Powered by Deep Web Technologies
Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

2

Department of Homeland Security Workshop  

Science Conference Proceedings (OSTI)

Homeland Security Modeling and Simulation Workshop. Purpose: This workshop is a joint effort of US Department of Homeland ...

2011-06-14T23:59:59.000Z

3

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

4

Homeland Security Presidential Directive 12  

NLE Websites -- All DOE Office Websites (Extended Search)

HSPD-12 Home HSPD-12 FAQs About the DOE HSPD-12 Badge HSPD-12 Reporting Metrics for OMB HSPD-12 Implementation Progress Guidance Related Links HSS Logo Homeland Security...

5

Homeland Security Programs/Projects for the Intelligent ...  

Science Conference Proceedings (OSTI)

Homeland Security Programs/Projects for the Intelligent Systems Division. Department of Homeland Security Urban Search ...

2011-12-23T23:59:59.000Z

6

NIST Testimony on Homeland Security Issues  

Science Conference Proceedings (OSTI)

NIST Testimony on Homeland Security Issues. 2012. 050912 Saunders House Testimony 050912 Saunders House Testimony ...

2010-10-05T23:59:59.000Z

7

Homeland Security Chemical/Biological/Radiological/Nuclear ...  

Science Conference Proceedings (OSTI)

... Information at NIST. Homeland Security Chemical/Biological/Radiological/ Nuclear/Explosives (CBRNE) Information at NIST. ...

2010-09-24T23:59:59.000Z

8

Homeland Security and Emergency Management Coordination (HSEMC...  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation...

9

Homeland Security Presidential Directive 7  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Homeland Security Presidential Directive/Hspd-7 3 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization, and Protection Purpose (1) This directive establishes a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks. Background (2) Terrorists seek to destroy, incapacitate, or exploit critical infrastructure and key resources across the United States to threaten national security, cause mass casualties, weaken our economy, and damage public morale and confidence. (3) America's open and technologically complex society includes a wide array of critical infrastructure

10

IT issues on homeland security and defense  

Science Conference Proceedings (OSTI)

This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. ... Keywords: and cyber threats, emergency readiness, homeland defense, homeland security, terror and disaster control

Kangbin Yim; Ilsun You

2011-08-01T23:59:59.000Z

11

Nonproliferation & Homeland Security Field Support | Global and...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Homeland Security Field Support Group provides radiological assistance to federal and state agencies under the DOE Radiological Assistance Program (RAP), field support for...

12

Homeland Security | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

13

A knowledge sharing framework for homeland security modeling and simulation  

Science Conference Proceedings (OSTI)

Modeling and simulation (M&S) tools and capabilities can enable understanding of the complex nature of systems in various homeland security domains. A coordinated effort across government, industry, and academia would advance capabilities in this important ...

Sanjay Jain; Charles W. Hutchings; Y. Tina Lee; Charles R. McLean

2010-12-01T23:59:59.000Z

14

Creative homeland security : imagining the next big solar storm.  

E-Print Network (OSTI)

??Creative Homeland Security: Imagining the next big solar storm aims to examine the use of creative practice within homeland security research. In this thesis, a (more)

Alfonso, Jonathan Rousseau

2012-01-01T23:59:59.000Z

15

Experts to Review Life-Saving Homeland Security Standards  

Science Conference Proceedings (OSTI)

Experts to Review Life-Saving Homeland Security Standards. For Immediate Release: September 27, 2007. ...

2013-12-12T23:59:59.000Z

16

U.S. Homeland Security R&D Budgets  

Science Conference Proceedings (OSTI)

The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

Halvorson, C S

2009-03-30T23:59:59.000Z

17

Homeland Security Issues for Facilities  

E-Print Network (OSTI)

The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure and systems. After assessments are complete, the results should be compared with guidelines and recommendations produced by government agencies or professional organizations. Areas to address to enhance security and safety include ventilation, control systems, air filtration, alarm systems, building access, and surveillance. This paper will look at the objectives of task forces, sources of information, and measures owners can take in schools and other facilities. Although actions involving increased awareness, structural reinforcement, and emergency water supplies are important, this discussion will focus on mechanical and security systems and related items. The authors' experiences in assisting Texas school districts will also be shared.

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

18

Homeland Security vs. the Madisonian Impulse: State Building and Anti-Statism after September 11  

E-Print Network (OSTI)

Homeland Security vs. the Madisonian Impulse: State Buildingstate pursue homeland security. Jay Stowsky is Adjunctcritics of US homeland security policy have consistently

Stowsky, Jay; Kroenig, Matthew

2005-01-01T23:59:59.000Z

19

Policies: Homeland Security Presidential Directive/Hspd-7  

Science Conference Proceedings (OSTI)

... appropriate systems, mechanisms, and procedures to share homeland security information relevant ... (a) commercial nuclear reactors for generating ...

20

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senate Homeland Security and Governmental Affairs Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Homeland Security and Emergency Management Coordination (HSEMC) Program |  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Homeland Security and Emergency Management Coordination (HSEMC) Program Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > Homeland Security and Emergency Management Coordination

22

ICE Press Office U.S. Department of Homeland Security  

E-Print Network (OSTI)

ICE Press Office U.S. Department of Homeland Security December 19, 2003 Contact: SEVP Fact Sheet) at (202) 353-3049. www.ice.gov #12;

Wisconsin at Madison, University of

23

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Homeland Security and Governmental Affairs Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia By: John Bashista, Deputy Director, Office of Procurement and Assistance Management, Office of Management Subject: Strengthening the Federal Acquisition Workforce: Government-wide Leadership and Initiatives 8-5-09_Final_Testimony_(Bashista).pdf More Documents & Publications Special Report: IG-RA-09-02 Before Senate Committee on Homeland Security and Governmental Affairs

24

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services, and International Security Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications Major Management Challenges and Program Risks : Department of Energy GAO/OCG-99-6 GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects

25

Recommended practices for homeland security modeling and simulation  

Science Conference Proceedings (OSTI)

This paper recommends practices for development and deployment of modeling, simulation, and analysis (MS&A) tools for homeland security applications. The proposed set of recommended practices applicable to any MS&A application includes: software engineering ...

Sanjay Jain; Charles R. McLean

2009-12-01T23:59:59.000Z

26

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network (OSTI)

This fact sheet describes Homeland Security issues that affect Texas and the nation. It includes an overview of some of the key water resource issues associated with preventing intentional contamination of water supplies served by small water systems.

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

27

The Engineer's Role in Homeland Security  

Science Conference Proceedings (OSTI)

... information security and critical infrastructure protection; Second, the safety of structures ... biological, radiological, nuclear, and explosive ...

2010-10-05T23:59:59.000Z

28

ORISE: California Homeland Security Exercise and Evaluation Program (HSEEP)  

NLE Websites -- All DOE Office Websites (Extended Search)

California Homeland Security Exercise and Evaluation Program (HSEEP) California Homeland Security Exercise and Evaluation Program (HSEEP) Training The Oak Ridge Institute for Science and Education (ORISE) and the California Governor's Office of Emergency Services) have revised the next generation Homeland Security Exercise and Evaluation Program (HSEEP) course to create a balance between learning exercise methodology and using Web-based toolkit activities to plan and develop exercises. The revised HSEEP training course is a four-day, interactive course with computer-based activities that maximize use of the HSEEP Toolkit. The course is focused on hands-on, toolkit activities that provide participants with valuable practice and training. The course also allows participants to use their own jurisdictional information to complete course activities,

29

Northwest Regional Technology Center, December 2012 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

of Homeland Security's Domestic Nuclear Detection Office's Operations Support Directorate supports state Security December 2012 The Northwest Regional Technology Center (NWRTC) is a virtual resource center, response, and recovery. The center enables homeland security solutions for emergency responder communities

30

The Department of Homeland Security Energy Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Homeland Security Homeland Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies conduct their environmental, transportation, and energy- related activities under the law in support of their respective missions in an environmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner." (Executive Order 13423, Section 1 - Policy) DHS Energy Program Overview Steven W. White, CEM May 2, 2007 3 Program Foundation  Comply with requirements of Laws, Regulations and Executive

31

Homeland Security Presidential Directive 12 - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

32

Homeland Security Presidential Directive 12 - Frequently Asked...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

33

Homeland Security Presidential Directive 12 - Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

34

Alternatives to 3He for Neutron Detection for Homeland Security  

Science Conference Proceedings (OSTI)

Neutron detection is an essential aspect of interdiction of radiological threats for national security purposes, since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons. Radiation portal monitoring systems, of which there are thousands deployed for homeland security and non-proliferation purposes, currently use 3He gas-filled proportional counters for detecting neutrons. Because of the high usage of 3He for neutron scattering science and national security, the supply has dwindled, and can no longer meet the demand. Consequently, a replacement technology for neutron detection is required in the very near future.

Kouzes, Richard T.; Conlin, Kenneth E.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

2010-08-11T23:59:59.000Z

35

Turning Ideas into Practice: How to Access Homeland Security R&D ...  

IBD-PO-10/01 Turning Ideas into Practice: How to Access Homeland Security R&D from Public Institutions September 16, 2003 Belinda Padilla Technology Commercialization ...

36

Before the House Subcommittee on Counterterrorism and Intelligence- Committee on Homeland Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Implications of Refinery Closures for U.S. Homeland Security and Critical Infrastructure Safety By: Howard Gruenspecht, Acting Administrator of the Energy Information Administration

37

Enhanced homeland security and disaster emergency operations based on biometrics and RFID  

Science Conference Proceedings (OSTI)

Methods that enhance homeland security and disaster emergency operations through biometrics and Radio Frequency Identification (RFID) were studied. Biometrics can be used in visas and e-passports for border security, identity verification at airports, ...

Lidong Wang

2012-07-01T23:59:59.000Z

38

A Survey of Operations Research Models and Applications in Homeland Security  

Science Conference Proceedings (OSTI)

Operations research has had a long and distinguished history of work in emergency preparedness and response, airline security, transportation of hazardous materials, and threat and vulnerability analysis. Since the attacks of September 11, 2001 and the ... Keywords: agencies, government, homeland security, planning

P. Daniel Wright; Matthew J. Liberatore; Robert L. Nydick

2006-11-01T23:59:59.000Z

39

Homeland security R&D roadmapping : risk-based methodological options.  

SciTech Connect

The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

Brandt, Larry D.

2008-12-01T23:59:59.000Z

40

HOMELAND SECURITY A Selected Bibliography U.S. ARMY WAR COLLEGE LIBRARY  

E-Print Network (OSTI)

This bibliography includes topics that reflect some of homeland security's many challenges: borders and immigration, cybersecurity, organization, policy, response capabilities, and resourcing. With certain exceptions, the materials in this bibliography are dated from 2006 to the present. For older materials, please see Homeland Security, compiled by Jeanette Moyer, May 2006. All items are available through the USAWC Library. For your convenience, we have added U.S. Army War College Library call numbers, Internet addresses, or database links at the end of each entry. Web sites were accessed March 2011. This bibliography and others compiled by our research librarians are available online through the Librarys home page at

Greta H. Andrusyszyn

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Homeland Security Presidential Directive 12 - DOE HSPD-12 Implementati...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

42

Analytical Chemistry for Homeland Defense and National Security  

SciTech Connect

The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

2002-08-18T23:59:59.000Z

43

Passive Neutron Detection in Ports for Homeland Security Applications  

E-Print Network (OSTI)

The smuggling of special nuclear material (SNM) has long been a concern. In April 2009, President Obama declared that a terrorist acquiring a nuclear weapon was the most immediate threat to global security. The Second Line of Defense (SLD) initiative was stood up by the National Nuclear Security Administration to deter, detect, and interdict illicit trafficking of nuclear and radioactive materials across international borders and maritime shipping. The SLD initiative does not provide for the detection of SNM being carried on small, personal watercraft. Previous work examined the possibility of using active neutron detectors to induce fission in SNM and detect the response. This thesis examines the possibility of detecting SNM using passive 3He neutron detectors. Monte Carlo N-Particle (MCNP) simulations were run to determine the best detector configuration. Detecting sources at increasing depths, detecting moving sources and the effects of waves were also simulated in MCNP. Comparisons with experimental measurements showed that detectors parallel to the surface of water were best at detecting neutron sources below the surface. Additionally, stacking detectors and placing a cadmium sheet between the polyethylene blocks resulted in a greater ability to determine the height of a source by taking the ratio of count rates in the lower and upper detectors. Using this configuration, a source of strength 3.39 x 10^5 n/s could be detected to a depth of 12.00 in below the water surface. Count rates in the presence of waves did not average out to count rates taken above a flat plane of water. Detectors closer to the water performed worse than above a flat plane while detectors placed higher recorded more counts than above a flat plane. Moving sources were also simulated; sources under water, 3.00 ft from the detectors, and moving at 5.8 kts could be detected above background.

Pedicini, Eowyn E

2013-05-01T23:59:59.000Z

44

Gregory H. Friedman: Provided for the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Governmental Affairs  

Energy.gov (U.S. Department of Energy (DOE))

Statement of Gregory H. Friedman Inspector General U.S. Department of Energy Before the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Governmental Affairs U.S. Senate

45

Fermilab | Science at Fermilab | Benefits to Society | Homeland...  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Homeland security Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and...

46

Process Control Systems in the Chemical Industry: Safety vs. Security  

Science Conference Proceedings (OSTI)

Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nations critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

Jeffrey Hahn; Thomas Anderson

2005-04-01T23:59:59.000Z

47

Improving the nuclear data base for non-proliferation and homeland security  

Science Conference Proceedings (OSTI)

Many of the technical advances in non-proliferation and homeland security require calculations of transport of neutrons and gamma-rays through materials. The nuclear data base on which these calculations are made must be of high quality in order for the calculated responses to be credible. At the Los Alamos Neutron Science Center, three spallation neutron sources are being used to provide high-quality cross section and structure data with reactions induced by neutrons. Neutron transmission, neutron-induced fission and capture cross sections, neutron emission in fission, and gamma-ray production by neutrons are principal areas of research. Furthermore, these sources are also being used to validate calculations of the characterization and response of new detectors and detection techniques. Current research activities are summarized here.

Haight, Robert C [Los Alamos National Laboratory; Bitteker, Leo J [Los Alamos National Laboratory; Couture, Aaron J [Los Alamos National Laboratory; Devlin, Matthew J [Los Alamos National Laboratory; Fotiadis, Nikolaos [Los Alamos National Laboratory; Gavron, Avigdor [Los Alamos National Laboratory; Hill, Tony S [Los Alamos National Laboratory; Laptev, Alexander B [Los Alamos National Laboratory; Nelson, Ronald O [Los Alamos National Laboratory; O'donnell, John M [Los Alamos National Laboratory; Taddeucci, Terry N [Los Alamos National Laboratory; Tovesson, Fredrik K [Los Alamos National Laboratory; Ulmann, John L [Los Alamos National Laboratory; Wender, Stephen A [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

48

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

49

Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications  

Science Conference Proceedings (OSTI)

Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

2009-06-17T23:59:59.000Z

50

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

51

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

52

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

53

SAMPLING AND MASS SPECTROMETRY APPROACHES FOR THE DETECTION OF DRUGS AND FOREIGN CONTAMINANTS IN BREATH FOR HOMELAND SECURITY APPLICATIONS  

Science Conference Proceedings (OSTI)

Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid phase microextraction (SPME) and identified using gas chromatography - mass spectrometry (GC-MS). Modifications to the sampling apparatus allowed for increased VOC collection efficiency, and reduced the time of sampling and analysis by over 25%. The VOCs are present in breath due to either endogenous production, or exposure to an external source through absorption, inhalation, or ingestion. Detection of these exogenous chemicals can provide information on the prior location and activities of the subject. Breath samples collected before and after exposure in a hardware store and nail salon were analyzed to investigate the prior location of a subject; breath samples collected before and after oral exposure to terpenes and terpenoid compounds, pseudoephedrine, and inhalation exposure to hexamine and other explosive related compounds were analyzed to investigate the prior activity of a subject. The elimination of such compounds from the body was also monitored. In application, this technique may provide an early warning system to identify persons of interest in the prevention and preemption stages of homeland security.

Martin, A N

2009-01-27T23:59:59.000Z

54

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

Science Conference Proceedings (OSTI)

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

55

Homeland Security Portal  

Science Conference Proceedings (OSTI)

... Biological/Radiological/Nuclear/Explosives (CBRNE); Critical Infrastructure Protection (CIP); Cybersecurity; National Construction Safety Team ...

2013-05-16T23:59:59.000Z

56

National Security Portfolio - Industrial Partnerships Office  

Giving animals in need a HOME. November 14, 2013. LLNL, Intel, Cray produce big data machine. ... for the Department of Energy's National Nuclear Security Administration

57

DOE and Industry Showcase New Control Systems Security Technologies at  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Development » Energy Delivery Systems Technology Development » Energy Delivery Systems Cybersecurity » Control Systems Security News Archive » DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy infrastructure from cyber attack on Tuesday through Thursday, March 23-25. Visit Booth #231 at the DistribuTECH 2010 Conference & Exhibition in Tampa, FL, to see first-hand demonstrations of several newly commercialized control systems security products-each developed through a

58

An input-output procedure for calculating economy-wide economic impacts in supply chains using homeland security consequence analysis tools.  

SciTech Connect

Sandia National Laboratories has developed several models to analyze potential consequences of homeland security incidents. Two of these models (the National Infrastructure Simulation and Analysis Center Agent-Based Laboratory for Economics, N-ABLE{trademark}, and Loki) simulate detailed facility- and product-level consequences of simulated disruptions to supply chains. Disruptions in supply chains are likely to reduce production of some commodities, which may reduce economic activity across many other types of supply chains throughout the national economy. The detailed nature of Sandia's models means that simulations are limited to specific supply chains in which detailed facility-level data has been collected, but policymakers are often concerned with the national-level economic impacts of supply-chain disruptions. A preliminary input-output methodology has been developed to estimate national-level economic impacts based upon the results of supply-chain-level simulations. This methodology overcomes two primary challenges. First, the methodology must be relatively simple to integrate successfully with existing models; it must be easily understood, easily applied to the supply-chain models without user intervention, and run quickly. The second challenge is more fundamental: the methodology must account for both upstream and downstream impacts that result from supply-chain disruptions. Input-output modeling typically estimates only upstream impacts, but shortages resulting from disruptions in many supply chains (for example, energy, communications, and chemicals) are likely to have large downstream impacts. In overcoming these challenges, the input-output methodology makes strong assumptions about technology and substitution. This paper concludes by applying the methodology to chemical supply chains.

Smith, Braeton J.; Vugrin, Eric D.; Loose, Verne W.; Warren, Drake E.; Vargas, Vanessa N.

2010-10-01T23:59:59.000Z

59

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

SciTech Connect

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

60

Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications  

SciTech Connect

When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data parameterizations on IMAAC/NARAC fate and transport predictions. A case study involving coastal sea breeze circulation patterns in the NYC region was used to investigate the sensitivity of atmospheric dispersion results on the source of three-dimensional wind field data.

Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

2010-04-26T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2002 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/09/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4451 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2002

62

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2006 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/13/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4455 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2006

63

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

3 3 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2003 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/10/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4452 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2003

64

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

8 8 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2008 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/15/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4457 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2008

65

Defense Office of Hearings & Appeals Decisions- Industrial Security  

NLE Websites -- All DOE Office Websites (Extended Search)

10 10 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2010 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/17/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4459 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2010

66

Fluid Mechanics and Homeland Security  

E-Print Network (OSTI)

. Exploring further, the user may wish to understand why, for example, plutonium is so strongly related reference system. If users click on plutonium, they receive a list of explanations of how nuclear power and plutonium are related, a list that includes the above explanation. #12;power. By clicking on plutonium

Settles, Gary S.

67

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

68

Guide to Industrial Control Systems (ICS) Security  

Science Conference Proceedings (OSTI)

... location for industries such as oil refineries, water and ... that could potentially affect oil and natural gas production, refinery operations, water ...

2013-05-13T23:59:59.000Z

69

Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event  

SciTech Connect

Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected information from across disciplines to outline where the state of knowledge on IND response is. In addition, the report looked at meetings that were held over the summer in various cities. The meetings were attended by both federal responders and local responders. The meetings explored issues regarding IND preparation and how to mitigate the effects of an IND detonation. Looking at the research and current preparation activity the report found that the state of knowledge in responding and communicating is a mixed bag. Some aspects of an IND attack are well understood, some are not, but much is left to synthesize. The effects of an IND would be devastating, yet much can be done to mitigate those effects through education, preparation, and research. A major gap in current knowledge is how to effectively communicate with the public before an attack. Little research on the effectiveness of public education has been done, but it is likely that educating the public about the effects of an IND and how to best protect oneself could save many lives.

A., B

2008-07-31T23:59:59.000Z

70

Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry  

SciTech Connect

This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

Akyol, Bora A.

2012-09-01T23:59:59.000Z

71

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

72

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

73

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

74

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

75

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

76

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

77

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

78

Public Safety and Security Information in MML  

Science Conference Proceedings (OSTI)

Public Safety and Security Information in MML. ... MML plays a key role in enhancing the nation's homeland security. Through ...

2010-10-05T23:59:59.000Z

79

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

80

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

JOM-e: The Role of Universities in Homeland Defense - TMS  

Science Conference Proceedings (OSTI)

Todd Stewart is director of the Program for International and Homeland Security at the Ohio State University (OSU). Jim Williams is dean of the College of...

82

Briefings on Physical Security of Electricity Substations  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

83

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and OMB have instituted laws, regulations, and directives that govern ... August 2004, Homeland Security Presidential Directive/Hspd-12 Subject ...

84

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

85

Active, Non-Intrusive Inspection Technologies for Homeland Defense  

SciTech Connect

Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

James L. Jones

2003-06-01T23:59:59.000Z

86

Development & expansion of an industrial control system security laboratory and an international research collaboration  

Science Conference Proceedings (OSTI)

In this paper, we describe the incremental building of a unique industrial control system laboratory designed to investigate security vulnerabilities and to support development of mitigating tools and techniques. The laboratory has been built over time ... Keywords: SCADA, critical infrastructure security, industrial control systems, test bed

Rayford B. Vaughn; Thomas Morris; Elena Sitnikova

2013-01-01T23:59:59.000Z

87

DOE and Industry Showcase New Control Systems Security Technologies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Technology Development Transmission Planning Smart Grid Energy Delivery Systems Cybersecurity Control Systems Security News Archive Control...

88

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

89

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

90

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS NEW YORK, NY  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

91

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS BOSTON, MA  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

92

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS DENVER, CO  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

93

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS HOUSTON, TX  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

94

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS TAMPA, FL  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

95

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS CHICAGO, IL  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

96

Environment/Health/Safety/Security (EHSS): Industrial Hygiene...  

NLE Websites -- All DOE Office Websites (Extended Search)

Industrial Hygiene Group IH Home Group Members Organization Chart Programs & Databases Who to Call Industrial Hygiene Group Committed to keeping workers, their families and the...

97

Final Version of Industrial Control Systems Security Guide ...  

Science Conference Proceedings (OSTI)

... Stouffer recommends using the new guide along with Guidelines for Smart Grid Cyber Security (NISTIR 7628), which NIST issued last September ...

2011-06-21T23:59:59.000Z

98

Homeland Security/Forensics/Human Identity News  

Science Conference Proceedings (OSTI)

... Humans spend greater than 90 percent of their time indoors, but we ... Experts Recommend Measures to Reduce Human Error in Fingerprint Analysis ...

2010-12-01T23:59:59.000Z

99

Bioscience & Health Homeland Security/Forensics/Human ...  

Science Conference Proceedings (OSTI)

... vehicle Experts Recommend Measures to Reduce Human Error in Fingerprint Analysis. 13DO003_oles_fingerprintmap_CS ...

2013-05-02T23:59:59.000Z

100

Homeland Security and Disaster Resilience News  

Science Conference Proceedings (OSTI)

... Over 46 million residential structures in the United ... Wind conditions at a fire scene can ... collected data following Joplin, Missouri, tornado Release ...

2010-05-24T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Homeland Security Applications (Sensors and Instrumentation and...  

NLE Websites -- All DOE Office Websites (Extended Search)

plume at 60 m from a liquid nitrogen dewar for initial testing, and the other with a propane leak from a 50-L cylinder at 720 m from the radar. Because of condensation, the cold...

102

Department of Homeland Security Transition Team  

Science Conference Proceedings (OSTI)

... Detection technologies Wide-area surveillance Ballast water verification Page 16. 16 An effective deterrent against CBRN threats ...

103

Compact Neutron Generators for Medical Home Land Security and Planetary Exploration  

E-Print Network (OSTI)

GENERATORS FOR MEDICAL, HOME LAND SECURITY AND PLANETARYdetection schemes, from home-land security applications[4-6

Reijonen, J.

2005-01-01T23:59:59.000Z

104

A cyber-physical experimentation environment for the security analysis of networked industrial control systems  

Science Conference Proceedings (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these ...

BLa Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-09-01T23:59:59.000Z

105

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee...

106

Environment/Health/Safety/Security (EHSS): Industrial Hygiene...  

NLE Websites -- All DOE Office Websites (Extended Search)

Associate Construction Health Support Daniel Best Tel: 486-7246 Industrial Hygienist Welding Heat Stress Thermometer Exchange Chemical Management System EETD Rob Connelly Tel:...

107

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

108

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

109

Securing major investment in the UK timber processing industry  

E-Print Network (OSTI)

in Europe, securing hundreds of jobs and highlighting the role of forestry in regional economic development as `FSC certified' and its use of the largest known biomass heating boiler in the UK as part of the new. · Installation of a 50 mw biomass boiler for plant heating requirements. · Attract related businesses to the area

110

Mitigating security issues in the evolving DNA synthesis industry  

E-Print Network (OSTI)

DNA synthesis technologies are advancing at exponential rates, with production of ever longer, more complex, and less expensive sequences of double stranded DNA. This has fostered development of industrial scale design, ...

Turlington, Ralph Donald, III

2013-01-01T23:59:59.000Z

111

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

112

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

113

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Securitys Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPs current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

114

Industry Day and One-on-One Meetings | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Industry Day and One-on-One Meetings | National Nuclear Security Industry Day and One-on-One Meetings | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Industry Day and One-on-One Meetings Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

115

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

116

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

117

Safety and Security Issues in Electric Power Industry  

Science Conference Proceedings (OSTI)

The paper presents, the main types of hazards for personnel, equipment and electric power systems which should be taken into consideration in the design of computer-based systems applied in electric power industry, as well as threats to the systems from ...

Zdzislaw Zurakowski

2000-10-01T23:59:59.000Z

118

A Role for Industry in Promoting Nuclear Security and Nonproliferation  

SciTech Connect

Industry has a unique opportunity and critical role to play in strengthening governmental efforts to prevent the spread of nuclear, radiological, and dual-use materials and technologies that could be used in a nuclear or radiological weapon. Governmental regulations and policies are in effect at both the national and international levels to inhibit access to such materials and technologies by illegitimate end-users. However, the discovery of an illegal nuclear network, spearheaded by Pakistani scientist A Q Khan, increased international concern about what more could be done to prevent proliferation. Industry is well-poised and has a strong incentive to take a more proactive role to complement existing governmental efforts. Companies can be a tremendous help in ensuring that illicit diversions do not occur by increasing their oversight over the supply chain.

Hund, Gretchen; Seward, Amy M.; Elkhamri, Oksana O.

2009-11-01T23:59:59.000Z

119

A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry  

Science Conference Proceedings (OSTI)

The power industry faces the implementation of smart grids, which will introduce new information security threats to the power automation systems. The ability to appropriately prepare for, and respond to, information security incidents, is of utmost ... Keywords: Information security, incident respons, smart grids

Maria B. Line

2013-03-01T23:59:59.000Z

120

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Strontium Iodide Scintillator Detector - Industrial ...  

home \\ technologies \\ strontium iodide scintillator. Technologies: Ready-to-Sign Licenses: Software: ... Experience working with the Department of Homeland Security. 6.

122

Infrastructure Security and Energy Restoration (ISER) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

resiliency and survivability of key energy assets and critical energy infrastructure at home and abroad. We work with the Department of Homeland Security, the Federal Energy...

123

The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms  

E-Print Network (OSTI)

ABSTRACT The Effects Of Port Security Compliance On The Competitiveness Of European Union Maritime Industry Firms. (May 2013) Jonathan Stone Department of Maritime Administration Texas A&M University Research Advisor: Dr. Joan Mileski Department of Maritime Administration Prior research has addressed European Union (EU) water transportation policy and its impact on firm strategy. We extend this research by attempting to measure the effect of port security regulation compliance implementation on the perceived competitiveness of maritime firms located in European Union ports. We ask the question: Can firm specific implementation of required port security compliance enhance or hinder a firms competitive advantage? We use Resource-Based Strategic Theory as a framework for evaluating competitiveness. Resource based theory purports that assets and systems can give a firm a competitive advantage if they follow the VRIN criteria of Valuable, Rare, Inimitable, and Not easily substitutable. We ask via email and snail mail survey instrument whether certain security assets, resources and systems are VRIN and whether these assets, resources and systems give competitive advantage to the firm. The type of resources/assets/systems include physical assets such as fencing; ongoing management assets such as communication systems, planning and structuring management assets such as security planning systems; human assets such as employee knowledge; technological assets such as software protection; intangible assets such as a safety culture and financial assets such as cost savings from security compliance. We administer the instrument to all firms operating in EU ports in 2011-2012. A list of firms is obtained from IHSfairplay Ports and Terminals Guide. The results of the survey shows that most managers do not perceive a competitive advantage was gained in the way security assets/resources/management systems were implemented. However, a strong minority 34.12% of managers did perceive competitive advantage was gained from port security compliance where systems/assets/resources were not easily imitated or the I. Furthermore, managers perceive where they were located within the port as an important advantage to security and competitiveness.

Stone, Jonathan Taylor

2013-05-01T23:59:59.000Z

124

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA Briefings on Physical Security of Electricity Substations The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations. The session for FEMA Region IX will be held in San Jose, CA and hosted by

125

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

126

Integration Of The Security Sub-Modules Elements In The Automotive Industry  

Science Conference Proceedings (OSTI)

This study is addressed to obtain a design methodology for integrated security sub-modules (constituting the suspension and steering modules) in the car manufacturing industry. The sub-modules are made up of a steel structure and anchorage elements (rubber-metal or plastic-metal), which undergo separate surface treatments to prevent corrosion. Afterwards, the elements are traditionally joined by means of adhesives and screws. This process involves a great number of stages, low quality union methods and generation of corrosion areas that shorten its useful life.This methodology provides automotive suppliers an additional added value and cost reduction, allowing them to increase its competitiveness in a sector that faces the transition from the traditional supply chain to a strategic value chain.

Gallego, C.; Fernandez, M.; Caires, A. S. [CIDAUT, Research and Development in Transport and Energy (Spain); Canibano, E. [CIDAUT, Research and Development in Transport and Energy (Spain); Escuela Universitaria Politecnica de Valladolid, Dpto. de Construcciones Arquitectonicas, Ingenieria del Terreno y Mecanica de los Medios Continuos y Teoria de Estructuras (Spain)

2007-05-17T23:59:59.000Z

127

Homeland Renewable Energy LLC | Open Energy Information  

Open Energy Info (EERE)

Homeland Renewable Energy LLC Homeland Renewable Energy LLC Jump to: navigation, search Name Homeland Renewable Energy LLC Place Langhorne, Pennsylvania Zip 19047 Product Holding company for Fibrowatt LLC and its subsidiaries, which develop poultry litter-fuelled power plants in the US. Coordinates 40.176396°, -74.918884° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.176396,"lon":-74.918884,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

128

William Rees appointed to new Global Security leadership position...  

NLE Websites -- All DOE Office Websites (Extended Search)

the importance of the Lab's work in key program areas, including non-proliferation, intelligence support, defense, nuclear counterterrorism, and homeland security. June 16, 2009...

129

Summary of the 2013 EPRI/NATF Industry Summit on Physical Security of Transmission Assets  

Science Conference Proceedings (OSTI)

Compromises to power system physical security can cause long-term outages, which can adversely impact the economy, the environment, public safety, and national security. Such compromises could cost utilities, and ultimately society, billions of dollars. Recent physical security incidents have heightened awareness of the need for greater emphasis on the physical security of substations and transmission facilities. To begin a collaborative process of addressing physical security threats, EPRI and the ...

2013-11-26T23:59:59.000Z

130

A Secure Web Service for Electricity Prepayment Vending in South Africa: A Case Study and Industry Specification  

Science Conference Proceedings (OSTI)

Current standardised offline vending systems play a critical role in supporting electricity prepayment-metering infrastructure by enabling convenient access to point of sales for customers to purchase prepaid electricity tokens. Electricity utilities ... Keywords: Electricity Vending, Interoperability, Industry specification, Client-server, Prepayment, Secure Socket layer, Web Service

K. P. Subramoney; G. P. Hancke

2007-05-01T23:59:59.000Z

131

Nuclear and solar energy implications for homeland security .  

E-Print Network (OSTI)

??In the eyes of many experts, the world is moving away from oil as a cheap energy source. As this future unfolds, the United States (more)

Thibeaux, Allen L.

2008-01-01T23:59:59.000Z

132

HSO Spotlight No 02 2012 Homeland Security Presidential Directive...  

NLE Websites -- All DOE Office Websites (Extended Search)

and those badges will need to be renewed. Appointment of HSPD-12 Renewal Officials: Each HQ element needs to assign Federal personnel within their organization as USAccess...

133

Preliminary Benchmarking Efforts and MCNP Simulation Results for Homeland Security  

Science Conference Proceedings (OSTI)

MC Calculations / Special Issue on the 11th International Conference on Radiation Shielding and the 15th Topical Meeting of the Radiation Protection and Shielding Division (PART 3) / Radiation Measurements and Instrumentation

Robert B. Hayes

134

Policies: Homeland Security Presidential Directive/Hspd-7  

Science Conference Proceedings (OSTI)

... Routine database systems. ... 208, OMB will rely on the CIO Council to ... of the privacy impact assessment by the Chief Information Officer, or equivalent ...

135

Prepared for the Department of Homeland Security Science and  

E-Print Network (OSTI)

NIDSTM ANP Technologies/Sm iths Detection http://www.smithsdetection.com/NIDS.php Immunoassay and reader ....................................................................................4.15 Smiths Detection: NIDSTM (Developed by ANP Technologies

136

Before the Senate Homeland Security and Governmental Affairs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the Sustainable Federal Government Executive Order More Documents & Publications Data Center Optimization Plan Before the House Subcommittees on Oversight and Energy -...

137

Department of Homeland Security Urban Search and Rescue ...  

Science Conference Proceedings (OSTI)

... Response Robot Evaluation Exercise (#7) Disaster City, Texas A&M University College Station, TX November 14 - 18, 2011 November 18, 2011 ...

2013-08-17T23:59:59.000Z

138

Directionally Sensitive Neutron Detector For Homeland Security Applications  

E-Print Network (OSTI)

With an increase in the capabilities and sophistication of terrorist networks worldwide comes a corresponding increase in the probability of a radiological or nuclear device being detonated within the borders of the United States. One method to decrease the risk associated with this threat is to interdict the material during transport into the US. Current RPMS have limitations in their ability to detect shielded nuclear materials. It was proposed that directionally sensitive neutron detectors might be able to overcome many of these limitations. This thesis presents a method to create a directionally sensitive neutron detector using a unique characteristic of 10B. This characteristic is the Doppler broadening of the de-excitation gamma-ray from the 10B(n, alpha) reaction. Using conservation principles and the method of cone superposition, the mathematics for determining the incoming neutron direction vector from counts in a boron loaded cloud chamber and boron loaded semiconductor were derived. An external routine for MCNPX was developed to calculate the Doppler broaden de-excitation gamma-rays. The calculated spectrum of Doppler broadened de-excitation gamma-rays was then compared to measured and analytical spectrums and matched with a high degree of accuracy. MCNPX simulations were performed for both a prototype 10B loaded cloud chamber and prototype 10B loaded semiconductor detector. These simulations assessed the detectors' abilities to determine incoming neutron direction vectors using simulated particle reactant data. A sensitivity analysis was also performed by modifying the energy and direction vector of the simulated output data for 7Li* particles. Deviation coefficients showed a respective angular uncertainty of 1.86 degrees and 6.07 degrees for the boron loaded cloud chamber and a boron loaded semiconductor detectors. These capabilities were used to propose a possible RPM design that could be implemented.

Spence, Grant

2011-12-01T23:59:59.000Z

139

Homeland Security Presidential Directive HSPD-7 (December 17, 2003)  

Energy.gov (U.S. Department of Energy (DOE))

This directive establishes a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from...

140

FOIA Post from CSRC -- Guidance on Homeland Security Info. ...  

Science Conference Proceedings (OSTI)

... of our nation or threaten public safety. ... the protection of sensitive critical infrastructure information. ... if the information concerns nuclear or radiological ...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Department of Homeland Security, Science and Technology Directorate...  

NLE Websites -- All DOE Office Websites (Extended Search)

kWh kilowatt-hour kWm 2 kilowatts per square meter LCC life cycle cost LED light-emitting diode Li lithium Li-air lithium-air LiFePO4 lithium iron phosphate Li-ion lithium-ion...

142

Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms  

Science Conference Proceedings (OSTI)

A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination.

Burns, Kimberly A.

2008-01-01T23:59:59.000Z

143

Homeland Security/Forensics/Human Identity Programs and ...  

Science Conference Proceedings (OSTI)

... Digital PCR Last Updated Date: 04/26/2013 Digital PCR (dPCR) is a method used to quantify nucleic acids (DNA, RNA, cDNA). ...

2010-12-01T23:59:59.000Z

144

Department of Homeland Security Urban Search and Rescue ...  

Science Conference Proceedings (OSTI)

... and Technology (NIST) to develop comprehensive standards related to the development, testing, and certification of effective technologies for ...

2013-05-30T23:59:59.000Z

145

JOM-e: Issues and Opportunities in Homeland Security  

Science Conference Proceedings (OSTI)

A grand challenge for such an effort would be to develop technologies to allow people to live independently ten years longer. The application of technology to...

146

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

147

Securing the metal recycling chain for the steel industry by detecting orphan radioactive sources in scrap metal  

SciTech Connect

Experimental tests are reported for the detection of the heavy metal shielding of orphan sources hidden inside scrap metal by using a recently developed muon tomography system. Shielded sources do not trigger alarm in radiation portal commonly employed at the entrance of steel industry using scrap metal. Future systems integrating radiation portals with muon tomography inspection gates will substantially reduce the possibility of accidental melting of radioactive sources securing the use of recycled metal.

Pesente, S.; Benettoni, M.; Checchia, P.; Conti, E.; Gonella, F.; Nebbia, G. [INFN Sezione di Padova, via Marzolo 8, 35131 Padova Italy (Italy); Vanini, S.; Viesti, G.; Zumerle, G. [INFN Sezione di Padova, via Marzolo 8, 35131 Padova Italy (Italy); University of Padova and INFN Sezione di Padova, via Marzolo 8, 35131 Padova Italy (Italy); Bonomi, G.; Zenoni, A. [University of Brescia, via Branze 38, 25123 Brescia and INFN Sezione di Pavia, via Bassi 6, 27100 Pavia (Italy); Calvini, P.; Squarcia, S. [University of Genova and INFN Sezione di Genova, via Dodecaneso 33, 16146 Genova (Italy)

2010-08-04T23:59:59.000Z

148

Best Practices for the Security of Radioactive Materials  

Science Conference Proceedings (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

149

No More Secrets: National Security S t r a t e g i e s  

E-Print Network (OSTI)

Macmillan series, Initiatives in Strategic Studies: Issues and Policies. He joined NPS in 1990 after, Contemporary Security Policy, Defense Analysis, Harvard International Review, Homeland Security Affairs, Intelligence and National Security, International Journal of Intelligence and Counterintelligence

Acton, Scott

150

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

151

Industry  

E-Print Network (OSTI)

from refrigeration equipment used in industrial processesfrom refrigeration equipment used in industrial processesfrom refrigeration equipment used in industrial processes

Bernstein, Lenny

2008-01-01T23:59:59.000Z

152

Department of Energy Launches Initiative with Industry to Better Protect  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Initiative with Industry to Better Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats Department of Energy Launches Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats January 5, 2012 - 12:20pm Addthis Washington, D.C. - As part of the Obama Administration's efforts to enhance the security and reliability of the nation's electrical grid, U.S. Energy Secretary Steven Chu today announced an initiative to further protect the electrical grid from cyber attacks. The "Electric Sector Cybersecurity Risk Management Maturity" project, a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS), will leverage the insight of private industry and public sector experts to build on existing cybersecurity measures and

153

Environmental Security and Restoration [EVS Program Area]  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Security and Restoration Environmental Security and Restoration EVS focuses on environmental and human health aspects of homeland and national security, as well as restoration of sites contaminated with hazardous materials. Contamination in our environment - in air, water, and soil - contributes to health problems and affects the quality of our lives. The EVS Division confronts this challenge by addressing environmental and human health aspects of homeland and national security and by characterizing and restoring sites contaminated with hazardous materials. We integrate extensive expertise in engineering, health physics, hydrogeology, environmental science, chemistry, spatial analysis, database management, and computer programming to contribute to environmental security and restoration.

154

The Drinking Water Security and Safety Amendments of 2002: Is America's Drinking Water Infrastructure Safer Four Years Later?  

E-Print Network (OSTI)

NAT'L STRATEGY FOR HOME- LAND SECURITY, supra note 50, at 9.on Creating the Home- land Security Department, supra noteM. Merriam, Homeland Security Begins At Home: Local Planning

Shermer, Steven D.

2006-01-01T23:59:59.000Z

155

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

156

Industry  

E-Print Network (OSTI)

oxide emission reductions in industry in the EU. Europeanissues: Annual survey of industries. Central StatisticalDesiccated coconut industry of Sri- Lankas opportunities

Bernstein, Lenny

2008-01-01T23:59:59.000Z

157

Industry  

E-Print Network (OSTI)

the paper, glass or ceramics industry) making it difficulttechnology in the ceramic manufacturing industry. industries: iron and steel, non-ferrous metals, chemicals (including fertilisers), petroleum refining, minerals (cement, lime, glass and ceramics) and

Bernstein, Lenny

2008-01-01T23:59:59.000Z

158

Industry  

E-Print Network (OSTI)

in the iron and steel industry: a global model. Energy, 30,report of the world steel industry 2005. International Irontrends in the iron and steel industry. Energy Policy, 30,

Bernstein, Lenny

2008-01-01T23:59:59.000Z

159

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

160

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Industry  

E-Print Network (OSTI)

and power in US industry. Energy Policy, 29, pp. 1243-1254.Paris. IEA, 2004: Energy Policies of IEA Countries: Finlandand steel industry. Energy Policy, 30, pp. 827-838. Kim, Y.

Bernstein, Lenny

2008-01-01T23:59:59.000Z

162

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

163

Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system  

DOE Patents (OSTI)

A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

Chen, Yu-Gene T.

2013-04-16T23:59:59.000Z

164

The future of infrastructure security : a workshop held at Sandia National Laboratories.  

SciTech Connect

Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included ininfrastructure' problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions ofsecure and resilient' infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

2013-05-01T23:59:59.000Z

165

Industry  

NLE Websites -- All DOE Office Websites (Extended Search)

in an Appliance Industry Abstract This report provides a starting point for appliance energy efficiency policy to be informed by an understanding of: the baseline rate and...

166

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

167

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

168

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

169

Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

DOE Green Energy (OSTI)

For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

Durling, R L; Price, D E; Spero, K K

2005-06-06T23:59:59.000Z

170

Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

DOE Green Energy (OSTI)

For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented.

Durling, Jr., R L; Price, D E; Spero, K K

2005-01-03T23:59:59.000Z

171

Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management  

DOE Green Energy (OSTI)

The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

Durling, Jr., R L; Price, D E

2005-12-16T23:59:59.000Z

172

Industry  

NLE Websites -- All DOE Office Websites (Extended Search)

An Exploration of Innovation and An Exploration of Innovation and Energy Efficiency in an Appliance Industry Prepared by Margaret Taylor, K. Sydny Fujita, Larry Dale, and James McMahon For the European Council for an Energy Efficient Economy March 29, 2012 ERNEST ORLANDO LAWRENCE BERKELEY NATIONAL LABORATORY LBNL - 5689E An Exploration of Innovation and Energy Efficiency in an Appliance Industry Abstract This report provides a starting point for appliance energy efficiency policy to be informed by an understanding of: the baseline rate and direction of technological change of product industries; the factors that underlie the outcomes of innovation in these industries; and the ways the innovation system might respond to any given intervention. The report provides an overview of the dynamics of energy efficiency policy and innovation in the appliance

173

Industry  

E-Print Network (OSTI)

milling industry: An ENERGY STAR Guide for Energy and Plantcement mak- ing - An ENERGY STAR Guide for Energy and Plantre- fineries - An ENERGY STAR Guide for Energy and Plant

Bernstein, Lenny

2008-01-01T23:59:59.000Z

174

Securing Supervisory Control and Data Acquisition (SCADA) ...  

Science Conference Proceedings (OSTI)

... Acquisition (SCADA) and Industrial Control Systems (ICS) Linkage of Security and Safety in SCADA and Industrial Control Systems ...

2013-04-09T23:59:59.000Z

175

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

176

Industry  

Science Conference Proceedings (OSTI)

This chapter addresses past, ongoing, and short (to 2010) and medium-term (to 2030) future actions that can be taken to mitigate GHG emissions from the manufacturing and process industries. Globally, and in most countries, CO{sub 2} accounts for more than 90% of CO{sub 2}-eq GHG emissions from the industrial sector (Price et al., 2006; US EPA, 2006b). These CO{sub 2} emissions arise from three sources: (1) the use of fossil fuels for energy, either directly by industry for heat and power generation or indirectly in the generation of purchased electricity and steam; (2) non-energy uses of fossil fuels in chemical processing and metal smelting; and (3) non-fossil fuel sources, for example cement and lime manufacture. Industrial processes also emit other GHGs, e.g.: (1) Nitrous oxide (N{sub 2}O) is emitted as a byproduct of adipic acid, nitric acid and caprolactam production; (2) HFC-23 is emitted as a byproduct of HCFC-22 production, a refrigerant, and also used in fluoroplastics manufacture; (3) Perfluorocarbons (PFCs) are emitted as byproducts of aluminium smelting and in semiconductor manufacture; (4) Sulphur hexafluoride (SF{sub 6}) is emitted in the manufacture, use and, decommissioning of gas insulated electrical switchgear, during the production of flat screen panels and semiconductors, from magnesium die casting and other industrial applications; (5) Methane (CH{sub 4}) is emitted as a byproduct of some chemical processes; and (6) CH{sub 4} and N{sub 2}O can be emitted by food industry waste streams. Many GHG emission mitigation options have been developed for the industrial sector. They fall into three categories: operating procedures, sector-wide technologies and process-specific technologies. A sampling of these options is discussed in Sections 7.2-7.4. The short- and medium-term potential for and cost of all classes of options are discussed in Section 7.5, barriers to the application of these options are addressed in Section 7.6 and the implication of industrial mitigation for sustainable development is discussed in Section 7.7. Section 7.8 discusses the sector's vulnerability to climate change and options for adaptation. A number of policies have been designed either to encourage voluntary GHG emission reductions from the industrial sector or to mandate such reductions. Section 7.9 describes these policies and the experience gained to date. Co-benefits of reducing GHG emissions from the industrial sector are discussed in Section 7.10. Development of new technology is key to the cost-effective control of industrial GHG emissions. Section 7.11 discusses research, development, deployment and diffusion in the industrial sector and Section 7.12, the long-term (post-2030) technologies for GHG emissions reduction from the industrial sector. Section 7.13 summarizes gaps in knowledge.

Bernstein, Lenny; Roy, Joyashree; Delhotal, K. Casey; Harnisch, Jochen; Matsuhashi, Ryuji; Price, Lynn; Tanaka, Kanako; Worrell, Ernst; Yamba, Francis; Fengqi, Zhou; de la Rue du Can, Stephane; Gielen, Dolf; Joosen, Suzanne; Konar, Manaswita; Matysek, Anna; Miner, Reid; Okazaki, Teruo; Sanders, Johan; Sheinbaum Parado, Claudia

2007-12-01T23:59:59.000Z

177

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

178

Watch What I Do, Not What I Say: The Unintended Consequences of the Homeland Investment Act  

E-Print Network (OSTI)

This paper analyzes the impact on firm behavior of the Homeland Investment Act of 2004, which provided

Dhammika, Dharmapala

179

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

180

Secure Systems and Applications Group  

Science Conference Proceedings (OSTI)

... technologies, and on developing security solutions ... the earliest stages of technology development through proof ... industry, and to develop tests, test ...

2013-01-17T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

182

Industrial  

Gasoline and Diesel Fuel Update (EIA)

Industrial Industrial 8,870,422 44.3% Commercial 3,158,244 15.8% Electric Utilities 2,732,496 13.7% Residential 5,241,414 26.2% Source: Energy Information Administration (EIA), Form EIA-176, "Annual Report of Natural and Supplemental Gas Supply and Disposition." T e x a s L o u i s i a n a C a l i f o r n i a A l l O t h e r S t a t e s 0 1 2 3 4 5 0 30 60 90 120 Trillion Cubic Feet Industrial Billion Cubic Meters T e x a s C a l i f o r n i a F l o r i d a A l l O t h e r S t a t e s 0 1 2 3 4 5 0 30 60 90 120 Trillion Cubic Feet Electric Utilities Billion Cubic Meters N e w Y o r k C a l i f o r n i a I l l i n o i s A l l O t h e r S t a t e s 0 1 2 3 4 5 0 30 60 90 120 Trillion Cubic Feet Commercial Billion Cubic Meters I l l i n o i s C a l i f o r n i a N e w Y o r k A l l O t h e r S t a t e s 0 1 2 3 4 5 0 30 60 90 120 Trillion Cubic Feet Residential Billion Cubic Meters 11. Natural Gas Delivered to Consumers in the United States, 1996 Figure Volumes in Million Cubic Feet Energy Information Administration

183

The future of infrastructure security : a workshop held at Sandia National Laboratories.  

Science Conference Proceedings (OSTI)

Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included ininfrastructure' problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions ofsecure and resilient' infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

2013-05-01T23:59:59.000Z

184

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

185

2002 TMS Fall Meeting: Opportunities and Issues in Homeland ...  

Science Conference Proceedings (OSTI)

The National Nuclear Security Administration (NNSA) laboratories (Sandia, Los Alamos, and Lawrence Livermore National Laboratories) were scientific and...

186

Chapter_1_Physical_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

187

Nuclear Forensics | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Forensics | National Nuclear Security Administration Forensics | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Forensics Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Nuclear Forensics Nuclear Forensics Forensics Operations The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security

188

TEC Working Group Topic Groups Security  

Energy.gov (U.S. Department of Energy (DOE))

The Security Topic group is comprised of regulators, law enforcement officials, labor and industry representatives and other subject matter experts concerned with secure transport of spent nuclear...

189

Gas Pipeline Securities (Indiana) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pipeline Securities (Indiana) Gas Pipeline Securities (Indiana) Eligibility Utility Investor-Owned Utility Industrial MunicipalPublic Utility Rural Electric Cooperative Fuel...

190

Security of industrial sensor network-based remote substations in the context of the Internet of Things  

Science Conference Proceedings (OSTI)

The main objective of remote substations is to provide the central system with sensitive information from critical infrastructures, such as generation, distribution or transmission power systems. Wireless sensor networks have been recently applied in ... Keywords: Industrial Control Networks, Internet of Things, Supervisory Control and Data Acquisition (SCADA) Systems, The Internet, Wireless Sensor Networks

Cristina Alcaraz; Rodrigo Roman; Pablo Najera; Javier Lopez

2013-05-01T23:59:59.000Z

191

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

192

Applied Information Security, 1st edition  

Science Conference Proceedings (OSTI)

Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability ...

Randy Boyle

2009-07-01T23:59:59.000Z

193

How to prepare the National Guard's leadership for successful venture in homeland security .  

E-Print Network (OSTI)

??The National Guard (NG) will be the first military force on disaster scenes in the United States. If the NG is to respond as efficiently (more)

Amundson, Randy J.

2009-01-01T23:59:59.000Z

194

Northwest Regional Technology Center, October 2011 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

management system to be piloted in a Los Angeles exercise New guidance on nuclear and chemical response then be vetted in other interested cities and states in the Northwest Region. The final concept and procedure will help transition this technology for use nationwide. DHHS Issues Guidance on Nuclear and Chemical

195

Northwest Regional Technology Center, May 2011 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

national standards for disaster prepared- ness, response, and recovery systems. The county then documented by the Pacific Northwest National Laboratory (PNNL), to support regional preparedness, resiliency, response Program, allows emergency response agencies to engage with each other and leverage their collective

196

Before the Subcommittee on Financial and Contracting Oversight- Committee on Homeland Security and Governmental Affairs  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Overview of DOE Office of Environmental Management acquisitions and contract project management reforms By: J.E. "Jack" Surash, Deputy Assistant Secretary for Acquisition and Project Management

197

Current State of Commercial Radiation Detection Equipment for Homeland Security Applications  

Science Conference Proceedings (OSTI)

Detectors / Special Issue on the 11th International Conference on Radiation Shielding and the 15th Topical Meeting of the Radiation Protection and Shielding Division (Part 1) / Radiation Measurements and Instrumentation

Raymond T. Klann; Jason Shergur; Gary Mattesich

198

Northwest Regional Technology Center, November 2012 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

, operated by the Pacific Northwest National Laboratory (PNNL), to support regional preparedness, resiliency Responders to effectively counter a potential threat to our Nation. PNNL, in collaboration with DHS S. To better determine the requirements and needs of First Responders in a daily operational context, PNNL held

199

Northwest Regional Technology Center, May 2013 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

by the Pacific Northwest National Laboratory (PNNL), to support regional preparedness, resiliency, response Events Next-Generation Communications Inoperability Virtual Workshop PNNL hosted a Next including Lync, LiveWall and Twitter. The purpose of the workshop, organized by PNNL's Jon Barr, Jessica

200

DOE O 484.1 Admin Chg 1, Reimbursable Work for the Department of Homeland Security  

Directives, Delegations, and Requirements

The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of ...

2006-08-17T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Economics definitions, methods, models, and analysis procedures for Homeland Security applications.  

SciTech Connect

This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation&Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

2010-01-01T23:59:59.000Z

202

Agency interoperation for effective data mining in border control and homeland security applications  

Science Conference Proceedings (OSTI)

US Customs embarked on a major modernization initiative of its Information Technology systems. Drawing in data from Customs trade systems, targeting inspectors review manifest information as well as strategic and tactical intelligence to determine which ...

Nabil R. Adam; Vijayalakshmi Atluri; Rey Koslowski; Vandana P. Janeja; Janice Warner; Aabhas Paliwal

2005-05-01T23:59:59.000Z

203

Integration of sensing and computing in an intelligent decision support system for homeland security defense  

Science Conference Proceedings (OSTI)

We propose an intelligent decision support system based on sensor and computer networks that incorporates various component techniques for sensor deployment, data routing, distributed computing, and information fusion. The integrated system is deployed ... Keywords: Data routing, Distributed computing, Dynamic programming, Intelligent decision support system, Sensor deployment, Sensor fusion

Qishi Wu; Mengxia Zhu; Nageswara S. V. Rao

2009-04-01T23:59:59.000Z

204

Improving National and Homeland Security through a proposed Laboratory for Information Globalization and Harmonization Technologies (LIGHT)  

E-Print Network (OSTI)

A recent National Research Council study found that: "Although there are many private and public databases that contain information potentially relevant to counter terrorism programs, they lack the ...

Choucri, Nazli

2004-11-30T23:59:59.000Z

205

Improving National and Homeland Security through a proposed Laboratory for nformation Globalization and Harmonization Technologies (LIGHT)  

E-Print Network (OSTI)

A recent National Research Council study found that: "Although there are many private and public databases that contain information potentially relevant to counter terrorism programs, they lack the ...

Choucri, Nazli

2004-12-10T23:59:59.000Z

206

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

207

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry |...

208

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

209

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

210

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

211

Abstracts of Awards for Fiscal Year 2009 NIST SBIR Program  

Science Conference Proceedings (OSTI)

... required for many industrial, research, and homeland security applications. ... TES arrays can uniquely solve to monitor nuclear reactor use), quantum ...

2013-03-12T23:59:59.000Z

212

LA-UR-07-6494 An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA  

E-Print Network (OSTI)

LA-UR-07-6494 An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA-6494 An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA · Homeland by Los Alamos National Security LLC for DOE/NNSA Your Letter of Interest should include the following

213

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

214

Critical reflection in a digital media artwork - Playas: homeland mirage  

E-Print Network (OSTI)

The introduction of digital media into the working practice of artists has produced challenges previously unknown to the field of art. This inquiry follows an atypical model of artist-driven research derived from disciplines such as social science and education. Here, an artwork functions as a model that is self-reflective, integrating methodologies in a form that benefits art and science. Using Naturalistic Inquiry, including semi-structured interviews of fifteen participants, the work illustrates a process of creation, analysis and evaluation that places the values of the artist on equal footing with the needs of science. Recently, artists have begun using video game engines as a tool to produce 3D navigable spaces. Using the hybrid video game/installation Playas: Homeland Mirage as a case study, this research examines the impact of technology on the artwork and identifies a number of key issues related to the function of critical reflection in this environment. Rules-of-play were a fundamental pre-requisite to the stimulation of critically reflective experience. The human interface with software and hardware was also a primary factor in reflective experience. Based on participant evaluation and observation, the interface was altered in response to its effect on critical reflection, illustrating how choices in this area impact aesthetic experience. Those with experience in visual art were more likely to engage the work in a critically reflective manner than seasoned video game players who tended to be more interested in scoring and winning. These findings and others inform our understanding of the stimulation of critical reflection in immersive environments and show how we can sensitively integrate technology with meaningful evaluative methods. By repurposing a video game in this manner, we learn about the nature of the video game and the nature of art. This research enables artists to gain a better understanding of the medium to more fully integrate technology within a meaningful practice. Conversely, other fields will benefit from a better understanding of the stimulation of meaning in immersive spaces and gain a comprehensive view of a work that strives to contribute to our culture on a deeper level than as simple entertainment. Ultimately, more fully understanding critical reflection in virtual environments will enable us to create enriched experiences that transcend space to create real or virtual place.

Stenner, Jack Eric

2007-08-01T23:59:59.000Z

215

PNNL: Available Technologies: Security Industry  

Current Control Technology for Quantum Cascade Laser and Other Applications; Identifying Operator Distraction When Driving or Operating Equipment;

216

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

217

Security Forms and Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » New Employee Orientation » Security Forms and Services » New Employee Orientation » Security Forms and Information Security Forms and Information Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees assigned to the DOE Headquarters complex are required to present two identity source documents (i.e., U.S. Passport, driver's license, identification card with photograph issued by a Federal, state, or local government agency, etc.), have their fingerprints taken, and undergo a background investigation (the identity proofing process) prior to reporting for duty or being issued a DOE standard badge (identity or PIV badge). Most likely, your HR representative and/or administrative personnel have

218

Security is Not an Option | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security is Not an Option Security is Not an Option A 10-year roadmap for achieving control system cyber security in the energy industry has been hailed as a model for other...

219

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

220

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

222

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

223

Application Security what are the costs of doing business?  

Science Conference Proceedings (OSTI)

... Page 11. What does incomplete Application Security cost? Prius 2005 recall ... Automobile as Industrial Control System (ICS) Prius 2010 recall ...

2011-04-14T23:59:59.000Z

224

Industry Interactive Procurement System (IIPS)  

NLE Websites -- All DOE Office Websites (Extended Search)

Industry Interactive Industry Interactive Industry Interactive Industry Interactive Procurement System Procurement System (IIPS) (IIPS) Douglas Baptist, Project Manager Information Management Systems Division US Department of Energy IIPS Functions Issue synopses, solicitations and related documents via the Internet Receive and Respond to Solicitation Specific Questions Receive proposal, bid or application information electronically Provide access to proposal information to authorized personnel through a web browser Conduct negotiations or obtain clarifications Issue award documents IIPS Security Security Plan in place and approved by DOE's Chief Information Officer System security tested by DOE's Computer Incident Advisory Capability team Security measures include: - Encryption on the IIPS server

225

Comments Sought on New IT Security Guides  

Science Conference Proceedings (OSTI)

... Publication (SP) 800-54, Border Gateway Protocol Security; SP 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial ...

2012-09-06T23:59:59.000Z

226

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

227

Technologies - Industrial Partnerships Office  

Industrial Partnerships Office P.O. Box 808, L-795 Livermore, CA 94551 Phone: (925) 422-6416 Fax: (925) 423-8988 Operated by Lawrence Livermore National Security, LLC ...

228

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

229

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

230

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

231

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

232

National Security Technology Incubator Business Plan  

SciTech Connect

This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

2007-12-31T23:59:59.000Z

233

Secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-05-01T23:59:59.000Z

234

Disentangling the relations between safety and security  

Science Conference Proceedings (OSTI)

This article aims at a finer apprehension of the relations between safety and security, which are intrinsically and increasingly intricate. We introduce a new conceptual framework to better capture their moving perimeters. Then, we present our on-going ... Keywords: SIS, computer security, dependability, industrial control systems, safety, safety systems, security

Ludovic Pietre-Cambacedes; Claude Chaudet

2009-08-01T23:59:59.000Z

235

National Security & Safety Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 2, 2012 July 2, 2012 Inspection Report: INS-O-12-02 Management of Explosives at Selected Department Sites June 29, 2012 Audit Report: OAS-M-12-05 Office of Secure Transportation Capabilities May 31, 2012 Audit Report: IG-0866 Integrated Safety Management at Sandia National Laboratories April 23, 2012 Audit Report: OAS-L-12-05 The Joint Actinide Shock Physics Experimental Research Facility at the Nevada National Security Site March 6, 2012 Inspection Report: INS-L-12-02 Follow-up Inspection on Security Clearance Terminations and Badge Retrieval at the Lawrence Livermore National Laboratory February 28, 2012 Audit Report: IG-0860 The Department of Energy's Implementation of Homeland Security Presidential Directive 12 November 15, 2011 Evaluation Report: OAS-M-12-01 The Federal Energy Regulatory Commission's Unclassified Cyber Security

236

Subsidized Security and Stability of Equilibrium Solutions in an N-Player Game with Errors ?  

E-Print Network (OSTI)

Optimizing resource allocation in interdependent security problems is a serious challenge for U.S. homeland security. In this paper, game theory is applied to this challenge in the case where investment by one defender has positive externalities for other players. The phenomena of tipping and cascading are discussed, and we explore how to target subsidized security in order to achieve the best results from tipping. We show that subsidization of security investments can increase the stability of equilibrium solutions, and also decrease the total expected social costs. The above findings are illustrated in numerical examples. 1

Jun Zhuang; Vicki M. Bier

2006-01-01T23:59:59.000Z

237

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

238

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

239

National Security Technology Incubation Strategic Plan  

Science Conference Proceedings (OSTI)

This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.

None

2007-01-01T23:59:59.000Z

240

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

242

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

243

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

244

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

245

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

246

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

247

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

248

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

249

Contact Us | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Us Contact Us Home > Field Offices > Welcome to the Los Alamos Field Office > Contact Us Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook National Nuclear Security Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program LANS Contract Los Alamos Field Office Emergency Public Information Related Links

250

Industrial alliances  

Science Conference Proceedings (OSTI)

The United States is emerging from the Cold War era into an exciting, but challenging future. Improving the economic competitiveness of our Nation is essential both for improving the quality of life in the United States and maintaining a strong national security. The research and technical skills used to maintain a leading edge in defense and energy now should be used to help meet the challenge of maintaining, regaining, and establishing US leadership in industrial technologies. Companies recognize that success in the world marketplace depends on products that are at the leading edge of technology, with competitive cost, quality, and performance. Los Alamos National Laboratory and its Industrial Partnership Center (IPC) has the strategic goal to make a strong contribution to the nation`s economic competitiveness by leveraging the government`s investment at the Laboratory: personnel, infrastructure, and technological expertise.

Adams, K.V.

1993-09-13T23:59:59.000Z

251

Architectural support for enhancing security in clusters  

E-Print Network (OSTI)

Cluster computing has emerged as a common approach for providing more comput- ing and data resources in industry as well as in academia. However, since cluster computer developers have paid more attention to performance and cost eciency than to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust to security attacks intrinsically. In this research, we propose architectural supports for enhancing security of clus- ter systems with marginal performance overhead. This research proceeds in a bottom- up fashion starting from enforcing each cluster component's security to building an integrated secure cluster. First, we propose secure cluster interconnects providing con- dentiality, authentication, and availability. Second, a security accelerating network interface card architecture is proposed to enable low performance overhead encryption and authentication. Third, to enhance security in an individual cluster node, we pro- pose a secure design for shared-memory multiprocessors (SMP) architecture, which is deployed in many clusters. The secure SMP architecture will provide condential communication between processors. This will remove the vulnerability of eavesdrop- ping attacks in a cluster node. Finally, to put all proposed schemes together, we propose a security/performance trade-o model which can precisely predict performance of an integrated secure cluster.

Lee, Man Hee

2008-08-01T23:59:59.000Z

252

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

253

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

254

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

255

Argonne Chemical Sciences & Engineering - People - National Security -  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Nuclear Forensics and Nanoscale Engineering Chemical Analysis and Research Analytical Chemistry Laboratory Management and Support David B. Chamberlain, Chemical Engineer and Department Manager phone: 630/252-7699, fax: 630/972-4409, e-mail: david.chamberlain@anl.gov M.S., Chemical Engineering, University of Idaho Spent fuel reprocessing Radiological forensics Sealed radioactive source characterization Radioactive materials and national security Mary Anne Yates, Senior Technical Advisor/Senior Chemist phone: 630/252-7699, fax: 630/972-4409, e-mail: mayates@anl.gov Ph.D., Nuclear Chemistry, Carnegie Mellon University Homeland Security Counterterrorism Publications in nuclear, atomic, and particle physics Jodi L. Canaday, Administrative Secretary

256

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

257

AMI System Security Requirements - v1_01-1 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AMI System Security Requirements - v101-1 AMI System Security Requirements - v101-1 This document provides the utility industry and vendors with a set of security requirements...

258

Technology Capabilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security & Defense Homeland Security & Defense Information Technology & Communications Information Technology & Communications Sensors, Electronics &...

259

Securing a Wireless Networked Control System Using Information Fusion  

Science Conference Proceedings (OSTI)

Security of a wireless sensor network practically governs its usability in several applications. Especially, in applications like Industrial control systems which use NCS and SCADA systems, the security affects the stability of the system. We propose ...

Brijesh Kashyap Chejerla, Sanjay Madria

2012-10-01T23:59:59.000Z

260

The Resilient Economy: Integrating Competitiveness and Security  

Science Conference Proceedings (OSTI)

Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

Debbie van Opstal

2009-01-07T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

262

National Security Studies Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security Studies Program National Security Studies Program National Security Studies Program Objective The National Security Studies Program (NSSP) is designed to prepare future leaders of civilian agencies for high-level policy, command, and staff responsibilities. The NSSP focuses on international environments and commercial partnerships. All students successfully completing the program are awarded a Master's degree. The program does not involve a promotion or a change in position. Benefits to the Organization The program prepares federal civilian employees for high-level policy, command, and staff responsibilities. Participants will gain valuable experience in leadership, information strategy, national security studies, military strategy, logistics, economics, industry studies, and more. The

263

The Future of Cyber Security: NIST Special Publication 800-53 ...  

Science Conference Proceedings (OSTI)

... PE Physical and Environmental Protection ... Extend the supplemental guidance for security controls ... Industry sectors (eg, nuclear power, transportation ...

2013-06-06T23:59:59.000Z

264

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

265

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

266

Introduction SCADA Security for Managers and Operators | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA...

267

Y-12 National Security Complex Technology Marketing Summaries ...  

This technology can be adapted to most any high-hazard or emergency condition. Y-12 National Security Complex; 09/12/2011: Industrial Technologies

268

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach  

Science Conference Proceedings (OSTI)

Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%--75% of security incidents originate from within an organization. ... Keywords: IS misuse, IS security, end-user security, general deterrence theory, security countermeasures, security management

John D'Arcy; Anat Hovav; Dennis Galletta

2009-03-01T23:59:59.000Z

269

Towards a Process for Web Services Security  

E-Print Network (OSTI)

Web Services (WS) security has undergone an enormous development, as carried out by the major organizations and consortiums of the industry over the last few years. This has brought about the appearance of a huge number of WS security standards. Such a fact has made organizations remain reticent about adopting technologies based on this paradigm, due to the learning curve which is inevitable in the integration of security into their practical deployments. In this paper we present PWSSec (Process for Web Services Security), which enables the integration of a set of specific security stages into the traditional phases of WS-based systems development. PWSSec defines three stages, WSSecReq (Web Services Security Requirements), WSSecArch (Web Services Security Architecture) and WSSecTech (Web Services Security Technologies). These facilitate, respectively, the definition of WS-specific security requirements, the development of a WS-based security architecture and the identification of the WS security standards that the security architecture must articulate in order to implement the security services.

Carlos Gutirrez; Eduardo Fernndez-medina; Mario Piattini

2005-01-01T23:59:59.000Z

270

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

271

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

272

Assessing Power Substation Network Security and Survivability  

E-Print Network (OSTI)

This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vulnerability and hardening assessment techniques have been presented. The paper also discusses the state of the power industry cyber security, which appears to lag behind the state-ofthe-practice in both network security and ultrareliable systems design.

Carol Taylor; Paul Oman; Axel Krings

2003-01-01T23:59:59.000Z

273

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

274

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

275

Computing | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Computing High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce...

276

Materials Performance Group Homepage  

Science Conference Proceedings (OSTI)

... Atomistic modeling; Shape memory alloys. Programs/Projects. ... the US auto industry and base ... to US manufacturing, homeland security, and energy ...

2013-07-02T23:59:59.000Z

277

Electricity Subsector Cybersecurity Capability Maturity Model...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

with the Department of Homeland Security (DHS) and involved close collaboration with industry, other Federal agencies, and other stakeholders. Electricity Subsector...

278

Partnering with Utilities for Energy Efficiency & Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SPIDERS SPIDERS Energy Security JCTD Proposal Dr. George Ka'iliwai Mr. Wade Jost USPACOM J8, Director of OSD Power Surety y Task Force Resources and Assessment The RedGate Group This brief is: This brief is: UNCLASSIFIED 1 UNCLASS As of Nov 09 The Situation * "Critical national security y and homeland defense missions are at an unacceptably high risk of extended outage from failure of the electric grid." The Defense Science Board Task Force on DoD Energy Security, July 2008 UNCLASS 2 UNCLASS As of Nov 09 The Situation * "There have been numerous attacks on the operating systems of major critical infrastructure facilities, including power grids, around the world in recent years: Chinese and Russian spies have "penetrated the U S penetrated the U.S.

279

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

280

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Nuclear Security Conference 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Conference 2010 Nuclear Security Conference 2010 Nuclear Security Conference 2010 April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear Materials U.S. Secretary of Energy Steven Chu Wednesday, April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his remarks as prepared for delivery: I would like to thank the Nuclear Energy Institute for hosting this important conference on the role of the private sector in securing nuclear materials. I would also like to thank all of you for your participation today. Your industry lies at the intersection of two of the most pressing issues of our time: the energy challenge and the threat of nuclear proliferation.

282

Nuclear Security Conference 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Conference 2010 Nuclear Security Conference 2010 Nuclear Security Conference 2010 April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear Materials U.S. Secretary of Energy Steven Chu Wednesday, April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his remarks as prepared for delivery: I would like to thank the Nuclear Energy Institute for hosting this important conference on the role of the private sector in securing nuclear materials. I would also like to thank all of you for your participation today. Your industry lies at the intersection of two of the most pressing issues of our time: the energy challenge and the threat of nuclear proliferation.

283

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

284

Risk Analysis, Vol. 30, No. 4, 2010 DOI: 10.1111/j.1539-6924.2010.01370.x Deceptive Detection Methods for Effective Security with  

E-Print Network (OSTI)

no increase in inspection cost. KEY WORDS: Homeland security; mixed strategies; nuclear detection; screening catastrophic weapons, such as chemical or biological agents or nuclear de- vices, requires high vigilance.kantor@rutgers.edu. traffic through ports and harbors. When we consider the further problem of protecting cities and high

285

Poultry Industry: Industry Brief  

Science Conference Proceedings (OSTI)

This Electric Power Research Institute (EPRI) Industry Brief provides an overview of the U.S. poultry industry and ways in which electric-powered processes and technologies can be used in poultry and egg production and processing. The poultry industry, which consists of poultry production for meat as well as egg production and processing, is one of the fastest growing segments of the U.S. food manufacturing industry. It is also an energy-intensive industry. In fact, a 2010 report by the USDA illustrates ...

2011-03-30T23:59:59.000Z

286

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

287

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

288

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

289

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

290

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

291

Research trend on secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, SCADA systems, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-08-01T23:59:59.000Z

292

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

293

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

294

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

295

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

296

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

297

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

298

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

299

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

300

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

302

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

303

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

304

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

305

Distributed Network Protocol (DNP3) Security Interoperability Testing 2012  

Science Conference Proceedings (OSTI)

This project encourages the adoption of the Distributed Network Protocol (DNP3) Secure Authentication specification through three approaches:Supporting development and review of the specification by industry experts in supervisory control and data acquisition (SCADA) and cryptographyAligning the specification with international standards performing similar functions, so that there is a common industry-wide approach to SCADA securityDeveloping ...

2012-12-31T23:59:59.000Z

306

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

307

Compensation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Compensation | National Nuclear Security Administration Compensation | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Compensation Home > Federal Employment > Working at NNSA > Compensation Compensation Whether you're a new college graduate, someone with industry experience looking to move into a Federal job or a current government employee looking

308

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

309

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

310

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

311

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

312

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

313

Site Visits by US Dept of Homeland Security regarding H-1B employees at Stanford University If your Department has sponsored H-1B employees, it is possible that the U.S. Department of Homeland  

E-Print Network (OSTI)

;OFFICe OF InSpeCtOr GenerAl I SemIAnnuAl repOrt #12; I AprIl 1­September 30, 2007 Robert W. Cobb Inspector General from The InspeCTor General #12;OFFICe OF InSpeCtOr GenerAl I SemIAnnuAl repOrt #12; I Apr executIve offIcer Renee N. Juhans counsel to the Inspector General Francis P. LaRocca offIce of au

Ford, James

314

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

315

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

316

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

317

Dairy Industry: Industry Brief  

Science Conference Proceedings (OSTI)

This Electric Power Research Institute (EPRI) Industry Brief provides an overview of the U.S. dairy industry and ways in which electric-powered processes and technologies can be used in milk production and processing. Because of the different processes involved, the characteristics of energy consumption at milk production and processing facilities vary by facility. Most energy used in milk production is in the form of diesel fuel, followed by electricity and then by petroleum products such as gasoline an...

2011-03-30T23:59:59.000Z

318

Improving security applications using indoor location systems on wireless sensor networks  

Science Conference Proceedings (OSTI)

One of the fields in which companies are investing more money is security, either personal security to avoid industrial accidents or security against intrusions. There is also the huge effort that the scientific community is doing developing all required ... Keywords: IEEE 802.15.4, ILS, indoor location systems, security applications, wireless sensor networks

Josep Paradells; Jordi Vilaseca; Jordi Casademont

2009-01-01T23:59:59.000Z

319

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

320

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

322

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

323

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

324

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

325

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

326

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

327

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

328

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

329

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

330

Measurable Control System Security through Ideal Driven Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

2008-01-01T23:59:59.000Z

331

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

332

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

333

The Security Epidemic  

NLE Websites -- All DOE Office Websites (Extended Search)

5-1130 5-1130 A different version of this appeared in Security Management 50, pp. 88-94 (2006). Turnkey Turnover Solutions: Powerful Tools and Experts are Available! Eddie G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory Introduction It's early in World War II, and the US is scrambling to put together an effective fighting force. But how to you select and place millions of former civilians into military positions that will suit their abilities and temperament? The Army turned to industrial/organizational (I/O) psychologists. To solve this problem, the I/O psychologists developed the Army General Classification Test (AGCT), which later evolved into the Armed Services Vocational Aptitude Battery (ASVAB) still used

334

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

335

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

336

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

337

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

338

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

339

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

340

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

342

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

343

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

344

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

345

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

346

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

347

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

348

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

349

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

350

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

351

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

352

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

353

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

354

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

355

Transportation Security Review Program and Radiofrequency Identification (RFID) Technology Applications for Hazardous Materials  

Science Conference Proceedings (OSTI)

EPRI formed a Transportation Security Implementation Working Group in response to regulatory requirements to review Carrier Transportation Security Plans, and to address rapidly changing or new transportation security rules. This group, working in collaboration with the Nuclear Energy Institute (NEI) Transportation Task Force, develops and implements transportation security programs with broad application across the industry, such as a Transportation Security Review program for carriers. This report docu...

2004-11-05T23:59:59.000Z

356

Securing Our Energy Future  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Our Energy Our Energy Securing Our Energy Future Future World Energy Demand Growing Dramatically 12 1400 1200 10 1000 2000 2050 2100 Population of Population of Industrialized Countries Industrialized Countries Wo W rl r d o ld Po P pu p la l ti t on o o u a i n Wo W rl r d E d ne n rg r y o l E e gy Co C ns n um u pt p io i n o s m t on Population (Billions) Energy Consumption (Qbtu / yr) 8 800 6 600 4 400 2 200 0 0 1900 1950 Year U.S. Electricity Generation by Fue U.S. Electricity Generation by Fuel Electric Generation by Fuel 1980 - 2030 (billion kilowatt-hours) 0 1000 2000 3000 4000 5000 6000 1980 1990 2000 2010 2020 2030 Renewables/Other Nuclear Natural Gas Petroleum Coal Source: EIA Annual Energy Outlook 2008 Why Do We Keep Coal in the Mix? Why Do We Keep Coal in the Mix? World Energy Reserves World Energy Reserves Source: Energy Information Administration/ International Reserves Data

357

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

358

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

359

The Paradox of Regulatory Development in China: The Case of the Electricity Industry  

E-Print Network (OSTI)

supply to attract investment in the energy-intensive industries.industry to secure a stable supply of raw materials. In 2006, Huaneng Energy andsupply enables the local government to attract energy-intensive, heavy industries

Tsai, Chung-min

2010-01-01T23:59:59.000Z

360

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

362

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

363

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

364

A software-based trust framework for distributed industrial management systems  

Science Conference Proceedings (OSTI)

One of the major problems in industrial security management is that most organizations or enterprises do not provide adequate guidelines or well-defined policy with respect to trust management, and trust is still an afterthought in most security engineering ... Keywords: Distributed industrial management systems, Security engineering, Trust management

Sheikh I. Ahamed; Mohammad Zulkernine; Steve Wolfe

2007-10-01T23:59:59.000Z

365

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

366

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

367

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network (OSTI)

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

368

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

369

The IAEA Assistance and Training Programme for Transport Security  

Science Conference Proceedings (OSTI)

The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

2010-01-01T23:59:59.000Z

370

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

371

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

372

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

373

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

374

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

375

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

376

Industrial Applications  

Science Conference Proceedings (OSTI)

Table 2   Frequently used rubber linings in other industries...Application Lining Power industry Scrubber towers Blended chlorobutyl Limestone slurry tanks Blended chlorobutyl Slurry piping Blended chlorobutyl 60 Shore A hardness natural rubber Seawater cooling water

377

Industrial Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Industrial Industrial Industrial / Manufacturing Buildings Industrial/manufacturing buildings are not considered commercial, but are covered by the Manufacturing Energy Consumption Survey (MECS). See the MECS home page for further information. Commercial buildings found on a manufacturing industrial complex, such as an office building for a manufacturer, are not considered to be commercial if they have the same owner and operator as the industrial complex. However, they would be counted in the CBECS if they were owned and operated independently of the manufacturing industrial complex. Specific questions may be directed to: Joelle Michaels joelle.michaels@eia.doe.gov CBECS Manager Release date: January 21, 2003 Page last modified: May 5, 2009 10:18 AM http://www.eia.gov/consumption/commercial/data/archive/cbecs/pba99/industrial.html

378

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

380

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

382

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

383

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

384

Use of a virtual environment to solve real world problems The research involves a project for homeland security within the Modeling and Simulation  

E-Print Network (OSTI)

and Simulation Group has worked diligently to duplicate virtual nuclear facilities and power plants across certain components are attacked by terrorists. Certain components of a nuclear facility or power plant at the Oak Ridge National Laboratory. Using the Unreal Engine, nuclear facilities and other real-world plants

385

Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider  

E-Print Network (OSTI)

A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

Friedman, Peter S; Chapman, J Wehrley; Levin, Daniel S; Weaverdyck, Curtis; Zhou, Bing; Benhammou, Yan; Etzion, Erez; Moshe, M Ben; Silver, Yiftah; Beene, James R; Varner, Robert L

2010-01-01T23:59:59.000Z

387

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Strengthening the Federal Acquisition Workforce: Government-wide Leadership and Initiatives By: John Bashista, Deputy Director, Office of Procurement and Assistance Management, Office of Management

388

Deputy Assistant Secretary Jack Surash's Written Statement before the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Governmental Affairs (June 27, 2013)  

Energy.gov (U.S. Department of Energy (DOE))

Written Statement of Jack Surash, Deputy Assistant Secretary for Acquisition and Project Management of Office of Environmental Management, United States Department of Energy, before the...

389

Hearing on Online Privacy, Social Networking, and Crime Victimization Before the Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security U.S. House of Representatives  

E-Print Network (OSTI)

Washington, DCMr. Chairman and Members of the Committee, thank you for the opportunity to testify today. My name is Marc Rotenberg, and I am the President of the Electronic Privacy Information Center. EPIC was established to focus public attention on emerging privacy and civil liberties issue. I also teach Information Privacy Law at Georgetown University Law Center. I want to thank you for holding this hearing today and also thank Chairman Conyers for his May letter to Facebook. EPIC has a particular interest in privacy and social networking services. We filed two complaints at the Federal Trade Commission in the last year following decisions by Facebook to change its privacy policies and the privacy settings of its users. We also filed a complaint when Google introduced Buzz, its social network service, because the company essentially opted in all of its Gmail users. We believe it is vitally important to protect the privacy of users of these services, and many users agree. To be clear, we do not object to social network servicesthey are enormously valuablebut we do believe that there are serious privacy risks to

Marc Rotenberg

2010-01-01T23:59:59.000Z

390

Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider  

E-Print Network (OSTI)

A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

Peter S. Friedman; Robert Ball; J. Wehrley Chapman; Daniel S. Levin; Curtis Weaverdyck; Bing Zhou; Yan Benhammou; Erez Etzion; M. Ben Moshe; Yiftah Silver; James R. Beene; Robert L. Varner Jr.

2010-07-03T23:59:59.000Z

391

Industries Affected  

Science Conference Proceedings (OSTI)

Table 2   Industries affected by microbiologically influenced corrosion...generation: nuclear, hydro, fossil fuel,

392

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

393

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

394

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

395

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

396

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

397

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

398

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

399

Design and simulation on data-forwarding security in sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks are the emerging information technology for monitoring equipment and ambient conditions of production lines in modern factories. A salient feature of wireless sensor networks is that nodes can relay sensing data to a factory ... Keywords: SQF, WSNs, energy consumption, industrial security, modelling, network security, packet delivery latency, reliability, routing, secure quasimultipath forwarding, wireless sensor networks

Men Long; Chwan-Hwa 'John' Wu

2009-10-01T23:59:59.000Z

400

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

402

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

403

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

404

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

405

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

406

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

407

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

408

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

409

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

410

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

411

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

412

OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information Technologies (IT) such as Ethernet(tm), Transmission Control Protocol/Internet Protocol (TCP/IP) and Windows® for both critical and non-critical communications. This has made the interfacing of industrial control equipment much easier, but has resulted in significantly less isolation from the outside world, resulting in the increased risk of cyber-based attacks impacting industrial production and human safety. OPC Security Whitepaper #3 Hardening Guidelines for OPC Hosts

413

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

414

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

415

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

416

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

417

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

418

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

419

Technologies - Industrial Partnerships Office  

Operated by Lawrence Livermore National Security, LLC, for the Department of Energy's National Nuclear Security Administration LLNL-WEB ...

420

Industrial Partnerships Office  

Weapons & Complex Integration. Organizations. Organizations. Global Security. ... LLC, for the Department of Energy's National Nuclear Security Administration

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Secure Transportation_final_print-ready  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A A History of Secure Transportation * The transportation of the CEUSP material in casks will be made by Hittman Transport, a commercial carrier * Hittman Transport is a specialty company whose primary mission is transporting hazardous materials * Transport method meets all of the requirements of the Department of Energy, Nuclear Regulatory Commission, and Department of Transportation for shipment of hazardous radioactive material * Hittman Transport maintains drivers with DOE security clearances and all shipments will be escorted by armed Federal officers Hittman Transport drivers' average number of years experience 26 Completed Hittman Transport shipments without significant accident or loss of material 196K Hittman Transport began supporting the nuclear industry

422

Related Sites | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

423

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

424

Industry @ ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Industry @ ALS Industry @ ALS Industry @ ALS Concrete Industry Benefits from Ancient Romans and the ALS Print Thursday, 17 October 2013 14:24 New insights into the Romans' ingenious concrete harbor structures emerging from ALS beamline research could move the modern concrete industry toward its goal of a reduced carbon footprint. Summary Slide Read more... Moving Industry Forward: Finding the Environmental Opportunity in Biochar Print Thursday, 12 September 2013 08:41 Using ALS Beamlines 10.3.2 and 8.3.2, the Environmental Protection Agency (EPA) is currently investigating how biochar sorbs environmental toxins and which kinds of biochar are the most effective. The possibilities for widespread use have already launched entrepreneurial commercial ventures. Summary Slide

425

Role mining - revealing business roles for security administration using data mining technology  

Science Conference Proceedings (OSTI)

In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) ... Keywords: data mining, enterprise systems management, identity management, migration, provisioning, role engineering, role-based access control, security administration, security data models, security management, single point of administration and control

Martin Kuhlmann; Dalia Shohat; Gerhard Schimpf

2003-06-01T23:59:59.000Z

426

World Institute for Nuclear Security Launch | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

World Institute for Nuclear Security Launch World Institute for Nuclear Security Launch World Institute for Nuclear Security Launch September 29, 2008 - 3:43pm Addthis Remarks as Prepared for Secretary Bodman Thank you. My thanks to Director General El Baradei and Senator Nunn for their opening remarks. I am pleased to be here with you this afternoon. Each nation has the responsibility to assist in the effort to make nuclear materials and facilities secure. This means we need cooperation at every level and every stage of the process: from government, to industry, to non-governmental organizations. As such, the World Institute for Nuclear Security will make an important contribution to the cause of nuclear nonproliferation and nuclear security. By bringing the private, public, and non-governmental sectors together,

427

World Institute for Nuclear Security Launch | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Institute for Nuclear Security Launch Institute for Nuclear Security Launch World Institute for Nuclear Security Launch September 29, 2008 - 3:43pm Addthis Remarks as Prepared for Secretary Bodman Thank you. My thanks to Director General El Baradei and Senator Nunn for their opening remarks. I am pleased to be here with you this afternoon. Each nation has the responsibility to assist in the effort to make nuclear materials and facilities secure. This means we need cooperation at every level and every stage of the process: from government, to industry, to non-governmental organizations. As such, the World Institute for Nuclear Security will make an important contribution to the cause of nuclear nonproliferation and nuclear security. By bringing the private, public, and non-governmental sectors together,

428

Transmission Line Security Monitor: Final Report  

SciTech Connect

The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

John Svoboda

2011-04-01T23:59:59.000Z

429

Urban agriculture as a tool for neighborhood fabric repair in post-industrial Detroit.  

E-Print Network (OSTI)

??This thesis focuses on Detroit as a post-industrial city that suffers from abandonment, vacancy, and food security issues. I address this problem through the lens (more)

Fairbank, Sandra Trubow

2011-01-01T23:59:59.000Z

430

2008-2010 Research Summary: Analysis of Demand Response Opportunities in California Industry  

E-Print Network (OSTI)

NIST Framework and Roadmap for Smart Grid Interoperability29 2.7.3. Smart Grid and Industrial Auto-of actors in different Smart Grid domains through secure

Goli, Sasank

2013-01-01T23:59:59.000Z

431

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

432

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

433

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

434

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

435

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

436

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

437

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

438

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

439

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

440

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

442

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

443

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

444

Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)  

Science Conference Proceedings (OSTI)

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

445

Rationale and Development of a Security Assurance Index with Application toward the Development of a World Risk Index  

SciTech Connect

Assurance categories were previously developed to support the Department of Homeland Securitys efforts in the mitigation of Cyber Control System events. Defined according to the risk of life and economic loss, the minimum range is designated by policy, whereas the maximum limit seems to be constrained only by limits and interdependencies of the event. Use of this life / assets scale has proven to be helpful in managing risk due to the scale's ease of use, communication, and understanding. Suggestions have been made that this scale could be applied to all events of terror, disaster, and calamity of an international scale, with equally good results. This paper presents the history of some existing scales of disaster and assurance, the rationale behind the development of the original Security Assurance Index, and our proposed scale of disaster and calamity as a World Risk Index.

M. M. Plum; G. A. Beitel, PhD

2006-06-01T23:59:59.000Z

446

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

447

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

448

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

449

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

450

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

451

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

452

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

453

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

454

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

455

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

456

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

457

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

458

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

459

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

460

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

462

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

463

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

464

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

465

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

466

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

467

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

468

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

469

Towards learning normality for anomaly detection in industrial control networks  

Science Conference Proceedings (OSTI)

Recent trends in automation technology lead to a rising exposition of industrial control systems (ICS) to new vulnerabilities. This requires the introduction of proper security approaches in this field. Prevalent in ICS is the use of access control. ...

Franka Schuster, Andreas Paul, Hartmut Knig

2013-06-01T23:59:59.000Z

470

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

471

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

472

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

473

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

474

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

475

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

476

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

477

Corporate strategic plan for safeguards and security  

SciTech Connect

Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department`s diverse security needs. As an integral part of the nation`s security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation`s and international security environments.

1997-06-01T23:59:59.000Z

478

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UCAIUG: AMI-SEC-ASAP UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents. 5 6 This document provides substantial supporting information for the use of these requirements 7 including scope, context, constraints, objectives, user characteristics, assumptions, and 8

479

6 Homeland Defense Journal -December 18, 2002 | Vol 1. Issue 23 Gilmore Commission Calls for Independent Center to Coordinate Terrorism  

E-Print Network (OSTI)

, Washington DC. · How much will new security initiatives cost and who will end up paying for them? · Which allowed. The building walls are a metal composite, and standard glass windows are used. The receiver- cant levels are transmitted through the walls and windows. No inter- ception would be possible

Jenn, David C.

480

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

482

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

483

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

484

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

485

Impact of Vehicular Communications Security on Transportation Safety  

E-Print Network (OSTI)

Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time, there is consensus among authorities, industry, and academia on the need to secure VC systems. With specific proposals in the literature, a critical question must be answered: can secure VC systems be practical and satisfy the requirements of safety applications, in spite of the significant communication and processing overhead and other restrictions security and privacy-enhancing mechanisms impose? To answer this question, we investigate in this paper the following three dimensions for secure and privacy-enhancing VC schemes: the reliability of communication, the processing overhead at each node, and the impact on a safety application. The results indicate that with the appropriate system design, including sufficiently high processing power, applications enabled by secure VC can be in practice as effective as those enabled by uns...

Papadimitratos, Panos; Hubaux, Jean-Pierre; Lioy, Antonio

2008-01-01T23:59:59.000Z

486

Interactive montages of sprites for indexing and summarizing security video  

E-Print Network (OSTI)

In this video we present a new model of interaction for indexing and visualizing video in the context of security applications. We wish to index security video that contains relatively rare but important events, such as security video taken from large public or industrial facilities (e.g. a nuclear power plant) or exterior home security video from a residential neighborhood. We present a method of indexing video by arranging irregularly shaped icons or sprites into a montage representing motion events or security events within the original video scene. The sprites in the montage are used as an index into the original video. We also generate video montages to summarize video in which motion events are compressed and overlayed in a video of shorter time duration. This summary video also acts as an index into the original video stream.

Chris Pal; Nebojsa Jojic

2005-01-01T23:59:59.000Z

487

Developing Secure Power Systems Professional Competence: Alignment and Gaps  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Developing Secure Power Systems Professional Competence: Alignment Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to protect and enable the modernized grid currently being built. In the spring of 2011 a project was initiated to identify those capabilities and competencies along with assessing the need and qualifications for a certification program for Secure Power Systems

488

Integrity, Reliability and Security: The Role of Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

F. Lawson F. Lawson Director, Strategic Center for Natural Gas & Oil National Energy Technology Laboratory General session Natural Gas Technologies Conference 2005 Cosponsors: NETL/Gas Technology Institute Orlando, Florida January 31, 2005 Integrity, Reliability and Security: The Role of Technology Introduction Integrity, reliability, and security encompass all the attributes we want-indeed, need-from our natural gas industry. We need integrity in physical transportation and storage systems, reliability in operating systems, and security in supplies and delivery systems. This conference is the most comprehensive forum for addressing new and evolving technologies impacting all these needs. The conference scope runs the gamut: from finding and producing to storing,

489

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

490

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

491

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

492

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

493

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

494

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

495

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

496

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

497

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

498

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

499

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

500

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups