. *Develop a comprehensive portfolio of Customer Behavior studies *Demonstrate next generation of Cyber Security *Using test bed sites to deploy and demonstrate an integrated communication, demand response, and electric vehicle infrastructure, protected by the next generation cyber security. *All this will be done in conjunction with consumer behavior studies identifying methods to

431

Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment  

Science Journals Connector (OSTI)

Pervasive and on-demand computing are now a reality, mainly in the scientific area, and the computational Grid concept is gaining popularity as a scalable ... distributed computing and data resources. But, as Grids

Francesco Palmieri

2006-01-01T23:59:59.000Z

432

Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision  

Science Journals Connector (OSTI)

The GRASP project aims to provide an OGSA compliant infrastructure to allow Application Service Providers to exploit Grid concepts and infrastructure. Orchestration of grid service instances running somewhere on...

M. Gaeta; G. Laria; P. Ritrovato; N. Romano; B. Serhan; S. Wesner

2004-01-01T23:59:59.000Z

433

Wide-Area Communication for Grids: An Integrated Solution to Connectivity, Performance and Security Problems  

E-Print Network [OSTI]

, this approach violates site security and requires manual interaction of site administrators. The SOCKS pro

Kielmann, Thilo

434

NISTIR 7628 Guidelines for  

E-Print Network [OSTI]

NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements The Smart Grid Interoperability Panel ­ Cyber Security Working Group August 2010 #12;NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security

435

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect (OSTI)

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a months worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a months worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-12-19T23:59:59.000Z

436

First-Ever Demonstration of Quantum Cryptography to Improve Security of the  

Broader source: Energy.gov (indexed) [DOE]

First-Ever Demonstration of Quantum Cryptography to Improve First-Ever Demonstration of Quantum Cryptography to Improve Security of the Electric Grid First-Ever Demonstration of Quantum Cryptography to Improve Security of the Electric Grid March 19, 2013 - 4:21pm Addthis A Los Alamos National Laboratory (LANL) team has successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography. The demonstration was conducted in the test bed that is part of the OE-funded Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project at the University of Illinois Urbana-Champaign. For more information about the demonstration, read the complete press release on the LANL website. To learn more about how OE is supporting the research and development of numerous advanced technologies uniquely designed to protect the electric

437

First-Ever Demonstration of Quantum Cryptography to Improve Security of the  

Broader source: Energy.gov (indexed) [DOE]

First-Ever Demonstration of Quantum Cryptography to Improve First-Ever Demonstration of Quantum Cryptography to Improve Security of the Electric Grid First-Ever Demonstration of Quantum Cryptography to Improve Security of the Electric Grid March 19, 2013 - 4:21pm Addthis A Los Alamos National Laboratory (LANL) team has successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography. The demonstration was conducted in the test bed that is part of the OE-funded Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project at the University of Illinois Urbana-Champaign. For more information about the demonstration, read the complete press release on the LANL website. To learn more about how OE is supporting the research and development of numerous advanced technologies uniquely designed to protect the electric

438

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

indicators vis-a-vis one another, which is especially important in the midst of the current budgetary uncertainty in Washington. In this study, we present our definitions of the three indicators; an overview of the eighteen sectors of critical infrastructure...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

439

Security Analysis of Phasor Measurement Units in Smart Grid Communication Infrastructures.  

E-Print Network [OSTI]

??Phasor Measurement Units (PMUs), or synchrophasors, are rapidly being deployed in the smart grid with the goal of measuring phasor quantities concurrently from wide area (more)

[No author

2014-01-01T23:59:59.000Z

440

Los Alamos director echoes cyber concerns  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of times by adversaries. Our systems, and yours, are very attractive. Securing the grid will be key for energy security going forward NATIONAL HARBOR, Md.,May 21, 2013-Los...

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Sandia National Laboratories: Transmission Grid Integration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Infrastructure Security, Modeling, Modeling & Analysis, News, News & Events, Renewable Energy, SMART Grid, Systems Analysis, Transmission Grid Integration, Wind Energy Sandia...

442

A risk-averse security-constrained optimal power flow for a power grid subject to hurricanes  

Science Journals Connector (OSTI)

Abstract During the course of a hurricane, many components in the power grid may be affected. In particular, loss of transmission lines and/or towers due to excess wind conditions may adversely impact the operation of the grid and force a re-dispatch of the generation units. However, large generation units have considerable ramp rates and usually are not able to vary their outputs fast enough. This might lead to temporary imbalances between load and generation that, if not resolved quickly, may result in more severe cascading failures. When a large scale disturbance such as a hurricane is forthcoming it is most beneficial to proactively dispatch the grid so as to minimize the likelihood of future failures. To assist the operator in proactively responding to an imminent event such as a hurricane, a risk-averse generation dispatch model is presented in this paper based on security-constrained AC optimal power flow. To perform (Nk) contingency analysis, a geospatial model of the power grid is developed that allows for the computation of outage probabilities of the transmission lines affected by the hurricane wind fields. Statistical analysis has been performed on the historical data on the past hurricane events in the US in order to simulate realistic hurricane scenarios. The IEEE 118-bus test system has been mapped onto the map of the state of Texas in order to provide a realistic test bed. The proposed algorithm takes into account the cost of operation, as well as the risks associated with overload and over/undervoltage conditions. Moreover, it allows for preventive as well as corrective dispatch of the power grid.

Pirooz Javanbakht; Salman Mohagheghi

2014-01-01T23:59:59.000Z

443

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov [DOE]

The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4.

444

Security and Privacy-Preserving Mechanism for Aggregator Based Vehicle-to-Grid Network  

Science Journals Connector (OSTI)

Electrification is foremost actor in superseding internal combustion engine vehicles with electric vehicles (EV). The EV technology will lead to fundamental shift in existing power grid as well as transportation ...

Binod Vaidya; Dimitrios Makrakis; Hussein T. Mouftah

2014-01-01T23:59:59.000Z

445

Workshop on Secure, Trusted, Manageable and Controllable Grid Services (SGS 2008)  

Science Journals Connector (OSTI)

Grid systems are expected to connect a large number of heterogeneous resources (PCs, databases, HPC clusters, instruments, sensors, visualization tools, etc.), to be used by many users and to execute a large v...

Christophe Crin

2009-01-01T23:59:59.000Z

446

Exploiting the Computational Grid Lecture 1 Globus and the Grid  

E-Print Network [OSTI]

software used. · · The Globus toolkit consists of four key components: · Security ­ handled by Grid Security Infrastructure (GSI) · Resource Management ­ Grid Resource Allocation Manager (GRAM) · Information Services ­ Grid Resource Information Protocol (GRIP) · Data Management ­ Grid FTP · Security is essential

447

Organizational Control Reconfigurations for a Robust Smart Power Grid  

Science Journals Connector (OSTI)

Large-scale cyber-physical infrastructures, such as the Smart Power Grid, are envisioned as some of the core ... administrators. Overloading and failures in the Smart Power Grid threaten the matching of demand-su...

Evangelos Pournaras; Mark Yao; Ron Ambrosio

2013-01-01T23:59:59.000Z

448

grid history | OpenEI Community  

Open Energy Info (EERE)

the grid? black out brown out bulk power system electricity grid future grid grid history security Smart Grid transmission We all rely on it but what do you really know about our...

449

Core Grid Functions: A Minimal Architecture for Grids  

E-Print Network [OSTI]

, etc.) Identity Credential Management Grid Security Infrastructure Globus 2-style interface · Service Security Gateways information servers · J2EE hosting environment servers · Factory services Grid Security · Architectural Constraints (e.g. security) · Bindings #12;8 Resource Discovery & State / Grid Persistent State

450

Development and Demonstration of a Security Core Component  

SciTech Connect (OSTI)

In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on security through obscurity. Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. Cyber crime has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group has something to prove. Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be on the front line if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utilitys SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values even results from a SIEM (Security Information and Event Management) system. When the system deviates from normal, CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSMs built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that real world training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipients SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

Turke, Andy

2014-02-28T23:59:59.000Z

451

Operations Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

or 301-903-9990. Addthis Related Articles Operations Security (OPSEC) Reminder Cybersecurity Is Every Citizen's Responsibility Secretary Moniz visits the Office of Cyber...

452

A Security-enabled Grid System for MINDS Distributed Data Mining  

Science Journals Connector (OSTI)

Interest has been increasing in mining information from a huge amount of data for various purposes such as business processes, scientific discoveries, and security. MINDS (Minnesota INtrusion Detection System) is...

Seonho Kim; Jinoh Kim; Jon B. Weissman

2014-09-01T23:59:59.000Z

453

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

454

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

SciTech Connect (OSTI)

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

455

Cybersecurity and the Smarter Grid  

Science Journals Connector (OSTI)

Reliability remains a fundamental principle of grid modernization efforts, but in today's world, reliability requires cybersecurity. This article discusses energy sector partnerships that are designing cybersecurity into the smart grid with the vision of surviving a cyber-incident while sustaining critical energy delivery functions.

Carol Hawk; Akhlesh Kaushiva

2014-01-01T23:59:59.000Z

456

The Space Power Grid: Synergy Between Space, Energy and Security Policies  

E-Print Network [OSTI]

­ Space solar power, renewable energy, climate policy, global warming, infrastructure, power grid and advantages of space-based versus terrestrial solar power generation. The two great advantages are (1.1% of the total solar energy falling on Earth, and conceivably, lenses in solar orbit could collect solar

457

Sandia National Laboratories: Grid Integration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Specialists Conference On July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News &...

458

2012 SG Peer Review - Recovery Act: Irvine Smart Grid Demonstration Project - Ardalan Kemiab, Southern California Edison  

Broader source: Energy.gov (indexed) [DOE]

Peer Peer Review Meeting Peer Review Meeting Irvine Smart Grid Demonstration (ISGD) ( ) Ed Kamiab Southern California Edison (SCE) 6/8/2012 ISGD Objective SCE' I i S t G id D t ti (ISGD) ill (Insert graphic here) SCE's Irvine Smart Grid Demonstration (ISGD) will demonstrate an integrated, scalable Smart Grid system that includes many of the interlocking pieces of an end- to-end Smart Grid system, from the transmission and distrib tion s stems to cons mer applications s ch as distribution systems to consumer applications such as smart appliances and plug-in electric vehicles. Life-cycle Funding ($K) FY2010 FY2015 1. Energy Smart Customer Devices 2 Year 2020 Distribution System Technical Scope FY2010 - FY2015 $39,612 2. Year 2020 Distribution System 3. Interoperability & Cyber Security 4. Workforce of the Future

459

An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks  

Science Journals Connector (OSTI)

Wireless Sensor Networks (WSNs) have been widely applied to sensing data from different environments. Owing to the resource limitations of WSNs, the data may be tampered easily during transmission. It may happen that data reach incorrect destinations or received incorrect data. It is an important issue for WSNs that base stations must receive correct data and ensure the data confidentiality. This paper proposes an efficient key management scheme and employs symmetric cryptography to secure the messages. In addition, we propose a secure routing protocol to provide a robust route. The proposed scheme further guarantees the destination should receive the data correctly.

Yu-Kai Hsiao; Ren-Junn Hwang

2010-01-01T23:59:59.000Z

460

security | OpenEI Community  

Open Energy Info (EERE)

the grid? black out brown out bulk power system electricity grid future grid grid history security Smart Grid transmission We all rely on it but what do you really know about our...

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid  

Science Journals Connector (OSTI)

......Firstly, the customer metering data should be end-to-end...the customers' metering data [6]; (ii...secure authentication method should be realized...to minimize their energy cost. With regard...can restore left energy back to the electric...we need to have a verification scheme for the customers......

Hyejin Son; Taeyoon Kang; Hwangnam Kim; Jong-Bae Park; Jae Hyung Roh

2012-10-01T23:59:59.000Z

462

Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. -  

E-Print Network [OSTI]

and energy reserves of wireless sensor nodes while also securing them against attackers. All aspects that they are potentially low cost solutions to a variety of real-world chal- lenges [1]. Their low cost provides a means, real-world wireless sensor networking applica- tions, which require a certain amount of trust

Shi, Weisong

463

Power Grid Defense Against Malicious Cascading Failure  

E-Print Network [OSTI]

An adversary looking to disrupt a power grid may look to target certain substations and sources of power generation to initiate a cascading failure that maximizes the number of customers without electricity. This is particularly an important concern when the enemy has the capability to launch cyber-attacks as practical concerns (i.e. avoiding disruption of service, presence of legacy systems, etc.) may hinder security. Hence, a defender can harden the security posture at certain power stations but may lack the time and resources to do this for the entire power grid. We model a power grid as a graph and introduce the cascading failure game in which both the defender and attacker choose a subset of power stations such as to minimize (maximize) the number of consumers having access to producers of power. We formalize problems for identifying both mixed and deterministic strategies for both players, prove complexity results under a variety of different scenarios, identify tractable cases, and develop algorithms f...

Shakarian, Paulo; Lindelauf, Roy

2014-01-01T23:59:59.000Z

464

Cyber sleuths face off  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to plasma physics and new materials. Contact Communications Office (505) 667-7000 Hacking skills put to the test in week of hands-on cyber warfare training LOS ALAMOS, New...

465

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

466

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

467

September 27 29, 2010, Baltimore Convention Center Focusing on Emerging Automation Specifications and Use Cases, Software Assurance, Healthcare IT, Cyber Security, and Regulatory Compliance  

E-Print Network [OSTI]

the technical burdens of policy compliance, and innovated uses of automation across the enterprise in both, Vulnerability Identification, and Remediation Federal Information Security Management Act (FISMA) Federal Validated Tools Content Validation Innovative Case Studies Highlights Beautiful Baltimore Inner Harbor

468

A simulative analysis of the robustness of Smart Grid networks and a summary of the security aspects.  

E-Print Network [OSTI]

??The need for reliable and quick communication in the power grid is growing and becoming more critical. With the Smart Grid initiative, an increasing number (more)

Kubler, Sarah Marie

2011-01-01T23:59:59.000Z

469

Building a scientific data grid with DiGS  

Science Journals Connector (OSTI)

...the software. (d) Security and virtual organization management For a data grid that spreads across more...complete their work. The grid security infrastructure (GSI...request. In this way, the security of grid data is delegated to...

2009-01-01T23:59:59.000Z

470

Protecting Intelligent Distributed Power Grids Against Cyber...  

Broader source: Energy.gov (indexed) [DOE]

IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But...

471

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice  

Science Journals Connector (OSTI)

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and ...

Steve Winterfeld; Jason Andress

2012-12-01T23:59:59.000Z

472

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

473

Bridging Organizational Network Boundaries on the Grid  

E-Print Network [OSTI]

-productivity. Security issues studied in Grid applications include issues of authentication [18]. There is an obvious]. The mishandling of interoperability between domain security policies, or its total absence, can break grid], can block grid applications that need to go on the network. We refer to this as the grid security

Abramson, David

474

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect (OSTI)

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energys (DOEs) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEs Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

475

Power Grid Proposal Motivation  

Broader source: Energy.gov (indexed) [DOE]

TCIP: Trustworthy Cyber TCIP: Trustworthy Cyber Infrastructure for the Power Grid William H. Sanders University of Illinois at Urbana-Champaign TCIP team proprietary. Do not distribute without written permission. DOE Office of Electricity Delivery & Energy Reliability Visualization and Controls Program Peer Review, October 2006 2 Scale of effort * $1.5 M per year for 5 years (Total FY06 DOE funding: 125K) * NSF/CISE, NSF/ENG, DOE, DHS * 4 universities, 19 senior investigators - University of Illinois at Urbana-Champaign (14) - Washington State University (3) - Cornell University (1) - Dartmouth University (1) * 19 member external advisory board (growing from 14) 3 TCIP Vision and Strategy * Provide the fundamental science and technology to create an intelligent, adaptive power grid which -

476

Sandia National Laboratories: power-grid analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

power-grid analysis New Jersey Transit FutureGrid MOU Signing On October 4, 2013, in Analysis, Energy Surety, Infrastructure Security, Microgrid, Modeling, Modeling & Analysis,...

477

Sandia National Laboratories: smart-grid technologies  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

smart-grid technologies New Jersey Transit FutureGrid MOU Signing On October 4, 2013, in Analysis, Energy Surety, Infrastructure Security, Microgrid, Modeling, Modeling & Analysis,...

478

Sandia National Laboratories: Distribution Grid Integration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Specialists Conference On July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News &...

479

Teaching the Grid: Learning Distributed Computing with the M-grid Framework  

E-Print Network [OSTI]

. This situation arises in a number of different scenarios, including Grid computing which is a secure, service how to use as real Grid software requires extensive setting up and complex security processes. M-grid it is executed. Established Grid systems have extensive security infrastructures associated with them

Walters, Robert

480

Security for grids  

E-Print Network [OSTI]

lc=1033 [21] Liberty Alliance Project. Introduction to theGuidelines. Version 1.0. Liberty Alliance Project. http://

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "grid cyber security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

482

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News & Events, Photovoltaic, Renewable...

483

Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach  

E-Print Network [OSTI]

-physical security is a topic of primary concern in the envisioned smart power grid [1]­[3]. Besides failures the smart grid vision. Related work. While the security of the electricity network has always been-physical security in smart power grids. Traditionally, state estimation and detection procedures have been designed

Bullo, Francesco

484

O`ahu Grid Study: Validation of Grid Models  

E-Print Network [OSTI]

O`ahu Grid Study: Validation of Grid Models Prepared for the U.S. Department of Energy Office Resource Technologies for Energy Security Subtask 7.2 Deliverable By GE Global Research Niskayuna, New York

485

Security is Not an Option | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

is Not an Option Security is Not an Option A 10-year roadmap for achieving control system cyber security in the energy industry has been hailed as a model for other industries....

486

Sandia National Laboratories: modernize the electric grid  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Assurance, Energy Storage, Energy Storage Systems, Energy Surety, Grid Integration, Infrastructure Security, Microgrid, Modeling & Analysis, News, News & Events,...

487

Cyber-Security week is coming up during the week of October 13, thru October 17, 2008. This year the Residence Hall Association is sponsoring a poster contest to educate and  

E-Print Network [OSTI]

the Residence Hall Association is sponsoring a poster contest to educate and bring awareness of cyber this is an issue that affects all of us. How do you get involved? Your poster should created electronically the document in a PDF format. What will you be doing? The poster should consist of information about the topic

Ray, David

488

Audited credential delegation: a usable security solution for the virtual physiological human toolkit  

Science Journals Connector (OSTI)

...the widest international scale. grid security|e-health security|information...of the existing computational grid security infrastructures use public key...mechanism has required an evolution of grid security policies because it violates the...

2011-01-01T23:59:59.000Z

489

RECOVERY ACT SELECTIONS FOR SMART GRID INVESTMENT GRANT AWARDS - BY STATE  

Broader source: Energy.gov (indexed) [DOE]

STATE STATE HQ State HQ City Name of Awardee Brief Project Description Recovery Act Funding Participant Cost Share Total Project Value Map of Project Coverage Area AL Birmingham Southern Company Services, Inc. Deploy five integrated smart grid technology systems that enhance energy efficiency, cyber security, distribution and transmission line automation, and smart power substations that will reduce energy load and save money for consumers. Will also benefit customers in FL, GA, MS, NC and SC. $164,527,160 $165,603,272 $330,130,432 http://www.smartgrid.gov/sites/default/files/cover age_maps/SmartGridMap- SouthernCompany.JPG Alabama Total $164,527,160 $165,603,272 $330,130,432 AR Forrest City Woodruff Electric Install smart meters for more than 13,000 electric cooperative customers that will provide time-of-use data,

490

NISTIR 7628 Guidelines for  

E-Print Network [OSTI]

NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid The Smart Grid Interoperability Panel ­ Cyber Security Working Group August 2010 #12;NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid The Smart Grid Interoperability Panel

491

Course Description Grid Computing, NGSSC, 2p  

E-Print Network [OSTI]

#12;­ Grid security: Grid security demands and solutions for, e.g., authen- tication, authorityCourse Description Grid Computing, NGSSC, 2p Erik Elmroth, Olle Mulmo, and Leif Nixon February 14, 2003 General information This course is designed to give a broad overview of the concept of grid comput

Elmroth, Erik

492

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect (OSTI)

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

493

First-Ever Demonstration of Quantum Cryptography to Improve Security...  

Energy Savers [EERE]

First-Ever Demonstration of Quantum Cryptography to Improve Security of the Electric Grid First-Ever Demonstration of Quantum Cryptography to Improve Security of the Electric Grid...

494

Cyber and physical infrastructure interdependencies.  

SciTech Connect (OSTI)

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

495

Sandia National Laboratories: SMART Grid  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Integration, Infrastructure Security, Microgrid, News, News & Events, Partnership, SMART Grid Daniel Borneo and Ben Schenkman (both in Sandia's Energy Surety Engineering and...

496

Cyber and Security Assessments | Department of Energy  

Energy Savers [EERE]

material. To accomplish this independent oversight function, our office sponsors and trains the DOE composite adversary team to role play the postulated adversary during...

497

Strengthening Cyber Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

the National Environmental Policy Act Vision for 2025: A Framework for Change Demand Response and Smart Metering Policy Actions Since the Energy Policy Act of 2005: A Summary...

498

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

infrastructure systems in the analysis of safety and stability - a significant contribution to the theory of hybrid

Amin, Saurabh

2011-01-01T23:59:59.000Z

499

Design Security and Cyber-Physical Threats  

Science Journals Connector (OSTI)

The trustworthiness of reconfigurable hardware, such as FPGAs is defined by the mechanisms protecting the configuration data. The field programmability of an FPGA is a distinct feature enabling various possibi...

Thomas Feller

2014-01-01T23:59:59.000Z

500

January 2015 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

with members of the Idaho National Laboratory. The lab has a long history in the nuclear energy area and its growing expertise in new threat areas such as cyber security; make it...