Powered by Deep Web Technologies
Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

2

Usable Security in Smart Homes  

E-Print Network (OSTI)

Abstract—A number of technologies are emerging that enable the creation of “Smart Homes”, which are households containing numerous networked devices all interacting with each other over the home network. As these Smart Homes become increasingly prevalent and users become more reliant on mobile devices to handle sensitive information, research related to the development of a usable security framework for Smart Homes is increasing in importance. In this paper, we first give some of the motivating use cases for such a security framework. We then describe some of the design challenges presented by the creation of usable Smart Home security frameworks. With an emphasis on usability, we proceed to highlight the hardships users face when interacting with currently available security frameworks and substantiate the need for a significant improvement in this field. Finally, we summarize and conclude. Key words: Smart Home, home networking, security, usability.

Saad Shakhshir; Dimitris Kalofonos

2005-01-01T23:59:59.000Z

3

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

4

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

5

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

6

Home Production and Social Security Reform ?  

E-Print Network (OSTI)

This paper incorporates home production into a dynamic general equilibrium model of overlapping generations with endogenous retirement to study Social Security reforms. As such, the model differentiates both consumption goods and labor effort according to their respective roles in home production and market activities. Using a calibrated model, we conduct a policy experiment where we eliminate the current pay-as-you-go Social Security System and study the steady state impact. We find that the experiment has important implications for labor supply as well as consumption decisions and that these decisions are influenced by the presence of a home production technology. Comparing our economy to a onegood economy without home production, the welfare gains of eliminating Social Security are magnified significantly. We further demonstrate that the qualitative results hold with the less extreme policy reform where we delay the eligible Social Security benefits claimant age by four years. These policy analyses suggest the importance of modeling home production and distinguishing between both time

Michael Dotsey; Wenli Li; Fang Yang

2012-01-01T23:59:59.000Z

7

Connecting to the Internet Securely; Protecting Home Networks CIAC-2324  

SciTech Connect

With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

Orvis, W J; Krystosek, P; Smith, J

2002-11-27T23:59:59.000Z

8

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

9

Global Home File System at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Home Global Home Filesystem Overview Global home directories (or "global homes") provide a convenient means for a user to have access to source files, input files, configuration files, etc., regardless of the platform the user is logged in to. Wherever possible, you should refer to your home directory using the environment variable $HOME. The absolute path to your home directory (e.g., /u4/elvis/) may change, but the value of $HOME will always be correct. For security reasons, you should never allow "world write" access to your $HOME directory or your $HOME/.ssh directory. NERSC scans for such security weakness, and, if detected, will change the permissions on your directories. Platforms Utilizing Global Home The Global Home file system is available on all NERSC systems except PDSF.

10

February 2012Home Production and Social Security Reform  

E-Print Network (OSTI)

This paper incorporates home production into a dynamic general equilibrium model of overlapping generations with endogenous retirement to study Social Security reforms. As such, the model di¤erentiates both consumption goods and labor e¤ort according to their respective roles in home production and market activities. Using a calibrated model, we …nd that eliminating the current pay-asyou-go Social Security system has important implications for both labor supply and consumption decisions and that these decisions are in‡uenced by the presence of a home production technology. Comparing our benchmark economy to one with di¤erentiated goods but no home production, we …nd that eliminating Social Security bene…ts generates larger welfare gains in the presence of home production. This result is due to the self insurance aspects generated by the presence of home production. Comparing our economy to a one-good economy without home production, we show that the welfare gains of eliminating Social Security are magni…ed even further. These policy analyses suggest the importance of modeling home production and distinguishing between both time use and consumption goods depending on whether they are involved in market or home production. JEL Classi…cations: E21, E62, H55

Michael Dotsey; Wenli Li; Michael Dotsey; Wenli Li; Fang Yang

2012-01-01T23:59:59.000Z

11

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

12

Collaboration Topics - System Software | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our...

13

Compact Neutron Generators for Medical Home Land Security and Planetary Exploration  

E-Print Network (OSTI)

GENERATORS FOR MEDICAL, HOME LAND SECURITY AND PLANETARYdetection schemes, from home-land security applications[4-6

Reijonen, J.

2005-01-01T23:59:59.000Z

14

Secure smart homes using Jini and UIUC SESAME  

E-Print Network (OSTI)

In this paper, we discuss our approach to constructing a dynamic and secure “Smart Home ” environment and tackling the challenges associated with it. “Tiny UIUC SESAME ” is a lightweight Java-implementation of a subset of SESAME. SESAME is an extension to Kerberos that supports public key technologies, access control, and delegation of access rights. We discuss our Tiny UIUC SESAME and how it could be integrated with handheld and consumer devices. With the current advancements in computing power and network technology, the concept of fully automated “smart ” homes is not far fetched. Jini technology from Sun Microsystems provides the necessary facilities for creating “network plug and play” devices, which when connected to a network, announce their presence and enable network users to exploit these devices remotely. Once all devices in a household are automated and connected through a network; authentication, security and access control become important and challenging issues to consider. Since Jini provides APIs, protocols, and conventions that handle the common parts of distributed devices, building a Smart Home environment with these tools is fairly straightforward. We have implemented such a dynamic “Smart Home ” environment using Jini technology, securing the environment with our Tiny UIUC SESAME, our secure network authentication system.

Jalal Al-muhtadi; Manish An; M. Dennis Mickunas; Roy H. Campbell

1999-01-01T23:59:59.000Z

15

Predictors of Home-Based Wireless Security Matthew Hottell  

E-Print Network (OSTI)

Predictors of Home-Based Wireless Security Matthew Hottell Indiana University Drew Carter Indiana state of insecurity in home-based wireless networks? We examine the following factors: education, income

Hottell, Matt

16

IntuiSec : a framework for intuitive user interaction with security in the smart home  

E-Print Network (OSTI)

This thesis presents IntuiSec, a framework for intuitive user interaction with Smart Home security. The design approach of IntuiSec is to introduce a layer of indirection between user-level intent and the system-level ...

Shakhshir, Saad Zafer

2007-01-01T23:59:59.000Z

17

Endangered tortoises find new home at NNSS | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Endangered tortoises find new home at NNSS | National Nuclear Security Endangered tortoises find new home at NNSS | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Endangered tortoises find new home at NNSS Endangered tortoises find new home at NNSS Posted By Office of Public Affairs Nevada National Security Site (NNSS) has teamed up with the San Diego Zoo

18

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

19

Security Analysis of Emerging Remote Obstetrics Monitoring Systems  

E-Print Network (OSTI)

assume home-based systems have a higher level of security protections. A password protection mechanism and management will need to be in place. No medical professionals to operate monitoring device in home-based

Wu, Jie

20

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

22

Towards personalised home care systems  

Science Conference Proceedings (OSTI)

Home care is increasingly seen as a promising alternative to traditional care services. Programming home care systems remains a significant challenge considering the potentially large scale of deployment, the differences between individual care needs, ... Keywords: home care, personalisation, pervasive computing, policy-based management

Feng Wang; Kenneth J. Turner

2008-07-01T23:59:59.000Z

23

A Tiered Security System for Mobile Devices  

E-Print Network (OSTI)

We have designed a tiered security system for mobile devices where each security tier holds user-defined security triggers and actions. It has a friendly interface that allows users to easily define and configure the different circumstances and actions they need according to context. The system can be set up and activated from any browser or directly on the mobile device itself. When the security system is operated from a Web site or server, its configuration can be readily shared across multiple devices. When operated directly from the mobile device, no server is needed for activation. Many different types of security circumstances and actions can be set up and employed from its tiers. Security circumstances can range from temporary misplacement of a mobile device at home to malicious theft in a hostile region. Security actions can range from ringing a simple alarm to automatically erasing, overwriting, and re-erasing drives.

Bardsley, Scott; Morris, R Paul

2008-01-01T23:59:59.000Z

24

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

25

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

26

The Office of Health, Safety and Security - Home  

NLE Websites -- All DOE Office Websites

Office of Health, Safety and Security Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab FUNCTIONS Right Tab Left Tab RESOURCES Right Tab Left Tab NEWSFEEDS Right Tab Left Tab VIDEOS Right Tab Left Tab EVENTS Welcome to the U.S. Department of Energy (DOE), Office of Health, Safety and Security (HSS) public website. The Office of Health, Safety and Security was created to bring the vital DOE corporate functions of health, safety, environment, and security together under one office. ...read more New to our website? Locating information within the HSS website can be accomplished by navigating through our Offices' functions or by selecting specific areas of interest. The HSS Program Offices, Functions, Document

27

Security Issues in E-Home Network and Software Infrastructures  

E-Print Network (OSTI)

Many people enjoy an Internet connection even at home. These private connections are becoming cheaper, faster and more stable resulting in more and more private PCs being connected at all times. A permanent Internet connection offers new possibilities for Internet services targeting the private home. But it also creates new risks for the household. The Internet is a new door into the house that can be exploited by hackers. They might learn about the behaviour of household members by eavesdropping on their Internet traffic or they can gain control over network nodes and access sensitive information in the house. In this paper, we take a look at ways of securely connecting a private home to the Internet. We give an overview of existing technology for connecting more than just PCs to the Internet and describe proposed network infrastructures for the home. We also offer an outlook on the emerging area of electronic services (e-services), an area that differs substantially from the propagated e-business of today and gives a better reason for permanently connecting one's home than occasional web browsing or e-mailing. This paper introduces network and security terminology as well as a prospect for future homes with requirements on the software platform needed for e-services. 1.

Almut Herzog Nahid; Nahid Shahmehri; Andrzej Bednarski; Ioan Chisalita; Ulf Nordqvist; Levon Saldamli; Diana Szentivanyi; Måns Östring; Linköpings Universitet

2001-01-01T23:59:59.000Z

28

Home heating system  

SciTech Connect

A home heating system is disclosed that has a furnace with a combustion chamber for burning fuel and creating heat, and a chimney with a draft therein. An improvement is described that has an exhaust flue connected between the combustion chamber and the chimney for venting heated exhaust products from the furnace, a heat reclaimer connected into the exhaust flue between the combustion chamber and the chimney for reclaiming heat from the heated exhaust product, and an outside air line for supplying air from the outside of the house to the combustion chamber. A first flue portion of the exhaust flue is connected between the combustion chamber and the heat reclaimer, and a second insulated flue portion of the exhaust flue is connected between the heat reclaimer and the chimney. An outside air by-pass or balancing line is connected between the outside air line and the chimney for satisfying the chimney suction at flame-out. A flow sensing and regulating device may be connected into the outside air line for regulating the flow or air so that outside air is supplied to the furnace only when fuel is burned therein.

Bellaff, L.

1980-03-25T23:59:59.000Z

29

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

30

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

31

Collaboration Topics - System Software | National Nuclear Security  

National Nuclear Security Administration (NNSA)

System Software | National Nuclear Security System Software | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

32

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

33

Composition of Management System for Smart Homes  

E-Print Network (OSTI)

The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm control), comfort subsystem (temperature, etc.), intelligence subsystem (multimedia, houseware). The design solving process is based on Hierarchical Morphological Multicriteria Design (HMMD) approach: (1) design of a tree-like system model, (2) generation of design alternatives for leaf nodes of the system model, (3) Bottom-Up process: (i) multicriteria selection of design alternatives for system parts/components and (ii) composing the selected alternatives into a resultant combination (while taking into account ordinal quality of the alternatives above and their compatibility). A realistic numerical example illustrates the design process of a management system for smart homes.

Levin, Mark Sh; Klapproth, Alexander

2011-01-01T23:59:59.000Z

34

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

35

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

36

Aerial Measuring System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Measuring System | National Nuclear Security Administration Measuring System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Aerial Measuring System Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management > Aerial Measuring System Aerial Measuring System AMS Logo NNSA's Aerial Measuring System (AMS) provides specialized airborne

37

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

38

Situated Usability Testing for Security Systems  

Science Conference Proceedings (OSTI)

While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

Greitzer, Frank L.

2011-03-02T23:59:59.000Z

39

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management • Architecture security focus • Physical interaction ... Cybersecurity • Cybersecurity Framework • Smart Grid Program ...

2013-06-05T23:59:59.000Z

40

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Prototype system brings advantages of wireless technology to secure  

National Nuclear Security Administration (NNSA)

Prototype system brings advantages of wireless technology to secure Prototype system brings advantages of wireless technology to secure environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Prototype system brings advantages of wireless technology ... Prototype system brings advantages of wireless technology to secure environment

42

NNSA Policy System | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy System | National Nuclear Security Administration Policy System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Policy System Home > About Us > Our Operations > Management and Budget > NNSA Policy System NNSA Policy System The NNSA's Policy System is established under the authority of Section 3212(d) of Public Law 106-65, the National Defense Authorization Act for

43

PIA - Northeast Home Heating Oil Reserve System (Heating Oil...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil)...

44

PIA - Northeast Home Heating Oil Reserve System (Heating Oil...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PIA - Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating...

45

Senior Systems Engineer | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Senior Systems Engineer | National Nuclear Security Administration Senior Systems Engineer | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Regina Griego Senior Systems Engineer Regina Griego Regina Griego Role: Senior Systems Engineer Profile: Regina Griego has been elected a fellow of the International Council on

46

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

47

PIA - Security Clearance Tracking System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Clearance Tracking System PIA - Security Clearance Tracking System PIA - Security Clearance Tracking System PIA - Security Clearance Tracking System More Documents &...

48

ETTP Security Access Control System (ESACS) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

49

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

50

The National Information Systems Security Conference ...  

Science Conference Proceedings (OSTI)

The National Information Systems Security Conference announces its Keynote and Banquet Speakers. August Bequai, Esq ...

1996-10-28T23:59:59.000Z

51

Tropexx – Blending System - Home - Energy Innovation Portal  

• Process gas-blending system • Blending of volatile liquids or gases PATENTS AND AWARDS The Y-12 National Security Complex has

52

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

security efforts by establishing the national SCADA test bed program INL [INL/EXT- 05-00671, Idaho National Laboratory. US-CERT [2008], Control Systems Security

Amin, Saurabh

2011-01-01T23:59:59.000Z

53

System and method for secure group transactions  

DOE Patents (OSTI)

A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

Goldsmith, Steven Y. (Rochester, MN)

2006-04-25T23:59:59.000Z

54

Control Systems Security Publications Library | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Technology Development Transmission Planning Smart Grid Energy Delivery Systems Cybersecurity Control Systems Security News Archive Control...

55

Project Management and Systems Support | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

56

Small Business Sourcing System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sourcing System | National Nuclear Security Administration Sourcing System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Sourcing System Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Small Business Toolbox > Small Business Sourcing System Small Business Sourcing System

57

Project Management and Systems Support | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

58

Planning for Home Renewable Energy Systems | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

for Home Renewable Energy Systems Planning for Home Renewable Energy Systems November 11, 2013 - 8:49pm Addthis Planning for a home renewable energy system is a process that...

59

Control Systems Security News Archive | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Delivery Systems Cybersecurity Control Systems Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu...

60

Northeast Home Heating Oil Reserve System Heating Oil, PIA Office...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Northeast Home Heating Oil Reserve System Heating Oil, PIA Office of Fossil Energy Headquaters Northeast Home Heating Oil Reserve System Heating Oil, PIA Office of Fossil Energy...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Designing Secure SCADA Systems Using Security Patterns  

Science Conference Proceedings (OSTI)

Critical infrastructure systems are those systems that support our daily lives and their protection is fundamental. The key component of a critical infrastructure system is the process control system, also known as the supervisory, control, and data ...

Eduardo B. Fernandez; Maria M. Larrondo-Petrie

2010-01-01T23:59:59.000Z

62

Advanced Metering Infrastructure (AMI) System Security Requirements  

Science Conference Proceedings (OSTI)

This report identifies key cyber security requirements and suggests basic security approaches for safeguarding the many interfaces of Advanced Metering Infrastructure (AMI) systems. These requirements, which were developed through a clearly defined security assessment procedure, are generic; but they can be used to develop more specific security requirements based on actual configurations and environments.

2009-12-21T23:59:59.000Z

63

Security Science & Technology | Nuclear Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Treaty Verification Nuclear Systems Modeling, Simulation & Validation Nuclear Systems Technology Reactor Technology Nuclear Science Home | Science & Discovery |...

64

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

65

Computational Systems & Software Environment | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Computational Systems & Software Environment | National Nuclear Security Computational Systems & Software Environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog CSSE Computational Systems & Software Environment Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

66

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

67

Crops reap benefits of Pantex irrigation system | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Crops reap benefits of Pantex irrigation system | National Nuclear Security Crops reap benefits of Pantex irrigation system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Crops reap benefits of Pantex irrigation system Home > content > Crops reap benefits of Pantex irrigation system Crops reap benefits of Pantex irrigation system

68

Control Systems Security Standards: Accomplishments And Impacts |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

69

Combi Systems for Low Load homes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

text styles text styles Combi Systems for Low Load Homes Center for Energy and Environment, NorthernSTAR, Ben Schoenbauer * Low load homes are more common than ever. * Typical space heating and DHW equipment have capacities larger than necessary * A single heating plant could provide high efficiency heat at lower costs, increased durability and improved combustion safety Context Technical Approach * A condensing water heater and hydronic air handler will used to provide space and water heating loads in almost 300 weatherized homes. * System specifications, sizing, and installation optimization guidelines were all developed. * Contractor capability was developed in MN market, but may not be developed in all local. 4 Recommended Guidance * Determine peak load on system: - Space heating design load (ie 40,000 Btu/hr)

70

Information technology - Security techniques - Information security management systems - Requirements  

E-Print Network (OSTI)

ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

International Organization for Standardization. Geneva

2005-01-01T23:59:59.000Z

71

National SCADA Test Bed Enhancing control systems security in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of...

72

Pantex Occupational Health System (OHS), National Nuclear Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

73

Scalable security for petascale parallel file systems  

Science Conference Proceedings (OSTI)

Petascale, high-performance file systems often hold sensitive data and thus require security, but authentication and authorization can dramatically reduce performance. Existing security solutions perform poorly in these environments because they cannot ... Keywords: capabilities, high-performance computing, scalability, secure object-based storage

Andrew W. Leung; Ethan L. Miller; Stephanie Jones

2007-11-01T23:59:59.000Z

74

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

75

Secure Systems and Applications Group  

Science Conference Proceedings (OSTI)

... technologies, and on developing security solutions ... the earliest stages of technology development through proof ... industry, and to develop tests, test ...

2013-01-17T23:59:59.000Z

76

Systems security and functional readiness  

SciTech Connect

In Protective Programming Planning, it is important that every facility or installation be configured to support the basic functions and mission of the using organization. This paper addresses the process of identifying the key functional operations of our facilities in Europe and providing the security necessary to keep them operating in natural and man-made threat environments. Functional Readiness is important since many of our existing facilities in Europe were not constructed to meet the demands of today's requirements. There are increased requirements for real-time systems with classified terminals and stringent access control, tempest and other electronic protection devices. One must prioritize the operations of these systems so that essential functions are provided even when the facilities are affected by overt or covert hostile activities.

Bruckner, D.G.

1988-01-01T23:59:59.000Z

77

IT-Security for Safety-Critical Automation Systems  

E-Print Network (OSTI)

The protection of safety-critical and infrastructure systems (such as automation systems for utilities, but also for manufacturing plants) against electronic and communication network based attacks becomes more and more important. This paper investigates how such safety-critical plants and automation systems can be secured against information system and network based attacks. The two common approaches, hard perimeter, and defense-in-depth are discussed. Based on the defense-in-depth approach, a conceptional, generic security zone model for use in analysis and synthesis of a plant security architecture is proposed, and for each of its zones a survey of the available and appropriate security mechanisms is given. Using an example from the substation automation domain, it is shown how threats and counter-measures can be systematically derived and how the specific system and usage characteristics of automation systems (or at least their restricted safety critical sub-functions) can be exploited in a positive way to deploy security mechanisms that would in this form not be available and applicable to home or office information systems. 1.

Martin Naedele

2002-01-01T23:59:59.000Z

78

Smart Home Concepts: Current Trends  

E-Print Network (OSTI)

bills), improved security, “upgradeable” home appliances,and smart homes could introduce new security holes notsmart home features are in the area of safety and security (

Venkatesh, Alladi

2003-01-01T23:59:59.000Z

79

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

... of the Federal Information Systems Security Educator's ... and those involved in instructional design and curriculum ... NIST that is designed to improve ...

2012-02-07T23:59:59.000Z

80

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... to two CISOs at the US Department of Energy. ... Prior to EES, Al worked for Keane Federal Systems, Inc ... the FBI on all matters of cyber security policy. ...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Electronic DOE Information Security System (eDISS) PIA, Office...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

82

Fenix Secure Operating System: Principles, Models and Architecture  

Science Conference Proceedings (OSTI)

The paper introduces design principles of Secure Operating System Fenix developed in Information Security Centre of Saint-Petersburg Technical University. Fenix is a special purpose secure operating system supposed to be a basis for secure information ...

Dmitry P. Zegzhda; Pavel G. Stepanov; Alexey D. Otavin

2001-05-01T23:59:59.000Z

83

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

84

SRS upgrades helium recovery system | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

upgrades helium recovery system | National Nuclear Security upgrades helium recovery system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > SRS upgrades helium recovery system SRS upgrades helium recovery system Posted By Office of Public Affairs Savannah River Site (SRS) Tritium Programs recently completed a project to design, build and relocate a new system for separating and capturing

85

Overview: Home Heating Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- 8:17am Addthis Home heating accounts for about 30 percent of the energy used in the home. | Photo courtesy iStockphoto.com Home heating accounts for about 30 percent of the...

86

Argonne's National Security Information Systems  

E-Print Network (OSTI)

was asked by the DOE National Nuclear Security Administration (NNSA) to install the ARG-US RFID equipment in the NNSA vehicles (a Peterbilt truck and a Dodge Sprinter van) and integration with the in-vehicle Omni about the DOE/NNSA's Global Threat Reduction Initiative (GTRI) for voluntary security enhancements

Kemner, Ken

87

Processes in securing open architecture software systems  

Science Conference Proceedings (OSTI)

Our goal is to identify and understand issues that arise in the development and evolution processes for securing open architecture (OA) software systems. OA software systems are those developed with a mix of closed source and open source software components ... Keywords: Open architecture, configuration, continuous software development, process integration, process modeling, security

Walt Scacchi, Thomas A. Alspaugh

2013-05-01T23:59:59.000Z

88

Secure videoconferencing equipment switching system and method  

DOE Patents (OSTI)

A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

Hansen, Michael E. (Livermore, CA)

2009-01-13T23:59:59.000Z

89

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network (OSTI)

This thesis examines how perturbing selected adversary capabilities in a design basis threat (DBT) may affect the assessment of a facility's security system performance. We found that using a strictly defined DBT to design and analytically test facility security systems can lead to invalid assessments that security measures are meeting standards. Design Basis Threats are intended to represent the most severe yet realistic attack a facility might face. However, the static nature of the standard DBT makes it unable to test the performance of a facility security system in the case where a specialized adversary may possess different capabilities than defined in the DBT. Our analysis of security system performance for various modeled facilities revealed significant vulnerabilities to certain perturbations of adversary capabilities. These vulnerabilities went undetected when the original strictly defined graded DBT was used in the assessment procedure. By maximizing one adversary capability at the expense of others, a specialized adversary force was able to efficiently defeat each facility. To address this problem, we proposed employing a so-called "point-based" DBT as an alternative to the existing strictly defined DBT. In a point-based DBT, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities will outweigh the additional cost of generating a point-based DBT, especially if the vulnerabilities are identified during the initial design of the security system.

Conchewski, Curtis

2012-08-01T23:59:59.000Z

90

Energy Engineering and Systems Analysis - Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Engineering and Systems Analysis U.S. Department of Energy Energy Engineering and Systems Analysis U.S. Department of Energy Search Argonne ... Search Decision and Information Sciences Energy Systems FutureGrid Infrastructure Assurance Center Intelligence Analysis National Security Nuclear Engineering Transportation Research and Analysis Computing Center Transportation Technology R&D Center EESA Intranet Image of battery development team standing by an electric vehicle in Argonne's Ev-Smart Grid Interoperability Center Features eesa success stories ebr-2 Argonne's Major Nuclear Energy Milestones Argonne's Nuclear Energy Exhibit Argonne's Nuclear Energy Exhibit Argonne's Glassblowing Studio Glassblowing Studio Reactor Advanced Burner Test Reactor Preconceptual Design Argonne Experts Guide Argonne Experts Guide

91

ORO Office Safeguards and Security Clearance Tracking System...  

NLE Websites -- All DOE Office Websites (Extended Search)

Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System...

92

DOE Challenge Home Case Study, Clifton View Homes, Coupeville, WA, Systems Home  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Clifton View Clifton View Homes Coupeville, WA BUILDING TECHNOLOGIES OFFICE DOE Challenge Home builders are in the top 1% of builders in the country meeting the extraordinary levels of excellence and quality specifi ed by the U.S. Department of Energy. Every DOE Challenge Home starts with ENERGY STAR for Homes Version 3 for an energy-effi cient home built on a solid foundation of building science research. Then, even more advanced technologies are designed in for a home that goes above and beyond current code to give you the superior quality construction, HVAC, appliances, indoor air quality, safety, durability, comfort, and solar-ready components along with ultra-low or no utility bills. This provides homeowners with a quality home that will last for generations to come.

93

DOE Challenge Home Case Study, Weiss Building & Development, LLC., System Home, River Forest, IL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LLC LLC System Home River Forest, IL BUILDING TECHNOLOGIES OFFICE DOE Challenge Home builders are in the top 1% of builders in the country meeting the extraordinary levels of excellence and quality specifi ed by the U.S. Department of Energy. Every DOE Challenge Home starts with ENERGY STAR for Homes Version 3 for an energy-effi cient home built on a solid foundation of building science research. Then, even more advanced technologies are designed in for a home that goes above and beyond current code to give you the superior quality construction, HVAC, appliances, indoor air quality, safety, durability, comfort, and solar-ready components along with ultra-low or no utility bills. This provides homeowners with a quality home that will last for generations to come.

94

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

95

Recommended Practice for Securing Control System Modems  

SciTech Connect

This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

James R. Davidson; Jason L. Wright

2008-01-01T23:59:59.000Z

96

Home | Buildings Technology & Urban Systems Department  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab Buildings & Urban Systems Buildings Lab Buildings & Urban Systems Buildings Technology & Urban Systems Department Search Search Home About Us Groups Tools & Guides Facilities Publications News Links Contact Us Staff The Building Technology and Urban Systems Department (BTUS) works closely with industry to develop technologies for buildings that increase energy efficiency, and improve the comfort, health, and safety of building occupants. Berkeley Lab Hosts 5 Emerging Leaders During TechWomen 2013 As part of TechWomen 2013, emerging leaders from around the world toured a number of scientific facilities in the Bay Area, including the Advanced Light Source at Berkeley Lab. Pho Read More The Retrocommissioning Sensor Suitcase Brings Energy Efficiency to Small Commercial Buildings The data module communicates wirelessly with the smart pad, which launches

97

Home Energy Systems Inc | Open Energy Information  

Open Energy Info (EERE)

Systems Inc Systems Inc Jump to: navigation, search Name Home Energy Systems Inc Address 6996 Convoy Ct. Place San Diego, California Zip 92111 Sector Solar Product Solar PV installer Website http://www.homeenergysystemsin Coordinates 32.8346671°, -117.1645956° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":32.8346671,"lon":-117.1645956,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

98

Forced Air Systems in High Performance Homes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FORCED AIR SYSTEMS IN FORCED AIR SYSTEMS IN HIGH PERFORMANCE HOMES Iain Walker (LBNL) Building America Meeting 2013 What are the issues? 1. Sizing  When is too small too small? 2. Distribution  Can we get good mixing at low flow? 3. Performance  Humidity Control  Part load efficiency  Blowers & thermal losses Sizing  Part-load - not an issue with modern equipment  Careful about predicted loads - a small error becomes a big problem for tightly sized systems  Too Low Capacity = not robust  Extreme vs. design days  Change in occupancy  Party mode  Recovery from setback Sizing  Conventional wisdom - a good envelope = easy to predict and not sensitive to indoor conditions  But..... Heating and cooling become discretionary - large variability depending on occupants

99

Audit Report, Evaluation of Classified Information Systems Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report, Evaluation of Classified Information Systems Security Program, DOEIG-0518 Audit Report, Evaluation of Classified Information Systems Security Program, DOEIG-0518 All...

100

Security Analysis and Project Management Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

A Summary of Control System Security Standards Activities in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector...

102

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

103

NERSC Increases System Storage and Security for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve IO Performance Throughout the month...

104

IPS - Secure Internet Payment System  

Science Conference Proceedings (OSTI)

There are a number of questions one might ask about security of money transactions on the Internet. A first question might be: "Why do we need to protect money transaction on the Internet?" The Internet is an insecure and unreliable communication medium ...

Zoran Djuric

2005-04-01T23:59:59.000Z

105

Security approaches for Radio Frequency Identification systems  

E-Print Network (OSTI)

In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain ...

Foley, Joseph Timothy, 1976-

2007-01-01T23:59:59.000Z

106

Secure and Efficient Routable Control Systems  

SciTech Connect

This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

2010-05-01T23:59:59.000Z

107

Home Automation  

E-Print Network (OSTI)

In this paper I briefly discuss the importance of home automation system. Going in to the details I briefly present a real time designed and implemented software and hardware oriented house automation research project, capable of automating house's electricity and providing a security system to detect the presence of unexpected behavior.

Ahmed, Zeeshan

2010-01-01T23:59:59.000Z

108

Protocol for plug and play in Bluetooth based home networks  

Science Conference Proceedings (OSTI)

Home networks, interlinking devices like fridges, air conditioners, home theatres, security devices, lighting systems are about to realize the concept of a smart home. Among the competing technologies, Bluetooth, with its low cost, low power consumption ...

N. Sriskanthan; D. Tandon; K. K. Lee

2004-05-01T23:59:59.000Z

109

Webinar: ENERGY STAR Hot Water Systems for High Performance Homes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Star Hot Water Systems for High Performance Homes Star Hot Water Systems for High Performance Homes 1 | Building America Program www.buildingamerica.gov Buildings Technologies Program Date: September 30, 2011 ENERGY STAR ® Hot Water Systems for High Performance Homes Welcome to the Webinar! We will start at 11:00 AM Eastern. There is no call in number. The audio will be sent through your computer speakers. All questions will be submitted via typing. Video of presenters Energy Star Hot Water Systems for High Performance Homes 2 | Building America Program www.buildingamerica.gov Energy Star Hot Water Systems for High Performance Homes 3 | Building America Program www.buildingamerica.gov Building America Program: Introduction Building Technologies Program Energy Star Hot Water Systems for High Performance Homes

110

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

111

Analytical foundations of physical security system assessment  

E-Print Network (OSTI)

Physical security systems are intended to prevent or mitigate potentially catastrophic loss of property or life. Decisions regarding the selection of one system or configuration of resources over another may be viewed as design decisions within a risk theoretic setting. The problem of revealing a clear preference among design alternatives, using only a partial or inexact delineation of event probabilities, is examined. In this dissertation, an analytical framework for the assessment of the risk associated with a physical security system is presented. Linear programming is used to determine bounds on the expected utility of an alternative, and conditions for the separation of preferences among alternatives are shown. If distinguishable preferences do not exist, techniques to determine what information may help to separate preferences are presented. The linear programming approach leads to identification of vulnerabilities in a security system through an examination of the solution to the dual problem. Security of a hypothetical military forward operating base is considered as an illustrative example. For two alternative security schemes, the uncertainty inherent in the scenario is represented using probability assessments consisting of bounds on event probabilities and exact probability assignments. Application of the framework reveals no separation of preferences between the alternatives. Examination of the primal and dual solutions to the linear programming problems, however, reveals insights into information which, if obtained, could lead to a separation of preferences as well as information on vulnerabilities in one of the alternative security postures.

Graves, Gregory Howard

2006-08-01T23:59:59.000Z

112

Homes  

Energy.gov (U.S. Department of Energy (DOE))

 The U.S. Department of Energy (DOE) improves home energy performance by developing and demonstrating advanced energy efficiency technologies and practices that make homes in the United States more...

113

Home Network Technologies and Automating Demand Response  

E-Print Network (OSTI)

security "to" the home from security "in" the home. )homes can be controlled to optimize convenience, comfort and securityhome network protocols. Some protocols are adding security

McParland, Charles

2010-01-01T23:59:59.000Z

114

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

115

Countering automated exploits with system security CAPTCHAS  

Science Conference Proceedings (OSTI)

Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users can do everything necessary to fulfil their tasks with the computer. The disadvantage ...

Dinan Gunawardena; Jacob Scott; Alf Zugenmaier; Austin Donnelly

2005-04-01T23:59:59.000Z

116

Planning a Home Solar Electric System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

solar electric systems-where your power provider essentially pays you retail price for the electricity you feed back into the grid. To help evaluate whether a home...

117

Guidelines for System Security and Information System Management  

Science Conference Proceedings (OSTI)

This document provides a concise set of guidelines and best practices for performing risk assessment, security management, and system management within utility automation networks.

2008-06-09T23:59:59.000Z

118

Newsletters | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Newsletters Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Newsletters Newsletters U.S....

119

Training | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Training Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > Training Training 2013 Annual Users Training Meeting Presentations...

120

BRC-Systems and Emerging Technologies Security Research ...  

Science Conference Proceedings (OSTI)

... Systems and Emerging Technologies Security Research Group Biometric Standards and Related Technical Developments. ...

2013-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Energy Crossroads: Home Energy Rating Systems | Environmental...  

NLE Websites -- All DOE Office Websites (Extended Search)

Contractors Association (CBPCA) helps green contractors identify and perform quality Green Home Energy Upgrades - our name for comprehensive (i.e., whole-house) energy...

122

Design tools for complex dynamic security systems.  

SciTech Connect

The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

2007-01-01T23:59:59.000Z

123

Planning for Home Renewable Energy Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Planning for Home Renewable Energy Systems Planning for Home Renewable Energy Systems Planning for Home Renewable Energy Systems November 11, 2013 - 8:49pm Addthis Planning for a home renewable energy system is a process that includes analyzing your existing electricity use, looking at local codes and requirements, deciding if you want to operate your system on or off of the electric grid, and understanding technology options you have for your site. | Photo by Francis Fine Art Photography. Planning for a home renewable energy system is a process that includes analyzing your existing electricity use, looking at local codes and requirements, deciding if you want to operate your system on or off of the electric grid, and understanding technology options you have for your site. | Photo by Francis Fine Art Photography.

124

Security requirements and recommendations for Advanced Meters and Home Area Networks  

Science Conference Proceedings (OSTI)

This report describes the testing required to ensure the proper long-term functioning of an installed home area network (HAN) at a utility customers premises. The document investigates the test parameters that should be evaluated after a utility’s installation of a HAN system at its customers premises to ensure statistically reliable performance for the life of the system. To aid utilities in their evaluations, this report provides the theoretical basis for the development of installation test procedures...

2009-06-30T23:59:59.000Z

125

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network (OSTI)

. http://docs.info.apple.com/article.html?artnum=303411 BEA Systems - 2007 Daylight Savings Time ChangesIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Shellcode Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The 2007 Daylight

126

On the importance of securing telephony systems  

Science Conference Proceedings (OSTI)

In the following work we present an easy to read essay about the array of threats that modern telephony systems face, that will prove, hopefully, useful for both administrators and simple users. We have taxonomized these threats and we have further provided ... Keywords: communication systems security, telephony fraud, telephony threats

Iosif I. Androulidakis

2009-01-01T23:59:59.000Z

127

Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Skip Navigation Links Home Newsroom About INL Careers Research Programs Facilities Education Distinctive Signature: ICIS Environment, Safety & Health Research Library Technology...

128

DOE and Industry Showcase New Control Systems Security Technologies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Technology Development Transmission Planning Smart Grid Energy Delivery Systems Cybersecurity Control Systems Security News Archive Control...

129

Secure Control Systems for the Energy Sector  

Science Conference Proceedings (OSTI)

Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

Smith, Rhett; Campbell, Jack; Hadley, Mark

2012-03-31T23:59:59.000Z

130

Cyber security in power systems .  

E-Print Network (OSTI)

??Many automation and power control systems are integrated into the 'Smart Grid' concept for efficiently managing and delivering electric power. This integrated approach created several… (more)

Sridharan, Venkatraman

2012-01-01T23:59:59.000Z

131

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

132

Comparison of Routable Control System Security Approaches  

SciTech Connect

This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

2011-06-01T23:59:59.000Z

133

Securing a Wireless Networked Control System Using Information Fusion  

Science Conference Proceedings (OSTI)

Security of a wireless sensor network practically governs its usability in several applications. Especially, in applications like Industrial control systems which use NCS and SCADA systems, the security affects the stability of the system. We propose ...

Brijesh Kashyap Chejerla, Sanjay Madria

2012-10-01T23:59:59.000Z

134

Control Systems Security Standards: Accomplishments & Impacts  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

019 019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

135

Liability aspects of home energy-rating systems  

SciTech Connect

Liability aspects of home energy rating systems are discussed. An introduction to the rating system concept, including types of rating systems, implementation efforts to date, and possible groups to conduct ratings, is also included. The home energy rating system concept involves the periodic rating of the energy efficiency of residential buildings. The rating can provide a relative indication of a home's energy efficiency and also a quantitative estimate of consumption, fuel cost, or both. Primary attention is given to liability issues associated with developing and performing ratings. Secondary attention is given to possible liability associated with misuse of a rating once it has been performed.

Hendrickson, P.L.

1983-10-01T23:59:59.000Z

136

Meeting Minutes from Automated Home Energy Management System Expert Meeting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Home Energy Management System Expert Meeting Home Energy Management System Expert Meeting October 1-2, 2009 AGENDA - Day 1 8:30 - 8:45 Welcome and Debriefing of Building America and Home Energy Management Research- Lew Pratsch, DOE 8:45 - 9:15 Utilities Trends- Smart Grid Projects and Integration With Home Controls - Mike Keesee, SMUD 9:15 - 9:45 Thoughts on Controls System Performance Requirements - Rich Brown, LBL 9:45 - 10:15 Efficiency Trends in Consumer Electronics - Kurtis McKenney, TIAX 10:15 - 10:30 Session Break 10:30 - 11:00 Cloud Computing (Web Data Computing, Data Storage) Trends - Troy Batterberry, Microsoft 11:00- 11:30 Cloud Computing (Web Data Computing, Data Storage) Trends - Tom Sly via Net Conference 11:30 - 12:00 Smart Appliance Trends / Home Area Network Trends - David Najewicz, GE

137

Installing and Maintaining a Home Solar Electric System | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Installing and Maintaining a Home Solar Electric System Installing and Maintaining a Home Solar Electric System Installing and Maintaining a Home Solar Electric System July 2, 2012 - 8:21pm Addthis When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. How does it work? Making sure your home solar electric or PV system is sized, sited, and installed correctly is essential for maximizing its energy performance. As with any mechanical or electrical appliance, PV systems require routine, periodic maintenance.

138

Installing and Maintaining a Home Solar Electric System | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Installing and Maintaining a Home Solar Electric System Installing and Maintaining a Home Solar Electric System Installing and Maintaining a Home Solar Electric System July 2, 2012 - 8:21pm Addthis When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. How does it work? Making sure your home solar electric or PV system is sized, sited, and installed correctly is essential for maximizing its energy performance. As with any mechanical or electrical appliance, PV systems require routine, periodic maintenance.

139

22nd National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... Techniques Dr. Roshan Thomas, NAI Labs ... Kubic, National Security Agency Tom Shake, MIT ... Security Implementations Bret Hartman, Concept Five ...

2000-10-25T23:59:59.000Z

140

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices  

E-Print Network (OSTI)

Residential Photovoltaic Energy Systems in California: Themarginal impacts of photovoltaic (PV) energy systems on home

Hoen, Ben

2013-01-01T23:59:59.000Z

142

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

143

Ultra Safe And Secure Blasting System  

SciTech Connect

The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

Hart, M M

2009-07-27T23:59:59.000Z

144

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

145

Service Oriented Architecture in Network Security - a novel Organisation in Security Systems  

E-Print Network (OSTI)

Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed.

Hilker, Michael

2008-01-01T23:59:59.000Z

146

Scalable Security for Petascale Parallel File Systems  

E-Print Network (OSTI)

Y. Hu. Snare: A strong security scheme for network-attachedThekkath. Block-level security for network-attached disks.and J. Satran. The OSD security protocol. In Proc. 3rd IEEE

Leung, Andrew W.; Miller, Ethan L; Jones, Stephanie

2007-01-01T23:59:59.000Z

147

An Intercommunication Home Energy Management System with Appliance Recognition in Home Network  

Science Conference Proceedings (OSTI)

In present days there are wide varieties of household electric appliances along with different power consumption habits of consumers, making identifying electric appliances without presetting difficulty. This paper introduces smart appliance management ... Keywords: appliance recognition, home energy management, smart appliance management system

Ying-Xun Lai; Joel José Rodrigues; Yueh-Min Huang; Hong-Gang Wang; Chin-Feng Lai

2012-02-01T23:59:59.000Z

148

Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Oak Ridge Oak Ridge The ORO is a diverse office supporting key missions in Science and Technology. To a lesser degree, other DOE missions are also supported in the areas of Environmental Management, Science Education, Nuclear Fuel Supply, National Security, Technology Transfer, and Economic Development. The ORO also manages the Financial Service Center that supports other DOE sites/locations. ORO helps to ensure mission success by providing support in the areas of acquisition and financial services, quality assurance, environmental compliance, nuclear safety, operations, maintenance, work planning and control, safety and health, human capital, real property and infrastructure, information management, safeguards and security, emergency management, public affairs, etc.

149

Neumann Receives Computer System Security Award  

Science Conference Proceedings (OSTI)

... in the area of information security and assurance. ... significant long-term contributions to computer security ... trade, and improve the quality of life. ...

2012-12-13T23:59:59.000Z

150

An Overview of Automotive Home and Neighborhood Refueling  

E-Print Network (OSTI)

convenience and security similar to home refueling. Theconvenience and security similar to home refueling. This canfreedom, and security of refueling at home to early vehicle

Li, Xuping; Ogden, Joan M.; Kurani, Kenneth S.

2009-01-01T23:59:59.000Z

151

A survey of security in multi-agent systems  

Science Conference Proceedings (OSTI)

Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security ... Keywords: Agents, Multi-agent systems, Multi-agents, Security, Security in MAS

Rodolfo Carneiro Cavalcante; Ig Ibert Bittencourt; Alan Pedro da Silva; Marlos Silva; Evandro Costa; Robério Santos

2012-04-01T23:59:59.000Z

152

Ideal based cyber security technical metrics for control systems  

Science Conference Proceedings (OSTI)

Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the ... Keywords: control system security, cyber security metrics

Wayne Boyer; Miles McQueen

2007-10-01T23:59:59.000Z

153

Recommended Practice for Securing Control System Modems | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Practice for Securing Control System Modems Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. Recommended Practice for Securing Control System Modems More Documents & Publications

154

Northeast Home Heating Oil Reserve - Online Bidding System | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Petroleum Reserves » Heating Oil Reserve » Northeast Services » Petroleum Reserves » Heating Oil Reserve » Northeast Home Heating Oil Reserve - Online Bidding System Northeast Home Heating Oil Reserve - Online Bidding System The U.S. Department of Energy has developed an on-line bidding system - an anonymous auction program - for the sale of product from the one million barrel Northeast Home Heating Oil Reserve. We invite prospective bidders and other interested parties to try out this system and give us your views. You must register to use the system to practice or to participate in an actual emergency sale. Registration assures that you will receive e-mail alerts of sales or other pertinent news. You will also have the opportunity to establish a user ID and password to submit bids. If you establish a user ID, you will receive a temporary password by

155

Security Framework for Control System Data Classification and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for Control System Data Classification and Protection Security Framework for Control System Data Classification and Protection This document presents a data...

156

Selection of Model in Developing Information Security Criteria for Smart Grid Security System  

E-Print Network (OSTI)

At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

157

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

158

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

159

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

E-Print Network (OSTI)

in residential selling prices as PV systems increase inhas an effect on the sale price of PV homes (i.e. , a fixedcomparable” homes, sales prices of PV homes are “compared”

Hoen, Ben

2011-01-01T23:59:59.000Z

160

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

162

Security-Constrained Adequacy Evaluation of Bulk Power System Reliability  

E-Print Network (OSTI)

Security-Constrained Adequacy Evaluation of Bulk Power System Reliability Fang Yang, Student Member. Stefopoulos, Student Member, IEEE Abstract -- A framework of security-constrained adequacy evaluation (SCAE electric load while satisfying security constraints. It encompasses three main steps: (a) critical

163

Smart Solar Home System with Safety Device Low Voltage Alert  

Science Conference Proceedings (OSTI)

For many reasons Bangladeshi people are now using renewable energy. So, solar energy is the best renewable energy till now, in respect of Bangladesh. So using of solar system is common nowadays. Bangladesh Government has taken some steps to make solar ... Keywords: Smart Solar Home System (SSHS), Rooftop, Safety Device, Low voltage alert

Tawheed Hasan; Md. Faysal Nayan; Md. Asif Iqbal; Monzurul Islam

2012-03-01T23:59:59.000Z

164

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

165

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... 9:15 NIST Welcome William Barker, NIST Computer Security Division NO BIO and Presentation Available. ... BIO & Abstract Presentation. ...

166

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... Jim Wiggins, Federal IT Security Institute ... Gale Warshawsky, Department of Energy: Lawrence Livermore ... Notice & Privacy Policy Send comments or ...

167

NNSA Policy System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

168

Aerial Measuring System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

169

ORO Office Safeguards and Security Clearance Tracking System and Visitor  

NLE Websites -- All DOE Office Websites (Extended Search)

Office Safeguards and Security Clearance Tracking System and Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking System(VETS) PIA, Oak ridge Operations Office iManage Strategic Integrated Procurement Enterprise System (STRIPES) PIA, Office of Procurement and Assistance Management

170

Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Cleanup Project Cleanup Project Search Login Home News News Inside the ICP articles About Us About Us Our Mission Facility Factsheets History of the Site Safety Working with CWI/Property Sales Working with CWI Subcontracting & Small Business Academic Internship Program Property Sales Outreach Community Outreach Stakeholders Education and Research Transfer Program AR-IR Administration Contact Us Industry leader in safe performance CWI's worker-owned safety culture has been the cornerstone for delivering work at the Idaho Cleanup Project. Since contract inception in May 2005, the CWI team has reduced recordable injuries by more than 70 percent. Video Feature: Waste Management Treatment of sodium-contaminated waste using a distillation process (9:47) Terms Of Use Privacy Statement If you have a disability and need an

171

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

172

Microfluidic Partitioning System  

home \\ technologies \\ microfluidic partitioning system. Technologies: Ready-to-Sign Licenses: ... for the Department of Energy's National Nuclear Security Administration

173

List of Major Information Systems,National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

174

Process Control Systems in the Chemical Industry: Safety vs. Security  

Science Conference Proceedings (OSTI)

Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

Jeffrey Hahn; Thomas Anderson

2005-04-01T23:59:59.000Z

175

Home > Home  

NLE Websites -- All DOE Office Websites (Extended Search)

or the information, products or services contained therein by the DOE Oak Ridge Office. Home Home Contact Infomation Background Reference Documents Pre-Solicitation Notice Final...

176

Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Site A and Plot M Site A and Plot M The Burial Site of the World's First Self-Sustaining Nuclear Reactor > Content on this page requires a newer version of Adobe Flash Player. Get Adobe Flash player July 31, 1942 The Army Corp of Engineers leases 1,025 acres of the Cook County Forest Preserve to build a research facility. November 1942 Under the direction of Enrico Fermi, a group of scientists at the University of Chicago begin building Chicago Pile-1 (CP-1). Security and secracy were essential. December 2, 1942 Enrico Fermi's team creates the world's first self-sustaining nuclear chain reaction using the CP-1 reactor under Stagg Field at the University of Chicago. CP-1 1943 The experiments under Stagg Field shut down, and the scientists move to a 19 acre section of the leased forest preserve, known as Site A. CP-1 is

177

NREL: Wind Research - Systems Engineering Home Page  

NLE Websites -- All DOE Office Websites (Extended Search)

Search More Search Options Site Map The National Wind Technology Center (NWTC) wind energy systems engineering initiative has developed an analysis platform to leverage its...

178

Adapting Legacy Home Appliances to Home Network Systems Using Web Services  

E-Print Network (OSTI)

This paper presents a framework that adapts the conventional home electric appliances with the infrared remote controls (legacy appliances) to the emerging home network system (HNS). The proposed method extensively uses the concept of service-oriented architecture to improve programmable interoperability among multi-vendor appliances. We first prepare APIs that assist a PC to send infrared signals to the appliances. We then aggregate the APIs within self-contained service components, so that each of the component achieves a logical feature independent of device(or vendor)-specific operations. The service components are finally exported to the HNS as Web services. Thus, the legacy appliances can be used as distributed components with open interfaces. To demonstrate the effectiveness, we also implement an actual HNS and integrated services with multi-vendor legacy appliances.

Masahide Nakamura; Akihiro Tanaka; Hiroshi Igaki; Haruaki Tamada; Ken-ichi Matsumoto

2006-01-01T23:59:59.000Z

179

Fermilab | FRA Contractor Assurance System (CAS) | Home  

NLE Websites -- All DOE Office Websites (Extended Search)

FRA Contractor Assurance System (CAS) FRA Contractor Assurance System (CAS) photo The FRA CAS is governed by Section H.13 of the FNAL prime contract, executed by the FRA Board of Directors and implemented throughout the FNAL organization. This system provides reasonable assurance that the objectives of the contractor management systems below are being accomplished in accordance with the requirements of the contract. The Fermilab Assurance Council (AC) is a key element of the CAS. The members of the AC are Management System owners and/or major process owners. A major function of the AC is to identify and track issues that arise though an awareness of changes in the laboratory's operating environment, applicable laws and regulations, self-assessments and the various review processes of the laboratory. The AC executes this function through the FRA

180

Roadmap to Secure Control Systems in the Energy Sector 2006 ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Energy Sector More Documents & Publications Security is Not an Option DOE National SCADA Test Bed Program Multi-Year Plan Roadmap to Achieve Energy Delivery Systems...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations Appendix F ...

2013-05-09T23:59:59.000Z

182

Security and Privacy Controls for Federal Information Systems  

Science Conference Proceedings (OSTI)

NIST Special Publication 800-53. Revision 4. Security and Privacy Controls for Federal Information Systems. and Organizations. JOINT TASK FORCE ...

2013-06-18T23:59:59.000Z

183

Securing Wide Area Measurement Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the...

184

Security Controls for Computer Systems (U): Report of ...  

Science Conference Proceedings (OSTI)

... This first step is essential in order that ... other computing systems, any facilities for security ... management controls and procedures, facility clearance is ...

2013-04-15T23:59:59.000Z

185

Evaluating Ventilation Systems for Existing Homes  

SciTech Connect

During the course of this project, an affordable and high performance ductwork system to directly address the problems of thermal losses, poor efficiency, and air leakage was designed. To save space and enable direct connections between different floors of the building, the ductwork system was designed in such a way that it occupied interior or exterior frame wall cavities. The ductwork system satisfied building regulations for structural support when bridging multiple floors, the spread of fire and smoke, and insulation to reduce the heat flow into or out of the building. Retrofits of urban residential buildings will be the main focus for the application of this ductwork system. Highly reflective foils and insulating materials were used to aid in the increase of the overall R-value of the ductwork itself and the wall assembly. It is expected that the proposed system will increase the efficiency of the HVAC system and the thermal resistance of the building envelope. The performance of the proposed ductwork design was numerically evaluated in a number of different ways. Our results indicate that the aerogel duct method is a very cost attractive alternative to the conventional method.

Aldrich, R.; Arena, L.

2013-02-01T23:59:59.000Z

186

Evaluating Ventilation Systems for Existing Homes  

SciTech Connect

During the course of this project, an affordable and high performance ductwork system to directly address the problems of thermal losses, poor efficiency, and air leakage was designed. To save space and enable direct connections between different floors of the building, the ductwork system was designed in such a way that it occupied interior or exterior frame wall cavities. The ductwork system satisfied building regulations for structural support when bridging multiple floors, the spread of fire and smoke, and insulation to reduce the heat flow into or out of the building. Retrofits of urban residential buildings will be the main focus for the application of this ductwork system. Highly reflective foils and insulating materials were used to aid in the increase of the overall R-value of the ductwork itself and the wall assembly. It is expected that the proposed system will increase the efficiency of the HVAC system and the thermal resistance of the building envelope. The performance of the proposed ductwork design was numerically evaluated in a number of different ways. Our results indicate that the duct method is a very cost attractive alternative to the conventional method.

Aldrich, R.; Arena, L.

2013-02-01T23:59:59.000Z

187

Security Issues and Challenges for Cyber Physical System  

Science Conference Proceedings (OSTI)

In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set ... Keywords: Cyber-Physical System, Security, actuation, context-aware

Eric Ke Wang; Yunming Ye; Xiaofei Xu; S. M. Yiu; L. C. K. Hui; K. P. Chow

2010-12-01T23:59:59.000Z

188

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy, mitigation, and resilience ­ is among the most important R&D needs for the emerging smart grid. One

189

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy important R&D needs for the emerging smart grid. One of the overarching goals of the future research

190

ORION: An Adaptive Home-based Software Distributed Shared Memory System  

E-Print Network (OSTI)

1 ORION: An Adaptive Home-based Software Distributed Shared Memory System M.C. Ng School programs to a distributed environment. Orion implements home-based consistency model. In this paper, we also present 2 adaptive schemes for home-based DSM systems: home migration and dynamic adaptation

Wong, Weng Fai

191

Adaptive Schemes for Home-based DSM Systems School of Computing  

E-Print Network (OSTI)

Adaptive Schemes for Home-based DSM Systems M.C. Ng School of Computing National University Home-based consistency model, a variant of lazy release consistency model (LRC), is a recent, we present 2 adaptive schemes for home-based DSM systems: home migration and dynamic adaptation

Wong, Weng Fai

192

HOMES: highway operation monitoring and evaluation system  

Science Conference Proceedings (OSTI)

This work proposes high-performance critical visualization techniques for exploring real-time and historical traffic loop-detector data. Until recently, it has been difficult to discover trends, identify patterns, or locate abnormalities within the massive ... Keywords: data streams, intelligent transportation system, visualization

Chang-Tien Lu; Arnold P. Boedihardjo; Jing Dai; Feng Chen

2008-11-01T23:59:59.000Z

193

Cyber Security Procurement Methodology for Power Delivery Systems  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new power delivery systems requires cyber security experts, power system engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfit to meet requirements.The Electric Power Research ...

2012-12-31T23:59:59.000Z

194

TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH  

SciTech Connect

The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

Lee, Hsien-Hsin S

2010-05-11T23:59:59.000Z

195

A testbed for secure and robust SCADA systems  

Science Conference Proceedings (OSTI)

The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a ...

Annarita Giani; Gabor Karsai; Tanya Roosta; Aakash Shah; Bruno Sinopoli; Jon Wiley

2008-07-01T23:59:59.000Z

196

20th National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... NIST does not accept any other credit cards. ... and CD-ROM of the conference proceedings will be ... In January 1981, the National Computer Security ...

197

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

198

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

199

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network (OSTI)

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

200

DOE and Industry Showcase New Control Systems Security Technologies at  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Development » Energy Delivery Systems Technology Development » Energy Delivery Systems Cybersecurity » Control Systems Security News Archive » DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy infrastructure from cyber attack on Tuesday through Thursday, March 23-25. Visit Booth #231 at the DistribuTECH 2010 Conference & Exhibition in Tampa, FL, to see first-hand demonstrations of several newly commercialized control systems security products-each developed through a

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

FORTUNA-A framework for the design and development of hardware-based secure systems  

Science Conference Proceedings (OSTI)

Security requires a holistic view. In this work we contribute to this goal by taking a new viewpoint, with the proposal of the logic-probabilistic framework FORTUNA to support the design and development of hardware-based-security systems (HwBSS). It ... Keywords: Formal methods for security, Hardware-based security, Information security, Security evaluation tool, Security metrics

Roberto Gallo, Henrique Kawakami, Ricardo Dahab

2013-08-01T23:59:59.000Z

202

Research challenges for the security of control systems  

Science Conference Proceedings (OSTI)

In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirements and problems for the security of control systems? We also propose ...

Alvaro A. Cárdenas; Saurabh Amin; Shankar Sastry

2008-07-01T23:59:59.000Z

203

Developing Secure Power Systems Professional Competence: Alignment and Gaps  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Developing Secure Power Systems Professional Competence: Alignment Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to protect and enable the modernized grid currently being built. In the spring of 2011 a project was initiated to identify those capabilities and competencies along with assessing the need and qualifications for a certification program for Secure Power Systems

204

Guideline for Securing Control Systems and Corporate Network Interfaces  

Science Conference Proceedings (OSTI)

Until recent years, many electric utilities have dealt with the cyber security issues of protecting control system networks by keeping the control system and corporate system networks physically separate. Others have prohibited remote access to control system networks, requiring all connections be made onsite. While these techniques effectively protect the system from external cyber-security-based threats, they are restricting a growing requirement for access, particularly among corporate users who need ...

2005-12-05T23:59:59.000Z

205

NMMSS Fill-able Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Fill-able Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > NMMSS Fill-able...

206

NIST Selects Winner of Secure Hash Algorithm (SHA-3) ...  

Science Conference Proceedings (OSTI)

... Any change in the original message, however small, must cause a change in the ... in a building-wide security system and home appliances that can ...

2012-10-10T23:59:59.000Z

207

Business Systems Analysis.:. Lawrence Berkeley National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Travel Office Business Systems Search: Go Fiscal Year End Close Wiki Cyber Security Contact Us spacer BSA Home OCFO Home Send Feedback Page Last Updated 61112...

208

Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations  

Science Conference Proceedings (OSTI)

Safety Instrumented Systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil & natural gas installations. SIS typically include the Emergency Shutdown System (ESD) that ensures that process systems return ... Keywords: Offshore, Process Control, Safety Instrumented Systems, Secure remote access

Martin Gilje Jaatun; Tor Olav Grøtan; Maria B. Line

2008-06-01T23:59:59.000Z

209

Privacy and Security Research Group workshop on network and distributed system security: Proceedings  

Science Conference Proceedings (OSTI)

This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

Not Available

1993-05-01T23:59:59.000Z

210

System Effects of High Efficiency Filters in Homes  

NLE Websites -- All DOE Office Websites (Extended Search)

System Effects of High Efficiency Filters in Homes System Effects of High Efficiency Filters in Homes Title System Effects of High Efficiency Filters in Homes Publication Type Conference Paper LBNL Report Number LBNL-6144E Year of Publication 2013 Authors Walker, Iain S., Darryl J. Dickerhoff, David Faulkner, and William J. N. Turner Conference Name ASHRAE Annual Conference Date Published 03/2013 Abstract Occupant concern about indoor air quality (IAQ) issues has led to the increased use of more effective air filters in residential heating and cooling systems. A drawback of improved filtration is that better filters tend to have more flow resistance. This can lead to lower system airflows that reduce heat exchanger efficiency, increase duct pressure that leads to increased air leakage for ducts and, in some case s, increased blower power consumption. There is currently little knowledge on the magnitude of these effects. In this study, the performance of ten central forced air systems was monitored for a year. The systems used either a Permanent Split Capacitor (PSC) or a Brushless Permanent Magnet (BPM) blower. Each system was operated with a range of filter efficiencies ranging from MERV 6 (the lowest currently permitted in ASHRAE Standard 62.2) up to MERV 16. Measurements were recorded every ten seconds for blower power, filter pressure drop, supply and return plenum pressures together with plenum and indoor temperatures. These detailed continuous measurements allowed observation of filter loading effects as well as the initial change in system performance when filters were swapped. The results of the field measurements were used in simulations to examine more general system performance effects for a wider range of climates. The field tests showed that system static pressures were highly influenced by filter selection, filter loading rates varied more from house to house than by MERV rating and overall were quite low in many of the homes. PSC motors showed reduced power and airflow as the filters loaded, but BPM motors attempted to maintain a constant airflow and increased their power to do so. The combined field test and simulation results from this study indicate that for MERV 10-13 filters the effects on energy use are small (5%) and usability. In systems using low MERV filters that are already close to blower performance limits the addition of a MERV 16 filter pushed the blowers to their performance limits.

211

Secure transfer of measurement data in open systems  

Science Conference Proceedings (OSTI)

The liberalization of different markets which are liable to legal metrology accelerates the need for transferring measuring data over open networks. This increases the involvement of communication technology in measuring systems and raises new security ... Keywords: Digital signatures, Legal metrology, SELMA, Secure data transfer

Luigi Lo Iacono; Christoph Ruland; Norbert Zisky

2006-01-01T23:59:59.000Z

212

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

E-Print Network (OSTI)

Effects of Residential Photovoltaic Energy Systems on HomeEffects of Residential Photovoltaic Energy Systems on Homewith existing photovoltaic (PV) energy systems have sold in

Hoen, Ben

2011-01-01T23:59:59.000Z

213

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

214

Measurable Control System Security through Ideal Driven Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

2008-01-01T23:59:59.000Z

215

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

216

DOE Challenge Home Case Study, Dwell Development, Seattle, WA, Systems Home  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Dwell Dwell Development Seattle, WA BUILDING TECHNOLOGIES OFFICE DOE Challenge Home builders are in the top 1% of builders in the country meeting the extraordinary levels of excellence and quality specifi ed by the U.S. Department of Energy. Every DOE Challenge Home starts with ENERGY STAR for Homes Version 3 for an energy-effi cient home built on a solid foundation of building science research. Then, even more advanced technologies are designed in for a home that goes above and beyond current code to give you the superior quality construction, HVAC, appliances, indoor air quality, safety, durability, comfort, and solar-ready components along with ultra-low or no utility bills. This provides homeowners with a quality home that will last for generations to come.

217

Neutralization: new insights into the problem of employee systems security policy violations  

Science Conference Proceedings (OSTI)

Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers have traditionally viewed violations of IS security ... Keywords: IS security, IS security policies, compliance, deterrence theory, neutralization theory

Mikko Siponen; Anthony Vance

2010-09-01T23:59:59.000Z

218

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

219

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

220

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network (OSTI)

This fact sheet describes Homeland Security issues that affect Texas and the nation. It includes an overview of some of the key water resource issues associated with preventing intentional contamination of water supplies served by small water systems.

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

IT Security for Automation Systems – Motivations and Mechanisms  

E-Print Network (OSTI)

The protection of safety-critical and infrastructure systems (such as automation systems for utilities, but also for manufacturing plants) against electronic and communication network based attacks becomes more and more important. This paper examines how such safety-critical plants and automation systems can be secured against information system and network based attacks. Based on the defense-in-depth approach, a conceptional, generic security zone model for use in analysis and synthesis of a plant security architecture is proposed, and for each of its zones a survey of the available and appropriate security mechanisms for delay, detection, and reaction is given. Der Schutz von sicherheitskritischen Systemen und Infrastruktureinrichtungen (wie zum Beispiel der Automatisierungsanlagen von Versorgungsunternehmen, aber auch von Fabrikationsanlagen) gegen

Martin Naedele; Abb Schweiz Ag

2004-01-01T23:59:59.000Z

222

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

223

AMI System Security Requirements - v1_01-1 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AMI System Security Requirements - v101-1 AMI System Security Requirements - v101-1 This document provides the utility industry and vendors with a set of security requirements...

224

Roadmap to Secure Control Systems in the Energy Sector  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roadmap Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic framework for guiding industry and goernment efforts based on a clear ision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctie feature of this collaboratie effort is the actie inolement and leadership of energy asset

225

Network Security Management for Transmission Systems  

Science Conference Proceedings (OSTI)

The electric power grid is increasingly dependent on information technology and telecommunication infrastructures.   While great benefits will result from this influx of technology, a holistic and granular awareness of all elements of the information infrastructure supporting a control subsystem will be critical to ensure long term reliability and security. The management of this information infrastructure requires connectivity and analytics to support both IT and OT assets in a unified ...

2012-12-31T23:59:59.000Z

226

Building America Top Innovations 2013 Profile Â… HPXML: A Standardized Home Performance Data Sharing System  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

home performance program tracking home performance program tracking systems and energy upgrade analysis software. Many software platforms are available for recording the results of home energy audits for energy-efficiency upgrades and for analyzing home energy performance. Because states and utilities have adopted different tools for compiling and analyzing the data, home performance companies that participate in multiple utility programs or operate over multiple regions need proficiency in each of the reporting platforms used. The necessity of being fluent in multiple programs and of providing results in numerous platforms dramatically increases the home performance companies' information technology infrastructure and training costs. The National Renewable Energy Laboratory (NREL) has supported the

227

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

on control systems . . . . . . . . . . . . . . . . 7.2control system. . . . . . . . . . . . . . . . . . . . . . . . . .8 Stabilization of Networked Control Systems using 8.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

228

GAO Challenges and Efforts to Secure Control Systems (March 2004) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) Computerized control systems perform vital functions across many of our nation's critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and flow of gas through pipelines. In October 1997, the President's Commission on Critical Infrastructure Protection emphasized the increasing vulnerability of control systems to cyber attacks. The House Committee on Government Reform and its Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census asked GAO to report on potential cyber vulnerabilities, focusing on (1) significant cybersecurity risks associated with control systems (2) potential and reported cyber attacks

229

Marine asset security and tracking (MAST) system  

DOE Patents (OSTI)

Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

Hanson, Gregory Richard (Clinton, TN); Smith, Stephen Fulton (Loudon, TN); Moore, Michael Roy (Corryton, TN); Dobson, Eric Lesley (Charleston, SC); Blair, Jeffrey Scott (Charleston, SC); Duncan, Christopher Allen (Marietta, GA); Lenarduzzi, Roberto (Knoxville, TN)

2008-07-01T23:59:59.000Z

230

Pressurized security barrier and alarm system  

DOE Patents (OSTI)

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

Carver, D.W.

1994-12-31T23:59:59.000Z

231

Pressurized security barrier and alarm system  

DOE Patents (OSTI)

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder's making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

Carver, Don W. (Knoxville, TN)

1995-01-01T23:59:59.000Z

232

Pressurized security barrier and alarm system  

DOE Patents (OSTI)

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

Carver, D.W.

1995-04-11T23:59:59.000Z

233

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

234

Secure Systems Editors: Patrick McDaniel, mcdaniel@cse.psu.edu  

E-Print Network (OSTI)

the smartgrid technology. His research interests include network and systems security, telecommunications

McDaniel, Patrick Drew

235

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

236

Using Multiple Unmanned Systems for a Site Security Task  

SciTech Connect

Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

2009-04-01T23:59:59.000Z

237

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach  

Science Conference Proceedings (OSTI)

Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%--75% of security incidents originate from within an organization. ... Keywords: IS misuse, IS security, end-user security, general deterrence theory, security countermeasures, security management

John D'Arcy; Anat Hovav; Dennis Galletta

2009-03-01T23:59:59.000Z

238

My Home is My Bazaar - A Taxonomy and Classification of Current Wireless Home Network Protocols  

Science Conference Proceedings (OSTI)

Recent advances in wireless communication have produced a multitude of related protocols, leading to a growing market of products for home automation systems within energy management, elder care, etc. These systems are different from wired ones in terms ... Keywords: wireless networks, security, home automation, pervasive computing, protocols, taxonomy

Rune Torbensen; Klaus Marius Hansen; Theis Solberg Hjorth

2011-09-01T23:59:59.000Z

239

Consistency-based System Security Techniques  

E-Print Network (OSTI)

terminates the operation of the wireless system that isDuring the operation mode of the wireless system when theHT-embedded wireless system enters the operation mode. The

Wei, Sheng

2013-01-01T23:59:59.000Z

240

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

InkTag: secure applications on an untrusted operating system  

Science Conference Proceedings (OSTI)

InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design ... Keywords: application protection, paraverification, virtualization-based security

Owen S. Hofmann; Sangman Kim; Alan M. Dunn; Michael Z. Lee; Emmett Witchel

2013-04-01T23:59:59.000Z

242

A secure monitoring and control system for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

The maintenance of Wireless Sensor Networks (WSNs) can carry high or prohibitive costs, particularly, if the WSN is deployed in unattended areas. Secure monitoring and control of the WSN is vital, however, practical systems are rare and limited with ... Keywords: Monitoring,Wireless sensor networks,Control systems,Intrusion detection,Elliptic curve cryptography

Michael Riecker, Rainer Thome, Dingwen Yuan, Matthias Hollick

2012-10-01T23:59:59.000Z

243

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

244

Control Systems Security News Archive | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

News Archive News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award October 2009 - DOE NSTB researchers demonstrated R&D successes to asset owners at EnergySec Conference September 2009 - ISA approves standard for wireless automation in process control applications Sept. 2009 - Government and Industry a Force for Collaboration at the

245

Use of a hybrid technology in a critical security system.  

SciTech Connect

Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

Scharmer, Carol; Trujillo, David J.

2010-08-01T23:59:59.000Z

246

Use of a hybrid technology in a critical security system.  

SciTech Connect

Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

Trujillo, David J.

2010-10-01T23:59:59.000Z

247

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

248

Building America System Research Plan for Reduction of Miscellaneous Electrical Loads in Zero Energy Homes  

SciTech Connect

This research plan describes the overall scope of system research that is needed to reduce miscellaneous electrical loads (MEL) in future net zero energy homes.

Barley, C. D.; Haley, C.; Anderson, R.; Pratsch, L.

2008-11-01T23:59:59.000Z

249

Training programs for the systems approach to nuclear security.  

Science Conference Proceedings (OSTI)

In support of the US Government and the International Atomic Energy Agency (IAEA) Nuclear Security Programmes, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been implemented as the basis for a performance methodology for the design and evaluation of Physical Protection Systems against a Design Basis Threat (DBT) for theft or sabotage of nuclear and/or radiological materials. Since integrated systems must include people as well as technology and the man-machine interface, a critical aspect of the human element is to train all stakeholders in nuclear security on the systems approach. Current training courses have been beneficial but are still limited in scope. SNL has developed two primary international courses and is completing development of three new courses that will be offered and presented in the near term. In the long-term, SNL envisions establishing a comprehensive nuclear security training curriculum that will be developed along with a series of forthcoming IAEA Nuclear Security Series guidance documents.

Ellis, Doris E.

2005-07-01T23:59:59.000Z

250

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

251

Roadmap to Secure Control Systems in the Energy: Executive Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Foreword Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctive feature of this collaborative effort is the active involvement and leadership of energy asset owners and operators in developing the Roadmap content and priorities. The Roadmap synthesizes

252

NERSC Increases System Storage and Security for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Increases Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve I/O Performance Throughout the month of March the Cray XT4 machine Franklin underwent a series of upgrades and improvements, including a major I/O upgrade. The disk capacity of the scratch file system was increased by 30% to 460 TB, and the I/O bandwidth was nearly tripled to an aggregate write performance of 32 GB/sec, compared to 11 GB/s before the upgrade. Instead of adding the new hardware to the existing scratch file system, NERSC chose to implement a second scratch file system so that Franklin now has two scratch file systems, each with a peak write bandwidth of 16 GB/sec. "We doubled the amount of I/O hardware and nearly tripled the bandwidth,

253

Towards Security of Integrated Enterprise Systems ...  

Science Conference Proceedings (OSTI)

... corrective actions” (Merit Projecta 98, p. 8). The enterprise system management framework should include an object repository (Yankee 97, p.2 ...

1999-11-05T23:59:59.000Z

254

Bellingham, Washington, Control System Cyber Security Case ...  

Science Conference Proceedings (OSTI)

... of software used on the Olympic system was shipped to Houston to allow the ... site, the maximum bandwidth of the communication channel and the ...

2007-10-24T23:59:59.000Z

255

MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS  

E-Print Network (OSTI)

network at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, was infected [39]. There have been-physical systems, threat models, protocols for treaty verification. 1. Introduction The rapid growth of information) sys- tems that monitor power, gas/oil transportation, water and waste-water distribution. Such systems

Burmester, Mike

256

Critical issues in process control system security : DHS spares project.  

SciTech Connect

The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

2010-10-01T23:59:59.000Z

257

2013 DOE Safety and Security Enforcement Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

2013 DOE Safety and Security Workshop 2013 Workshop Home Registration Agendas Hotel and Training Center Information Enforcement Home 2013 DOE Safety and Security Enforcement...

258

Towards secure multi-sited transactional revision control systems  

Science Conference Proceedings (OSTI)

Version control systems play a very important role in maintaining the revision history of software and facilitating software evolution. As the software development process is gradually taking the form of a collaborative effort among several teams hosted ... Keywords: Configuration management, Security, Transaction processing, Version control

Junxing Zhang; Indrajit Ray

2007-03-01T23:59:59.000Z

259

Towards a secure Frequency Monitoring NETwork (FNET) system  

Science Conference Proceedings (OSTI)

Reactive and real-time wide area monitoring systems (WAMS), such as the Frequency Monitoring NETwork (FNET) developed at Virginia Tech, allow for the gathering of frequency data throughout the entire power grid. FNET uses the Internet as a communication ... Keywords: FNET, Smart Grid, cyber security

Joseph L. McDaniel; Ambareen Siraj

2010-04-01T23:59:59.000Z

260

Asbestos : operating system security for mobile devices  

E-Print Network (OSTI)

This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital ...

Stevenson, Martijn

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Could Your Home Benefit from a Small Wind Electric System? | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Could Your Home Benefit from a Small Wind Electric System? Could Your Home Benefit from a Small Wind Electric System? Could Your Home Benefit from a Small Wind Electric System? August 8, 2013 - 2:31pm Addthis A small wind electric system can be a clean, affordable way to power your home. | Photo courtesy of Thomas Fleckenstein, NREL 26476 A small wind electric system can be a clean, affordable way to power your home. | Photo courtesy of Thomas Fleckenstein, NREL 26476 Erik Hyrkas Erik Hyrkas Media Relations Specialist, Office of Energy Efficiency & Renewable Energy How can I participate? Check out these resources to figure out whether a small wind electric system is the right choice for you. Small residential wind turbines have been around for decades, and in recent years they have become a more affordable option due to tax credits and

262

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

Science Conference Proceedings (OSTI)

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

263

Security problems with a SC-CNN-based Chaotic Masking Secure Communication System  

E-Print Network (OSTI)

This paper studies the security of a chaotic cryptosystem based on the Chua circuit and implemented with State Controlled Cellular Neural Networks. It is shown that the plaintext can be retrieved by ciphertext band-pass filtering after an imperfect decoding with wrong receiver parameters. It is also shown that the key space of the system can be notably reduced easing a brute force attack. The system parameters were determined with high precision through the analysis of the decoding error produced by the mismatch between receiver and transmitter parameters.

A. B. Orue; G. Alvarez; F. Montoya; C. Sanchez-Avila

2007-06-20T23:59:59.000Z

264

Building America Top Innovations 2013 Profile Â… HPXML: A Standardized Home Performance Data Sharing System  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

program tracking systems and program tracking systems and energy upgrade analysis software. Many software platforms are available for recording the results of home energy audits for energy-efficiency upgrades and for analyzing home energy performance. Because states and utilities have adopted different tools for compiling and analyzing the data, home performance companies that participate in multiple utility programs or operate over multiple regions need proficiency in each of the reporting platforms used. The necessity of being fluent in multiple programs and of providing results in numerous platforms dramatically increases the home performance companies' information technology infrastructure and training costs. The National Renewable Energy Laboratory (NREL) has supported the

265

Secure Video Surveillance System (SVSS) for unannounced safeguards inspections.  

Science Conference Proceedings (OSTI)

The Secure Video Surveillance System (SVSS) is a collaborative effort between the U.S. Department of Energy (DOE), Sandia National Laboratories (SNL), and the Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC). The joint project addresses specific requirements of redundant surveillance systems installed in two South American nuclear facilities as a tool to support unannounced inspections conducted by ABACC and the International Atomic Energy Agency (IAEA). The surveillance covers the critical time (as much as a few hours) between the notification of an inspection and the access of inspectors to the location in facility where surveillance equipment is installed. ABACC and the IAEA currently use the EURATOM Multiple Optical Surveillance System (EMOSS). This outdated system is no longer available or supported by the manufacturer. The current EMOSS system has met the project objective; however, the lack of available replacement parts and system support has made this system unsustainable and has increased the risk of an inoperable system. A new system that utilizes current technology and is maintainable is required to replace the aging EMOSS system. ABACC intends to replace one of the existing ABACC EMOSS systems by the Secure Video Surveillance System. SVSS utilizes commercial off-the shelf (COTS) technologies for all individual components. Sandia National Laboratories supported the system design for SVSS to meet Safeguards requirements, i.e. tamper indication, data authentication, etc. The SVSS consists of two video surveillance cameras linked securely to a data collection unit. The collection unit is capable of retaining historical surveillance data for at least three hours with picture intervals as short as 1sec. Images in .jpg format are available to inspectors using various software review tools. SNL has delivered two SVSS systems for test and evaluation at the ABACC Safeguards Laboratory. An additional 'proto-type' system remains at SNL for software and hardware testing. This paper will describe the capabilities of the new surveillance system, application and requirements, and the design approach.

Galdoz, Erwin G. (Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Rio de Janeiro, Brazil); Pinkalla, Mark

2010-09-01T23:59:59.000Z

266

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

267

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Independent Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations...

268

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

269

Events and Conferences | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Areas Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Events and Conferences Events...

270

Framework for Evaluating Cyber Security Posture for Power Delivery Systems  

Science Conference Proceedings (OSTI)

While many asset owners and operators are performing self-assessments of their control systems, the methods used vary widely across the electric sector. This lack of consistent criteria and metrics makes it difficult to benchmark and compare the cyber security posture of power delivery systems.The objective of this technical update is to develop an evaluation framework that uses both the Department of Energy (DOE) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) ...

2013-11-28T23:59:59.000Z

271

Communications Security Analysis for Control System Networks: Preliminary Report  

Science Conference Proceedings (OSTI)

Communications capabilities in the control system network are expanding and security issues are becoming more important as the electric power industry migrates from relatively slow, serial communications to high-speed, asynchronous communications. This report surveys current and evolving wired and wireless high-speed communication technologies to create a roadmap for planning control system network upgrades before regulation or equipment obsolescence and reliability concerns become issues. Technologies s...

2007-02-15T23:59:59.000Z

272

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

Science Conference Proceedings (OSTI)

An increasing number of homes in the U.S. have sold with photovoltaic (PV) energy systems installed at the time of sale, yet relatively little research exists that estimates the marginal impacts of those PV systems on home sale prices. A clearer understanding of these possible impacts might influence the decisions of homeowners considering the installation of a PV system, homebuyers considering the purchase of a home with PV already installed, and new home builders considering including PV as an optional or standard product on their homes. This research analyzes a large dataset of California homes that sold from 2000 through mid-2009 with PV installed. It finds strong evidence that homes with PV systems sold for a premium over comparable homes without PV systems during this time frame. Estimates for this premium expressed in dollars per watt of installed PV range, on average, from roughly $4 to $5.5/watt across a large number of hedonic and repeat sales model specifications and robustness tests. When expressed as a ratio of the sales price premium of PV to estimated annual energy cost savings associated with PV, an average ratio of 14:1 to 19:1 can be calculated; these results are consistent with those of the more-extensive existing literature on the impact of energy efficiency on sales prices. When the data are split among new and existing homes, however, PV system premiums are markedly affected. New homes with PV show premiums of $2.3-2.6/watt, while existing homes with PV show premiums of more than $6/watt. Reasons for this discrepancy are suggested, yet further research is warranted. A number of other areas where future research would be useful are also highlighted.

Hoen, Ben; Cappers, Peter; Wiser, Ryan; Thayer, Mark

2011-04-19T23:59:59.000Z

273

TMS 2012: Exhibit Home  

Science Conference Proceedings (OSTI)

Meeting Home Meeting Registration Housing and Travel Exhibit Info ... name and booth number; aisle carpeting; security throughout the exhibition (setup, show ...

274

Integrated training for the Department of Energy stadnard security system  

SciTech Connect

Lawrence Livermore National Laboratory has been successful in designing and providing technical performance-based training for the Argus security system. This training has been developed for technical and operational staff at facilities installing or using the Argus security system. The Argus training program is designed to instruct candidates to become the trainers for their facilities. The design criteria of the Argus training program includes: Meeting orders of the Department of Energy and the Department of Defense, Being flexible for a changing environment, Customizing lessons to site`s needs, and Configuring for a specific job. The Argus training staff has implemented a successful process for designing and developing integrated training to sup port complex systems, each with its own operational needs, and adapting it to specific sites.

Wadsworth, M.

1997-06-01T23:59:59.000Z

275

High-end Home Firewalls CIAC-2326  

SciTech Connect

Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managers have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.

Orvis, W

2003-10-08T23:59:59.000Z

276

Least Squares Optimal Scaling of Partially Observed Linear Systems  

E-Print Network (OSTI)

presence or absence of home-security devices). Items werestation Incivility: Graffiti Home security: Motion detector

2003-01-01T23:59:59.000Z

277

Improving security applications using indoor location systems on wireless sensor networks  

Science Conference Proceedings (OSTI)

One of the fields in which companies are investing more money is security, either personal security to avoid industrial accidents or security against intrusions. There is also the huge effort that the scientific community is doing developing all required ... Keywords: IEEE 802.15.4, ILS, indoor location systems, security applications, wireless sensor networks

Josep Paradells; Jordi Vilaseca; Jordi Casademont

2009-01-01T23:59:59.000Z

278

Implementing Multi-Vendor Home Network System with Vendor-Neutral Services and Dynamic Service Binding  

Science Conference Proceedings (OSTI)

The home network system (HNS) consists of networked household appliances, intended to provide value-added services. The conventional HNS has been built on the single-vendor system, which severely limits potential of the HNS. To overcome the problem, ...

Masahide Nakamura; Yusuke Fukuoka; Hiroshi Igaki; Ken-ichi Matsumoto

2008-07-01T23:59:59.000Z

279

Security analysis of communication system based on the synchronization of different order chaotic systems  

E-Print Network (OSTI)

This work analyzes the security weakness of a recently proposed communication method based on chaotic modulation and masking using synchronization of two chaotic systems with different orders. It is shown that its application to secure communication is unsafe, because it can be broken in two different ways, by high-pass filtering and by reduced order system synchronization, without knowing neither the system parameter values nor the system key.

G. Alvarez; L. Hernandez; J. Munoz; F. Montoya; Shujun Li

2005-06-27T23:59:59.000Z

280

Building America Best Practices Series, Volume 6: High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems  

SciTech Connect

This guide is was written by PNNL for the US Department of Energy's Building America program to provide information for residential production builders interested in building near zero energy homes. The guide provides indepth descriptions of various roof-top photovoltaic power generating systems for homes. The guide also provides extensive information on various designs of solar thermal water heating systems for homes. The guide also provides construction company owners and managers with an understanding of how solar technologies can be added to their homes in a way that is cost effective, practical, and marketable. Twelve case studies provide examples of production builders across the United States who are building energy-efficient homes with photovoltaic or solar water heating systems.

Baechler, Michael C.; Gilbride, Theresa L.; Ruiz, Kathleen A.; Steward, Heidi E.; Love, Pat M.

2007-06-04T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Building America Best Practices Series, Volume 6: High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems  

SciTech Connect

This guide is was written by PNNL for the US Department of Energy's Building America program to provide information for residential production builders interested in building near zero energy homes. The guide provides indepth descriptions of various roof-top photovoltaic power generating systems for homes. The guide also provides extensive information on various designs of solar thermal water heating systems for homes. The guide also provides construction company owners and managers with an understanding of how solar technologies can be added to their homes in a way that is cost effective, practical, and marketable. Twelve case studies provide examples of production builders across the United States who are building energy-efficient homes with photovoltaic or solar water heating systems.

Baechler, Michael C.; Gilbride, Theresa L.; Ruiz, Kathleen A.; Steward, Heidi E.; Love, Pat M.

2007-06-04T23:59:59.000Z

282

A vision-based system for object identification and information retrieval in a smart home  

Science Conference Proceedings (OSTI)

This paper describes a hand held device developed to assist people to locate and retrieve information about objects in a home. The system developed is a standalone device to assist persons with memory impairments such as people suffering from Alzheimer's ... Keywords: object detection and recognition, smart home

Raphael Grech; Dorothy Monekosso; Deon De Jager; Paolo Remagnino

2010-11-01T23:59:59.000Z

283

Agentc: Agent-based system for securing maritime transit  

E-Print Network (OSTI)

Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-based traffic management techniques can be used to improve the security of transit through piracy-affected areas. Combining agent-based modeling and simulation of maritime traffic and novel route planning and vessel scheduling techniques, the system shows the promising potential of agent-based methods for increasing maritime security. Real-world data sources Control and presentation interface (Google Earth) Route planning and scheduling Optimum group transit formation Maritime traffic simulation Maritime environment model Randomized transit routing FSM-based vessel behavior models Optimum transit patrolling Inter-agent communication channels

Michal Jakob; Branislav Bošanský; Michal P?chou?ek

2011-01-01T23:59:59.000Z

284

July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and Commercial Facilities July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and Commercial Facilities July 12, 2013 - 10:40am Addthis On Wednesday, July 17 from 2 - 3 p.m. ET, Clean Energy States Alliance will host a webinar on resilient solar-storage systems for homes and commercial facilities. The webinar will be introduced by Dr. Imre Gyuk, Energy Storage Program Manager in the Office of Electricity Delivery and Energy Reliability. This webinar will include basic information on battery-backed PV systems that can continue to operate in islanded mode when the grid is down, supporting critical loads. Speaker Michael Kleinberg of DNV KEMA will discuss existing solutions and opportunities for solar PV systems with

285

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

286

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project  

SciTech Connect

This is the final report of Phase 2 of the Secure Power Systems Professional project, a 3 phase project. DOE will post to their website upon release.

O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; leo, R.; Perman, K.

2013-08-26T23:59:59.000Z

287

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

288

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

289

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

290

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

291

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

292

Remote-Controllable Power Outlet System for Home Power Management  

Science Conference Proceedings (OSTI)

In this paper we describe the Wireless Power-Controlled Outlet Module (WPCOM) with a scalable mechanism for home power management which we have developed. The WPCOM integrates the multiple AC power sockets and a simple low-power microcontroller into ...

Chia-Hung Lien; Ying-Wen Bai; Ming-Bo Lin

2007-11-01T23:59:59.000Z

293

Analysis of costs-benefits tradeoffs of complex security systems  

SciTech Connect

Essential to a systems approach to design of security systems is an analysis of the cost effectiveness of alternative designs. While the concept of analysis of costs and benefits is straightforward, implementation can be at the least tedious and, for complex designs and alternatives, can become nearly intractable without the help of structured analysis tools. PACAIT--Performance and Cost Analysis Integrated Tools--is a prototype tool. The performance side of the analysis collates and reduces data from ASSESS, and existing DOE PC-based security systems performance analysis tool. The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. Costs are reported over the full life-cycle of the system, that is, the costs to procure, operate, maintain and retire the system and all of its components. Results are collected in Microsoft{reg_sign} Excel workbooks and are readily available to analysts and decision makers in both tabular and graphical formats and at both the system and path-element levels.

Hicks, M.J. [Sandia National Labs., Albuquerque, NM (United States). Security Systems Analysis and Development Dept.

1996-12-31T23:59:59.000Z

294

Capacity Utilization Study for Aviation Security Cargo Inspection Queuing System  

SciTech Connect

In this paper, we conduct performance evaluation study for an aviation security cargo inspection queuing system for material flow and accountability. The queuing model employed in our study is based on discrete-event simulation and processes various types of cargo simultaneously. Onsite measurements are collected in an airport facility to validate the queuing model. The overall performance of the aviation security cargo inspection system is computed, analyzed, and optimized for the different system dynamics. Various performance measures are considered such as system capacity, residual capacity, throughput, capacity utilization, subscribed capacity utilization, resources capacity utilization, subscribed resources capacity utilization, and number of cargo pieces (or pallets) in the different queues. These metrics are performance indicators of the system s ability to service current needs and response capacity to additional requests. We studied and analyzed different scenarios by changing various model parameters such as number of pieces per pallet, number of TSA inspectors and ATS personnel, number of forklifts, number of explosives trace detection (ETD) and explosives detection system (EDS) inspection machines, inspection modality distribution, alarm rate, and cargo closeout time. The increased physical understanding resulting from execution of the queuing model utilizing these vetted performance measures should reduce the overall cost and shipping delays associated with new inspection requirements.

Allgood, Glenn O [ORNL; Olama, Mohammed M [ORNL; Lake, Joe E [ORNL; Brumback, Daryl L [ORNL

2010-01-01T23:59:59.000Z

295

Control Systems Security Publications Library | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications Library Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require Adobe Acrobat Reader. You can download a free copy of the Reader by visiting Adobe.) VULNERABILITY REPORTS PERIODICAL ARTICLES ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION DOE NSTB PROGRAM PLANNING AND RESOURCE DOCUMENTS PROJECT FACT SHEETS TRAINING MATERIALS AND RECOMMENDED PRACTICES ASSESSMENT AND TECHNICAL PUBLICATIONS SANDIA NATIONAL LABORATORIES REPORTS FOR NSTB PACIFIC NORTHWEST NATIONAL LABORATORY REPORTS FOR NSTB IDAHO NATIONAL LABORATORY REPORTS FOR NSTB FEDERAL GUIDANCE AND POLICY DOCUMENTS VULNERABILITY REPORTS INL Common Vulnerabilities Report - 2008 NERC Top 10 Vulnerabilities of Control Systems and Their Associated

296

Safety and Security Enforcement Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

297

Networking technology adoption : system dynamics modeling of fiber-to-the-home  

E-Print Network (OSTI)

A system dynamics model is developed and run to study the adoption of fiber-to-the-home as a residential broadband technology. Communities that currently do not have broadband in the United States are modeled. This case ...

Kelic, Andjelka, 1972-

2005-01-01T23:59:59.000Z

298

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

299

Security data extraction from IEC 61850 ACSI models for network and system management  

Science Conference Proceedings (OSTI)

The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and sabotage, ... Keywords: IEC 61850, IEC 62351, network and system management, power grid security, smart grid security

Chung-Hyo Kim; Moon-Seok Choi; Seong-Ho Ju; Yong-Hun Lim; Jong-Mock Baek

2011-08-01T23:59:59.000Z

300

SecTTS: A secure track & trace system for RFID-enabled supply chains  

Science Conference Proceedings (OSTI)

Due to the highly sensitive business information communicated within RFID-enabled supply chain networks, there is an urgent need for a secure and effective track & trace system. In this paper, we aim to design and implement a secure track & trace system ... Keywords: EPCglobal network, RFID, Relay policy, Security, Supply chains

Jie Shi; Yingjiu Li; Wei He; Darren Sim

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Circuits of power in creating de jure standards: shaping an international information systems security standard  

Science Conference Proceedings (OSTI)

This paper addresses the role of power and politics in setting standards. It examines the interaction of external contingencies, powerful agents, resources, meaning, and membership of relevant social and institutional groupings in generating successful ... Keywords: information systems security management, information systems security standards, institutionalization, power and politics, security management code of practice

James Backhouse; Carol W. Hsu; Leiser Silva

2006-08-01T23:59:59.000Z

302

Design principles and patterns for computer systems that are simultaneously secure and usable  

E-Print Network (OSTI)

It is widely believed that security and usability are two antagonistic goals in system design. This thesis argues that there are many instances in which security and usability can be synergistically improved by revising ...

Garfinkel, Simson

2005-01-01T23:59:59.000Z

303

A collaborative framework for multi-area dynamic security assessment of large scale systems  

E-Print Network (OSTI)

that our knowledge of power system dynamics and the quality of available dynamic security analysis software- security assessment (load-flow computations) [4]­[10]. But there remain several open questions which have

Wehenkel, Louis

304

Smartgrid supervisory control and data acquisition (SCADA) system security issues and counter measures.  

E-Print Network (OSTI)

??This project discusses security issues, countermeasures and research issues in the Supervisory Control And Data Acquisition (SCADA) system. SCADA system is used in power sector… (more)

Sunku Ravindranath, Raksha

2010-01-01T23:59:59.000Z

305

A System for Smart Home Control of Appliances based on Timer and Speech Interaction  

E-Print Network (OSTI)

The main objective of this work is to design and construct a microcomputer based system: to control electric appliances such as light, fan, heater, washing machine, motor, TV, etc. The paper discusses two major approaches to control home appliances. The first involves controlling home appliances using timer option. The second approach is to control home appliances using voice command. Moreover, it is also possible to control appliances using Graphical User Interface. The parallel port is used to transfer data from computer to the particular device to be controlled. An interface box is designed to connect the high power loads to the parallel port. This system will play an important role for the elderly and physically disable people to control their home appliances in intuitive and flexible way. We have developed a system, which is able to control eight electric appliances properly in these three modes.

Haque, S M Anamul; Islam, Md Ashraful

2010-01-01T23:59:59.000Z

306

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

307

A privilege management system for a secure network  

Science Conference Proceedings (OSTI)

Modern research projects may involve dozens of geographically distributed collaborators who access distributed information, applications workstations and devices. We are developing an architecture and methods for distributed, decentralized privilege ... Keywords: CEBAF, Chinese Institute of High Energy Physics, Continuous Electron Beam Accelerator Facility, DICCE project, Distributed Informatics Computing and Collaborative Environments project, ESnet, Internet, Old Dominion University, US Department of Energy's Energy Science Network, World Wide Web based interfaces, X-windows, authentication, authorisation, authorization, computer network management, design, distributed computing environment networks, distributed information, implementation, network interfaces, privilege management system, secure network

K. J. Maly; A. Gupta; B. Kvande; I. B. Levinstein; R. Mukkamala; M. Olson; R. Whitney; R. Chambers

1996-06-01T23:59:59.000Z

308

Report on emergency electrical power supply systems for nuclear fuel cycle and reactor facilities security systems  

SciTech Connect

The report includes information that will be useful to those responsible for the planning, design and implementation of emergency electric power systems for physical security and special nuclear materials accountability systems. Basic considerations for establishing the system requirements for emergency electric power for security and accountability operations are presented. Methods of supplying emergency power that are available at present and methods predicted to be available in the future are discussed. The characteristics of capacity, cost, safety, reliability and environmental and physical facility considerations of emergency electric power techniques are presented. The report includes basic considerations for the development of a system concept and the preparation of a detailed system design.

1977-01-01T23:59:59.000Z

309

Home cogeneration system can augment peak power requirements  

SciTech Connect

The use of internal combustion engines to supplement peak power generation to homeowners is suggested. As in a car heater, internal combustion engines would recover heat from the radiators to heat the house. The IC, inlet and outlet lines, thermostat, muffler (''critical''), induction generator, and reverse power delay are schematicized. Synchronous generators are not recommended. Disadvantages include the potential pollution, high capital cost, and the resistance of homeowners ''acquainted with the problems of owning a car.'' A simple method to determine the economics of home cogeneration is given. Special consideration is paid to the induction generator, and the engine starter.

Krishnan, K.R.

1983-06-01T23:59:59.000Z

310

Improved security for commercial container transports using an innovative active RFID system  

Science Conference Proceedings (OSTI)

The huge number of containers daily involved in the global transportation system opens important logistic and security issues. The matter of improving the management of goods in the harbor and the serious vulnerability problem of containers are relevant ... Keywords: Electronic seals, RFID technology, Secure supply chain, Secure transport, Wireless communications

Francesco Rizzo; Marcello Barboni; Lorenzo Faggion; Graziano Azzalin; Marco Sironi

2011-05-01T23:59:59.000Z

311

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Conference Proceedings (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

312

Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

313

ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains  

Science Conference Proceedings (OSTI)

In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently ... Keywords: decentralized access control, identity privacy, location privacy, mobile privacy, wireless security

Jiejun Kong; Shirshanka Das; Edward Tsai; Mario Gerla

2003-09-01T23:59:59.000Z

314

Agent Tcl: A flexible and secure mobile-agent system  

E-Print Network (OSTI)

An information agent manages all or a portion of a user's information space. The electronic resources in this space are often distributed across a network and can contain tremendous quantities of data. Mobile agents provide efficient access to such resources and are a powerful tool for implementing information agents. A mobile agent is an autonomous program that can migrate from machine to machine in a heterogeneous network. By migrating to the location of a resource, the agent can access the resource efficiently even if network conditions are poor or the resource has a low-level interface. Telescript is the best-known mobile-agent system. Telescript, however, requires the programmer to learn and work with a complex object-oriented language and a complex security model. Agent Tcl, on the other hand, is a simple, flexible, and secure system that is based on the Tcl scripting language and the Safe Tcl extension. In this paper we describe the architecture of Agent Tcl and its current implementation.

Robert S. Gray

1996-01-01T23:59:59.000Z

315

National SCADA Test Bed Enhancing control systems security in the energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed Enhancing control systems security in the energy sector More Documents & Publications NSTB Summarizes Vulnerable Areas Transmission and Distribution World March 2007: DOE Focuses on Cyber

316

Implementing home energy management system with UPnP and mobile applications  

Science Conference Proceedings (OSTI)

The power grid is undergoing a revolution and modernization through integrating information and communication technologies with the power system and also installing new electricity system technologies. Distributed controls in a certain self-reliant power-service ... Keywords: Automatic energy management, Customer domain, Home energy management system, Smart Grid, UPnP

Hwantae Kim; Suk Kyu Lee; Hyunsoon Kim; Hwangnam Kim

2012-12-01T23:59:59.000Z

317

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

318

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... JOINT TASK FORCE TRANSFORMATION INITIATIVE ... aspects of information security (ie, technical ... physical, personnel, cyber-physical); and 4. Is ...

2013-05-09T23:59:59.000Z

319

New Tools to Help Configure Secure Operating Systems  

Science Conference Proceedings (OSTI)

... assist federal agencies in complying with computer security requirements mandated by the government's Office of Management and Budget (OMB). ...

2013-07-08T23:59:59.000Z

320

ITL Bulletin Security Of Bluetooth Systems And Devices ...  

Science Conference Proceedings (OSTI)

... hopping spread spectrum (FHSS) technology for transmissions. ... but provides for minimal transmission security. ... for radio link power control, which ...

2013-04-16T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Secure Data Center (Fact Sheet), Energy Systems Integration Facility...  

NLE Websites -- All DOE Office Websites (Extended Search)

engineering. Partners at the ESIF's Secure Data Center include: * Government agencies * Vehicle manufacturers * Transit agencies * Hydrogen suppliers * Fuel cell developers *...

322

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

323

Analysis of Secure Mobile Grid Systems: A systematic approach  

Science Conference Proceedings (OSTI)

Developing software through systematic processes is becoming more and more important due to the growing complexity of software development. It is important that the development process used integrates security aspects from the first stages at the same ... Keywords: Requirements Analysis, Reusable use cases, Secure mobile Grid development, Security

David G. Rosado; Eduardo Fernández-Medina; Javier López; Mario Piattini

2010-05-01T23:59:59.000Z

324

Catalog of DC Appliances and Power Systems  

E-Print Network (OSTI)

boat, outdoor Home, office, hotel, shop, landscape, securityHome, industrial, commercial sites, area, security Indoor,home audio, computers Rechargeable electronics Security

Garbesi, Karina

2012-01-01T23:59:59.000Z

325

A Summary of Control System Security Standards Activities in the Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Summary of Control System Security Standards Activities in the A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of several of the sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the Energy Sector.pdf More Documents & Publications

326

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

327

T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity networking solution.

328

Cryptographic Challenges for Smart Grid Home Area ...  

Science Conference Proceedings (OSTI)

Page 1. Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking Author – Apurva Mohan, Honeywell ACS Labs ...

2012-05-09T23:59:59.000Z

329

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporation’s Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

330

'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State  

Science Conference Proceedings (OSTI)

This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

Miles McQueen; Annarita Giani

2011-09-01T23:59:59.000Z

331

Field Measurements of Heating System Efficiency in Nine Electrically-Heated Manufactured Homes.  

Science Conference Proceedings (OSTI)

This report presents the results of field measurements of heating efficiency performed on nine manufactured homes sited in the Pacific Northwest. The testing procedure collects real-time data on heating system energy use and heating zone temperatures, allowing direct calculation of heating system efficiency.

Davis, Bob; Siegel, J.; Palmiter, L.; Baylon, D.

1996-07-01T23:59:59.000Z

332

Activities to Secure Control Systems in the Energy Sector  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

sector sector NSTB November 2008 Hank Kenchington - Program Manager Office of Electricity of Delivery and Energy Reliability U.S. Department of Energy Activities to Secure Control Systems in the Energy Sector * 2,000,000 Miles of Oil Pipelines * 1,300,000 Miles of Gas Pipelines * 2,000 Petroleum Terminals * ~1,000,000 Wells * Extensive Ports, Refineries, Transportation, and LNG Facilities * 160,000 Miles of Electrical Transmission lines * ~17,000 Generators; 985,000 Megawatts (net summer capacity) * Over 3,100 Electric Utilities, with 131 million customers Refinery Locations, Crude and Product Pipelines Source: Energy Information Administration, Office of Oil & Gas LNG Import Facilities (Reactivation underway) Legend Interstate Pipelines Intrastate and Other Pipelines

333

The investigation of the structural properties of machines for the design of secure and trustworthy systems  

Science Conference Proceedings (OSTI)

In this paper, we investigate the problem of designing secure and trustworthy systems based on the notion of attack space. In particular, we consider the study of structural properties of a system at a design or architectural level. This preliminary ... Keywords: attack space, design for trustworthiness, secure systems, structure theory

Edward Jung; Chih-Cheng Hung; Guangzhi Ma; Seonho Choi

2011-11-01T23:59:59.000Z

334

Hardware-assisted security enhanced Linux in embedded systems: a proposal  

Science Conference Proceedings (OSTI)

As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. This is especially true for embedded systems, often operating in non-secure environments, ... Keywords: SELinux, access controls, embedded systems

Leandro Fiorin; Alberto Ferrante; Konstantinos Padarnitsas; Stefano Carucci

2010-10-01T23:59:59.000Z

335

RAPID-CURE COATINGS SYSTEM - Home - Energy Innovation Portal  

Technology Marketing Summary The Naval Research Laboratory has developed a durable, rapid cure coatings system that is designed for harsh ...

336

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53 53 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman August 2013 PNNL- 22653 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members August 2013 Prepared by: Pacific Northwest National Laboratory and

337

Nuclear Materials Management & Safeguards System | National Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

Our Jobs Our Jobs Working at NNSA Blog Nuclear Materials Management & Safeguards System Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management &...

338

List of Major Information Systems,National Nuclear Security Administra...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

339

ITL Bulletin Information Security in the System Development ...  

Science Conference Proceedings (OSTI)

... 800-17) c. CC product reevaluation (Additional References: CC) d. Assessment ... Security into the Capital Planning and Investment Control Process ...

2012-04-05T23:59:59.000Z

340

Final Version of Industrial Control Systems Security Guide ...  

Science Conference Proceedings (OSTI)

... Stouffer recommends using the new guide along with Guidelines for Smart Grid Cyber Security (NISTIR 7628), which NIST issued last September ...

2011-06-21T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

342

BETTER DUCT SYSTEMS FOR HOME HEATING AND COOLING.  

SciTech Connect

This is a series of six guides intended to provide a working knowledge of residential heating and cooling duct systems, an understanding of the major issues concerning efficiency, comfort, health, and safety, and practical tips on installation and repair of duct systems. These guides are intended for use by contractors, system designers, advanced technicians, and other HVAC professionals. The first two guides are also intended to be accessible to the general reader.

ANDREWS,J.

2001-01-01T23:59:59.000Z

343

Nuclear Forensics | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Initiatives Cyber Security Nuclear Forensics Bioinformatics National Security Home | Science & Discovery | National Security | Initiatives | Nuclear Forensics SHARE Nuclear Forensics image Tools, techniques, and expertise in nuclear fuel cycle research gained over seven decades help ORNL scientists control and track nuclear bomb-grade materials to be sure they don't fall into the wrong hands. Among the leading-edge technologies used by researchers are high-resolution techniques that allow analysis of radiation detector data in stunning detail. Researchers are also developing aerosol sampling systems to collect airborne particulates and instantly send an alert if radiation is detected. For more information, please contact: nuclearforensicsinitiative

344

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

International | National Nuclear Security Administration International | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > International International U.S. Department of Energy / U.S. Nuclear Regulatory Commission

345

Design and Simulation of a Four-channel Security System of Rocket Fuze  

Science Conference Proceedings (OSTI)

The light armored equipment has been widely used in modern wars, but it is vulnerable to be destroyed by the incoming projectile, so its battlefield survivability can not be guaranteed. In this paper, a four-channel security system has been designed ... Keywords: rocket fuse, security system, multi-point detonation, directional detonation

Shao-Jie Ma; Hao Qin; He Zhang; Hui Li

2010-06-01T23:59:59.000Z

346

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems  

Science Conference Proceedings (OSTI)

In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, ... Keywords: Information confinement, Privacy, Probabilistic algorithm, RFID systems, Security

Roberto Di Pietro; Refik Molva

2011-05-01T23:59:59.000Z

347

Secure virtual architecture: a safe execution environment for commodity operating systems  

Science Conference Proceedings (OSTI)

This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach, which we call Secure Virtual Architecture (SVA), defines ... Keywords: compiler, memory safety, operating systems, security, type safety, typed assembly language, virtual machine

John Criswell; Andrew Lenharth; Dinakar Dhurjati; Vikram Adve

2007-10-01T23:59:59.000Z

348

Development & expansion of an industrial control system security laboratory and an international research collaboration  

Science Conference Proceedings (OSTI)

In this paper, we describe the incremental building of a unique industrial control system laboratory designed to investigate security vulnerabilities and to support development of mitigating tools and techniques. The laboratory has been built over time ... Keywords: SCADA, critical infrastructure security, industrial control systems, test bed

Rayford B. Vaughn; Thomas Morris; Elena Sitnikova

2013-01-01T23:59:59.000Z

349

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

350

Planning a Home Solar Electric System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

site, you'll also need to consider both the geographic orientation and the tilt of your solar panels -- PV modules -- as both can affect your system's performance. The Economics...

351

Power System Dynamic Security Analysis Using Artificial Intelligence Systems: Phase 1 -- Feasibility Evaluation  

Science Conference Proceedings (OSTI)

On-line transient stability analysis, using actual system conditions, will allow more realistic stability limits. The result will be improved economy through increased transfers across the transmission grid. This feasibility evaluation explores ways of using artificial intelligence and other techniques to solve the computational problems associated with dynamic security analysis.

1994-04-26T23:59:59.000Z

352

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UCAIUG: AMI-SEC-ASAP UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents. 5 6 This document provides substantial supporting information for the use of these requirements 7 including scope, context, constraints, objectives, user characteristics, assumptions, and 8

353

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

354

V-196: Microsoft Security Bulletin Advance Notification for July...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

provides additional information about security in Microsoft products. Consumers can visit Security At Home, where this information is also available by clicking "Latest Security...

355

Home-Explorer: Ontology-based physical artifact search and hidden object detection system  

Science Conference Proceedings (OSTI)

A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects) in the ... Keywords: Smart object, context aware, ontology, semantic web, ubiquitous computing

Bin Guo; Satoru Satake; Michita Imai

2008-04-01T23:59:59.000Z

356

Effect of imperfect Faraday mirrors on security of a Faraday-Michelson quantum cryptography system  

E-Print Network (OSTI)

The one-way Faraday-Michelson system is a very useful practical quantum cryptography system where Faraday mirrors(FMs) play an important role. In this paper we analyze the security of this system against imperfect FMs. We consider the security loophole caused by the imperfect FMs in Alice's and Bob's security zones. Then we implement a passive Faraday mirror attack in this system. By changing the values of the imperfection parameters of Alice's FMs, we calculate the quantum bit error rate between Alice and Bob induced by Eve and the probability that Eve obtains outcomes successfully. It is shown that the imperfection of one of Alice's two FMs makes the system sensitive to the attack. At last we give a modified key rate as a function of the Faraday mirror imperfections. The security analysis indicates that both Alice's and Bob's imperfect FMs can compromise the secure key.

Wang Weilong; Gao Ming; Ma Zhi

2013-10-29T23:59:59.000Z

357

Underground home A/C system. Final report  

DOE Green Energy (OSTI)

The purpose of the project was to transfer the heat of house air into the earth through an underground piping system, return the cooler to the house and disperse it throughout the house. The principle of the idea has been achieved, but not to the extent desired. It was originally hoped that the system would allow temperatures in the house to reach a maximum of 80/sup 0/ even during days where outside temperatures reached high 90/sup 0/. So far, a differential of 6/sup 0/ to 8/sup 0/ has been achieved.

Outland, B.W.

1981-06-30T23:59:59.000Z

358

Implementing and Evaluating a Wireless Body Sensor System for Automated Physiological Data Acquisition at Home  

E-Print Network (OSTI)

Advances in embedded devices and wireless sensor networks have resulted in new and inexpensive health care solutions. This paper describes the implementation and the evaluation of a wireless body sensor system that monitors human physiological data at home. Specifically, a waist-mounted triaxial accelerometer unit is used to record human movements. Sampled data are transmitted using an IEEE 802.15.4 wireless transceiver to a data logger unit. The wearable sensor unit is light, small, and consumes low energy, which allows for inexpensive and unobtrusive monitoring during normal daily activities at home. The acceleration measurement tests show that it is possible to classify different human motion through the acceleration reading. The 802.15.4 wireless signal quality is also tested in typical home scenarios. Measurement results show that even with interference from nearby IEEE 802.11 signals and microwave ovens, the data delivery performance is satisfactory and can be improved by selecting an appropriate channe...

Chen, Chao; 10.5121/ijcsit.2010.2303

2010-01-01T23:59:59.000Z

359

Ubiquitous systems and the family: thoughts about the networked home  

Science Conference Proceedings (OSTI)

Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people, especially families, will be able to engage with and trust such systems ... Keywords: privacy, social interaction, the family, trust, ubiquitous computing

Linda Little; Elizabeth Sillence; Pam Briggs

2009-07-01T23:59:59.000Z

360

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Executive Summary Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy: Executive Summary

362

Roadmap to Secure Control Systems in the Energy Sector - 2006 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- 2006 - 2006 Roadmap to Secure Control Systems in the Energy Sector - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy Sector More Documents & Publications

363

Improving Security of Oil Pipeline SCADA Systems Using Service-Oriented Architectures  

Science Conference Proceedings (OSTI)

Oil pipeline Supervisory Control and Data Acquisition (SCADA) systems monitor and help control pipes transporting both crude and refined petroleum products. Typical SCADA system architectures focus on centralized data collection and control --- however, ... Keywords: SCADA, architecture, petroleum, pipeline, security, services

Nary Subramanian

2008-11-01T23:59:59.000Z

364

Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems  

SciTech Connect

Portable implantable medical device systems are playing a larger role in modern health care. Increasing attention is now being given to the wireless control interface of these systems. Our position is that wireless security in portable implantable medical device systems is just a part of the overall system security, and increased attention is needed to address low-tech security issues.

Paul, Nathanael R [ORNL; Kohno, Tadayoshi [University of Washington, Seattle

2012-01-01T23:59:59.000Z

365

A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis  

Science Conference Proceedings (OSTI)

With the increasing organizational dependence on information systems, information systems security has become a very critical issue in enterprise risk management. In information systems, security risks are caused by various interrelated internal and ... Keywords: Ant colony optimization, Bayesian networks, Information systems, Security risk, Vulnerability propagation

Nan Feng, Harry Jiannan Wang, Minqiang Li

2014-01-01T23:59:59.000Z

366

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

367

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

368

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

369

CyberPhysical System Security for the Electric Power Grid  

E-Print Network (OSTI)

on the vulnerabil- ity of SCADA protocols. Security venues such as DEFCON, Blackhat, and RSA have recently included implementation vulnerabilities that allow attack- ers to execute arbitrary code in specific SCADA protocols

Manimaran, Govindarasu

370

Cyber Security Solutions for Instrumentation and Control Systems  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection standards requirements of the North American Electric Reliability Corporation and related requirements in the international community. Compliance with ...

2012-12-12T23:59:59.000Z

371

Ultra-Efficient Home Design | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ultra-Efficient Home Design Ultra-Efficient Home Design Ultra-Efficient Home Design April 26, 2012 - 9:52am Addthis All Kaupuni Village homes in Oahu, Hawaii, incorporate energy efficiency and renewable energy technologies to produce as much energy as they consume. Credit: Kenneth Kelly, NREL. All Kaupuni Village homes in Oahu, Hawaii, incorporate energy efficiency and renewable energy technologies to produce as much energy as they consume. Credit: Kenneth Kelly, NREL. What does this mean for me? Lower energy bills and improved comfort Energy reliability and security Environmental sustainability How does it work? Ultra-efficient home design reduces home energy use and meets all or part of the reduced energy requirements with on-site renewable energy systems, such as solar water heating and solar electricity.

372

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems ?  

E-Print Network (OSTI)

We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide the necessary security within timing constraints; the previous solution that does provide the necessary security is not BITW. At a comparable hardware cost, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency. A microcontroller prototype of our

Patrick P. Tsang; Sean W. Smith

2007-01-01T23:59:59.000Z

373

Argonne Chemical Sciences & Engineering - National Security ...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Forensics * Members * Contact * Publications * Overview National Security Home National Security - Nuclear Forensics Nick Woods with a custom modified HEPA-filtered...

374

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Departmental Personnel Security Home Mission and Functions PERSEC Corner Clearance Automation Departmental Personnel Security FAQs Drug Testing for DOE Positions FAQs...

375

Global Security Directorate - Nonproliferation, Safeguards, and...  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Nonproliferation, Safeguards, and Security Programs click for full size image of Megatons to megawatts The Global Security and Nonproliferation Programs...

376

Security Risk Assessment Methodologies (RAM) for Critical ...  

IP Home; Search/Browse ... Lead Laboratory for development of physical security technology and funded Sandia to develop a technical capability in security modeling ...

377

Argonne Chemical Sciences & Engineering - National Security ...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Home National Security - Nanoscale Engineering Super-absorbent gel Using this spray-on, super-absorbent gel and engineered nanoparticles, Argonne researchers are...

378

A method for modeling and quantifying the security attributes of intrusion tolerant systems  

Science Conference Proceedings (OSTI)

Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, ... Keywords: MTTSF, QoS, intrusion tolerance, security attributes, semi Markov model

Bharat B. Madan; Katerina Goševa-Popstojanova; Kalyanaraman Vaidyanathan; Kishor S. Trivedi

2004-03-01T23:59:59.000Z

379

Evaluation of power system security and development of transmission pricing method  

E-Print Network (OSTI)

The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed 1) The description of probabilistic methods for power system security assessment 2) The computation time of simulation methods 3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.

Kim, Hyungchul

2003-08-01T23:59:59.000Z

380

Technical Guideline for Cyber Security Requirements and Life Cycle Implementation Guidelines for Nuclear Plant Digital Systems  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This EPRI guideline document provides technical guidance for addressing c...

2010-10-29T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

382

A service scenario generation scheme based on association rule mining for elderly surveillance system in a smart home environment  

Science Conference Proceedings (OSTI)

More convenient smart home environments can be constructed by monitoring home appliances, if automated services are supported by their usage information. This paper proposes a scheme for translating association rules among appliances mined from their ... Keywords: Association rule mining, Service scenario, Surveillance system

Kyung Jin Kang; Borey Ka; Sung Jo Kim

2012-10-01T23:59:59.000Z

383

Risk assessment of climate systems for national security.  

SciTech Connect

Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing [University of Illinois-Urbana; Conrad, Stephen Hamilton; Constantine, Paul [Stanford University; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael [National Center for Atmospheric Research; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

2012-10-01T23:59:59.000Z

384

TMS 2009 Annual Meeting and Exhibition: Home Page  

Science Conference Proceedings (OSTI)

TMS Home · TMS Home Page .... economy, attendees and presenters considered issues not only of economic and job security but also of energy, environment, ...

385

WORKING PAPER SERIESFEDERAL RESERVE BANK of ATLANTA WORKING PAPER SERIES The Federal Home Loan Bank System: The Lender of Next-to-Last Resort?  

E-Print Network (OSTI)

Abstract: The Federal Home Loan Bank (FHLB) System is a large, complex, and understudied governmentsponsored liquidity facility that currently has more than $1 trillion in secured loans outstanding, mostly to commercial banks and thrifts. This paper first documents the significant role played by the FHLB System at the outset of the ongoing financial crisis and then provides evidence about the uses of these funds by their bank and thrift members. We then identify the trade-offs faced by FHLB member-borrowers when choosing between accessing the FHLB System or the Federal Reserve’s discount window during the crisis. We conclude by describing the fragmented U.S. lender-of-last-resort framework and finding that additional clarity about the respective roles of the various liquidity facilities would be helpful.

Adam Ashcraft; Morten L. Bech; W. Scott Frame; Adam Ashcraft; Morten L. Bech; W. Scott Frame

2009-01-01T23:59:59.000Z

386

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry |...

387

A privacy expectations and security assurance offer system  

Science Conference Proceedings (OSTI)

Consumers accessing web sites for information or to purchase products face limited opportunity to express their privacy preferences, and even less recourse if security violations lead to inadvertent disclosure of privacy sensitive information. A privacy ... Keywords: e-commerce, incentives, insurance, privacy

Jeffrey Hunker

2008-07-01T23:59:59.000Z

388

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41 41 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman July 2013 PNNL- 22641 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members July, 2013 Prepared by: Pacific Northwest National Laboratory and NBISE Secure Power Systems Professional Project Team This document is a summarization of the report, Developing Secure Power Systems

389

A cyber-physical experimentation environment for the security analysis of networked industrial control systems  

Science Conference Proceedings (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these ...

BéLa Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-09-01T23:59:59.000Z

390

Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices  

E-Print Network (OSTI)

E. "Understanding the Solar Home Price Premium: ElectricityMurphy, M. "Comparative Analysis of Home Buyer Response toNew Zero-Energy Homes." Summer Study on Energy Efficiency in

Hoen, Ben

2013-01-01T23:59:59.000Z

391

Tax Credits for Home Energy Improvements: If You Buy an Energy-Efficient Product or Renewable Energy System for Your Home, You May be Eligible for a Federal Tax Credit (Fact Sheet)  

Science Conference Proceedings (OSTI)

This two-page fact sheet provides an overview of 2010 federal tax credits for energy efficient products or renewable energy systems in the home.

Not Available

2010-05-01T23:59:59.000Z

392

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

393

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

394

Network and System Management for Reliability and Cyber Security  

Science Conference Proceedings (OSTI)

The evolving control of the electric power grid is increasingly dependent on information technology and telecommunication infrastructures, which, like the grid itself, must be managed in a holistic way to ensure reliability and security. The management of this information infrastructure requires connectivity and analytics to support both information technology (IT) and operational technology (OT) assets in a unified manner.This project utilized a telecommunications modeled network ...

2012-11-28T23:59:59.000Z

395

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

396

System manual for the University of Pennsylvania retrofitted solar heated Philadelphia row home (SolaRow)  

DOE Green Energy (OSTI)

The University of Pennsylvania SolaRow house, an urban row home retrofitted for comfort and domestic hot water heating, was extensively instrumented for performance monitoring and acquisition of weather and solar radiation data. This report describes the heating and instrumentation systems, provides the details for instrumentation, piping and valve identification, and specifies the operation and maintenance of the heating and data acquisition systems. The following are included: (1) system flow diagrams; (2) valve and cable identification tables; (3) wiring diagrams; and (4) start-up, normal operation, shut-down, maintenance and trouble-shooting procedures. It thus provides the necessary technical information to permit system operation and monitoring, overall system performance analysis and optimization, and acquisition of climatological data.

Zinnes, I.; Lior, N.

1980-05-01T23:59:59.000Z

397

The Drinking Water Security and Safety Amendments of 2002: Is America's Drinking Water Infrastructure Safer Four Years Later?  

E-Print Network (OSTI)

NAT'L STRATEGY FOR HOME- LAND SECURITY, supra note 50, at 9.on Creating the Home- land Security Department, supra noteM. Merriam, Homeland Security Begins At Home: Local Planning

Shermer, Steven D.

2006-01-01T23:59:59.000Z

398

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

399

In Proceedings of the 2nd Symposium on Operating Systems Design and Implementation, October 1996 Performance Evaluation of Two HomeBased Lazy Release Consistency Protocols for  

E-Print Network (OSTI)

Performance Evaluation of Two Home­Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems, called Overlapped Home­based LRC (OHLRC), takes advantage of the communication processor found on each

400

Verification of initial-state opacity in security applications of discrete event systems  

Science Conference Proceedings (OSTI)

In this paper, we formulate and analyze methodologies for verifying the notion of initial-state opacity in discrete event systems that are modeled as non-deterministic finite automata with partial observation on their transitions. A system is initial-state ... Keywords: Discrete event system, Formal methods in security analysis, Initial state estimation, Initial state estimator, Tracking in sensor network

Anooshiravan Saboori, Christoforos N. Hadjicostis

2013-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Security of the Europena Electricity Systems: Conceptualizing the ssessment Criteria and Core Indicators  

E-Print Network (OSTI)

.,  2006).  It  is  generally  believed  that  greater  diversity  enhances  the  robustness  of  an  electricity  system  to  fossil  fuel  supply  shocks  generating economic and security of supply benefits while also promoting network  resilience...  availability of  energy  sources  (Winzer, 2012;  Jamasb and Pollitt,  2008). This implies that security of supply has traditionally come to be defined in  terms of fuel availability or network reliability. However, there are also emerging  concerns with regards to...

Jamasb, Tooraj Nepal, Rabindra

2012-12-10T23:59:59.000Z

402

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

RSA SecurID User Guide VPN Home What is RSA SecurID? RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an...

403

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Test...

404

References | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog References Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management &...

405

Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration Reports Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Test and...

406

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

407

RDF recipes for context-aware interoperability in pervasive systems  

Science Conference Proceedings (OSTI)

Nowadays home automation systems integrate many devices from security system, heating, ventilation and air conditioning system, lighting system or audio-video systems. Every time a new device is installed, problems with connecting it to other devices ...

Anna M. Kosek; Aly A. Syed; Jon M. Kerridgey

2010-06-01T23:59:59.000Z

408

DOE CHALLENGE HOME and PHIUS PARTNER TO MAKE IT EASIER TO REACH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CHALLENGE HOME CHALLENGE HOME and PHIUS PARTNER TO MAKE IT EASIER TO REACH NEW LEVELS OF ZERO NET-ENERGY READY This partnership between DOE and PHIUS enhances coordination between voluntary peak performance new home label programs to expedite market transformation to net-zero ready homes that are so energy efficient that small renewable energy systems can offset most or all annual energy consumption. Net-zero ready homes can help address climate change, economic, and energy security issues. By working together, we create a continuous path to net-zero ready performance with minimal confusion to the housing industry. This is a voluntary home label program recognizing homes that comply with PHIUS+ standards. Key requirements beyond DOE's Challenge Home specifications include:

409

GPRS Video Streaming Surveillance System GVSS  

E-Print Network (OSTI)

Future security measures will create comfortable living environments that are embedded with a wide range of intelligent functionalities including home computing, entertainment, health care and security. These place stringent requirements on the home networking architecture which integrates various existing technologies for monitoring and control for future high security needs. This paper discusses the design and implementation of a gvss gprs Video Streaming Surveillance System system, which integrates various existing technologies for providing security for smart home environments. This system provides security for office, home and other buildings where high security is required.This allows the mobile user to track the activities from a particular location. The system will send snapshots of the video and stores them in different formats. It is also possible to display the time with the image when it was captured in the gprs enabled mobiles. This system is implemented using J2me Technology

Pushpavathi, T P; Kumar, N R Shashi

2010-01-01T23:59:59.000Z

410

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Markets and Policy Group * Energy Analysis Department Energy Markets and Policy Group * Energy Analysis Department An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California Ben Hoen, Peter Cappers, Mark Thayer, Ryan Wiser Lawrence Berkeley National Laboratory LBNL Webinar June 9 th , 2011 This work was supported by the Office of Energy Efficiency and Renewable Energy (Solar Energy Technologies Program) of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231, by the National Renewable Energy Laboratory under Contract No. DEK-8883050, and by the Clean Energy States Alliance.

411

Pilot States Program report: Home energy ratings systems and energy-efficient mortgages  

SciTech Connect

This report covers the accomplishments of the home energy ratings systems/energy-efficient mortgages (HERS/EEMs) pilot states from 1993 through 1998, including such indicators as funding, ratings and EEMs achieved, active raters, and training and marketing activities. A brief description of each HERS program's evolution is included, as well as their directors' views of the programs' future prospects. Finally, an analysis is provided of successful HERS program characteristics and factors that appear to contribute to HERS program success.

Farhar, B.

2000-04-04T23:59:59.000Z

412

Creating home network access for the elderly  

Science Conference Proceedings (OSTI)

Wireless broadband networks for home environment present us with many challenges unfamiliar in more public settings. At home, we encounter the end-users with little ICT experience. Probably among the most challenging members of the home network are the ... Keywords: accessibility, authentication, home networks, security, usability, user interface design

Kristiina Karvonen

2007-07-01T23:59:59.000Z

413

Emergency Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Emergency Information Home > Field Offices > Welcome to the Sandia Field Office > Emergency Information Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to

414

Change Request Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Change Request Forms | National Nuclear Security Administration Change Request Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Change Request Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Change Request Forms Change Request Forms

415

NMMSS Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reports | National Nuclear Security Administration Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Reports Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > NMMSS Reports NMMSS Reports U.S. Department of Energy / U.S. Nuclear Regulatory Commission

416

SAMS Overview | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

SAMS Overview | National Nuclear Security Administration SAMS Overview | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog SAMS Overview Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > SAMS Overview SAMS Overview U.S. Department of Energy / U.S. Nuclear Regulatory Commission

417

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Action Codes Table | National Nuclear Security Administration Action Codes Table | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Action Codes Table Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Code Tables > Action Codes Table

418

Security Sciences Field Lab (SSFL) | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Science Nuclear Science Research Areas Research Highlights Facilities and Capabilities Educational Outreach Publications and Reports News and Awards Nuclear Science Home | Science & Discovery | Nuclear Science | Facilities and Capabilities SHARE Security Sciences Field Laboratory May 30, 2013 The Security Sciences Field Laboratory (SSFL) is designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including: sensors; cameras; alarm communication and display; power generation; access control; unattended stand-alone, remote communication; unmanned aerial and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain such as open grassy fields, hilly wooded areas, sand

419

Energy-efficient mortgages and home energy rating systems: A report on the nation`s progress  

SciTech Connect

This report summarizes progress throughout the nation in establishing voluntary programs linking home energy rating systems (HERS) and energy-efficient mortgages (EEMs). These programs use methods for rating the energy efficiency of new and existing homes and predicting energy cost savings so lenders can factor in energy cost savings when underwriting mortgages. The programs also encourage lenders to finance cost-effective energy-efficiency improvements to existing homes with low-interest mortgages or other instruments. The money saved on utility bills over the long term can more than offset the cost of such energy-efficiency improvements. The National Collaborative on HERS and EEMs recommended that this report be prepared.

Farhar, B.C.; Eckert, J.

1993-09-01T23:59:59.000Z

420

Cyber Fit Pyramid for the home user. | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pyramid for the home user. Cyber Fit Pyramid for the home user. Cyber Fit Pyramid for the home user. Developed for Security Awareness materials for the Department Cyber Fit Pyramid...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

A national program for energy-efficient mortgages and home energy rating systems: A blueprint for action  

SciTech Connect

This Review Draft reports findings and recommendations of the National Collaborative on Home Energy Rating Systems and Mortgage Incentives for Energy Efficiency. The US Department of Energy, in cooperation with the US Department of Housing and Urban Development, formed this National Collaborative as a National Energy Strategy initiative. Participating in the Collaborative were representatives of the primary and secondary mortgage markets, builder and remodeler organizations, real estate and appraiser associations, the home energy rating system industry, utility associations, consumer and public interest groups, state and local government interest groups, and environmental organizations. The Collaborative's purpose was to develop a voluntary national program encouraging energy efficiency in homes through mortgage incentives linked to home energy ratings.

1992-03-01T23:59:59.000Z

422

A national program for energy-efficient mortgages and home energy rating systems: A blueprint for action. Review draft  

SciTech Connect

This Review Draft reports findings and recommendations of the National Collaborative on Home Energy Rating Systems and Mortgage Incentives for Energy Efficiency. The US Department of Energy, in cooperation with the US Department of Housing and Urban Development, formed this National Collaborative as a National Energy Strategy initiative. Participating in the Collaborative were representatives of the primary and secondary mortgage markets, builder and remodeler organizations, real estate and appraiser associations, the home energy rating system industry, utility associations, consumer and public interest groups, state and local government interest groups, and environmental organizations. The Collaborative`s purpose was to develop a voluntary national program encouraging energy efficiency in homes through mortgage incentives linked to home energy ratings.

1992-03-01T23:59:59.000Z

423

Data acquisition and monitoring system for Los Alamos National Security and Resources Study Center  

DOE Green Energy (OSTI)

The National Security and Resources Study Center, a modern, three level building containing 5574 m/sup 2/ of temperature controlled space and an integral solar energy heating and cooling system is in operation at Los Alamos, New Mexico. The instrumentation system used to measure the energy production (solar energy system) and consumption (HVAC system) in all the building operating modes is described. Included are descriptions of the sensors (temperature, mass flow, power, etc.) and the data acquisition system.

Trump, M.A.

1978-01-01T23:59:59.000Z

424

Impact of Poverty and Household Food Security on the Use of Preventive Medical Services in the California Health Interview Survey  

E-Print Network (OSTI)

a “medical home” regardless of food security status. ThereSecurity Status Food Insecure w/o hunger Have a medical home

Harrison, Gail G.

2004-01-01T23:59:59.000Z

425

Secure distribution of events in content-based publish subscribe systems  

Science Conference Proceedings (OSTI)

Content-based publish-subscribe systems are an emerging paradigm for building a range of distributed applications. A specific problem in content-based systems is the secure distribution of events to clients subscribing to those events. In content-based ...

Lukasz Opyrchal; Atul Prakash

2001-08-01T23:59:59.000Z

426

Home energy rating system business plan feasibility study in Washington state  

SciTech Connect

In the Fall of 1993, the Washington State Energy Office funded the Washington Home Energy Rating System project to investigate the benefits of a Washington state HERS. WSEO established a HERS and EEM Advisory Group. Composed of mortgage lenders/brokers, realtors, builders, utility staff, remodelers, and other state agency representatives, the Advisory Group met for the first time on November 17, 1993. The Advisory Group established several subcommittees to identify issues and options. During its March 1994 meeting, the Advisory Group formed a consensus directing WSEO to develop a HERS business plan for consideration. The Advisory Group also established a business plan subcommittee to help draft the plan. Under the guidance of the business plan subcommittee, WSEO conducted research on how customers value energy efficiency in the housing market. This plan represents WSEO`s effort to comply with the Advisory Group`s request. Why is a HERS Business Plan necessary? Strictly speaking this plan is more of a feasibility plan than a business plan since it is designed to help determine the feasibility of a new business venture: a statewide home energy rating system. To make this determination decision makers or possible investors require strategic information about the proposed enterprise. Ideally, the plan should anticipate the significant questions parties may want to know. Among other things, this document should establish decision points for action.

Lineham, T.

1995-03-01T23:59:59.000Z

427

Position paper: the role of platforms and operating systems in supporting home networks  

Science Conference Proceedings (OSTI)

As researchers look beyond the PC there is increasing interest in developing and deploying sophisticated home networks. Such networks might allow the seamless integration of information and services produced both within the home and externally, enabling ...

Nigel Davies; Pierre-Guillaume Raverdy

2000-09-01T23:59:59.000Z

428

Using Jini to Integrate Home Automation in a Distributed Software-System  

Science Conference Proceedings (OSTI)

The last few years, a tendency arose to integrate various programmable devices through ever expanding computer networks. One particular domain in which this evolution stood out clearly is home automation. The EIB standard defines a home automation solution ...

Peter Rigole; Tom Holvoet; Yolande Berbers

2002-04-01T23:59:59.000Z

429

Home Energy Saver for Consumers  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Energy Saver for Consumers Home Energy Saver for Consumers The Home Energy Saver(tm) (HES) empowers homeowners and renters to save money, live better, and help the earth by reducing energy use in their homes. HES recommends energy-saving upgrades that are appropriate to the home and make sense for the home's climate and local energy prices. The money invested in these upgrades commonly earns "interest" in the form of energy bill savings, at an annual rate of 20% or more. Depending on the type of improvement made, the home can achieve better comfort (warmer in winter, cooler in summer), fewer drafts, lower maintenance costs, and improved security and fire safety-all of which improve life and increase the home's value. HES computes a home's energy use on-line in a matter of seconds based on

430

Office of Headquarters Personnel Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

431

The Mobil Integrated C{sup 3} (command control and communications) and Security System  

SciTech Connect

The current political and economic situations suggest that significant reductions of nuclear forces outside the US will continue. This implies that in times of crisis the rapid deployment of nuclear weapons into a theater may be required. This paper describes a proposed Mobile Integrated C{sup 3} and Security System (MICSS). The MICSS, together with associated personnel, could satisfy the command and control and security requirements of a deployed nuclear operation. Rapid deployment poses unique nuclear weapon surety difficulties that must be overcome for the operation to be effective and survivable. The MICSS must be portable, reliable, limited in size, and easily emplaced to facilitate movement, reduce the possibility of detection, and minimize manpower requirements. The MICSS will be based on existing technology. Sandia has designed prototype mobile command centers for the military. These command centers are based on an approach that stresses modularity, standards, and the use of an open architecture. Radio, telephone, satellite communications, communication security, and global positioning system equipment has been successfully integrated into the command centers. Sandia is also supporting the development of portable security systems for the military. These systems are rapidly deployable and mission flexible and are capable of intrusion detection, area and alarm display, night assessment, and wireless sensor communications. This paper is organized as follows: Background information about the prototype mobile command centers will be presented first. Background information about portable security systems concepts will then be given. Next, an integrated communications and security system will be presented, and finally, the design and status of a prototype MICSS will be described.

Eras, A.; Brown, R.D.

1993-06-15T23:59:59.000Z

432

On The Design and Implementation of a Home Energy Management System  

E-Print Network (OSTI)

energy management at home is key and an integral part of the future Smart Grid. In this paper, we present the key issues of home energy management in Smart Grid: a holistic management solution, improved device energy management and show the results in simulation studies. Index Terms--smart grid, home energy

Boutaba, Raouf

433

Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security  

E-Print Network (OSTI)

Approved for public release; distribution is unlimited. Lexington Massachusetts This page intentionally left blank. EXECUTIVE SUMMARY Concern about energy security on domestic Department of Defense installations has led to the possibility of using natural gas-fired electricity generators to provide power in the event of electric grid failures. As natural gas is an increasingly base-load fuel for electricity generation in the United States, the electricity generation system has become increasingly dependent on the operation of the natural gas system. However, as the natural gas system is also partly dependent on electricity for its ability to deliver natural gas from the well-head to the consumer, the question arises of whether, in the event of an electric grid failure, the natural gas would continue to flow. As the natural gas transmission system largely uses natural gas from the pipelines as a source of power, once the gas has been extracted from the ground, the system is less dependent on the electric grid. However, some of the drilling rigs, processing units, and pipeline compressors do depend on electric power, making the vulnerability to the system to a disruption in the national electricity supply network vary depending on the cause, breadth, and geographic location of the disruption. This is due to the large numbers of players in the natural gas production and

N. Judson; N. Judson

2013-01-01T23:59:59.000Z

434

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

435

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

436

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

437

Access Rate Control System | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support...

438

Cyber-Physical Systems Security for the Smart Grid  

Science Conference Proceedings (OSTI)

... Untrusted input Smart Grid Function ... Smart meter, control data Load balancing ... System (FACTS) Transmission/Distribution Automation

2012-05-05T23:59:59.000Z

439

A VECTOR ENERGY FUNCTION APPROACH FOR SECURITY ANALYSIS OF AC/DC SYSTEMS  

E-Print Network (OSTI)

This paper examines dynamic behavior in system models that reflect reasonably detailed (third order) HVDC dynamics along with ac system models that include reactive flows, and frequency and voltage dependent load models. A vector Lyapunov function approach is employed to define a system wide energy function that can be used for general security analysis. The paper describes the derivation of individual component Lyapunov functions for simplified models of HVDC links connected to "infinitely strong" ac systems, along with a standard ac only system Lyapunov function. A novel method of obtaining weighting coefficients to sum these components for the overall system energy function is proposed. Use of the new energy function for transient stability and security analysis is illustrated in a test system.

Christopher L. DeMarco; Claudio A. Cañizares

1992-01-01T23:59:59.000Z

440

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

IntuiSec: a Framework for Intuitive User Interaction with Security in Smart Spaces". Nokia  

E-Print Network (OSTI)

This paper presents IntuiSec, a framework for intuitive user interaction with smart home security using mobile devices. The design approach of IntuiSec is to introduce a level of indirection between the user-level intent and the system-level security infrastructure. This layer of indirection, implemented by a collection of distributed middleware and user-level tools, exposes only concepts and real-world metaphors that are intuitive to non-expert users and translates their intent to the necessary underlying security settings. The IntuiSec framework presents the user with intuitive steps for setting up a secure home network, establishing trusted relationships between devices, and granting temporal, selective access for both home occupants and visitors to devices within the smart home. I.

Dimitris N. Kalofonos

2006-01-01T23:59:59.000Z

442

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

443

Expensive Moisture/Insulation System Problems at Several Central Florida and South Texas Nursing Homes  

E-Print Network (OSTI)

These nursing homes were designed and built in the 80's and 90's. They experienced similar design and construction deficiencies and expensive repairs. Some of the issues to be discussed in this paper are the interactions of architectural and HVAC shortcomings that result in a synergistic increase in mold, mildew, corrosion and rot. ASHRAE 62 requires 24 hour per day toilet exhaust and fresh air. What do you do to control humidity when the A/C duty cycles when the thermostat is satisfied? There needs to be humidity control designed into the HVAC system. Architects and contractors frequently take a "head in the sand" approach to wall and attic vapor barriers. This needs to be looked at realistically. We have seen several nursing homes whose moisture/sheet rock damage was severe due to design defects that allowed free interchange of hot humid air between the attic and the space inside interior partitions. Allowing air interchange between the attic and outdoors: can cause overheating of water in pipes in attics where temperaturs reach 150° F. increases condensation due to inadequate details in mechanical insulation on ducts and pipes Vinyl wall covering is well known to be a disaster in this climate but interior decorators continue to specify it on various walls. HVAC balance needs to be considered. Frequently the kitchen exhaust design is not coordinated with the HVAC engineer. There needs to be a reasonable balance between air in and air out of the building. When air is allowed to flow through the insulation system R value is reduced to near 0. In order to prevent mold and mildew and expensive failures, along with even more expensive lawsuits, the HVAC system design and the insulation system design must be integrated.

Lotz, W. A.

2000-01-01T23:59:59.000Z

444

S-Security Protective Force and Systems Services for the Nevada Site  

NLE Websites -- All DOE Office Websites (Extended Search)

S-Security Protective Force and Systems Services for the Nevada Site S-Security Protective Force and Systems Services for the Nevada Site Office Solicitation Number: DE-SOL-0002014 Agency: Department of Energy Office: Federal Locations Location: All DOE Federal Contracting Offices Notice Type: Modification/Amendment Original Posted Date: June 22, 2010 Posted Date: June 13, 2011 Response Date: Jul 13, 2011 5:00 pm Mountain Original Response Date: July 7, 2010 Archiving Policy: Manual Archive Original Archive Date: August 6, 2010 Archive Date: - Original Set Aside: N/A Set Aside: N/A Classification Code: S -- Utilities and housekeeping services NAICS Code: 561 -- Administrative and Support Services/561612 -- Security Guards and Patrol Services Solicitation Number: DE-SOL-0002014 Notice Type:

445

DOE/CX-00007 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07 07 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM (PROJECT S-221) HANFORD SITE, RICHLAND, WASHINGTON PROPOSED ACTION The U.S. Department of Energy (DOE) proposes to install six wooden utility poles to support the safeguards and security enhanced assessment system. LOCATION OF ACTION The locations of the proposed action are generally within and around 200 East Area of the Hanford Site. The specific locations cannot be disclosed due to their safeguards and security related nature, and the locations have been designated Official Use Only. It is the policy of the DOE to make records available to the public to the greatest extent possible, in keeping with the spirit of the Freedom of Information Act (FOIA), while at the same time

446

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

447

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

448

Office of Departmental Personnel Security - Drug Testing for...  

NLE Websites -- All DOE Office Websites (Extended Search)

Departmental Personnel Security Home Mission and Functions PERSEC Corner Clearance Automation Departmental Personnel Security FAQs Drug Testing for DOE Positions FAQs...

449

Annual Planning Summaries: Health, Safety, and Security (HSS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agencies You are here Home Annual Planning Summaries: Health, Safety, and Security (HSS) Annual Planning Summaries: Health, Safety, and Security (HSS) Document(s) Available...

450

PIA - Security Clearance Work Tracking and Budget System | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office Occupational Injury & Illness System (01&15) PIA, Idaho National Laboratory TRAIN-PIA.pdf...

451

Security Metricsfor Process Control Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics...

452

Control Systems Cyber Security: Defense in Depth Strategies ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and direction for developing 'defense-in-depth' strategies for organizations that use control system networks while maintaining a multi-tier information architecture. Control...

453

Industrial Control System Security and NIST SP 800-53 ...  

Science Conference Proceedings (OSTI)

... Automation and Control Systems • Leaders: – Johan Nye - ExxonMobil, Kevin Staggs - Honeywell: Co-chairs – Dennis Holstein: Editor Page 54. 54 ...

2008-07-16T23:59:59.000Z

454

Cyber-Physical Systems Security for the Smart Grid  

Science Conference Proceedings (OSTI)

... D. Transmission Automation ... or reputation manage ment systems for smart grid applications where ... the topology of the power distribution network to ...

2012-04-05T23:59:59.000Z

455

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

456

Integration of a security type system into a program logic  

Science Conference Proceedings (OSTI)

Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal software analyses. In this paper we show that a flow-sensitive type system ensuring non-interference in a simple while language can be expressed through ...

Reiner Hähnle; Jing Pan; Philipp Rümmer; Dennis Walter

2006-11-01T23:59:59.000Z

457

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

458

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

459

North American Electricity Infrastructure: System Security, Quality, Reliability, Availability, and Efficiency  

E-Print Network (OSTI)

1 North American Electricity Infrastructure: System Security, Quality, Reliability, Availability for reliable and disturbance-free electricity. The massive power outages in the United States, Canada, UK and Italy in 2003 underscored electricity infrastructure's vulnerabilities [1-11]. This vital yet complex

Amin, S. Massoud

460

Machine-to-Machine Communications and Security Solution in Cellular Systems  

Science Conference Proceedings (OSTI)

This paper introduces an efficient machine-to-machine M2M communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage ... Keywords: 4G Network, Ad Hoc, Machine-To-Machine, Security, Terminals

Mahdy Saedy; Vahideh Mojtahed

2011-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

NLE Websites -- All DOE Office Websites (Extended Search)

4476E 4476E An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California Ben Hoen, Ryan Wiser, Peter Cappers and Mark Thayer Environmental Energy Technologies Division April 2011 Download from http://eetd.lbl.gov/ea/emp/reports/lbnl-4476e.pdf This work was supported by the Office of Energy Efficiency and Renewable Energy (Solar Energy Technologies Program) of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231, by the National Renewable Energy Laboratory under Contract No. DEK-8883050, and by the Clean Energy States Alliance. ERNEST ORLANDO LAWRENCE BERKELEY NATIONAL LABORATORY Disclaimer This document was prepared as an account of work sponsored by the United States Government.

462

Privacy Act System Notices | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

on himher; how an individual can access or amend the record; and the categories of sources of records in the system. The Act requires an agency to publish notice of a proposed...

463

Space Systems: Principal Associate Directorate for Global Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Eric Dors Program Managers Roger Petrin Marc Kippen Tom Vestrand Jared Dreicer Mark Dunham Administrator Patti Remelius Phone: 1-505-667-6722 Fax: 1-505-667-7442 Space Systems For...

464

A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?  

E-Print Network (OSTI)

A growing number of security applications are being developed and deployed to explicitly reduce risk from adversaries ’ actions. However, there are many challenges when attempting to evaluate such systems, both in the lab and in the real world. Traditional evaluations used by computer scientists, such as runtime analysis and optimality proofs, may be largely irrelevant. The primary contribution of this paper is to provide a preliminary framework which can guide the evaluation of such systems and to apply the framework to the evaluation of ARMOR (a system deployed at LAX since August 2007). This framework helps to determine what evaluations could, and should, be run in order to measure a system’s overall utility. A secondary contribution of this paper is to help familiarize our community with some of the difficulties inherent in evaluating deployed applications, focusing on those in security domains. Povzetek: Kako ovrednotiti varnostne aplikacije, kot recimo sistem ARMOR, ki je od 2007 dalje v uporabi na LAX?

Matthew E. Taylor; Christopher Kiekintveld; Craig Western; Milind Tambe

2009-01-01T23:59:59.000Z

465

Integrated Heat Pump HVAC Systems for Near-Zero-Energy Homes - Business Case Assessment  

SciTech Connect

The long range strategic goal of the Department of Energy's Building Technologies (DOE/BT) Program is to create, by 2020, technologies and design approaches that enable the construction of net-zero energy homes at low incremental cost (DOE/BT 2005). A net zero energy home (NZEH) is a residential building with greatly reduced needs for energy through efficiency gains, with the balance of energy needs supplied by renewable technologies. While initially focused on new construction, these technologies and design approaches are intended to have application to buildings constructed before 2020 as well resulting in substantial reduction in energy use for all building types and ages. DOE/BT's Emerging Technologies (ET) team is working to support this strategic goal by identifying and developing advanced heating, ventilating, air-conditioning, and water heating (HVAC/WH) technology options applicable to NZEHs. Although the energy efficiency of heating, ventilating, and air-conditioning (HVAC) equipment has increased substantially in recent years, new approaches are needed to continue this trend. Dramatic efficiency improvements are necessary to enable progress toward the NZEH goals, and will require a radical rethinking of opportunities to improve system performance. The large reductions in HVAC energy consumption necessary to support the NZEH goals require a systems-oriented analysis approach that characterizes each element of energy consumption, identifies alternatives, and determines the most cost-effective combination of options. In particular, HVAC equipment must be developed that addresses the range of special needs of NZEH applications in the areas of reduced HVAC and water heating energy use, humidity control, ventilation, uniform comfort, and ease of zoning. In FY05 ORNL conducted an initial Stage 1 (Applied Research) scoping assessment of HVAC/WH systems options for future NZEHs to help DOE/BT identify and prioritize alternative approaches for further development. Eleven system concepts with central air distribution ducting and nine multi-zone systems were selected and their annual and peak demand performance estimated for five locations: Atlanta (mixed-humid), Houston (hot-humid), Phoenix (hot-dry), San Francisco (marine), and Chicago (cold). Performance was estimated by simulating the systems using the TRNSYS simulation engine (Solar Energy Laboratory et al. 2006) in two 1800-ft{sup 2} houses--a Building America (BA) benchmark house and a prototype NZEH taken from BEopt results at the take-off (or crossover) point (i.e., a house incorporating those design features such that further progress towards ZEH is through the addition of photovoltaic power sources, as determined by current BEopt analyses conducted by NREL). Results were summarized in a project report, 'HVAC Equipment Design options for Near-Zero-Energy Homes--A Stage 2 Scoping Assessment', ORNL/TM-2005/194 (Baxter 2005). The 2005 study report describes the HVAC options considered, the ranking criteria used, and the system rankings by priority. Table 1 summarizes the energy savings potential of the highest scoring options from the 2005 study for all five locations. All system options were scored by the ORNL building equipment research team and by William Goetzler of Navigant Consulting. These scores were reviewed by DOE/BT's Residential Integration program leaders and Building America team members. Based on these results, the two centrally ducted integrated heat pump (IHP) systems (air source and ground source versions) were selected for advancement to Stage 2 (Exploratory Development) business case assessments in FY06. This report describes results of these business case assessments. It is a compilation of three separate reports describing the initial business case study (Baxter 2006a), an update to evaluate the impact of an economizer cooling option (Baxter 2006b), and a second update to evaluate the impact of a winter humidification option (Baxter 2007). In addition it reports some corrections made subsequent to release of the first two reports to correct so

Baxter, Van D [ORNL

2007-05-01T23:59:59.000Z

466

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

467

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

468

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

469

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements  

SciTech Connect

Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

Ondrej Linda; Milos Manic; Miles McQueen

2012-09-01T23:59:59.000Z

470

Abstract--Distribution factors play a key role in many system security analysis and market applications. The injection shift  

E-Print Network (OSTI)

1 Abstract-- Distribution factors play a key role in many system security analysis and market of the other distribution factors. The line outage distribution factors (LODFs) may be computed using the ISFs distribution factors, line outage distribution factors, multiple-line outages, system security. I. INTRODUCTION

471

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

472

GnatDb: a small-footprint, secure database system  

Science Conference Proceedings (OSTI)

This paper describes GnatDb, which is an embedded database system that provides protection against both accidental and malicious corruption of data. GnatDb is designed to run on a wide range of appliances, some of which have very limited resources. Therefore, ...

Radek Vingralek

2002-08-01T23:59:59.000Z

473

Home Energy Article: A Systems Approach to Retrofitting Residential HVAC Systems  

E-Print Network (OSTI)

to Retrofitting a Residential HVAC System, Lawrence Berkeleyducts. New downsized ducts and HVAC equipment. The ducts areto Retrofitting Residential HVAC Systems J.A. McWilliams and

McWilliams, Jennifer A.; Walker, Iain S.

2005-01-01T23:59:59.000Z

474

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

E-Print Network (OSTI)

is to reduce their electricity bills. However, homeownersinvestment through electricity bill savings. The decision toal. , 2010. reduced electricity bills of PV homes, which can

Hoen, Ben

2011-01-01T23:59:59.000Z

475

Development Of User Needs And Functional Requirements For A Real-time Ridesharing System  

E-Print Network (OSTI)

Gender, Home & Work Phone #, Social Security #, Drivershome and work telephone numbers, address, occupation, gender, social security

Kowshik, Raghu; Gard, John; Loo, Jason; Jovanis, Paul P.; Kitamura, Ryiuichi

1993-01-01T23:59:59.000Z

476

Homes | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

One Milwaukee Homeowner Shares Her Experience Milwaukee solar installers putting in a rooftop solar energy system on Dr. Paula Papanek's home. | Photo courtesy of Dr. Paula...

477

BCP Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Boulder Canyon Project Remarketing Effort HOME Home Page Image WELCOME Boulder Canyon Information Module Federal Register Notices Public Forums Correspondence and Presentations...

478

EERE: Homes  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RENEWABLE ENERGY AND BEING ENERGY EFFICIENT AT HOME Incentives Tax Credits, Rebates, and Savings Save Money and Energy at Home Appliances Energy Assessments Water Heating Using...

479

Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge  

Science Conference Proceedings (OSTI)

The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

Ondrej Linda; Todd Vollmer; Milos Manic

2012-08-01T23:59:59.000Z

480

Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices  

E-Print Network (OSTI)

an effect on the sale price of PV homes (i.e. , a fixed or3% of the total sales price of non-PV homes. A portion ofIf differences in selling prices exist between PV and non-PV

Hoen, Ben

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

GnatDb: A Small-Footprint, Secure Database System  

E-Print Network (OSTI)

This paper describes GnatDb, which is an embedded database system that provides protection against both accidental and malicious corruption of data. GnatDb is designed to run on a wide range of appliances, some of which have very limited resources. Therefore, its design is heavily driven by the need to reduce resource consumption. GnatDb employs atomic and durable updates to protect the data against accidental corruption. It prevents malicious corruption of the data using standard cryptographic techniques that leverage the underlying log-structured storage model. We show that the total memory consumption of GnatDb, which includes the code footprint, the stack and the heap, does not exceed 11 KB, while its performance on a typical appliance platform remains at an acceptable level.

Radek Vingralek

2002-01-01T23:59:59.000Z

482

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

483

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

484

A Security Study of Digital TV Distribution Systems  

E-Print Network (OSTI)

1 This Thesis corresponds to 20 weeks of full-time work for the authors. For digital TV distribution, the current predominant business model is vertical. That is, TV operators and end users are locked to some certain proprietary conditional access (CA) systems, CA vendors control set-top-box manufacturers with their proprietary technology, and subscribers can achieve new services at the cost of changing STBs. Thus the horizontal business model is required to enable the open and competing market for any TV operator, and the attractive services for subscribers. The SSNF 2 is making efforts on providing households high quality TV services over the urban networks, where households can freely choose the competing offerings via an open platform. The traditional battleground of TV operators is in broadcast networks; however, the more mature IP technology becomes, TV operators will increase interests in providing services in IP networks. Furthermore, TV operators are aware of the possible additional value from the mobile distribution channel due to the evolution of cellular networks from “pure voice telephony networks to universal data networks ” [67].

Nariman Molavi; Xu Zhao; Copyright Nariman Molavi; Xu Zhao

2005-01-01T23:59:59.000Z

485

Security assessment of power systems including energy storage. Progress report, July 1, 1978--September 30, 1978  

DOE Green Energy (OSTI)

Progress in assessing the security of power systems is reviewed. Further evaluation has been performed on the previously developed simplified model of the current-fed force-commutated converter (CFFCC). Validation studies were performed using the CFFCC as a control interface between a one-machine, three-bus power system equivalent and a superconducting magnetic energy storage device. The highlights of this investigation are reported. The identification of power system electromechanical models from systems measurements, with only normal load variation as a disturbing input, is being studied. A maximum liklihood estimation procedure has been partly developed. The procedure uses auto correlation information as an input rather than the observed time series.

Carroll, D.P.; Triezenberg, D.M.

1978-10-01T23:59:59.000Z

486

The information furnace: consolidated home control  

Science Conference Proceedings (OSTI)

?The Information Furnace is a basement-installed PC-type device that integrates existing consumer home-control, infotainment, security and communication technologies to transparently provide accessible and value-added services. A modern home contains ... Keywords: Automation, Consumer electronics, Home-control, Multi-modal interfaces

Diomidis D. Spinellis

2003-05-01T23:59:59.000Z

487

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

488

A systems-theoretic security model for large scale, complex systems applied to the US air transportation system  

E-Print Network (OSTI)

Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from ...

Laracy, Joseph R. (Joseph Raymond)

2007-01-01T23:59:59.000Z

489

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

490

Results of a field test of heating system efficiency and thermal distribution system efficiency in a manufactured home  

SciTech Connect

A two-day test using electric coheating was performed on a manufactured home in Watertown, New York. The main objective of the test was to evaluate planned procedures for measuring thermal distribution system efficiency. (Thermal distribution systems are the ductwork or piping used to transport heat or cooling effect from the equipment that produces it to the building spaces in which it is used.) These procedures are under consideration for a standard method of test now being prepared by a special committee of the American Society of Heating, Refrigerating, and Air-Conditioning Engineers. The ability of a coheating test to give a credible and repeatable value for the overall heating system efficiency was supported by the test data. Distribution efficiency is derived from system efficiency by correcting for energy losses from the equipment. Alternative means for achieving this were tested and assessed. The best value for system efficiency in the Watertown house was 0.53, while the best value for distribution efficiency was 0.72.

Andrews, J.W.; Krajewski, R.F.; Strasser, J.J. [Brookhaven National Lab., Upton, NY (United States); Kinney, L.; Lewis, G. [Synertech Systems Corp., Syracuse, NY (United States)

1995-05-01T23:59:59.000Z

491

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements  

Science Conference Proceedings (OSTI)

This paper proposes a new approach for assessing the organization's vulnerability to information-security breaches. Although much research has been done on qualitative approaches, the literature on numerical approaches to quantify information-security ... Keywords: Information security, Information-security measurement, Risk analysis, Security threats, Vulnerability measurement

Sandip C. Patel; James H. Graham; Patricia A. S. Ralston

2008-12-01T23:59:59.000Z

492

Towards a Secure and Efficient System for End-to-End Provenance  

E-Print Network (OSTI)

Work on the End-to-End Provenance System (EEPS) began in the late summer of 2009. The EEPS effort seeks to explore the three central questions in provenance systems: (1) “Where and how do I design secure hostlevel provenance collecting instruments (called provenance monitors)?”; (2) “How do I extend completeness and accuracy guarantees to distributed systems and computations?”; and (3) “What are the costs associated with provenance collection? ” This position paper discusses our initial exploration into these issues and posits several challenges to the realization of the EEPS vision.

Patrick Mcdaniel; Kevin Butler; Steve Mclaughlin; Radu Sion; Erez Zadok; Marianne Winslett

2010-01-01T23:59:59.000Z

493

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

494

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

495

ViridiScope: Design and Implementation of a Fine Grained Power Monitoring System for Homes  

E-Print Network (OSTI)

A key prerequisite for residential energy conservation is knowing when and where energy is being spent. Unfortunately, the current generation of energy reporting devices only provide partial and coarse grained information or require expensive professional installation. This limitation stems from the presumption that calculating per-appliance consumption requires per-appliance current measurements. However, since appliances typically emit measurable signals when they are consuming energy, we can estimate their consumption using indirect sensing. This paper presents ViridiScope, a finegrained power monitoring system that furnishes users with an economical, self-calibrating tool that provides power consumption of virtually every appliance in the home. ViridiScope uses ambient signals from inexpensive sensors placed near appliances to estimate power consumption, thus no inline sensor is necessary. We use a model-based machine learning algorithm that automates the sensor calibration process. Through experiments in a real house, we show that ViridiScope can estimate the end-point power consumption within 10 % error.

Younghun Kim; Thomas Schmid; Zainul M. Charbiwala; Mani B. Srivastava

2009-01-01T23:59:59.000Z

496

Does the use of Solar Home Systems (SHS) contribute to climate protection?  

E-Print Network (OSTI)

The paper addresses planners and decision-makers in the field of international development cooperation and also institutions concerned with the impacts of project- and technology promotion. The primary aim of the dissemination of Solar Home Systems (SHS) in off grid areas in developing countries is to improve the living conditions of the population in a cost-effective manner. A large-scale dissemination is essential both for significant contributions to development and for climate effectiveness. However, the contribution of SHS to climate protection is disputed. This analysis presents the most important parameters affecting the contribution of SHS to climate protection and quantifies the influence of those parameters. The case considered presupposes the commercial dissemination of SHS. Greenhouse gas (GHG) emissions are affected by the marketing decisions of the supplier of SHS. With regard to the impact on GHG emissions, a comparison is made between traditional lighting with petroleum lamps and the use of dry cell batteries to operate small devices (baseline case) on the one hand and SHSs on the other. The comparison shows GHG savings of around 9 tonnes of CO2 equivalent GHG emissions within a 20-year period of use of one single 50 Wp SHS compared with the baseline case.

R. Posorski A; M. Bussmann B; C. Menke B

2002-01-01T23:59:59.000Z

497

Our Jobs | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Our Jobs Home > Federal Employment > Our Jobs Our Jobs NNSA's...

498

Photo Gallery | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Photo Gallery Home > Media Room > Photo Gallery Photo Gallery The...

499

Research and Development | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Research and Develo