National Library of Energy BETA

Sample records for home security systems

  1. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V.

    2014-05-30

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  2. Home | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Home Enter your keywords Search

  3. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  4. Home construction | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Performance with ENERGY STAR® Home Performance with ENERGY STAR® Homeowners across the United States can find trusted contractors who follow a comprehensive approach, recommended by ENERGY STAR®, to save money on energy bills while improving home comfort. The Home Performance with ENERGY STAR (HPwES) program provides homeowners with resources to identify trusted contractors that can help them understand their home's energy use, as well as identify home improvements that increase energy

  5. NREL Fills Key Leadership Role for Energy Systems Security and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fills Key Leadership Role for Energy Systems Security and Resilience April 6, 2015 Dr. ... a smart home, electricity storage, an electric vehicle charging station and solar panels. ...

  6. Early Oak Ridge Trailer Home | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Early Oak Ridge Trailer Home A typical trailer home

  7. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  8. Using Home Energy Scoring Systems

    Broader source: Energy.gov [DOE]

    Better Buildings Neighborhood Program Data and Evaluation Peer Exchange Call: Using Home Energy Scoring Systems, call slides and discussion summary, March 28, 2013.

  9. Intelligent mobile security systems

    SciTech Connect (OSTI)

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  10. Early Oak Ridge Home | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Early Oak Ridge Home A typical dwelling predating the Manhattan Project homes

  11. Cyber Securing Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industrial Control Systems Integration into the DoD Networks A Briefing in Response to House Report 113-102, Accompanying the FY14 National Defense Authorization Act Unclassified - Distribution Statement A August, 2015 Cyber Securing Control Systems Acquisition, Technology and Logistics 2 DoD Scope of Platform IT & Control Systems * Acquisitions / Weapon Systems - H,M & E (ships / subs, missiles, UVs, etc.) - Training Simulators, 3D printing, etc. * EI&E - Buildings & linear

  12. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  13. Early Oak Ridge Trailer Homes | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Early Oak Ridge Trailer Homes A row of trailer homes used

  14. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  15. Situated Usability Testing for Security Systems

    SciTech Connect (OSTI)

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  16. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  17. Home Heating Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Heat & Cool » Home Heating Systems Home Heating Systems Household Heating Systems: Although several different types of fuels are available to heat our homes, nearly half of us use natural gas. | Source: Buildings Energy Data Book 2011, 2.1.1 Residential Primary Energy Consumption, by Year and Fuel Type (Quadrillion Btu and Percent of Total). Household Heating Systems: Although several different types of fuels are available to heat our homes, nearly half of us use natural gas. | Source:

  18. Using Home Energy Scoring Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Energy Scoring Systems Using Home Energy Scoring Systems Better Buildings Neighborhood Program Data and Evaluation Peer Exchange Call: Using Home Energy Scoring Systems, call ...

  19. Planning a Home Solar Electric System | Department of Energy

    Office of Environmental Management (EM)

    Planning a Home Solar Electric System Planning a Home Solar Electric System Whether a home solar electric system will work for you depends on the available sun (resource),...

  20. PIA - Northeast Home Heating Oil Reserve System (Heating Oil...

    Energy Savers [EERE]

    Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil)...

  1. Center for Control System Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Control System Security Critical Infrastructure is at Risk As America's infrastructures have become more complex and interconnected, their operation and control has become more complicated as well. Automated control systems have been widely deployed to operate these infrastructures, and coupled with the networks they use to transfer data are a security vulnerability for the infrastructures they control. The Center for Control System Security at Sandia National Laboratories works with several

  2. Trailer homes in Oak Ridge | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Traffic Safety Traffic Safety Addthis Description Traffic safety promotion video

    Trailer homes in Oak Ridge Trailer homes in Oak Ridge An aerial of Oak Ridge showing the extensive use of trailer homes

  3. DOE Zero Energy Ready Home Case Study: Clifton View Homes, Coupeville, WA, Systems Home

    Broader source: Energy.gov [DOE]

    Case-study of a DOE Zero Energy Ready Home on Whidbey Island, WA, that scored HERS 45 without PV. This 2,908-square-foot custom/system home has a SIP roof and walls, R-20 rigid foam under slab, triple-pane windows, ground source heat pump for radiant floor heat, and a unique balanced ventilation system using separate exhaust fans to bring air into and out of home.

  4. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  5. Combi Systems for Low Load homes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Context Technical Approach * A condensing water heater and hydronic air handler will used to provide space and water heating loads in almost 300 weatherized homes. * System ...

  6. Home Energy Management System - Stochastic Optimal Scheduling...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Return to Search Home Energy Management System - Stochastic Optimal Scheduling of Residential Appliances with Renewable Energy Sources National Renewable Energy Laboratory Contact ...

  7. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses, for example, concrete blocks, razor-wire barriers, and steel-plated fighting positions to upgrade its physical security features. It has eliminated public access to ...

  8. Evaluating Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, Robb; Arena, Lois

    2013-02-01

    In an effort to improve housing options near Las Vegas, Nevada, the Clark County Community Resources Division (CCCRD) performs substantial renovations to foreclosed homes. After dramatic energy, aesthetic, and health and safety improvements are made, homes are rented or sold to qualified residents. This report describes the evaluation and selection of ventilation systems for these homes, including key considerations when selecting an ideal system. The report then describes CCCRD’s decision process with respect to ventilation.

  9. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  10. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ......... 17 Figure 5. Man-In-The-Middle attack on modem ... System LAN Local Area Network MITM Man-In-The-Middle OS Operating System PBX ...

  11. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  12. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated Security System (1.49 MB) More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Impacts of IPv6 on Infrastructure Control

  13. Webinar: ENERGY STAR Hot Water Systems for High Performance Homes...

    Energy Savers [EERE]

    ENERGY STAR Hot Water Systems for High Performance Homes Webinar: ENERGY STAR Hot Water Systems for High Performance Homes This presentation is from the Building America research ...

  14. PIA - Northeast Home Heating Oil Reserve System (Heating Oil...

    Broader source: Energy.gov (indexed) [DOE]

    Northeast Home Heating Oil Reserve System (Heating Oil) PIA - Northeast Home Heating Oil Reserve System (Heating Oil) (3.31 MB) More Documents & Publications PIA - WEB Physical ...

  15. HPXML: A Standardized Home Performance Data Sharing System -...

    Energy Savers [EERE]

    HPXML: A Standardized Home Performance Data Sharing System - Building America Top Innovation HPXML: A Standardized Home Performance Data Sharing System - Building America Top ...

  16. Automated Home Energy Management Standing Technical Committee...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Examples for Sensor Topics Strategically Placed Occupancy Sensors Outdoor Weather Data from Internet Smart Thermostats to meet occupant comfort needs Home Security System Home is ...

  17. Planning a Home Solar Electric System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Solar Electric System Planning a Home Solar Electric System Whether a home solar electric system will work for you depends on the available sun (resource), available space for the system size you need, the economics of the investment, and the local permits required. | Photo courtesy of Decker Homes. Whether a home solar electric system will work for you depends on the available sun (resource), available space for the system size you need, the economics of the investment, and the local

  18. PIA - Security Clearance Tracking System | Department of Energy

    Office of Environmental Management (EM)

    Tracking System PIA - Security Clearance Tracking System PIA - Security Clearance Tracking System PIA - Security Clearance Tracking System (209.32 KB) More Documents & Publications ...

  19. DOE Integrated Security System (DISS) preliminary communication security analysis

    SciTech Connect (OSTI)

    Sweeney, D. J.

    1993-10-01

    The purpose of this analysis is to document a technical approach to improve DOE Integrated Security System (DISS) dial-up communications security and the requirements to address them. This document is not intended as a comprehensive analysis of the security aspects of the DISS computer system but rather as an analysis of the dial-up communications security as it pertains to the use of the DISS database in the new DOE Automated Visitors Access Control System (DAVACS) procedures. Current access controls into the DISS will be discussed with emphasis on the DAVACS procedures. Recommendations will be provided for increasing the dial-up communications security into DISS as it relates to the automated visit procedures. Finally a design for an encrypted dial-up communication link to DISS will be given.

  20. Control Systems Security Standards: Accomplishments And Impacts |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments

  1. Home Cooling Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Heat & Cool » Home Cooling Systems Home Cooling Systems When it comes to cooling your house, there are a number of options beyond air conditioning. | Photo courtesy of ©iStockphoto/chrisgramly. When it comes to cooling your house, there are a number of options beyond air conditioning. | Photo courtesy of ©iStockphoto/chrisgramly. Although your first thought for cooling may be air conditioning, there are many alternatives that provide cooling with less energy use. A combination of proper

  2. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ...

  3. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  4. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity ...

  5. Roadmap to Secure Control Systems in the Energy Sector - January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure...

  6. Commercial dissemination approaches for solar home systems

    SciTech Connect (OSTI)

    Terrado, E.

    1997-12-01

    The author discusses the issue of providing solar home systems to primarily rural areas from the perspective of how to commercialize the process. He considers two different approaches, one an open market approach and the other an exclusive market approach. He describes examples of the exclusive market approach which are in process in Argentina and Brazil. Coming from a banking background, the business aspects are discussed in detail. He points out the strengths and weaknesses of both approaches toward developing such systems.

  7. Pantex Occupational Health System (OHS), National Nuclear Security...

    Energy Savers [EERE]

    Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

  8. Pantex Occupational Health System (OHS), National Nuclear Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security ...

  9. Cyberspace Security Econometrics System (CSES)

    Energy Science and Technology Software Center (OSTI)

    2012-07-27

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing complance pressures require careful consideration and adaption. The CSES provides a measure (i.e. a quantitative indication) of reliability, performance, and/or safety of a system that accounts for themore » criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement.« less

  10. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems Professional Competence: Alignment and ...

  11. Planning for Home Renewable Energy Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electricity & Fuel » Buying & Making Electricity » Planning for Home Renewable Energy Systems Planning for Home Renewable Energy Systems Planning for a home renewable energy system is a process that includes analyzing your existing electricity use, looking at local codes and requirements, deciding if you want to operate your system on or off of the electric grid, and understanding technology options you have for your site. | Photo by Francis Fine Art Photography. Planning for a home

  12. DOE Zero Energy Ready Home Case Study, Weiss Building & Development, LLC., System Home, River Forest, Illinois

    SciTech Connect (OSTI)

    none,

    2013-09-01

    The Passive House Challenge Home located in River Forest, Illinois, is a 5-bedroom, 4.5-bath, 3,600 ft2 two-story home (plus basement) that costs about $237 less per month to operate than a similar sized home built to the 2009 IECC. For a home with no solar photovoltaic panels installed, it scored an amazingly low 27 on the Home Energy Rating System (HERS) score.An ENERGY STAR-rated dishwasher, clothes washer, and refrigerator; an induction cooktop, condensing clothes dryer, and LED lighting are among the energy-saving devices inside the home. All plumbing fixtures comply with EPA WaterSense criteria. The home was awarded a 2013 Housing Innovation Award in the "systems builder" category.

  13. Secure videoconferencing equipment switching system and method

    DOE Patents [OSTI]

    Hansen, Michael E.

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  14. DOE Zero Energy Ready Home Case Study: 2013 Weiss Building & Development, LLC., System Home, River Forest, IL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LLC System Home River Forest, IL BUILDING TECHNOLOGIES OFFICE The U.S. Department of Energy invites home builders across the country to meet the extraordinary levels of excellence and quality specified in DOE's Zero Energy Ready Home program (formerly known as Challenge Home). Every DOE Zero Energy Ready Home starts with ENERGY STAR for Homes Version 3 for an energy-efficient home built on a solid foundation of building science research. Advanced technologies are designed in to give you superior

  15. ETTP Security Access Control System (ESACS) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) (218.51 KB) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL PeopleSoft - Human Resource System PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory

  16. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  17. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  18. Home Cooling Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fans In many climates, you can use a whole-house fan to meet all or most of your home cooling needs. Evaporative Cooling For homes in dry climates, evaporative cooling or...

  19. Secure videoconferencing equipment switching system and method

    DOE Patents [OSTI]

    Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

    2013-04-30

    Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

  20. Measure Guideline: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.

    2014-02-01

    This document addresses adding -or improving - mechanical ventilation systems to existing homes. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including some discussion of relevant codes and standards. Advantages, disadvantages, and approximate costs of various system types are presented along with general guidelines for implementing the systems in homes. CARB intends for this document to be useful to decision makers and contractors implementing ventilation systems in homes. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors. It is the intent of this document to assist contractors in making more informed decisions when selecting systems. Ventilation is an integral part of a high-performance home. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability.

  1. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  2. Secure and Efficient Routable Control Systems

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  3. Laser-guidance systems, security classification. Instruction

    SciTech Connect (OSTI)

    Flickinger, A.

    1982-12-03

    The Instruction reissues Department of Defense (DoD) Instruction 5210.62, April 25, 1980, and prescribes policies, standards, and criteria governing the security classification of information pertaining to any laser-guidance system that is developed in whole or in part with information or knowledge obtained from or developed for the Department of Defense; and provides guidance to DoD Components responsible for issuing security classification guides for individual systems and equipment under their control.

  4. Installing and Maintaining a Home Solar Electric System | Department...

    Energy Savers [EERE]

    Making sure your home solar electric or photovoltaic (PV) system is sized, sited, installed, and maintained correctly is essential for maximizing its energy performance. When...

  5. Meeting Minutes from Automated Home Energy Management System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Automated Home Energy Management System Expert Meeting October 1-2, 2009 AGENDA - Day 1 8:30 ... Computing (Web Data Computing, Data Storage) Trends - Troy Batterberry, Microsoft ...

  6. Zicom Electronic Security Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Security Systems Ltd. Place: Mumbai, Maharashtra, India Zip: 400093 Sector: Solar, Wind energy Product: Mumbai-based electronic security systems integrator. The firm plans to...

  7. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH March 25, 2010 - ...

  8. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  9. A Summary of Control System Security Standards Activities in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector ...

  10. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  11. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector ...

  12. Roadmap to Secure Control Systems in the Energy: Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to...

  13. Roadmap to Secure Control Systems in the Energy: Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy ...

  14. Roadmap to Secure Control Systems in the Energy Sector - January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent ...

  15. List of Major Information Systems,National Nuclear Security Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    List of Major Information Systems,National Nuclear Security Administration ADaPT ... List of Major Information Systems, Defense Line of Business National Nuclear Security ...

  16. Home Heating Systems | Department of Energy

    Office of Environmental Management (EM)

    separately, many homes use the following approaches: Active Solar Heating Uses the sun to heat either air or liquid and can serve as a supplemental heat source. Electric...

  17. Control Systems Security Standards: Accomplishments & Impacts

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited.

  18. Control Systems Security Standards: Accomplishments & Impacts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7-7019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination

  19. Design tools for complex dynamic security systems.

    SciTech Connect (OSTI)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III; Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  20. Selecting RMF Controls for National Security Systems

    SciTech Connect (OSTI)

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  1. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  2. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  3. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  4. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  5. Pantex Occupational Health System (OHS), National Nuclear Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Administration Pantex Site Office | Department of Energy Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office (337.13 KB) More Documents &

  6. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  7. Home Energy Management Systems and Reduced Consumption

    Broader source: Energy.gov [DOE]

    This presentation was given at the Summer 2012 DOE Building America meeting on July 25, 2012, and addressed the question "What emerging innovations are the key to future homes?"

  8. DOE Zero Energy Ready Home Case Study: Dwell Development, Seattle, WA, Systems Home

    Broader source: Energy.gov [DOE]

    Case study of a DOE Zero Energy Ready Home in Seattle, WA, that scored HERS 34 without PV. This 2,000-square-foot system home has R-45 double-stud walls, an unvented flat roof with 2 inches of spray foam plus 18 inches blown cellulose, R-42 XPS under slab, triple-pane windows, and a ductless mini-split heat pump.

  9. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  10. A voice password system for access security

    SciTech Connect (OSTI)

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  11. Liability aspects of home energy-rating systems

    SciTech Connect (OSTI)

    Hendrickson, P.L.

    1983-10-01

    Liability aspects of home energy rating systems are discussed. An introduction to the rating system concept, including types of rating systems, implementation efforts to date, and possible groups to conduct ratings, is also included. The home energy rating system concept involves the periodic rating of the energy efficiency of residential buildings. The rating can provide a relative indication of a home's energy efficiency and also a quantitative estimate of consumption, fuel cost, or both. Primary attention is given to liability issues associated with developing and performing ratings. Secondary attention is given to possible liability associated with misuse of a rating once it has been performed.

  12. Installing and Maintaining a Home Solar Electric System | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Home Solar Electric System Installing and Maintaining a Home Solar Electric System When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. Making sure your

  13. ORO Office Safeguards and Security Clearance Tracking System and Visitor

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control System PIA, Oak Ridge Operations Office | Department of Energy Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and

  14. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  15. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  16. Quality Management Systems for Zero Energy Ready Home Webinar (Text

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Version) | Department of Energy Quality Management Systems for Zero Energy Ready Home Webinar (Text Version) Quality Management Systems for Zero Energy Ready Home Webinar (Text Version) Below is the text version of the webinar, Quality Management Systems for Zero Energy Ready Home, presented in October 2014. Watch the presentation. GoToWebinar voice: The broadcast is now starting. All attendees are in listen-only mode. Lindsay Parker: Hi, everyone. We're really glad that you can make it here

  17. Smart Homes and Buildings Research at the Energy Systems Integration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facility (Text Version) | Energy Systems Integration | NREL Smart Homes and Buildings Research at the Energy Systems Integration Facility (Text Version) This is a text version of the video "Smart Homes and Buildings Research at the Energy Systems Integration Facility." So, the big promise of the smart home is to enhance your comfort and your convenience. And at the same time, allow us to save energy. So, we're doing the right thing, but we're also more convenient and more

  18. Security Profile Inspector for UNIX Systems

    Energy Science and Technology Software Center (OSTI)

    1995-04-01

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configurationmore » Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  19. System and method for key generation in security tokens

    SciTech Connect (OSTI)

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.; Pooser, Raphael C.; Prowell, Stacy J.

    2015-10-27

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  20. System and method for key generation in security tokens

    DOE Patents [OSTI]

    Evans, Philip G; Humble, Travis S; Paul, Nathanael R; Pooser, Raphael C; Prowell, Stacy J

    2015-11-05

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  1. Fuzzy-Logic Subsumption Controller for Home Energy Management Systems

    SciTech Connect (OSTI)

    Ainsworth, Nathan; Johnson, Brian; Lundstrom, Blake

    2015-10-06

    Home Energy Management Systems (HEMS) are controllers that manage and coordinate the generation, storage, and loads in a home. These controllers are increasingly necessary to ensure that increasing penetrations of distributed energy resources are used effectively and do not disrupt the operation of the grid. In this paper, we propose a novel approach to HEMS design based on behavioral control methods, which do not require accurate models or predictions and are very responsive to changing conditions. We develop a proof-of-concept behavioral HEMS controller and show by simulation on an example home energy system that it capable of making context-dependent tradeoffs between goals under challenging conditions.

  2. Installing and Maintaining a Home Solar Electric System | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Home Solar Electric System When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV...

  3. Measure Guideline: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.

    2014-02-01

    This report, developed by Building America research team CARB, addresses adding or improving mechanical ventilation systems to existing homes. The goal of this report is to assist decision makers and contractors in making informed decisions when selecting ventilation systems for homes. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including examination of relevant codes and standards. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors.

  4. Northeast Home Heating Oil Reserve- Online Bidding System

    Office of Energy Efficiency and Renewable Energy (EERE)

    The U.S. Department of Energy has developed an on-line bidding system - an anonymous auction program - for the sale of product from the one million barrel Northeast Home Heating Oil Reserve.

  5. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    which is free to browse our entire collection. Expect to go through something similar to airport security screening upon entry. Checking out materials: Borrowing may take place...

  6. High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems;

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Volume 6 Building America Best Practices Series | Department of Energy Home Technologies: Solar Thermal & Photovoltaic Systems; Volume 6 Building America Best Practices Series High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems; Volume 6 Building America Best Practices Series The sixth volume of the Building America Best Practices Series presents information that is useful throughout the United States for enhancing the energy efficiency practices in the specific

  7. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE (299.08 KB) More Documents & Publications PIA - INL Education Programs Business Enclave Manchester Software 1099 Reporting PIA, Idaho National Laboratory PIA - INL PeopleSoft - Human Resource System

  8. Information System Security Officer (ISSO) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Officer (ISSO) Information System Security Officer (ISSO) digital-388075_960_720.jpg The Information System Security Officer (ISSO) is responsible to the Information System Security Manager (SSM), information owner, and system owner for ensuring a proper security posture is in place. ISSO Core Competency Training Worksheet (241.41 KB) More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR) Information System Owner (ISO

  9. Information System Security Manager (ISSM) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Manager (ISSM) Information System Security Manager (ISSM) macbook-925595_960_720.jpg The Information Security System Manager (ISSM) is designated by an operating unit's (DOE organization or site) Senior Manager to manage the unit's cyber security program. The ISSM establishes, documents, and monitors an operating unit's cyber security program implementation plan, and ensures compliance with DOE management policies. Candidates must possess a working knowledge of cyber security policies and

  10. Aerial Monitoring System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Aerial Monitoring System NNSA to Conduct Aerial Radiation Monitoring Survey Over Philadelphia July 18-20 Philadelphia - On July 18 through July 20, the U.S. Department of Energy's National Nuclear Security Administration's (NNSA) will conduct low-altitude helicopter flights around Philadelphia to measure naturally occurring background radiation in support of the Democratic National... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  11. Ultra Safe And Secure Blasting System

    SciTech Connect (OSTI)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  12. Roadmap to Secure Control Systems in the Energy Sector 2006 ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation ...

  13. Smart Home and Building Systems | Energy Systems Integration...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that connects appliances, a home, or even a community to an end-to-end energy ecosystem. ... testing any portion of a home's energy ecosystem, including end loads, transformers, ...

  14. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    » Control Systems Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes

  15. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  16. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sign In Honeywell Aero KCP NNSA NATIONAL SECURITY CAMPUS IN THE NEWS IN THE NEWS NSC reaches safety milestone with on-time, on-budget moveLEARN MORE LEARN MORE HEALTH, SAFETY &...

  17. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  18. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  19. Roadmap to Secure Control Systems in the Energy Sector 2006 ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Presentation by Hank Kenchington on the 2006 roadmap to secure control ...

  20. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  1. Security Metricsfor Process Control Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Metricsfor Process Control Systems Security Metricsfor Process Control Systems This document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics to achieve operational excellence. Security Metrics for Process Control Systems (1.9 MB) More Documents & Publications Report of the Cyber Security Research Needs for Open Science Workshop Visualization & Controls Program Peer

  2. PIA - Security Clearance Work Tracking and Budget System | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System (202.44 KB) More Documents & Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office PIA - INL Education Programs Business Enclave Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory

  3. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  4. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  5. CNS welcomes home 20th HonorAir Knoxville flight | Y-12 National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Complex welcomes home 20th ... CNS welcomes home 20th HonorAir Knoxville flight Posted: May 24, 2016 - 12:30pm CNS's Gene Patterson welcomes home an East Tennessee veteran who participated in the 20th HonorAir Knoxville flight. April 13, 2016, was another memorable day for HonorAir Knoxville as 125 war veterans traveled to Washington, D.C., to visit the memorials built to honor their sacrifices. The one-day trip represented the 20th flight for HonorAir, which has flown more than 2,600 East

  6. Process Control Systems in the Chemical Industry: Safety vs. Security

    SciTech Connect (OSTI)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nations critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  7. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  8. NREL: Wind Research - Systems Engineering Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Illustration of a wind farm with a town in the background and a crane lifting the turbine blades onto the last turbine. A complete wind energy system includes the plant's energy ...

  9. Evaluating Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    Aldrich, R.; Arena, L.

    2013-02-01

    During the course of this project, an affordable and high performance ductwork system to directly address the problems of thermal losses, poor efficiency, and air leakage was designed. To save space and enable direct connections between different floors of the building, the ductwork system was designed in such a way that it occupied interior or exterior frame wall cavities. The ductwork system satisfied building regulations for structural support when bridging multiple floors, the spread of fire and smoke, and insulation to reduce the heat flow into or out of the building. Retrofits of urban residential buildings will be the main focus for the application of this ductwork system. Highly reflective foils and insulating materials were used to aid in the increase of the overall R-value of the ductwork itself and the wall assembly. It is expected that the proposed system will increase the efficiency of the HVAC system and the thermal resistance of the building envelope. The performance of the proposed ductwork design was numerically evaluated in a number of different ways. Our results indicate that the duct method is a very cost attractive alternative to the conventional method.

  10. Security Framework for Control System Data Classification and Protection |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Framework for Control System Data Classification and Protection Security Framework for Control System Data Classification and Protection This document presents a data classification process that gives utility administrators, control engineers, and IT personnel a cohesive approach to deploying efficient and effective process control security. Security Framework for Control System Data Classification and Protection (230.98 KB) More Documents & Publications Essential

  11. List of Major Information Systems,National Nuclear Security Administration

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADaPT Networked: | Department of Energy List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear

  12. Electronic DOE Information Security System (eDISS) PIA, Office of Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety and Security | Department of Energy DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security (88.14 KB) More Documents & Publications Integrated Safety Management Workshop

  13. Design of a physical security perimeter fencing system.

    SciTech Connect (OSTI)

    Mack, Thomas Kimball; Ross, Michael P.; Lin, Han Wei

    2010-10-01

    Design of a physical security perimeter fencing system requires that security designers provide effective detection, delay, and response functionalities with minimal nuisance alarms. In addition, the designers must take into considerations the security fence system life cycle cost (equipment and grounds maintenance), complexity of the terrain, safety, and environmental conditions (location of where the security fence will be installed). Often, these factors drive the security designers to design a perimeter intrusion detection and assessment system (PIDAS) that includes: (1) larger than desired footprint, (2) one or more animal control fences to minimize the nuisance alarm rate (NAR), and (3) clear zones and an isolation zone to facilitate intrusion detection and assessment by keeping the fence lines clear of vegetation, trash, and other objects that could impede the security system's performance. This paper presents a two-tier PIDAS design that focuses on effective performance specifically in high probability of detection and low NAR that minimizes cost and the footprint of the system.

  14. Computer security plan development using an expert system

    SciTech Connect (OSTI)

    Hunteman, W.J. ); Evans, R.; Brownstein, M.; Chapman, L. )

    1990-01-01

    The Computer Security Plan Assistant (SPA) is an expert system for reviewing Department of Energy (DOE) Automated Data Processing (ADP) Security Plans. DOE computer security policies require ADP security plans to be periodically reviewed and updated by all DOE sites. SPA is written in XI-Plus, an expert system shell. SPA was developed by BDM International, Inc., under sponsorship by the DOE Center for Computer Security at Los Alamos National Laboratory. SPA runs on an IBM or compatible personal computer. It presents a series of questions about the ADP security plan being reviewed. The SPA user references the ADP Security Plan and answers the questions. The SPA user reviews each section of the security plan, in any order, until all sections have been reviewed. The SPA user can stop the review process after any section and restart later. A Security Plan Review Report is available after the review of each section of the Security Plan. The Security Plan Review Report gives the user a written assessment of the completeness of the ADP Security Plan. SPA is being tested at Los Alamos and will soon be available to the DOE community.

  15. SECURITY-CLEARENCE-TRACKING-SYSTEM.pdf

    Energy Savers [EERE]

    Department of Energy SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY Based on the finding of a growing potential vulnerability, the President of the United States issued, in May 1998, a directive outlining the Administration's policy on critical infrastructure protection. SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY (1.55 MB) More Documents & Publications Energy Sector-Specific Plan: An

  16. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  17. Roadmap to Secure Control Systems in the Energy: Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision

  18. DOE and Industry Showcase New Control Systems Security Technologies at

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DistribuTECH | Department of Energy and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH March 25, 2010 - 1:20pm Addthis DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy

  19. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  20. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  1. Information security management system planning for CBRN facilities

    SciTech Connect (OSTI)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  2. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect (OSTI)

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  3. Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices

    SciTech Connect (OSTI)

    Hoen, Ben; Wiser, Ryan; Thayer, Mark; Cappers, Peter

    2012-04-15

    Relatively little research exists estimating the marginal impacts of photovoltaic (PV) energy systems on home sale prices. Using a large dataset of California homes that sold from 2000 through mid-2009, we find strong evidence, despite a variety of robustness checks, that existing homes with PV systems sold for a premium over comparable homes without PV systems, implying a near full return on investment. Premiums for new homes are found to be considerably lower than those for existing homes, implying, potentially, a tradeoff between price and sales velocity. The results have significant implications for homeowners, builders, appraisers, lenders, and policymakers.

  4. Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IQ Station Boise State University receives a portable 3D visualization system from CAES and INL More BSU Photo of the Week INL's Shane Grover drives the IQ Station...

  5. HQ Emergency Management Team (EMT) | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home ... NNSA and Department of Energy senior management, coordinatesprovides ... response management system Homeland Security and ...

  6. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  7. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    SciTech Connect (OSTI)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  8. DOE ZERH Webinar: Quality Management Systems for Zero Energy Ready Home |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Quality Management Systems for Zero Energy Ready Home DOE ZERH Webinar: Quality Management Systems for Zero Energy Ready Home The session will provide background and guidance for how Zero Energy Ready Home builders can integrate a quality management program in their business. The focus will be on facilitating builder transition to high-performance homes, minimizing builder risk during that transition, and ensuring consistent delivery on the HPH value proposition. The

  9. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Program Areas Defense Systems About Defense Systems & Assessments Program Areas Accomplishments Cybersecurity Programs Program Areas EOD security and defense photo Sandia's engineering, science, and technology expertise helps anticipate and solve the nation's toughest security challenges. Defense Systems & Assessments work is focused in seven main program areas: Information Operations: Information Operations develops technologies that help protect U.S. government,

  10. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  11. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  12. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  13. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  14. Planning, electric systems and security of supply

    SciTech Connect (OSTI)

    Saullo, A.

    1998-07-01

    The move towards liberalization of electricity markets has raised different views on the answer to be given to the following question: will the new environment allow for enough resources to be conveyed to the power sector so as to preserve security of supply? There are two facets under which the ``security of supply'' issue can be considered. The first one relates to the availability of generating capacity, and of network infrastructures, adequate to meet the demand. The second aspect to be considered in dealing with security of supply is more a matter of energy policy. Electricity, as such, is basically an energy carrier able to convey to consumers virtually any kind of energy source; the ``switching'' capability from a source to a different one may offer a solution when reliability of energy supply is felt at risk. This flexibility is a premium, particularly for those countries/regions that have to rely strongly on energy imports. Preserving the contribution that the power sector offers to the ``external'' security of supply may represent a major objective of investment policies and energy sector regulation, depending on the level of risk as perceived by national/regional authorities. On the other hand, the volume of investments at stake is considerable. Enel, on the base of projections of electricity demand worldwide made by the EU Commission and of studies on investments developed by EURELECTRIC, estimates that the volume of investments conveyed to the power sector each year in the period 2000--2010 will be in the range of 300 billion of 1995 US$. Will this huge amount of resources provide for an adequate level of security of supply? This paper aims to introduce for discussion some views on the subject, considering separately the industrialized countries and those still undergoing industrialization.

  15. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  16. NNSA sites take home 15 R&D Awards | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) sites take home 15 R&D Awards Thursday, November 19, 2015 - 4:28pm R&D Magazine named 15 NNSA lab projects as winners in the 53rd annual R&D 100 Awards, which honor the 100 most innovative technologies and services of the past year. The winners were selected by an independent panel of more than 70 judges. The R&D 100 Awards are often referred to as the "Oscars of Invention." NNSA winners: Lawrence Livermore National Laboratory Zero-order

  17. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    SciTech Connect (OSTI)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  18. Collaboration Topics - System Software | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    System Software This collaboration focuses on research and development of parallel file system interfaces and tools, system resource management capabilities, operating system ...

  19. Security Requirements for Classified Automatic Data Processing Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1985-07-10

    To establish and describe the computer security program for classified automatic data processing (ADP) systems at the Department of Energy (DOE) Headquarters. This directive does not cancel another directive. Canceled by DOE N 251.9.

  20. Control Systems Security Publications Library | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control Systems Security Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require Adobe Acrobat Reader. You can download a free copy of the Reader by visiting Adobe.) VULNERABILITY REPORTS PERIODICAL ARTICLES ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION DOE NSTB PROGRAM PLANNING AND RESOURCE DOCUMENTS PROJECT FACT SHEETS TRAINING MATERIALS AND RECOMMENDED PRACTICES

  1. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  2. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  3. Pressurized security barrier and alarm system

    DOE Patents [OSTI]

    Carver, D.W.

    1995-04-11

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

  4. Pressurized security barrier and alarm system

    DOE Patents [OSTI]

    Carver, Don W.

    1995-01-01

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder's making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

  5. Marine asset security and tracking (MAST) system

    DOE Patents [OSTI]

    Hanson, Gregory Richard; Smith, Stephen Fulton; Moore, Michael Roy; Dobson, Eric Lesley; Blair, Jeffrey Scott; Duncan, Christopher Allen; Lenarduzzi, Roberto

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  6. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  7. Building America Case Study: Selecting Ventilation Systems for Existing Homes (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-12-01

    This document addresses adding -or improving - mechanical ventilation systems to existing homes. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including some discussion of relevant codes and standards. Advantages, disadvantages, and approximate costs of various system types are presented along with general guidelines for implementing the systems in homes. CARB intends for this document to be useful to decision makers and contractors implementing ventilation systems in homes. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors. It is the intent of this document to assist contractors in making more informed decisions when selecting systems. Ventilation is an integral part of a high-performance home. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability.

  8. Indonesia solar home systems project for rural electrification

    SciTech Connect (OSTI)

    Sanghvi, A.P.

    1997-12-01

    This paper presents, from a financing aspect the broad issues involved in a plan to provide solar home systems (SHS) to provide rural electrification in several areas of rural Indonesia. The paper discusses the approaches being used to provide funding, develop awareness of the technology, and assure the success of the project. The plan involves the use of grant money to help with some of the initial costs of such systems, and thereby to encourage local financing on a terms rather than cash basis. There are needs for market development, and development of a business structure in the country to support this type of technology. Provided this plan can succeed, it may serve as a model for further efforts.

  9. Access Rate Control System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support safeguards and security, the Access Rate Control System (ARCS) controls the speed of entry through full-height turnstiles

  10. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  11. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  12. information systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    information systems NNSA's systems administrators keep the computers running For Systems Administrator (SysAdmin) Day, meet some of the men & women keeping NNSA going. Thanks for all you do! Michelle Swinkels, Senior Systems and Network Technologist at NNSA's Lawrence Livermore National Laboratory What excites you about your work for NNSA? I'... NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award"

  13. Collaboration Topics - System Software | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) System Software This collaboration focuses on research and development of parallel file system interfaces and tools, system resource management capabilities, operating system evaluation, and software for high-performance interconnects. Current activities include the test and evaluation of technologies and tools associated with the Lustre parallel file system, the development and analysis of middleware to encapsulate application I/O requirements and abstract the

  14. Building America System Research Plan for Reduction of Miscellaneous Electrical Loads in Zero Energy Homes

    SciTech Connect (OSTI)

    Barley, C. D.; Haley, C.; Anderson, R.; Pratsch, L.

    2008-11-01

    This research plan describes the overall scope of system research that is needed to reduce miscellaneous electrical loads (MEL) in future net zero energy homes.

  15. HPXML: A Standardized Home Performance Data Sharing System- Building America Top Innovation

    Broader source: Energy.gov [DOE]

    NREL’s Standard for Home Performance-Related Data Transfer (known as HPXML) facilitates smooth communication between program tracking systems and energy upgrade analysis software.

  16. Could Your Home Benefit from a Small Wind Electric System? | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Could Your Home Benefit from a Small Wind Electric System? Could Your Home Benefit from a Small Wind Electric System? August 8, 2013 - 2:31pm Addthis A small wind electric system can be a clean, affordable way to power your home. | Photo courtesy of Thomas Fleckenstein, NREL 26476 A small wind electric system can be a clean, affordable way to power your home. | Photo courtesy of Thomas Fleckenstein, NREL 26476 Erik Hyrkas Erik Hyrkas Media Relations Specialist, Office of Energy

  17. Using Multiple Unmanned Systems for a Site Security Task

    SciTech Connect (OSTI)

    Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

    2009-04-01

    Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

  18. emergency management systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    systems NNSA sites prepared for disasters using real-time response management system Pantex Emergency Services now uses the Emergency Management Information System, or EMInS. From left: Maribel Martinez, Brenda Graham and Greg Roddahl. One of NNSA's missions is emergency response, so it only makes sense that our sites and labs excel at emergency management on the local level. When... Building International Emergency Management Systems NNSA helps nations develop the core elements of an emergency

  19. Aerial Measuring System | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    AMS Logo NNSA's Aerial Measuring System (AMS) provides specialized airborne radiation ... The AMS mission is to provide a rapid survey of radiation and contamination following a ...

  20. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  1. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  2. HOME INSECURITY: NO ALARMS, FALSE ALARMS, AND SIGINT

    SciTech Connect (OSTI)

    Lamb, Logan M [ORNL

    2014-01-01

    The market share of home security systems has substantially increased as vendors incorporate more desirable features: intrusion detection, automation, wireless, and LCD touch panel controls. Wireless connectivity allows vendors to manufacture cheaper, more featureful products that require little to no home modification to install. Consumer win, since adding devices is easier. The result: an ostensibly more secure, convenient, and connected home for a larger number of citizens. Sadly, this hypothesis is flawed; the idea of covering a home with more security sensors does not translate into a more secure home. Additionally, the number of homes using these vulnerable systems is large, and the growth rate is increasing producing a even larger problem. In this talk, I will demonstrate a generalized approach for compromising three systems: ADT, the largest home security dealer in North America; Honeywell, one of the largest manufacturers of security devices; and Vivint, a top 5 security dealer. We will suppress alarms, create false alarms, and collect artifacts that facilitate tracking the movements of individuals in their homes.

  3. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  4. Function allocation in distributed safeguards and security systems

    SciTech Connect (OSTI)

    Barlich, G.L. )

    1991-01-01

    Computerized distributed systems are being used to collect and manage data for activities such as nuclear materials accounting, process control, laboratory coordination, and security. Poor choices made in allocating functions to individual processors can make a system unusable by burdening machines with excessive network retrievals and updates. During system design phases, data allocation algorithms based on operation frequencies, field sizes, security information, and reliability requirements can be applied in sensitivity studies to mathematically ensure processor efficiency. The Los Alamos Network Design System (NDS) implements such an allocation algorithm. The authors analyzed a large, existing distributed system to test the cost functions and to compare actual network problems with NDS results. Several common configurations were also designed and studied using the software. From these studies, some basic principles for allocating functions emerged. In this paper recommendations for function allocation in generic systems and related design options are discussed.

  5. International Monitoring System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Monitoring System NNSA Contributes to International Efforts to Further Strengthen Detection of Nuclear Explosions Every day, thousands of patients worldwide undergo medical tests, diagnostics, and treatments that use radioactive materials. These vital materials, such as molybdeum-99 (Mo-99), must be produced continuously to keep up with demand. One consequence of some Mo-

  6. Container Security - part of the CORE system

    Energy Science and Technology Software Center (OSTI)

    2009-10-02

    A data integration system to support the US Customs and Border Protection Officers to supervise and make decisions for container inspections. CORE is designed to act as a framework to bridge the gaps between disparate data integration and delivery of disparate information visualization.

  7. Critical issues in process control system security : DHS spares project.

    SciTech Connect (OSTI)

    Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

    2010-10-01

    The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

  8. Small Business Sourcing System | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Sourcing System NNSA is implementing a system housing small businesses that have participated in our Opportunity Sessions, and have completed the NNSA Capabilities Questionnaire. Information is gathered relevant to the performance of each small business and included in the system. Among the information contained is: Active contract vehicles Past performance information Primary performance areas Security clearance information Teaming partners As the database becomes more fully

  9. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Stewart, John; Chavez, Adrian

    2014-10-22

    The Padlock Project is an alliance between Tennessee Valley Authority (TVA), Sandia National Laboratories (SNL), and Schweitzer Engineering Laboratories Inc. (SEL). SEL is the prime contractor on the Padlock project. Rhett Smith (SEL) is the project director and Adrian Chaves (SNL) and John Stewart (TVA) are principle investigators. SEL is the world’s leader in microprocessor-based electronic equipment for protecting electric power systems. The Tennessee Valley Authority, a corporation owned by the U.S. government, provides electricity for 9 million people in parts of seven southeastern states at prices below the national average. TVA, which receives no taxpayer money and makes no profits, also provides flood control, navigation and land management for the Tennessee River system and assists utilities, and state and local governments with economic development.

  10. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  11. Secure Video Surveillance System Acquisition Software

    Energy Science and Technology Software Center (OSTI)

    2009-12-04

    The SVSS Acquisition Software collects and displays video images from two cameras through a VPN, and store the images onto a collection controller. The software is configured to allow a user to enter a time window to display up to 2 1/2, hours of video review. The software collects images from the cameras at a rate of 1 image per second and automatically deletes images older than 3 hours. The software code operates in amore » linux environment and can be run in a virtual machine on Windows XP. The Sandia software integrates the different COTS software together to build the video review system.« less

  12. An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California

    SciTech Connect (OSTI)

    Hoen, Ben; Cappers, Peter; Wiser, Ryan; Thayer, Mark

    2011-04-19

    An increasing number of homes in the U.S. have sold with photovoltaic (PV) energy systems installed at the time of sale, yet relatively little research exists that estimates the marginal impacts of those PV systems on home sale prices. A clearer understanding of these possible impacts might influence the decisions of homeowners considering the installation of a PV system, homebuyers considering the purchase of a home with PV already installed, and new home builders considering including PV as an optional or standard product on their homes. This research analyzes a large dataset of California homes that sold from 2000 through mid-2009 with PV installed. It finds strong evidence that homes with PV systems sold for a premium over comparable homes without PV systems during this time frame. Estimates for this premium expressed in dollars per watt of installed PV range, on average, from roughly $4 to $5.5/watt across a large number of hedonic and repeat sales model specifications and robustness tests. When expressed as a ratio of the sales price premium of PV to estimated annual energy cost savings associated with PV, an average ratio of 14:1 to 19:1 can be calculated; these results are consistent with those of the more-extensive existing literature on the impact of energy efficiency on sales prices. When the data are split among new and existing homes, however, PV system premiums are markedly affected. New homes with PV show premiums of $2.3-2.6/watt, while existing homes with PV show premiums of more than $6/watt. Reasons for this discrepancy are suggested, yet further research is warranted. A number of other areas where future research would be useful are also highlighted.

  13. T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security

    SciTech Connect (OSTI)

    Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

    2009-07-20

    Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

  14. CLASSIFICATION OF THE MGR SAFEGUARDS AND SECURITY SYSTEM

    SciTech Connect (OSTI)

    J.A. Ziegler

    1999-08-31

    The purpose of this analysis is to document the Quality Assurance (QA) classification of the Monitored Geologic Repository (MGR) safeguards and security system structures, systems and components (SSCs) performed by the MGR Safety Assurance Department. This analysis also provides the basis for revision of YMP/90-55Q, Q-List (YMP 1998). The Q-List identifies those MGR SSCs subject to the requirements of DOE/RW-0333P, ''Quality Assurance Requirements and Description'' (QARD) (DOE 1998).

  15. Measurement-Based Evaluation of Installed Filtration System Performance in Single-Family Homes

    SciTech Connect (OSTI)

    Chan, Wanyu Rengie; Singer, Brett C.

    2014-04-03

    This guide discusses important study design issues to consider when conducting an on-site evaluation of filtration system performance. The two most important dichotomies to consider in developing a study protocol are (1) whether systems are being evaluated in occupied or unoccupied homes and (2) whether different systems are being compared in the same homes or if the comparison is between systems installed in different homes. This document provides perspective and recommendations about a suite of implementation issues including the choice of particle measurement devices, selection of sampling locations, ways to control and/or monitor factors and processes that can impact particle concentrations, and data analysis approaches.

  16. AMI System Security Requirements - v1_01-1 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AMI System Security Requirements - v1_01-1 AMI System Security Requirements - v1_01-1 This document provides the utility industry and vendors with a set of security requirements for Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the procurement process, and represent a superset of requirements gathered from current cross industry accepted security standards and best practice guidance documents. AMI System Security Requirements - v1_01-1 (825.11 KB) More

  17. Home Energy Score API User: CakeSystems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CakeSystems Home Energy Score API User: CakeSystems CakeSystems is a platform that helps efficiency programs, professionals, and homeowners implement scoring tools to help move the market forward. CakeSystems uses a flexible data collection platform to gather the data necessary for a Home Energy Score and incorporates that into other workflows for creating proposals, program tracking, and homeowner engagement. The information also populates in an offline mobile app, available for Android and iOS

  18. Building America Best Practices Series, Volume 6: High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems

    SciTech Connect (OSTI)

    Baechler, Michael C.; Gilbride, Theresa L.; Ruiz, Kathleen A.; Steward, Heidi E.; Love, Pat M.

    2007-06-04

    This guide is was written by PNNL for the US Department of Energy's Building America program to provide information for residential production builders interested in building near zero energy homes. The guide provides indepth descriptions of various roof-top photovoltaic power generating systems for homes. The guide also provides extensive information on various designs of solar thermal water heating systems for homes. The guide also provides construction company owners and managers with an understanding of how solar technologies can be added to their homes in a way that is cost effective, practical, and marketable. Twelve case studies provide examples of production builders across the United States who are building energy-efficient homes with photovoltaic or solar water heating systems.

  19. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  20. High-end Home Firewalls CIAC-2326

    SciTech Connect (OSTI)

    Orvis, W

    2003-10-08

    Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managers have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.

  1. SunShot Installs Solar Energy System on Local Habitat for Humanity Home |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SunShot Installs Solar Energy System on Local Habitat for Humanity Home SunShot Installs Solar Energy System on Local Habitat for Humanity Home September 22, 2014 - 5:10pm Addthis 1 of 10 SunShot Initiative team members install a solar energy system on a Habitat for Humanity home in Washington, D.C. on Friday, September 19. The project was organized by GRID Alternatives, the nation's largest solar non-profit organization, as part of a two-day event to bring solar power

  2. July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commercial Facilities | Department of Energy July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and Commercial Facilities July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and Commercial Facilities July 12, 2013 - 10:40am Addthis On Wednesday, July 17 from 2 - 3 p.m. ET, Clean Energy States Alliance will host a webinar on resilient solar-storage systems for homes and commercial facilities. The webinar will be introduced by Dr. Imre Gyuk, Energy Storage Program

  3. Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Improvement Catalyst (HI-Cat) Home Improvement Catalyst (HI-Cat) The Home Improvement Catalyst (HI-Cat) is a new DOE initiative focused on high impact opportunities to achieve energy savings in home improvements already planned or being undertaken by homeowners. The home improvement market represents $150 billion in annual investment, with over 14 million projects that involve replacement or upgrades of heating and cooling systems, windows, siding and roofs, insulation and other measures.

  4. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Cybersecurity Programs Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering to protect cyber systems from malicious attacks Cyber worker inspecting supercomputer Protecting cyberspace An expert team, passionate about defending the nation's critical infrastructure Computer Annex "The cyber threat to our nation is one of the most serious

  5. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect (OSTI)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  6. Intelligent Facial Recognition Systems: Technology advancements for security applications

    SciTech Connect (OSTI)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  7. Building America Top Innovations 2013 Profile – HPXML: A Standardized Home Performance Data Sharing System

    SciTech Connect (OSTI)

    none,

    2013-09-01

    This Top Innovation profile describes the Standard for Home Performance-Related Data Transfer (known as HPXML), developed by the National Renewable Energy Laboratory, which facilitates smooth communication between program tracking systems and energy upgrade analysis software,

  8. A Summary of Control System Security Standards Activities in the Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sector (October 2005) | Department of Energy A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of

  9. Wake Imaging Measurement System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Imaging Measurement System - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear ...

  10. PV distribution system

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    distribution system - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & ...

  11. Capacity Utilization Study for Aviation Security Cargo Inspection Queuing System

    SciTech Connect (OSTI)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E; Brumback, Daryl L

    2010-01-01

    In this paper, we conduct performance evaluation study for an aviation security cargo inspection queuing system for material flow and accountability. The queuing model employed in our study is based on discrete-event simulation and processes various types of cargo simultaneously. Onsite measurements are collected in an airport facility to validate the queuing model. The overall performance of the aviation security cargo inspection system is computed, analyzed, and optimized for the different system dynamics. Various performance measures are considered such as system capacity, residual capacity, throughput, capacity utilization, subscribed capacity utilization, resources capacity utilization, subscribed resources capacity utilization, and number of cargo pieces (or pallets) in the different queues. These metrics are performance indicators of the system s ability to service current needs and response capacity to additional requests. We studied and analyzed different scenarios by changing various model parameters such as number of pieces per pallet, number of TSA inspectors and ATS personnel, number of forklifts, number of explosives trace detection (ETD) and explosives detection system (EDS) inspection machines, inspection modality distribution, alarm rate, and cargo closeout time. The increased physical understanding resulting from execution of the queuing model utilizing these vetted performance measures should reduce the overall cost and shipping delays associated with new inspection requirements.

  12. Measured heating system efficiency retrofits in eight manufactured (HUD-code) homes

    SciTech Connect (OSTI)

    Siegel, J.; Davis, B.; Francisco, P.; Palmiter, L.

    1998-07-01

    This report presents the results of field measurements of heating efficiency performed on eight all-electric manufactured homes sited in the Pacific Northwest with forced-air distribution systems. These homes, like more than four million existing manufactured homes in the US, were constructed to thermal specifications that were mandated by the US Department of Housing and Urban Development in 1976. The test protocol compares real-time measurements of furnace energy usage with energy usage during periods when zonal heaters heat the homes to the same internal temperature. By alternating between the furnace and zonal heaters on 2 hour cycles, a short-term coheat test is performed. Additional measurements, including blower door and duct tightness tests, are conducted to measure and characterize the home's tightness and duct leakage so that coheat test results might be linked to other measures of building performance. The testing was done at each home before and after an extensive duct sealing retrofit was performed. The average pre-retrofit system efficiency for these homes was 69%. After the retrofit, the average system efficiency increased to 83%. The average simple payback period for the retrofits ranges from 1 to 5 years in Western Oregon and 1 to 3 years in colder Eastern Oregon.

  13. Recommended Practice for Securing Control System Modems | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    KB) More Documents & Publications Intermediate SCADA Security Training Course Slides (September 2006) Introduction SCADA Security for Managers and Operators Mitigations for ...

  14. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; leo, R.; Perman, K.

    2013-08-26

    This is the final report of Phase 2 of the Secure Power Systems Professional project, a 3 phase project. DOE will post to their website upon release.

  15. National SCADA Test Bed - Enhancing control systems security in the energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    sector (September 2009) | Department of Energy SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA)

  16. Initial CTBT international monitoring system security findings and recommendations

    SciTech Connect (OSTI)

    Craft, R.L.; Draelos, T.J.

    1996-08-01

    An initial security evaluation of the proposed International Monitoring System (IMS) suggests safeguards at various points in the IMS to provide reliable information to the user community. Modeling the IMS as a network of information processing nodes provides a suitable architecture for assessing data surety needs of the system. The recommendations in this paper include the use of public-key authentication for data from monitoring stations and for commands issued to monitoring stations. Other monitoring station safeguards include tamper protection of sensor subsystems, preservation of data (i.e. short-term archival), and limiting the station`s network services. The recommendations for NDCs focus on the need to provide a backup to the IDC for data archival and data routing. Safeguards suggested for the IDC center on issues of reliability. The production of event bulletins should employ {open_quotes}two-man{close_quotes} procedures. As long as the data maintains its integrity, event bulletins can be produced by NDCs as well. The effective use of data authentication requires a sound key management system. Key management systems must be developed for the authentication of data, commands, and event bulletins if necessary. It is recommended that the trust placed in key management be distributed among multiple parties. The recommendations found in this paper offer safeguards for identified vulnerabilities in the IMS with regard to data surety. However, several outstanding security issues still exist. These issues include the need to formalize and obtain a consensus on a threat model and a trust model for the IMS. The final outstanding security issue that requires in-depth analysis concerns the IDC as a potential single point of failure in the current IMS design.

  17. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  18. Y-12 Deploys First Automated Security Weapons System in the DOE Nuclear

    National Nuclear Security Administration (NNSA)

    Weapons Complex | National Nuclear Security Administration | (NNSA) Deploys First Automated Security Weapons System in the DOE Nuclear Weapons Complex September 02, 2005 PDF icon NR09-05.pdf

  19. Roadmap to Secure Control Systems in the Energy Sector- January 2006

    Office of Energy Efficiency and Renewable Energy (EERE)

    This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented...

  20. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  1. Microsoft Word - AMI System Security Requirements - v1_01-1.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents.

  2. Cost/benefit analysis for video security systems

    SciTech Connect (OSTI)

    1997-01-01

    Dr. Don Hush and Scott Chapman, in conjunction with the Electrical and Computer Engineering Department of the University of New Mexico (UNM), have been contracted by Los Alamos National Laboratories to perform research in the area of high security video analysis. The first phase of this research, presented in this report, is a cost/benefit analysis of various approaches to the problem in question. This discussion begins with a description of three architectures that have been used as solutions to the problem of high security surveillance. An overview of the relative merits and weaknesses of each of the proposed systems is included. These descriptions are followed directly by a discussion of the criteria chosen in evaluating the systems and the techniques used to perform the comparisons. The results are then given in graphical and tabular form, and their implications discussed. The project to this point has involved assessing hardware and software issues in image acquisition, processing and change detection. Future work is to leave these questions behind to consider the issues of change analysis - particularly the detection of human motion - and alarm decision criteria. The criteria for analysis in this report include: cost; speed; tradeoff issues in moving primative operations from software to hardware; real time operation considerations; change image resolution; and computational requirements.

  3. Control Systems Cyber Security: Defense-in-Depth Strategies

    SciTech Connect (OSTI)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  4. Lessons from a Home Inspection

    Broader source: Energy.gov [DOE]

    Maintenance tips from a home inspector to keep the systems and appliances in your home running efficiently.

  5. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  6. T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability

    Broader source: Energy.gov [DOE]

    Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity networking solution.

  7. DOE CHALLENGE HOME and PHIUS PARTNER TO MAKE IT EASIER TO REACH

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CHALLENGE HOME and PHIUS PARTNER TO MAKE IT EASIER TO REACH NEW LEVELS OF ZERO NET-ENERGY READY This partnership between DOE and PHIUS enhances coordination between voluntary peak performance new home label programs to expedite market transformation to net-zero ready homes that are so energy efficient that small renewable energy systems can offset most or all annual energy consumption. Net-zero ready homes can help address climate change, economic, and energy security issues. By working

  8. Home Energy Score Sample Report

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADDRESS HOME SIZE YEAR BUILT AIR CONDITIONING Home Energy Score Score Home Facts Recommendations The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home's structure and heating, cooling, and hot water systems. The Home Facts provide details about the current structure and systems. Recommendations show how to improve the energy efficiency of the home to achieve a higher score and save money.

  9. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect (OSTI)

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  10. Modeling and simulation for cyber-physical system security research, development and applications.

    SciTech Connect (OSTI)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  11. Planning a Home Solar Electric System | Department of Energy

    Office of Environmental Management (EM)

    Thus, PV systems function most efficiently in the southwestern United States, which receives the greatest amount of solar energy. Before you buy a PV system, you will want to be ...

  12. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Cyber Security Audit and Attack Detection Toolkit project developed two commercial solutions-Bandolier and Portaledge. The Bandolier Audit Files enable energy sector asset ...

  13. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  14. BETTER DUCT SYSTEMS FOR HOME HEATING AND COOLING.

    SciTech Connect (OSTI)

    ANDREWS,J.

    2001-01-01

    This is a series of six guides intended to provide a working knowledge of residential heating and cooling duct systems, an understanding of the major issues concerning efficiency, comfort, health, and safety, and practical tips on installation and repair of duct systems. These guides are intended for use by contractors, system designers, advanced technicians, and other HVAC professionals. The first two guides are also intended to be accessible to the general reader.

  15. Planning for Home Renewable Energy Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to gain the inspector's approval if you or your installer follow the National Electrical Code (NEC); install pre-engineered, packaged systems; properly brief the inspector on your...

  16. Effects of Home Energy Management Systems on Distribution Utilities...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... For operational management to support the distribution system, the utility's consumers (e.g., homeowners) need to be provided financial incentives. Historically, demand-response ...

  17. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was selected from the list of standards identified

  18. TRACC Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages

    TRACC Home About TRACC Transportation Research Computing Resources Training & Workshops image image image image image image image image Previous Next Welcome To The Transportation Research And Analysis Computing Center (TRACC) Chartered in 1946 as the nation's first national laboratory, Argonne enters the 21st century focused on solving the major scientific and engineering challenges of our time: sustainable energy, a clean environment, economic competitiveness and national security. Argonne

  19. A Fuzzy-Logic Subsumption Controller for Home Energy Management Systems

    SciTech Connect (OSTI)

    Ainstworth, Nathan; Johnson, Brian; Lundstrom, Blake

    2015-10-05

    Presentation for NAPS 2015 associated with conference publication CP-64392. Home Energy Management Systems (HEMS) are controllers that manage and coordinate the generation, storage, and loads in a home. These controllers are increasingly necessary to ensure that increasing penetrations of distributed energy resources are used effectively and do not disrupt the operation of the grid. In this paper, we propose a novel approach to HEMS design based on behavioral control methods, which do not require accurate models or predictions and are very responsive to changing conditions.

  20. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  1. Estimated costs of ventilation systems complying with the HUD ventilation standard for manufactured homes

    SciTech Connect (OSTI)

    Miller, J.D.; Conner, C.C.

    1993-11-01

    At the request of the US Department of Housing and Urban Development (HUD), the Pacific Northwest Laboratory estimated the material, labor, and operating costs for ventilation equipment needed for compliance with HUD`s proposed revision to the ventilation standard for manufactured housing. This was intended to bound the financial impacts of the ventilation standard revision. Researchers evaluated five possible prototype ventilation systems that met the proposed ventilation requirements. Of those five, two systems were determined to be the most likely used by housing manufacturers: System 1 combines a fresh air duct with the existing central forced-air system to supply and circulate fresh air to conditioned spaces. System 2 uses a separate exhaust fan to remove air from the manufactured home. The estimated material and labor costs for these two systems range from $200 to $300 per home. Annual operating costs for the two ventilation systems were estimated for 20 US cities. The estimated operating costs for System 1 ranged from $55/year in Las Vegas, Nevada, to $83/year in Bismarck, North Dakota. Operating costs for System 2 ranged from a low of $35/year in Las Vegas to $63/year in Bismarck. Thus, HUD`s proposed increase in ventilation requirements will add less than $100/year to the energy cost of a manufactured home.

  2. Webinar: ENERGY STAR Hot Water Systems for High Performance Homes

    Broader source: Energy.gov [DOE]

    This presentation is from the Building America research team BA-PIRC webinar on September 30, 2011 providing informationprovide information about how to achieve energy savings from solar water heating, electric dedicated heat pump water heating, and gas tankless systems.

  3. Installing and Maintaining a Home Solar Electric System | Department...

    Energy Savers [EERE]

    ... (W) or kilowatts (kW). If possible, have the bids specify the system capacity in "AC Watts" (alternating current) under ... Also request an estimate of the amount of energy that the ...

  4. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Job Profiles

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.; Greitzer, Frank L.; Dalton, Angela C.; Pusey, Portia K.

    2015-03-01

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  5. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Individual and Team Performance Guidelines

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.; Greitzer, Frank L.; Dalton, Angela C.; Pusey, Portia K.

    2015-03-01

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  6. Foreign Affairs Information System (FAIS) Early Operational Capability (EOC) network security criteria

    SciTech Connect (OSTI)

    Not Available

    1988-09-12

    The Joint Center for Information Security Technology (JCIST) at Oak Ridge, Tennessee, under an interagency agreement between the Department of State (DOS) and the Department of Energy (DOE), has been tasked with the security certification testing of the Foreign Affairs Information system (FAIS) Early Operational Capability (EOC) software. The basis for this certification is the FAIS (EOC) Security Requirements Allocation (SRA) document. This document defines the security requirements for the FAIS EOC software. Security certification of the FAIS system is the responsibility of the Office of Information Systems Security, Bureau of Diplomatic Security (DS/ST/ISS). The overall FAIS EOC certification will be completed in two general steps. First, a test of a stand-alone FAIS EOC system against the SRA requirements which is currently in progress. Second is a test of all FAIS network system interfaces against the SRA requirements as expanded to adequately address the network security issues. This accumulation of requirements is referred to as the FAIS EOC Network Security Criteria. 5 refs.

  7. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  8. Technology Solutions Case Study: Selecting Ventilation Systems for Existing Homes

    SciTech Connect (OSTI)

    2014-12-01

    In multifamily buildings, particularly in the Northeast, exhaust ventilation strategies are the norm as a means of meeting both local exhaust and whole-unit mechanical ventilation rates. The issue of where the "fresh" air is coming from is gaining significance as air-tightness standards for enclosures become more stringent, and the normal leakage paths through the building envelope disappear. Researchers from the Consortium for Advanced Residential Buildings (CARB) found that the majority of high performance, new construction, multifamily housing in the Northeast use one of four general strategies for ventilation: continuous exhaust only with no designated supply or make-up air source, continuous exhaust with ducted make-up air to apartments, continuous exhaust with supply through a make-up air device integral to the unit HVAC, and continuous exhaust with supply through a passive inlet device, such as a trickle vent. Insufficient information is available to designers on how these various systems are best applied. In this project, the CARB team evaluated the four different strategies for providing make-up air to multifamily residential buildings and developed guidelines to help contractors and building owners choose the best ventilation systems.

  9. Linking home energy rating systems with energy efficiency financing: Progress on national and state programs

    SciTech Connect (OSTI)

    Farhar, B.C.; Collins, N.E.; Walsh, R.W.

    1996-10-01

    In 1991 and early 1992, the U.S. Department of Energy (DOE), in cooperation with the U.S. Department of Housing and Urban Development (HUD), established a National Collaborative on Home Energy Rating Systems (HERS) and Energy Efficient Mortgages (EEMs). The Collaborative's purpose was to involve stakeholders at a national policy level to develop a plan leading the nation toward a voluntary system linking HERS with EEMs. The National Renewable Energy Laboratory (NREL) coordinated the National Collaborative's meetings for DOE. Composed of representatives from 25 stakeholder organizations, the Collaborative, after some 14 meetings, reached consensus on two documents, both published by NREL in mg 1992: A National Program for Energy-Efficient Mortgages and Home Energy Rating Systems: A Blueprint for Action and Going National with HERS and EEMs: Issues and Impacts, The Collected Papers of the National Collaborative.

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy