Sample records for information security management

  1. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  2. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

  3. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute component of every organization's information security program. An effective risk management process enables

  4. Information Security Office Risk Management

    E-Print Network [OSTI]

    Alpay, S. Pamir

    or Approved) 6/01/2013 CISO Jason Pufahl, CISO Approved 6/01/2013 RMAC Risk Management Advisory Council

  5. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  6. ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION AND INFORMATION SYSTEM VIEW Shirley Radack, Editor Computer Security Division Information Technology Laboratory. Managing information security risk is an essential element of the organization's overall risk management

  7. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  8. ISM6328 -Boca Raton Campus-Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT

    E-Print Network [OSTI]

    Richman, Fred

    ISM6328 - Boca Raton Campus- Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT FALL 2011 security. Emphasis is on the management of information security efforts as well as progression in adopting, regularity and policy aspects of Information Security Management. We will examine security management

  9. CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT

    E-Print Network [OSTI]

    CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute) security, and the assurance of the confidentiality, integrity, and availability of information

  10. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity Date Version Author Comments

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management Information Security Policy 2004 09/2008 D01 Duncan Woodhouse Adaption and consolidation of best practices Registrar for Information Security, Risk Management and Business Continuity 2 University of Warwick

  11. Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20, 2013)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20 year (FY) 2013 reporting requirements for the Federal Information Security Management Act (FISMA is steadily working to improve its overall information technology (IT) security posture. Nevertheless

  12. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  13. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  14. Information System Security Manager (ISSM) | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe RankingReformManager (ISSM) Information System Security

  15. MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

    E-Print Network [OSTI]

    MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology an impact on the security of the systems and operations. In developing information systems, organizations

  16. A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng

    E-Print Network [OSTI]

    Zheng, Yuliang

    A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage,chandag,yuliangg@fcit.monash.edu.au Abstract Information security is based on access control models and cryptographic techniques of comprehensive information security within organizations. There is a need to study upper level issues

  17. Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13, 2014)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13) identified for this year's Federal Information Security Management Act (FISMA) review; however, the Agency Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information

  18. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  19. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  20. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  1. Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12-002, October 17, 2011)

    E-Print Network [OSTI]

    Christian, Eric

    Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12's information technology (IT) security posture. For FY 2011, we adopted a risk-based approach in which we required areas of review for FY 2011 Federal Information Security Management Act (FISMA) reporting: · Risk

  2. Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  4. Implementing Information Security and Its Technology: A LineManagement Perspective

    SciTech Connect (OSTI)

    Barletta, William A.

    2005-08-22T23:59:59.000Z

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  5. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  6. Federal Information Security Management Act: Fiscal Year 2012 Evaluation (IG-13-001, October 10, 2012)

    E-Print Network [OSTI]

    Federal Information Security Management Act: Fiscal Year 2012 Evaluation (IG-13-001, October 10 Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information that NASA has established a program to address the challenges in each of the areas that the Office

  7. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  8. Management of Control System Information SecurityI: Control System Patch Management

    SciTech Connect (OSTI)

    Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

    2011-09-01T23:59:59.000Z

    The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  12. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Kolda, Tamara G.

    . Samatova, D. Speck, R. Srikant, J. Thomas, M. Wertheimer, P. C. Wong SANDIA REPORT SAND2004-6648 Unlimited Report of the DHS Workshop on Data Sciences September 22-23, 2004 Jointly released by Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  13. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  14. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  15. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  16. EEO Complaints Information for Managers | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscovering HowAnaDynamic SwitchingE x

  17. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  18. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01T23:59:59.000Z

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  19. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  1. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  2. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  3. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  4. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  5. AT&TSecurity Consulting Information Assurance Federal Information Security

    E-Print Network [OSTI]

    Fisher, Kathleen

    AT&TSecurity Consulting Information Assurance ­ Federal Information Security Management Act (FISMA requirements under the Federal Information Security Management Act of 2002, of general support systems the security controls for the information system. The AT&T Consulting methodology is based on National

  6. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved GUIDELINE TITLE: Information Security Incident Response GUIDELINE PURPOSE: The purpose of information security incident response is to: mitigate the effects caused by such an incident

  7. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  8. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  9. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

    E-Print Network [OSTI]

    Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

    2010-01-01T23:59:59.000Z

    , and in their personal lives. Both corporations and government have responded by creating a new role in their organizations to lead the safeguarding efforts—chief information security officers (CISOs). The role of these officers is still under development. Do...

  10. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  11. Order Code RL33494 Security Classified and Controlled Information

    E-Print Network [OSTI]

    Laughlin, Robert B.

    Order Code RL33494 Security Classified and Controlled Information: History, Status, and Emerging Government and Finance Division #12;Security Classified and Controlled Information: History, Status in the creation, management, and declassification of national security information followed over the succeeding

  12. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04T23:59:59.000Z

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  13. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21T23:59:59.000Z

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  14. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  15. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  16. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  19. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  20. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity University of Warwick Statement on the Regulation of Investigatory Powers

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity 1 University of Warwick Statement on the Regulation of Investigatory Powers Act 2000: E Powers (RIP) Act as outlined below. The RIP Act statement is part of the strategic Information Security

  1. Information Technology and Management Department of Information Technology and Management

    E-Print Network [OSTI]

    Heller, Barbara

    Information Technology and Management Department of Information Technology and Management Daniel F Chicago, IL 60616 appliedtech.iit.edu/information-technology-and- management Dean and Chair: C. Robert in the information technology and cyber security fields. The Information Technology and Management degrees apply

  2. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved POLICY TITLE: Information Technology Security Policy POLICY PURPOSE: The purpose of this Information Technology Security Policy is to ensure and describe the steps necessary to secure information

  3. Appendix III to OMB Circular No. A-130 -Security of Federal Automated Information Resources

    E-Print Network [OSTI]

    Appendix III to OMB Circular No. A-130 - Security of Federal Automated Information Resources A automated information security programs; assigns Federal agency responsibilities for the security of automated information; and links agency automated information security programs and agency management

  4. Physical and Information Security Policy Category: Campus Life

    E-Print Network [OSTI]

    Physical and Information Security Policy Category: Campus Life Facilities Information Management 1. The Security Office (Bentley Campus) will provide information to assist staff and students in protecting Manager. 2.7 Information security University information must be protected in a manner that is appropriate

  5. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  6. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  7. ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY

    E-Print Network [OSTI]

    ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY ARCHITECTURE TO PROVIDE INFORMATION SECURITY AND PRIVACY Shirley Radack, Editor Computer Security Division protected. Better management of electronic health information will depend upon its secure exchange between

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  9. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  10. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  11. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  12. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  13. 06 DEC 2013 1 Information Security Guideline

    E-Print Network [OSTI]

    Queitsch, Christine

    (CISO) and Privacy Assurance and Systems Security Council (PASS Council) provide organizations with the information security and privacy risk management approach overseen by the CISO and PASS Council on behalf of the University. This document is a living document and will be reviewed and revised as necessary. Check the CISO

  14. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  15. Find It. Delete It. Protect It. Information Technology Security Strategy

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Find It. Delete It. Protect It. Information Technology Security Strategy Executive Summary The general proposed strategy is to optimize risk management for information security incrementally and over that security will be a process rather than project. Achievement of the goal, optimized risk management

  16. Filing Information: April 2009, IDC #217829, Volume: 1 Secure Content and Threat Management Products: Vendor Profile

    E-Print Network [OSTI]

    of major vendors, such as IBM, can expect to thrive and diversify their portfolio within this market's security solutions portfolio, which already includes a broad range of solutions spanning a variety solutions into the Tivoli portfolio and introduced an all- in-one low-cost security appliance for small

  17. NA IM- Associate Administrator for Information Management & Chief...

    National Nuclear Security Administration (NNSA)

    IM- Associate Administrator for Information Management & Chief Information Officer | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

  18. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  19. Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    is expanding at a rapid rate to enable communication using emerging standards, the software architecture. A medical emergency or disaster preparedness agency imposes relaxed privacy requirements during emergency by the smart grid in the context of cyber-security ­ the real time nature of data and the large scale at which

  20. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  1. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  2. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  3. Secure Information Sharing and Dissemination in the Context of Public Security

    E-Print Network [OSTI]

    Secure Information Sharing and Dissemination in the Context of Public Security Professor Nabil R. Adam Director, The Center for Information Management Integration & Connectivity (CIMIC) Executive://cimic.rutgers.edu/~adam/ Abstract In the context of homeland security, one of the key challenges in such environment is achieving

  4. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01T23:59:59.000Z

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  5. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  6. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  7. Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code: CS3190

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code for and the underlying principles of information security. By introducing students to key information security concepts to the administration, design, development, evaluation and management of secure information systems. Module Learning

  8. Security Event and Log Management Service

    E-Print Network [OSTI]

    Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management IBM Global Technology Services December 2007 #12;Executive Summary The economics of network security have changed. The high cost and complexity inherent in the use

  9. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  10. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  11. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  12. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  13. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group The principles · The eight principles are: 1. Economy of mechanism 2. FailIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group Objectives

  14. Information Records Information Management (RIM)

    E-Print Network [OSTI]

    Alpay, S. Pamir

    10/2012 Records & Information Management (RIM) Records Information Management (RIM) encompasses all, and properly manage all records from creation to disposition. Record Management Strategies Lock your offices, and properly destroy when the record retention period is met. Establish a plan for how to manage and protect

  15. CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection, Privacy & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection, Privacy & Records Troy...

  16. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)

    E-Print Network [OSTI]

    Proceedings of the Third International Symposium on Human Aspects of Information Security the scope of remediation, is a pervasive feature of Information Technology Security Management (ITSM of Information Security & Assurance (HAISA 2009) 120 which is security incident response. We extend those results

  17. Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY

    E-Print Network [OSTI]

    Code of Practice for Information Security Management (ISO/IEC 27002:2005) The international standard Electrotechnical Commission (IEC) A global organization that develops and publishes standards, the private sector, consumer groups, professional associations, and others. International Organization

  18. Tighter security for electronic information

    SciTech Connect (OSTI)

    Moore, T.

    1996-11-01T23:59:59.000Z

    Responding to interest expressed by many member utilities, EPRI is launching strategic core research in information security to help companies better protect power system operations, business-sensitive and private customer data, and networks from unauthorized access or use. Although the threat of computer security breaches has been relatively low and isolated in the past and break-ins have been few, the increasing use of networks for various business activities suggests that such risks will rise. EPRI expects to work through an existing strategic alliance with the Department of Energy to tap the expertise of the national laboratories in beefing up utilities` information security systems and practices. This paper describes these potential threats and strategies to combat them.

  19. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01T23:59:59.000Z

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all

  20. Information Security Policy Manual Latest Revision: May 16, 2012

    E-Print Network [OSTI]

    Alpay, S. Pamir

    1 Information Security Policy Manual Latest Revision: May 16, 2012 #12;2 Table of Contents Information Security Policy Manual...............................................................................................................................................17 Information Security Glossary

  1. Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code: CS4520

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code and understanding of the need for and the underlying principles of information security. The module will enable MSc students to take an active role in the design, planning, evaluation and management of secure information

  2. September 2004 INFORMATION SECURITY

    E-Print Network [OSTI]

    of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used by an organization to effectively develop an information system. A tra ditional SDLC is a linear sequential model. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

  3. Start your information security planning here!

    E-Print Network [OSTI]

    Magee, Joseph W.

    Start your information security planning here! Save the Date July 15, 2008 8:30 am ­ 12:30 pm-technology crimes. For additional information, visit http://csrc.nist.gov/secure iz/b or contact: securebiz developed a workshop to help the small business owner increase information system security. Learn how

  4. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision requirements for the protection of that information on the University. The University has had security of the University. The Information Technology Security Office has created this Incident Response Plan to assist

  5. Information Security 26:198:643:01

    E-Print Network [OSTI]

    Lin, Xiaodong

    Information Security 26:198:643:01 Spring 2012 Rutgers University M 2:30-5:20pm, 1WP-534 Panagiotis and interconnecting networks, raising demands for security measures to protect the information and relevant systems, students will learn the theoretical advancements in information security, state-of-the- art techniques

  6. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, As we write the summer issue, with the hire of Indir Advagic, SEAS is launching an Office of Information Security. Besides assessing the general state of information security at SEAS, one of Indir's first tasks will be to revive the cross

  7. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  8. Information Technology Security for Small Business

    E-Print Network [OSTI]

    Magee, Joseph W.

    Information Technology Security for Small Business (video script) Descriptive Text for the Visually symbolic of information technology security and cyber crime. Narration: "No matter how well you protect, "Information Technology Security for Small Business" and "It's not just good business. It's essential business

  9. Secured Information Flow for Asynchronous Sequential Processes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Secured Information Flow for Asynchronous Sequential Processes Isabelle Attali, Denis Caromel for unauthorized information flows. As a final result, all authorized communication paths are secure: no disclosure a new issue in data confidentiality: authorization of secured information flow transiting (by the mean

  10. Formalizing Information Security Knowledge Stefan Fenz

    E-Print Network [OSTI]

    Formalizing Information Security Knowledge Stefan Fenz Vienna University of Technology Vienna ontology which provides an on- tological structure for information security domain knowl- edge. Besides of the considered organization is incorporated. An evaluation conducted by an information security expert team has

  11. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  12. NNSA Selects Consolidated Nuclear Security, LLC to Manage the...

    National Nuclear Security Administration (NNSA)

    Consolidated Nuclear Security, LLC to Manage the Consolidated Contract for Nuclear Production Operations | National Nuclear Security Administration Facebook Twitter Youtube...

  13. Integrated safeguards and security management plan

    SciTech Connect (OSTI)

    Bowen, Sue, editor

    2001-04-16T23:59:59.000Z

    Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

  14. Integrated Safeguards and Security Management (ISSM) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

  15. The Department of Energy's National Security Information Fundamental...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental...

  16. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  17. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  18. Security Analysis and Project Management Systems | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

  19. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  20. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  1. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  2. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes program planning and management requirements for the Departments Safeguards and Security (S&S) Program. Cancels: DOE N 473.9 and DOE M 470.1-1

  3. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes program planning and management requirements for the Departments Safeguards and Security. Chg 1, dated 3-7-06 Cancels DOE N 473.9, DOE M 470.1-1 Chg 2.

  4. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    E-Print Network [OSTI]

    Thaw, David Bernard

    2011-01-01T23:59:59.000Z

    assets. Current information security law in the Unitedimplications for information security professionalism inbeing abundant in the information security community: Yes,

  5. Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE

    E-Print Network [OSTI]

    Martin, Jeff

    Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE Demand for technical security and information assurance professionals has risen dramatically in recent years OPPORTUNITIES: TUITION: Required Courses (78 Hours): · Information Assurance and Security Level 1: Information

  6. Electronic DOE Information Security System (eDISS) PIA, Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

  7. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  8. MSc and Postgraduate Diploma in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    of information security need internationally-recognised qualifications which How will the course help my career and understanding of What do employers say? Worldwide Access | Opportunity | International Standards qualifications. #12;`Attending my first Information Security supplier event after graduating made me reali

  9. National Interest Security Company NISC Formerly Technology Management...

    Open Energy Info (EERE)

    National Interest Security Company NISC Formerly Technology Management Services TMS Inc Jump to: navigation, search Name: National Interest Security Company (NISC) (Formerly...

  10. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23T23:59:59.000Z

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Cancels DOE O 200.1.

  11. University of Warwick Information Security Policy 1. Introduction

    E-Print Network [OSTI]

    Davies, Christopher

    University of Warwick Information Security Policy 1. Introduction The University recognises's strategic objectives. Information security is important to the protection of the University's reputation implications for individuals and is subject to legal obligations. The consequences of information security

  12. USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY

    E-Print Network [OSTI]

    USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute about the security of information systems for the decision makers of organizations. When organizations

  13. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  14. Security Survey of Internet Browsers Data Managers

    E-Print Network [OSTI]

    Boja, Catalin

    2011-01-01T23:59:59.000Z

    The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

  15. Safeguards and Security Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18T23:59:59.000Z

    The proposed revision to this Department of Energy Guide focuses on alignment of guidance for implementing key safeguard and security components to the DOE capital asset acquisition process with the revised DOE O 413.3B, Program and Project Management for Acquisition of Capital Assets, the revised DOE O 470.4B, Safeguard and Security Program, and the new series of DOE Orders replacing the DOE M 470.4 series of manuals.

  16. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  17. List of Major Information Systems,National Nuclear Security Administra...

    Energy Savers [EERE]

    List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT...

  18. Security Risk Management via Dynamic Games with Learning

    E-Print Network [OSTI]

    Alpcan, Tansu

    Security Risk Management via Dynamic Games with Learning Praveen Bommannavar Management Science@stanford.edu Abstract--This paper presents a game theoretic and learning approach to security risk management based agent, e.g. security and risk management division of the organization, which aims to mitigate risks. We

  19. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  20. Wayne Meitzler PNNL Component Security R&D Program Manager

    E-Print Network [OSTI]

    Perkins, Richard A.

    Wayne Meitzler PNNL Component Security R&D Program Manager Wayne Meitzler, as Pacific Northwest National Laboratory (PNNL) Component Security R&D Program Manager, has over 15 years of cyber security R systems. In the 90s, Wayne was one of the early cyber security R&D leaders at PNNL, and his research

  1. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01T23:59:59.000Z

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

  2. NIST Computer Security Division csrc.nist.gov Supplemental Guidance on

    E-Print Network [OSTI]

    -03, Enhancing the Security of Federal Information and Information Systems, stated that, "Our nation's security monitoring, or security authorization. Keywords Federal Information Security Management Act, Information Information For additional information on NIST's Computer Security Division programs, projects

  3. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  4. Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Information Security Officer (CISO). Click here for the electronic version on Dartmouth's Information Security

  5. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  6. Washington and Lee University Guidance on Information Security

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidance on Information Security This guidance addresses common issues that have come up during information security discussions with offices and departments across, Information Security Program Committee Chair (sdittman@wlu.edu) or Dean Tallman, Information Security Officer

  7. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11T23:59:59.000Z

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  8. Information & Records Management Process Manual

    E-Print Network [OSTI]

    Hickman, Mark

    several significant failures to manage information in the public sector in New Zealand, which the Official Information, Privacy, Copyright and Public Records Acts. How you manage UC informationInformation & Records Management Process Manual 2013Information and Records Management #12;Contents

  9. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes program planning and management requirements for the Department’s Safeguards and Security (S&S) Program. Change 2 is a revision to Section M of both the Manual and the CRD to realign the process for establishing deviations from DOE directives containing safeguards and security requirements to reflect established Departmental policy as set forth in DOE O 251.1C. Original publication, 8-26-05; Chg 1, 3-7-06. Canceled by DOE O 470.4B

  10. Managing power system security and optimization

    SciTech Connect (OSTI)

    O'Grady, M.J. (Potomac Electric Power Co., Washington, DC (United States)); Briggs, W.T.; Stadlin, W.O.

    1994-10-01T23:59:59.000Z

    Power system control objectives of energy management systems (EMSs) are well defined and understood: reliability, security, and optimization. However, the approaches to achieving these objectives have often resulted in disjointed solutions and poor acceptance by system operators. This article describes how the new PEPCO EMS provides unique system-wide (generation, transmission, distribution) security and optimization strategies via a coordinated suite of real-time closed-loop control functions. System operators played a key role in defining the application features and user interfaces, ensuring correct operating practices.

  11. Smart Grid Information Security (IS) Functional Requirement

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01T23:59:59.000Z

    It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

  12. When security meets software engineering: A case of modelling secure information systems

    E-Print Network [OSTI]

    When security meets software engineering: A case of modelling secure information systems Engineering: towards the Modeling of Secure Information Systems" paper presented at the 15th International. This is mainly because private information is stored in computer systems and without security, organisations (and

  13. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

    E-Print Network [OSTI]

    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems for information systems. Traditionally, security is considered after the definition of the system. However the health sector to military. As the use of Information Systems arises, the demand to secure those systems

  14. The Center for Information Systems Security Studies and

    E-Print Network [OSTI]

    The Center for Information Systems Security Studies and Research (CISR) has created the ISSE) and the Department of Homeland Security (DHS) have designated NPS as a Center of Academic Excellence in Information developments where cyber security is a concern. Information Systems Security Engineering (ISSE) Certificate

  15. Ontological Mapping of Information Security Best-Practice Guidelines

    E-Print Network [OSTI]

    Ontological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner security knowl- edge. While information security ontologies already exist, no methods have been proposed. Therefore, this paper presents a method for mapping the information security knowledge of the French EBIOS

  16. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28T23:59:59.000Z

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  17. Principles of Secure Information Flow Analysis Geoffrey Smith

    E-Print Network [OSTI]

    Smith, Geoffrey

    Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

  18. A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Information Security Officer (CISO) within an organisation to ensure that such information is adequately protected. External standards exist to advise CISOs on how to secure infor- mation insecure employee behaviour. CISOs require more information than they are currently provided

  19. Banner Job Installation Security Form Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Job Installation Security Form Office of Information Technology 424 Roy S. Nicks Hall, Box: ______________________________ Job Description: ______________________________ Section 3. Security Information Banner Module 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu Section 1. Requestor Information

  20. Information Security Office Logging Standard

    E-Print Network [OSTI]

    Alpay, S. Pamir

    All Approvals Review Date Reviewed By Name/Title Action (Reviewed or Approved) 6/01/2013 CISO Jason Pufahl, CISO Approved 6/01/2013 RMAC Risk Management Advisory Council Reviewed #12;Logging Standard 2 | P

  1. Improving web site security with data flow management

    E-Print Network [OSTI]

    Yip, Alexander Siumann, 1979-

    2009-01-01T23:59:59.000Z

    This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

  2. Managing environmental information

    SciTech Connect (OSTI)

    Solyst, J. [Chemical Manufacturers Association, Arlington, VA (United States)

    1998-12-31T23:59:59.000Z

    The public`s right to know about environmental policy has moved to the forefront with the technological advances in recent years. Congress has not kept pace with these developments having twice considered and twice rejected legislation that is necessary in this field. Congress should provide leadership to the Environmental Protection Agency (EPA) for a broad strategy to improve information resources and management.

  3. Information Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30T23:59:59.000Z

    Provides a framework for managing information, information resources, and information technology investment, which supports the operating elements of the Department in the accomplishment of its missions and functions in both an efficient and effective manner and in accordance with Departmental policy. Cancels: DOE 1324.5B, DOE 5900.1A, DOE 1130.8A, DOE 1330.1D, DOE 1410.2, DOE 1450.3A, DOE 1700.1, DOE 1800.1A, DOE 5300.1C

  4. Quantum non-locality and information security Muhammad Nadeem

    E-Print Network [OSTI]

    1 Quantum non-locality and information security Muhammad Nadeem Department of Basic Sciences-locality, as discussed here, is sufficient to achieve unconditional information security without requiring advanced, integrity, authenticity and availability of information to legitimate users. These information security

  5. Page 1 of 2 Policy Name: Information Technology (IT) Security

    E-Print Network [OSTI]

    Carleton University

    Page 1 of 2 Policy Name: Information Technology (IT) Security Originating/Responsible Department Information Officer (CIO) Policy: Information Technology (IT) Security Purpose: The purpose of this Policy is to outline Carleton University's approach to campus- wide IT security for networks, enterprise information

  6. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03T23:59:59.000Z

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  7. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful with the guidance of their senior administrators. The re-organization in some of the finance offices continues the intranet site. #12;2 Harry Dumay, PhD MBA Chief Financial Officer/ Associate Dean for Finance

  8. PRIVACY AND SECURITY OF PERSONAL INFORMATION

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

  9. The Promotion of Access to and Protection of National Security Information in South Africa

    E-Print Network [OSTI]

    Klaaren, Jonathan E.

    2003-01-01T23:59:59.000Z

    broadly, a military information security policy has beenfor secrecy and therefore information security measures in asection describes the information security implementation

  10. Security Risk Management using Internal Controls Simon Foley,

    E-Print Network [OSTI]

    Foley, Simon

    Security Risk Management using Internal Controls Simon Foley, Department of Computer Science technical concern, it should be considered as just another risk that needs to be managed alongside all other business risks. An Internal Controls approach to security risk management is proposed whereby automated

  11. Office of the CISO, December 2010 Information Security Risk Advisory

    E-Print Network [OSTI]

    Queitsch, Christine

    Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks. The Office of the Chief Information Security Officer (CISO) encourages you to be aware of the following when

  12. Acquisition Management | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA AccountManagement | National Nuclear Security

  13. Information Technology and Management Information Technology and Management

    E-Print Network [OSTI]

    Heller, Barbara

    Information Technology and Management Information Technology and Management IIT School of Applied Technology Daniel F. and Ada L. Rice Campus 201 E. Loop Road Wheaton, IL 60187 www.iit.edu/applied tech/ Dean Technology & Management program is to educate and inform students to prepare them to assume technical

  14. Los Alamos National Security LLC Selected to Manage Los Alamos...

    Office of Environmental Management (EM)

    to be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of...

  15. NNSA selects Consolidated Nuclear Security, LLC to manage the...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    also includes construction project management of the Uranium Processing Facility (UPF) at the Y-12 National Security Complex, and an option for unexercised option for...

  16. 6 Enterprise information risk management: Dealing with cloud computing

    E-Print Network [OSTI]

    Pym, David J.

    6 Enterprise information risk management: Dealing with cloud computing Adrian Baldwin HP Labs for the enterprise risk and security management lifecycle. Specifically, the economies of scale that large providers federated assurance for the cloud. 6.1 Introduction Managing IT risks remains a significant challenge

  17. A Comprehensive and Comparative Metric for Information Security

    E-Print Network [OSTI]

    Breu, Ruth

    A Comprehensive and Comparative Metric for Information Security Steffen Weiß1 , Oliver Weissmann2 security GmbH, Germany Abstract Measurement of information security is important for organizations , Falko Dressler1* 1 Dept. of Computer Science 7, University of Erlangen, Germany 2 atsec information

  18. The Complexity of Synchronous Notions of Information Flow Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Complexity of Synchronous Notions of Information Flow Security Franck Cassez1, , Ron van der flow security is concerned with the ability for agents in a system to deduce information about an information flow security policy has proved to be a subtle matter. A substantial literature has developed

  19. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST METHOD SELECTION LIST;DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST METHOD SELECTION LIST for reasons outside the scope of this document. #12;DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY

  20. A Survey of Interdependent Information Security Games ARON LASZKA1

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    A A Survey of Interdependent Information Security Games ARON LASZKA1 , MARK FELEGYHAZI1 , LEVENTE by the security-related decisions of others. This interdependence between information system operators and users Information security has traditionally been considered a strategic cat-and-mouse game between the defending

  1. Constructivist Approach To Information Security Awareness In The Middle East

    E-Print Network [OSTI]

    Wang, Yongge

    Constructivist Approach To Information Security Awareness In The Middle East Mohammed Boujettif the application of an approach to en- hance information security awareness amongst employees within middle- eastern companies, in effort to improve information security. We aim at surveying the current attitudes

  2. Information Security and Computer Systems: An Integrated Approach

    E-Print Network [OSTI]

    Holliday, Mark A.

    Information Security and Computer Systems: An Integrated Approach Mark A. Holliday Dept curriculum we are developing an Information Security option. Our approach highlights the many topics in information security that build upon concepts the students will already have seen in their computer systems

  3. SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS

    E-Print Network [OSTI]

    Williamson, John

    SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS Maryam Al-Awadi University This paper will explore and identify success factors related to the implementation of information security was to identify those factors required to ensure successful implementation of information security, particularly

  4. Army Regulation 2550 Information Management: Records

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Regulation 25­50 Information Management: Records Management Preparing and Managing Information Management: Records Management Preparing and Managing Correspondence *Army Regulation 25. This regulation on the prepa- ration and management of Army corre- spondence has been revised. This revision

  5. Training Management Information System

    SciTech Connect (OSTI)

    Rackley, M.P.

    1989-01-01T23:59:59.000Z

    The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

  6. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14T23:59:59.000Z

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  7. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  8. A CASE STUDY OF THREE OPEN SOURCE SECURITY MANAGEMENT

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    is not feasible. The objective of this work is therefore to evaluate three open source security management tools TCP dump data generated over five weeks of simulated network traffic in a hypothetical military localA CASE STUDY OF THREE OPEN SOURCE SECURITY MANAGEMENT TOOLS Hilmi Gunes Kayacik, A. Nur Zincir

  9. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  10. TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27

    E-Print Network [OSTI]

    TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27 29.01.03.V1.01 INFORMATION SECURITY, COMPUTER USE AND SOFTWARE INSTALLATION/USE Approved: May 10.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines

  11. INFORMATION SECURITY GROUP Course Specification 2013-14

    E-Print Network [OSTI]

    Mitchell, Chris

    with security mechanisms in modern computer systems and will consider: the core concepts: security policies understanding of the role of security mechanisms for modern computer systems, including both hardware in hardware and operating systems; memory management, memory protection and logical protection; access control

  12. Modern Quantum Technologies of Information Security

    E-Print Network [OSTI]

    Korchenko, Oleksandr; Gnatyuk, Sergiy

    2010-01-01T23:59:59.000Z

    In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

  13. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-14T23:59:59.000Z

    The Order establishes requirements and responsibilities for managing DOE's scientific and technical information. Cancels DOE O 241.1. Canceled by DOE O 241.1B.

  14. Group Security Association (GSA) Management in IP Multicast

    E-Print Network [OSTI]

    Thomas Hardjono; Mark Baugher; Hugh Harney

    Abstract: This work describes the Group Security Association (GSA) Management model and protocol as developed in the Secure Multicast Group (SMuG) in the IETF. The background reasoning from the Internet Key Exchange (IKE) protocol perspective is explained, together with the notion of Security Associations (SA) in the unicast case. This serves as a basis for a requirements for Group SA for multicast. Finally, the definition and construction of a GSA is described. 1.

  15. THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS

    E-Print Network [OSTI]

    THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

  16. Nevada National Security Site Cleanup Information Is Just a Click...

    Office of Environmental Management (EM)

    National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public Nevada National...

  17. Secure Streaming Media and Digital Rights Management Deepali Holankar

    E-Print Network [OSTI]

    Stamp, Mark

    Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer of our secure streaming media system and we give some performance results. 1 #12;2 Digital rights. Company A only wants to allow paying customers to have access to the media stream. Digital rights

  18. Security and Emergency Management Independent Oversight and Performance Assurance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-03-01T23:59:59.000Z

    Establishes the DOE Security and Emergency Management Independent Oversight and Performance Assurance Program. Cancels DOE O 470.2, Paragraph 5b(2) of DOE O 231.1 and Chapter IV of DOE M 231.1-1.

  19. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-11-15T23:59:59.000Z

    This Guide provides approaches for implementing security provisions within the functional areas contained in DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets. Canceled by DOE G 413.3-3A.

  20. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

  1. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  2. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01T23:59:59.000Z

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  3. Bounds on Information and the Security of Quantum Cryptography

    E-Print Network [OSTI]

    E. Biahm; T. Mor

    1997-01-08T23:59:59.000Z

    Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed states, and we find bounds on the information leaked to an eavesdropper. Our result suggests that quantum cryptography is ultimately secure.

  4. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  5. Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf

    E-Print Network [OSTI]

    Xia, Yu "Brandon"

    1 Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf Information properly and securely. Reason for Policy / Implication Statement Boston University is committed to collecting, handling, storing and using Sensitive Information properly and securely. This Policy establishes

  6. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-11-21T23:59:59.000Z

    This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

  7. Training for Records and Information Management

    Broader source: Energy.gov [DOE]

    Records Management Training:  NARA Records Management Training   NARA Targeted Assistance NARA Brochures Training Presentation:  Information Collection Requests/PRA (pdf)  

  8. Information Management and Supporting Documentation

    Broader source: Energy.gov [DOE]

    The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the Office of Management and Budget (OMB) before undertaking a collection of information...

  9. Information Technology Security Training Requirements Appendix E --Training Cross Reference E-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX E Appendix E -- Training Cross Reference E-1 #12;Information Technology Security Training Requirements Appendix E -- Training Cross Reference E-2 #12;Information Technology Security Training Requirements APPENDIX E -- JOB FUNCTION

  10. Washington and Lee University Guidelines for Responding to Information Security Breaches

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidelines for Responding to Information Security Breaches Notifications 1. As further detailed in the university's Guidelines for Reporting Information Security Breaches regarding an actual or suspected data breach should contact: i. the university's Information Security

  11. J. Douglas Streit, Information Security Officer Office of Computing and Communications Services

    E-Print Network [OSTI]

    J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated February 6, 2012 Old Dominion University Information Technology Security Program #12;J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated

  12. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  13. Int. J. Information and Computer Security, Vol. 4, No. 4, 2011 365 Copyright 2011 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    one of the business process security leitmotifs. It defines a mechanism that bridges the gap between workflow and access control systems. Delegation completion and authorisation enforcement are specified in workflow management systems', Int. J. Information and Computer Security, Vol. 4, No. 4, pp.365

  14. Office of the CISO, February 2011 Information Security and Privacy Risk Advisory

    E-Print Network [OSTI]

    Queitsch, Christine

    Office of the CISO, February 2011 Information Security and Privacy Risk Advisory Phishing Phishing's trust in traditional landline communication. The Office of the Chief Information Security Officer (CISO

  15. USING SECURITY ATTACK SCENARIOS TO ANALYSE SECURITY DURING INFORMATION SYSTEMS DESIGN

    E-Print Network [OSTI]

    is a development methodology tailored to describe both the organisational environment of a system and the system of a soft goal is "the system should be scalable". A task represents a way of doing something. ThusUSING SECURITY ATTACK SCENARIOS TO ANALYSE SECURITY DURING INFORMATION SYSTEMS DESIGN Haralambos

  16. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  17. Ninth Annual Cyber and Information Security Research Conference...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ninth Annual Cyber and Information Security Research Conference Apr 08 2014 04-08-2014 08:30 AM - 04-10-2014 04:00 PM Multiple speakers, multiple disciplines, multiple affiliations...

  18. Information Security Framework for Small and Medium Sized Businesses

    E-Print Network [OSTI]

    Michnick, Steven M.

    2009-06-17T23:59:59.000Z

    Information security issues are a challenge to everyone who uses computers. The rise of the personal computer as a common business tool and the Internet as a common means of business communication and commerce have also created an environment...

  19. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19T23:59:59.000Z

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  20. Securely Managing Cryptographic Keys used within a Cloud Environment

    E-Print Network [OSTI]

    , Co-tenancy, Distributed Management Cryptography essential to secure cloud operations Use of sound;Page 3 Cloud Service Provider (CSP) - Models Cloud Service Models Software as a Service (Saa CSP know who I am? How is my connection to cloud components protected? Administration Who

  1. CAN INTEGRATED WATERSHED MANAGEMENT BRING GREATER FOOD SECURITY IN ETHIOPIA?

    E-Print Network [OSTI]

    Walter, M.Todd

    CAN INTEGRATED WATERSHED MANAGEMENT BRING GREATER FOOD SECURITY IN ETHIOPIA? Oloro V. McHugh, Amy S, Ethiopia Gete Zeleke ARARI, Bahir Dar, Ethiopia Abstract: In the food insecure regions, short annual. Ethiopia's agricultural sector is driven by the subsistence strategies of smallholder farmers

  2. Manager, Sandia National Laboratories | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining the Stockpile Maintaining

  3. Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study Rostyslav-up of security risk management teams and their performance. Three different models were used to construct team security risk management tasks. The study has shown that there is a possible correlation between the teams

  4. Stay protected when connected Visit security.duke.edu for more information.

    E-Print Network [OSTI]

    McShea, Daniel W.

    Stay protected when connected Visit security.duke.edu for more information. Follow these guidelines Visit security.duke.edu for more information. Follow these tips for securing mobile devices: iOS 6/software/. Windows Mac Another free option: Microsoft Security Essentials: http://windows.microsoft.com/en- US/windows/products/security

  5. Security Forms and Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015ParentsMiddle|Security Enforcement Documents Security EnforcementNew

  6. Global plutonium management: A security option

    SciTech Connect (OSTI)

    Sylvester, K.W.B.

    1998-12-31T23:59:59.000Z

    The US surplus plutonium disposition program was created to reduce the proliferation risk posed by the fissile material from thousands of retired nuclear weapons. The Department of Energy has decided to process its Put into a form as secure as Pu in civilian spent fuel. While implementation issues have been considered, a major one (Russian reciprocity) remains unresolved. Russia has made disposition action conditional on extracting the fuel value of its Pu but lacks the infrastructure to do so. Assistance in the construction of the required facilities would conflict with official US policy opposing the development of a Pu fuel cycle. The resulting stagnation provides impetus for a reevaluation of US nonproliferation objectives and Pu disposition options. A strategy for satisfying Russian fuel value concerns and reducing the proliferation risk posed by surplus weapons-grade plutonium (WGPu) is proposed. The effectiveness of material alteration (e.g., isotopic, chemical, etc.{hor_ellipsis}) at reducing the desire, ability and opportunity for proliferation is assessed. Virtually all the security benefits attainable by material processing can be obtained by immobilizing Pu in large unit size/mass monoliths without a radiation barrier. Russia would be allowed to extract the Pu at a future date for use as fuel in a verifiable manner. Remote tracking capability, if proven feasible, would further improve safeguarding capability. As an alternate approach, the US could compensate Russia for its Pu, allowing it to be disposed of or processed elsewhere. A market based method for pricing Pu is proposed. Surplus Pu could represent access to nuclear fuel at a fixed price at a future date. This position can be replicated in the uranium market and priced using derivative theory. The proposed strategy attempts to meet nonproliferation objectives by recognizing technical limitations and satisfying political constraints.

  7. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  8. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking of BlytheDepartment of EnergyTreatmentInformationPlanDevelopment |

  9. Information theoretic security by the laws of classical physics

    E-Print Network [OSTI]

    Mingesz, R; Gingl, Z; Granqvist, C G; Wen, H; Peper, F; Eubank, T; Schmera, G

    2013-01-01T23:59:59.000Z

    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.

  10. Mutual information, bit error rate and security in Wójcik's scheme

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-21T23:59:59.000Z

    In this paper the correct calculations of the mutual information of the whole transmission, the quantum bit error rate (QBER) are presented. Mistakes of the general conclusions relative to the mutual information, the quantum bit error rate (QBER) and the security in W\\'{o}jcik's paper [Phys. Rev. Lett. {\\bf 90}, 157901(2003)] have been pointed out.

  11. MODERN AGRICULTURAL DIGITAL MANAGEMENT NETWORK INFORMATION

    E-Print Network [OSTI]

    MODERN AGRICULTURAL DIGITAL MANAGEMENT NETWORK INFORMATION SYSTEM OF HEILONGJIANG RECLAMATION AREA@126.com Abstract: To meet the need of agriculture management modernization of Heilongjiang reclamation area, further boost large-scale integration level of modern agriculture production and boost management

  12. Acquisition and Project Management | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA AccountManagement | National

  13. Information flow for secure distributed applications

    E-Print Network [OSTI]

    Cheng, Winnie Wing-Yee

    2009-01-01T23:59:59.000Z

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  14. Information Flow for Secure Distributed Applications

    E-Print Network [OSTI]

    Cheng, Winnie Wing-Yee

    2009-08-27T23:59:59.000Z

    Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

  15. advanced traveler information systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Skills Critically reflect on management Neirotti, Juan Pablo 213 Information Systems Security Information Systems Security Computer Technologies and Information Sciences Websites...

  16. Survey Research Methodology in Management Information Systems: An Assessment

    E-Print Network [OSTI]

    Pinsonneault, Alain; Kraemer, Kenneth L.

    1993-01-01T23:59:59.000Z

    Management. 181-186. A survey. Management the impact onskill requirements: A survey. Management Information SystemsManagement Information Systems Research Challenge: Survey

  17. Membership Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining the StockpileNational NuclearMembership

  18. Farmland Security Zone | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazelPennsylvania: EnergyExolisFairway,Farmers MutualFarmland Security

  19. The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute at The Johns Hopkins University (JHUISI) is planning for substantial multi-year growth in the area of

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute of Information Security and Cryptography. Our administration is committed at the highest level to substantially: Applicants in Information Security would also be associated with: · The Information Security Institute

  20. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  1. Information Security Analysis Using Game Theory and Simulation

    SciTech Connect (OSTI)

    Schlicher, Bob G [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

  2. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  3. Share this with To learn more about the AT&T Managed Security Services,

    E-Print Network [OSTI]

    Fisher, Kathleen

    one of the biggest issues for CISOs today. Many Chief Information Security Officers say they're unable

  4. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    9 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation In Ubiquitous Environments Mohamed Aymen Chalouf1 make the concerned communications vulnerable to security attacks because of the open medium on which

  5. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE and expanded its catalog of security controls to help organizations protect their information and information, the revised catalog brings together, for the first time, comprehensive information about security controls

  6. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect (OSTI)

    None

    2005-03-02T23:59:59.000Z

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for former waste management units, legacy contamination source areas and distribution of contamination in soils, and environmental infrastructure (e.g., caps, monitoring systems, etc.) that is in place or planned in association with RAs. (3) Regulatory considerations and processes for management and disposition of waste soil upon generation, including regulatory drivers, best management practices (BMPs), waste determination protocols, waste acceptance criteria, and existing waste management procedures and BMPs for Y-12. This Soil Management Plan provides information to project planners to better coordinate their activities with other organizations and programs with a vested interest in soil disturbance activities at Y-12. The information allows project managers and maintenance personnel to evaluate and anticipate potential contaminant levels that may be present at a proposed soil disturbance site prior to commencement of activities and allows a more accurate assessment of potential waste management requirements.

  7. Claridge Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationin UrbanCity ofCity ofInformationClaridge Management Jump to:

  8. A Uniform Type Structure for Secure Information KOHEI HONDA

    E-Print Network [OSTI]

    Gay, Simon

    A Uniform Type Structure for Secure Information Flow KOHEI HONDA Queen Mary, University of London . . . . . . . . . . . . . . . . . 13 Author's address: K. Honda, Department of Computer Science, Queen Mary, University of London, Mile, Vol. TBD, No. TDB, Month Year, Pages 1--83. #12; 2 · Kohei Honda and Nobuko Yoshida 2.5 Linear

  9. A Uniform Type Structure for Secure Information KOHEI HONDA

    E-Print Network [OSTI]

    Honda, Kohei

    A Uniform Type Structure for Secure Information Flow KOHEI HONDA Queen Mary, University of London . . . . . . . . . . . . . . . . . 13 Author's address: K. Honda, Department of Computer Science, Queen Mary, University of London, Mile. TBD, No. TDB, Month Year, Pages 1­83. #12;2 · Kohei Honda and Nobuko Yoshida 2.5 Linear/Affine Typing

  10. Roadmap: Computer Science Information Security -Bachelor of Science

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Computer Science ­ Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012­2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

  11. Finance, IT Operations& InformationSecurity Dear Colleagues,

    E-Print Network [OSTI]

    Finance, IT Operations& InformationSecurity Dear Colleagues, Compliance and customer service. Strategic planning and attention to day-to-day operations. Some of our activities during the past quarter awareness, and responding to incidents. Thank you to everyone who has completed a survey or provided

  12. Communications of the Association for Information Systems | Number 1Volume 28 Article 22

    E-Print Network [OSTI]

    -1-2011 Information Security Risk Management: In Which Security Solutions Is It Worth Investing? Stefan Fenz Vienna, Thomas (2011) "Information Security Risk Management: In Which Security Solutions Is It Worth Investing://aisel.aisnet.org/cais/vol28/iss1/22 #12;Volume 28 Article 22 Information Security Risk Management: In Which Security Solutions

  13. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23T23:59:59.000Z

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Cancels DOE 5639.8.

  14. Management information systems software evaluation

    SciTech Connect (OSTI)

    Al-Tunisi, N.; Ghazzawi, A.; Gruyaert, F.; Clarke, D. [Saudi Aramco, Dhahran (Saudi Arabia). Process and Control Systems Dept.

    1995-11-01T23:59:59.000Z

    In November 1993, Saudi Aramco management endorsed a proposal to coordinate the development of the Management Information Systems (MISs) of four concurrent projects for its facilities Controls Modernization Program. The affected projects were the Ras Tanura Refinery Upgrade Project, the Abqaiq Plant Controls Modernization and the Shedgum and Uthmaniyah Gas plants Control Upgrade Projects. All of these projects had a significant requirement of MISs in their scope. Under the leadership of the Process and Control Systems Department, and MIS Coordination Team was formed with representatives of several departments. An MIS Applications Evaluation procedure was developed based on the Kepner Tregoe Decisions Analysis Process and general questionnaires were sent to over a hundred potential Vendors. The applications were divided into several categories, such as: Data Capture and Historization, Human User Interface, Trending, Reporting, Graphic Displays, Data Reconciliation, Statistical Analysis, Expert Systems, Maintenance Applications, Document Management and Operations Planning and Scheduling. For each of the MIS Application areas, detailed follow-up questionnaires were used to short list the candidate products. In May and June 1994, selected Vendors were invited to Saudi Arabia for an Exhibition which was open to all Saudi Aramco employees. In conjunction with this, the Vendors were subjected to a rigorous product testing exercise by independent teams of testers. The paper will describe the methods used and the lessons learned in this extensive software evaluation phase, which was a first for Saudi Aramco.

  15. Nonintrusive Lightweight Agents for Information Management

    E-Print Network [OSTI]

    Graham, Nick

    Non­intrusive Lightweight Agents for Information Management S. Varma D.B. Skillicorn November 1997 a non­intrusive approach to building information management systems, based on software agents. Software is a non­intrusive, lightweight software agent that manages bookmarks (web browser pointers to favourite

  16. Stateful UML Design with Security Constraints for Information Assurance The design of software applications using UML embodies

    E-Print Network [OSTI]

    Demurjian, Steven A.

    Stateful UML Design with Security Constraints for Information Assurance Abstract The design design state containing security constraints and insures that information assurance with respect. Keywords: RBAC, MAC, UML, access control, information assurance, secure software design. 1. Introduction

  17. Secure quantum private information retrieval using phase-encoded queries

    E-Print Network [OSTI]

    Olejnik, L

    2011-01-01T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries {[}Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that...

  18. Portland State University Confidentiality and Information Management Policy and Procedures

    E-Print Network [OSTI]

    Bertini, Robert L.

    Portland State University Confidentiality and Information Management Policy and Procedures I and INFORMATION MANAGEMENT POLICY and PROCEDURES Confidentiality and Information Management Policy Information to in the rest of this document as "Confidential University Information." Database records, documents

  19. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  20. Digital Publishing Procedures Category: Information Management

    E-Print Network [OSTI]

    (WA) Policy Manager Vice President Corporate Relations and Development Contact Director, Digital Media1 Digital Publishing Procedures Category: Information Management 1. LEGISLATION a framework for the publishing of the University's digital communications, including but not limited to all

  1. Information Technology Security Training Requirements Appendix A --Learning Continuum A-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX A Appendix A -- Learning Continuum A-1 #12;Information Technology Security Training Requirements Appendix A -- Learning Continuum A-2 #12;Information Technology Security Training Requirements APPENDIX A -- LEARNING CONTINUUM T R A I N I N G E D U

  2. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series FISMA AND TECHNOLOGY 5 FISMA Strategic Vision We are building a solid foundation of information security across one of the largest information technology infrastructures in the world based on comprehensive security standards

  3. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1 York Road Towson, MD 21252 USA The Maryland Alliance for Information Security Assurance (MAISA universities. We work collaboratively to provide opportunities in Information Security Assurance curriculum

  4. Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts

    E-Print Network [OSTI]

    Queitsch, Christine

    Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts Page 1 of 16 Document Name: Information Security and Privacy Laws Version #: vF Created By: Ann Nagel, Associate Chief Information Security Officer Date Created: June 2, 2009 Updated By: Melissa Albin-Wurzer, Education

  5. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    Review your system access with your company's Information Security Officer. Access and downloading of information from laptop computers. Beware that your conversations may not be private or secure to be someone you trust in order to obtain personal or sensitive information. Additional travel security tips

  6. A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp

    E-Print Network [OSTI]

    Bushman, Frederic

    Page 1 I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy OfficerNet) as well as the establishment of information security policies, guidelines, and standards. The Office

  7. University of Connecticut / Jason Pufahl, CISSP, CISM 1 INFORMATION SECURITY STRATEGIC

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 #12;University of Connecticut / Jason Pufahl, CISSP, CISM 2 2 MISSION STATEMENT The mission of the Information Security Office (ISO) is to design

  8. Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.

    E-Print Network [OSTI]

    Lee, Ruby B.

    Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr. Computer Science in one crisis and adversaries in another, raising difficult security issues with respect to information on the information sharing and security risks when coalitions are formed in response to a crisis. This paper defines

  9. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica HighSTARTOperationsInformation | National

  10. Vendor Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrincetonUsing Maps1 - USAFof EnergyVendor Information Vendor

  11. The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories

    Broader source: Energy.gov [DOE]

    The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories was presented to CRENEL 9/15/2014.

  12. Before the Senate Homeland Security and Governmental Affairs...

    Energy Savers [EERE]

    and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland...

  13. 2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID#: ____________________

    E-Print Network [OSTI]

    Mountziaris, T. J.

    2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID YYYY My correct Social Security Number is: ________ - _____ - _________ B. SIGNATURE- For corrections to date of birth. · Signed Social Security card or passport- For corrections to social security

  14. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  15. Information Technology Specialist (System Analysis/Information Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will provide the technical direction, planning, programming, implementation and operations of the Information Technology (IT) program for the Carlsbad Field...

  16. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act of 2002 3 Security Management and Assistance Group (SMA) 4 FISMA Implementation Project 4 Publications

  17. Army Regulation 2555 Information Management: Records

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Regulation 25­55 Information Management: Records Management The Department of the Army Freedom Incorporates the Interim Change No. I01, which expires 30 June 1996 into the baseline regulation dated 10 of Information Act Program *Army Regulation 25­55 Effective 1 December 1997 History. This revision was originally

  18. An introduction Information and Records Management

    E-Print Network [OSTI]

    Hickman, Mark

    Bag 4800 Christchurch 8140 New Zealand www.canterbury.ac.nz Public RecordsAct ata glance · Only of the University. Public Records Act Information and Records Management at UC #12;Public RecordsAct2005 The Public Management team via records@canterbury.ac.nz. Archives New Zealand information on PRA, recordkeeping

  19. NIST Seeks Input for Planned 2011 Update of Security Control Catalog For Federal Information Systems and Organizations

    E-Print Network [OSTI]

    ; · Supply chain security; · Industrial/process control systems; and · Privacy. NIST SP 80053, Revision 3 Publication 80053, Recommended Security Controls for Federal Information Systems and Organizations webbased access to the security controls for federal information systems and organizations

  20. Published in IET Information Security Received on 10th December 2009

    E-Print Network [OSTI]

    Ansari, Nirwan

    Published in IET Information Security Received on 10th December 2009 Revised on 19th March 2010 doi: 10.1049/iet-ifs.2009.0261 Special Issue on Multi-Agent & Distributed Information Security ISSN 1751-8709 Survey of security services on group communications P. Sakarindr N. Ansari Advanced Networking Laboratory

  1. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1: it is bad code. This perspective on computer security education informs the design of our new approach, computer security education is often relegated to a secondary role in undergraduate curricula. Exposure

  2. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Ray, Indrakshi

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how}@cs.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  3. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  4. A Virtual Environment for Interactive Visualization of Power System Economic and Security Information

    E-Print Network [OSTI]

    visualization of power system economic and security information. Keywords: Power System Economics, SecurityA Virtual Environment for Interactive Visualization of Power System Economic and Security Information Thomas J. Overbye Raymond P. Klump Jamie D. Weber Senior Member Member Student Member University

  5. The Economic Consequences of Sharing Security Information Esther Gal-Or1

    E-Print Network [OSTI]

    Camp, L. Jean

    Information technology (IT) security has emerged as an important issue in the last decade. To promote the disclosure and sharing of cyber-security information amongst firms, the US federal government has encouraged-commerce con- tinues to grow, so does cyber crime. According to Jupiter Media Metrix, cyber-security issues

  6. UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY

    E-Print Network [OSTI]

    Adali, Tulay

    UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

  7. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F.; Carroll, J.; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30T23:59:59.000Z

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  8. Manager, Digital Developer Risk & Information Management Group

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    server · Deep understanding of the Web technology stack (TCP/IP, HTTP, HTML, XHTML, XML, JavaScript, CSS with at least one web programming languages such as Python, PHP, C/C++, C#, Ruby, or Java, especially on web, or other Web 2.0 solutions · Experience in machine learning, information retrieval, large-scale data mining

  9. Algorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security

    E-Print Network [OSTI]

    Khisti, Ashish, 1979-

    2009-01-01T23:59:59.000Z

    As modern infrastructure systems become increasingly more complex, we are faced with many new challenges in the area of information security. In this thesis we examine some approaches to security based on ideas from ...

  10. Voluntary Disclosure and Information Asymmetry: Evidence from the 2005 Securities Offering Reform

    E-Print Network [OSTI]

    SHROFF, NEMIT

    In 2005, the Securities and Exchange Commission enacted the Securities Offering Reform (Reform), which relaxes “gun-jumping” restrictions, thereby allowing firms to more freely disclose information before equity offerings. ...

  11. Proceedings of the 7 th World Conference on Information Security Education 910 June 2011, Lucerne, Switzerland

    E-Print Network [OSTI]

    Bishop, Matt

    Proceedings of the 7 th World Conference on Information Security Education 9­10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1­933510­94­3 © IFIP TC11.8 97 moment. Thus, the notion of security varies

  12. Proceedings of the 7th World Conference on Information Security Education

    E-Print Network [OSTI]

    Bishop, Matt

    Proceedings of the 7th World Conference on Information Security Education 9-10 June 2011, Lucerne, Lucerne, Switzerland ISBN: 1-933510-94-3 © IFIP TC11.8 97 moment. Thus, the notion of security varies

  13. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect (OSTI)

    Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

    2011-08-15T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  14. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  15. Information Technology Specialist (Data Management)

    Broader source: Energy.gov [DOE]

    (See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Corporate Services Office, Office of the Chief Information Officer, Enterprise...

  16. Project management plan for Contract Management Information System (CONTRACT)

    SciTech Connect (OSTI)

    Severud, K.J.

    1995-01-27T23:59:59.000Z

    The office of the Vice President of A/E Construction for ICF Kaiser has requested that OSHA compliance statistics be made available to management for companies subcontracting to the ICF Kaiser Company. In addition, a need to better manage contract administrative data for the Contracts Administration and the Construction Management Projects organizations has been identified. The Contract Management Information System is being developed to achieve these objectives. This document provides a Project Management Plan for development of the Contract Management Administration System (CONTRACT) by Design Services DAD/CAE Support. The Project Management Plan describes the project work breakdown structure, safety and quality considerations, with associated cost, schedule and project management information. The CONTRACT System is intended to aid the ICF Kaiser divisions with tracking of A/E subcontractor information to include general contract administration information used by the Contracts Administration organization, contract and safety performance data used by the Construction Management Projects and office of the organization and Vice President of A/E Construction.

  17. Security Requirements for Management Systems using Mobile Agents H. Reiser G. Vogt

    E-Print Network [OSTI]

    Security Requirements for Management Systems using Mobile Agents H. Reiser G. Vogt Munich Network Management Team Munich Network Management Team University of Munich, Germany Munich University of Technology and distributed management systems based on mobile agents have certain advantages over centralized and static

  18. Security Policies as the Foundation for Cryptographic

    E-Print Network [OSTI]

    Security Policies as the Foundation for Cryptographic Key Management Elaine Barker, CKMS Project to Layered Security Policies ­ From Information Management to Key Mngt. ­ From Dept. of Com. To NIST Employees · Security Domains ­ Simple to Complex · Key Management ­ Static to Configurable to Dynamic

  19. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  20. Information requirements of self-managing teams

    SciTech Connect (OSTI)

    Van Aken, E.M.

    1992-12-31T23:59:59.000Z

    In response to the significant challenges organizations face today, many managers have put in place continuous improvement efforts to help the organization on enhance its competitive position. A key element of continuous improvement efforts is employee involvement, and one of the most complex, mature, and effective forms of employee involvement is self-managing teams. A self-managing team is a group of employees, usually eight to fifteen, which is responsible for planning, implementing, controlling, and improving work processes. There are many characteristics of self-managing teams which are discussed frequently in the literature and are common topics of seminars and workshops on SMTs, including the role of the first-line supervisor, the structure of teams, the training necessary, and the pay system for SMTs. However, one area which has not been as widely researched is the role of information - what types of information do self-managing teams need? This paper addresses this question. Results from a multiple case study research project focusing on the information requirements of SMTs are presented. Specifically, seven types of information SMTs need are identified, as well as general characteristics of the information system. By information system, I mean very broadly, the system (both formal and informal) which provides information of any kind to a self-managing team. The results of this research can be thought of as ``design features`` for an information system to support SMTs. Practicing managers can use these design features in two ways: they can design them into beginning SMT efforts; or, for SMTs already established, managers can compare them to the existing information system and adjust accordingly.

  1. Information requirements of self-managing teams

    SciTech Connect (OSTI)

    Van Aken, E.M.

    1992-01-01T23:59:59.000Z

    In response to the significant challenges organizations face today, many managers have put in place continuous improvement efforts to help the organization on enhance its competitive position. A key element of continuous improvement efforts is employee involvement, and one of the most complex, mature, and effective forms of employee involvement is self-managing teams. A self-managing team is a group of employees, usually eight to fifteen, which is responsible for planning, implementing, controlling, and improving work processes. There are many characteristics of self-managing teams which are discussed frequently in the literature and are common topics of seminars and workshops on SMTs, including the role of the first-line supervisor, the structure of teams, the training necessary, and the pay system for SMTs. However, one area which has not been as widely researched is the role of information - what types of information do self-managing teams need This paper addresses this question. Results from a multiple case study research project focusing on the information requirements of SMTs are presented. Specifically, seven types of information SMTs need are identified, as well as general characteristics of the information system. By information system, I mean very broadly, the system (both formal and informal) which provides information of any kind to a self-managing team. The results of this research can be thought of as design features'' for an information system to support SMTs. Practicing managers can use these design features in two ways: they can design them into beginning SMT efforts; or, for SMTs already established, managers can compare them to the existing information system and adjust accordingly.

  2. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContractElectron-State HybridizationSecurity / Emergency Public Information

  3. MBA Concentration in Analytics & Information Management A I M : Analytics & Information Management

    E-Print Network [OSTI]

    Lin, Xiaodong

    MBA Concentration Management Science and Information Systems Michael N. Katehakis, Chair Douglas Jones Sampling 16:540:580 Quality Management Take 3 courses from Area 2 and 1 course from Area 1. 5 / 9 #12;MBA Process Analysis Manager of Information System Analysis Health Care Revenue Cycle Consultant Investment

  4. Enriching personal information management with document interaction histories

    E-Print Network [OSTI]

    Whitton, Mary C.

    Enriching personal information management with document interaction histories by Karl Gyllstrom;Abstract KARL GYLLSTROM: Enriching personal information management with document interaction histories. (Under the direction of David Stotts.) Personal information management is increasingly challenging

  5. Office of Legacy Management. Information and Records Management. Transition Guidance

    SciTech Connect (OSTI)

    none,

    2004-03-01T23:59:59.000Z

    The Office of Legacy Management (LM) is an integral part of the U.S. Department of Energy’s (DOE’s) strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. LM will work with each site using an integrated team approach to ensure a successful transition. Part of this process will include transition of Government records and information. The Office of Legacy Management Information and Records Management Transition Guidance focuses on LM’s goal to preserve and protect legacy records and information. This guidance document establishes a framework for the transfer of records management responsibilities for sites transferring to LM. It describes the requirements, responsibilities, and procedures for the efficient and cost-effective transfer of custody, ownership, and management of records and other information products from the transfer site to LM. Records management practices are critical to the functions of Federal agencies because records provide information about, or evidence of, the organization, functions, policies, decisions, procedures, operations, or other activities. Therefore, the information generated by an agency is created, maintained, and dispositioned through records management processes that ensure the appropriate preservation and retrieval of essential information. Because of their intrinsic value, best practices to preserve information and records should be utilized when records are transferred from one organization to another. As the transfer program completes cleanup activities at closure sites, a transitional process will facilitate the transparent shift in the management of site records activities to LM. The roles and responsibilities of the transfer site and/or program and LM described in this document are a necessary foundation for cooperation and coordination and are essential to the successful transition of records and information responsibilities. The DOE Office of the Chief Information Officer (OCIO) has a central role in DOE records management by providing guidance, expertise, and coordination to all DOE offices and organizations and coordination with the National Archives and Records Administration (NARA). LM and the transfer site will complete an integrated transition plan which will integrate all transition elements including information and records. As part of the overall transition plan, an Information and Records Transition Plan will be developed consistent with the integrated transition plan for the site transfer and included as an attachment. The Information and Records Management Transition Plan will be developed to assist both organizations in organizing the tasks; establishing a timetable and milestones for their completion; and identifying manpower, funding and other resources that will be needed to complete the ownership transfer. In addition, the plan will provide a valuable exchange of institutional knowledge that will assist LM in meeting the obligations of responsibly managing legacy records. Guidance for the development of the plan is included in this document. Records management concerns that may arise during site closure, such as management support, contract language and agreements, interactions with the OCIO and NARA, resource and budget considerations, and procedures to safeguard records are addressed. Guidelines and criteria for records management transition activities are also provided. These include LM expectations for the inventory, scheduling, and disposition of records; the management and transfer of electronic files, including databases and software; records finding aids, indices, and recordkeeping systems; and the process for the transfer of hard copy and electronic records to LM.

  6. DOE Selects Lawrence Livermore National Security, LLC to Manage...

    Office of Environmental Management (EM)

    and operating contractor for DOE's National Nuclear Security Administration's (NNSA) Lawrence Livermore National Laboratory in California. "Livermore National Laboratory...

  7. CONTRACTOR ASBESTOS INFORMATION ASBESTOS MANAGEMENT AT SFU

    E-Print Network [OSTI]

    CONTRACTOR ASBESTOS INFORMATION ASBESTOS MANAGEMENT AT SFU An extensive Asbestos Survey has been term Asbestos Management Program was approved by the Workers' Compensation Board of British Columbia. Note: There is a possibility that ACM containing materials may not have been identified or labeled

  8. Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information prepared by the Office of Security and Public

    E-Print Network [OSTI]

    Collins, Gary S.

    of Security and Public Safety. Information prepared by the Office of Security and Public Safety at WSU Spokane and Security Department Information 3 Reporting, Access and Programs 3-5 Policies and Procedures 6Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office

  9. LM Records and Information Management Transition Guidance (January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Records and Information Management Transition Guidance (January 2015) LM Records and Information Management Transition Guidance (January 2015) This guidance document establishes a...

  10. Best Management Practice #2: Information and Education Programs...

    Office of Environmental Management (EM)

    Water Use Reduction Best Management Practice 2: Information and Education Programs Best Management Practice 2: Information and Education Programs Educating users about water...

  11. U-168: EMC Documentum Information Rights Management Server Bugs...

    Broader source: Energy.gov (indexed) [DOE]

    8: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote...

  12. Energy Management and Information Systems Study - 2014 BTO Peer...

    Energy Savers [EERE]

    Management and Information Systems Study - 2014 BTO Peer Review Energy Management and Information Systems Study - 2014 BTO Peer Review Presenter: Jessica Granderson, Lawrence...

  13. A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS

    E-Print Network [OSTI]

    Baras, John S.

    A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS several information security goals, such as authentication, integrity and secrecy, have often been and the Institute for Systems Research, University of Maryland, College Park, MD, 20742 ABSTRACT Most information

  14. 6/17/13 (v1.2) Information Security Exit Process

    E-Print Network [OSTI]

    Kay, Mark A.

    6/17/13 (v1.2) Information Security Exit Process All Stanford related PHI, and other Restricted and Prohibited information (see http://dataclass.stanford.edu for details) must be securely may be held liable in the future. Once the applicable Stanford information has been removed

  15. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

  16. Security in the Telecommunications Information Networking Architecture --the CrySTINA Approach \\Lambda

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    Security in the Telecommunications Information Networking Architecture -- the CrySTINA Approach results of the CrySTINA project. We analyze and structure the security problem domain in the TINA­C architecture and present our approach to pro­ vide the necessary security functionality in the form of self

  17. ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION

    E-Print Network [OSTI]

    Lazos, Loukas

    ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast

  18. SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01T23:59:59.000Z

    SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of threats note of the data security issues covered in these publications. Ask yourself "Is my business vulnerable network with your peers, talk about cyber security issues. Give and get advice, hints, tips, etc. 4. Make

  19. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-13T23:59:59.000Z

    The purpose of this directive is to ensure that STI is appropriately managed as part of the DOE mission to enable the advancement of scientific knowledge and technological innovation. Cancels DOE O 241.1A and DOE O 241.1A Chg 1.

  20. 29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources ­ Portable Devices: Information Security Approved of its established security realm (e.g., authentication mechanism, firewall, or encryption). Information

  1. Managing agile information technology infrastructure

    E-Print Network [OSTI]

    Kalissery, Biju

    2007-01-01T23:59:59.000Z

    Information technology (IT) can be a key contributor for the successful implementation of business strategies. However, companies normally find it hard to synchronize their evolving business strategies with the capabilities ...

  2. Cyber safety : a systems thinking and systems theory approach to managing cyber security risks

    E-Print Network [OSTI]

    Salim, Hamid M

    2014-01-01T23:59:59.000Z

    If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet ...

  3. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/survivability. Our discussion employs the power transmission grid. 1 Introduction

  4. CargoNet : micropower sensate tags for supply-chain management and security

    E-Print Network [OSTI]

    Malinowski, Mateusz Ksawery

    2007-01-01T23:59:59.000Z

    This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state ...

  5. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect (OSTI)

    Madden, Michael S.

    2010-05-01T23:59:59.000Z

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  6. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-15T23:59:59.000Z

    The Guide provides a methodology for implementing the safeguards and security requirements of DOE O 413.3B. Cancels DOE G 413.3-3.

  7. Ross Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with form HistoryRistma AG Jump to: navigation,Rolls RoyceRosa SRoss Management

  8. Vantage Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlin BaxinUmwelt Management AGUserVHF TechnologiesVan Ness

  9. Efficient Private Information Retrieval Using Secure Xiangyao Yu, Christopher W. Fletcher

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    attention from the cryptography and security communities. Two main approaches to solve PIR have appearedEfficient Private Information Retrieval Using Secure Hardware Xiangyao Yu, Christopher W. Fletcher, marten, devadas}@mit.edu ABSTRACT Existing crypto-based Private Information Retrieval (PIR) schemes

  10. Security Awareness Programs During orientation in September, students are informed of services offered by the University

    E-Print Network [OSTI]

    Escher, Christine

    Security Awareness Programs During orientation in September, students are informed of services. Video and slide presentations outline ways to maintain personal safety and residence hall security. Students are told about crime on campus and in surrounding neighborhoods. Similar information is presented

  11. Toward a generic model of security in organizational context: exploring insider threats to information infrastructure.

    SciTech Connect (OSTI)

    Martinez-Moyano, I. J.; Samsa, M. E.; Burke, J. F.; Akcam, B. K.; Decision and Information Sciences; Rockefeller Coll. at the State Univ. of New York at Albany

    2008-01-01T23:59:59.000Z

    This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.

  12. 29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE

    E-Print Network [OSTI]

    29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE 29.01.03.M1 Security of Electronic Information Resources Approved May 27, 2002 Revised May 28, 2009 Revised October 15, report and transmit information. Information Security Awareness Assessment and Compliance (ISAAC

  13. Research With Students My principal research activities lie in information systems security with particular emphasis on access control

    E-Print Network [OSTI]

    of security, and secure transaction processing. My recent research has expanded beyond information systemsResearch With Students My principal research activities lie in information systems security and mining, semantic web and multimedia delivery. 1 Major Results · Security solutions for workflow systems

  14. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-09T23:59:59.000Z

    To establish Department of Energy (DOE) requirements and responsibilities to ensure that scientific and technical information (STI) is identified, processed, disseminated, and preserved in a manner that (a) enables the scientific community and the public to locate and use the unclassified and unlimited STI resulting from DOE's research and related endeavors and (b) ensures access to classified and sensitive unclassified STI is protected according to legal or Departmental requirements. Cancels DOE O 241.1. Canceled by DOE O 241.1A Chg 1.

  15. Vencon Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown of Ladoga,planning methodologies andVacantVanInformationVelocys Jump

  16. Power Management Mechanism Exploiting Network and Video Information over Wireless

    E-Print Network [OSTI]

    Bouras, Christos

    Power Management Mechanism Exploiting Network and Video Information over Wireless Links Christos information from higher network layers may be utilized for more efficient power management in wireless- tune transmission power according to information received from the transport (feedback reports from

  17. Power Management Mechanism Exploiting Network and Video Information over Wireless

    E-Print Network [OSTI]

    Bouras, Christos

    Power Management Mechanism Exploiting Network and Video Information over Wireless Links Christos- layer information from higher network layers may be utilized for more efficient power management that fine- tune transmission power according to information received from the transport (feedback reports

  18. Managerial information behaviour: Relationships among Total Quality Management orientation, information use environments, and managerial roles

    E-Print Network [OSTI]

    Simard, C; Rice, Ronald E

    2006-01-01T23:59:59.000Z

    NetWorking Total quality management and the control of workall information reported to management Quality means meetingby integrating total quality management and socio-technical

  19. Environmental remediation and waste management information systems

    SciTech Connect (OSTI)

    Harrington, M.W.; Harlan, C.P.

    1993-12-31T23:59:59.000Z

    The purpose of this paper is to document a few of the many environmental information systems that currently exist worldwide. The paper is not meant to be a comprehensive list; merely a discussion of a few of the more technical environmental database systems that are available. Regulatory databases such as US Environmental Protection Agency`s (EPA`s) RODS (Records of Decision System) database [EPA, 1993] and cost databases such as EPA`s CORA (Cost of Remedial Action) database [EPA, 1993] are not included in this paper. Section 2 describes several US Department of Energy (DOE) Environmental Restoration and Waste Management (EM) information systems and databases. Section 3 discusses several US EPA information systems on waste sites and technologies. Section 4 summarizes a few of the European Community environmental information systems, networks, and clearinghouses. And finally, Section 5 provides a brief overview of Geographical Information Systems. Section 6 contains the references, and the Appendices contain supporting information.

  20. Social Security Administration Information Phone: (706) 542-2900 Fax: (706) 583-0123 Web: international.uga.edu Email: issis@uga.edu

    E-Print Network [OSTI]

    Hall, Daniel

    Social Security Administration Information Phone: (706) 542-2900 Fax: (706) 583-0123 Web and return, you will keep the same number. For additional information you may visit the Social Security with your new Social Security information. #12;

  1. Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)

    E-Print Network [OSTI]

    1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS, Acting Chief, Computer Security Division, Information Technology Laboratory (ITL), NIST 9 Data Using Encryption Matthew Scholl, Computer Security Division, Information Technology Laboratory

  2. An interactive spatial information management system on the internet: the fire ant spatial information management system

    E-Print Network [OSTI]

    Dudek, Timothy Kirk

    2000-01-01T23:59:59.000Z

    to that information. The primary purpose of any information management system is to provide users with information that is complete, accurate, and in real-time (Obermeyer and Pinto 1994). The Internet has the capability to do just that with spatial data...

  3. Fact Sheet Preliminary Notice of Violation: Classified Information...

    Broader source: Energy.gov (indexed) [DOE]

    National Security, LLC (LANS) for violations of Department of Energy (DOE) classified information security program requirements. LANS is the management and operating contractor...

  4. Model-driven Security Policy Deployment: Property Oriented Approach

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    and managing the access control rules of an information system are some of the major concerns of security systems. We formally prove the process of de- ploying a security policy related to an information system the deployment of access control security policies. We show how the use of a formal ex- pression of the security

  5. Management of Security Policy Configuration using a Semantic Threat Graph Approach

    E-Print Network [OSTI]

    Foley, Simon

    Management of Security Policy Configuration using a Semantic Threat Graph Approach Simon N. Foley, in turn, unnec- essarily expose the enterprise to known threats. This paper proposes a threat management Threat Graphs, a variation of the tradi- tional Threat/Attack Tree, extended in order to relate semantic

  6. The Department of Homeland Security Energy Management Program

    Energy Savers [EERE]

    2, 2007 4 Structure The Energy Program is managed through the Energy Management Council (EMC) Formally established by Charter signed June 11, 2004 Reports to Chief...

  7. Automated Information Management via Abductive Logic Agents

    E-Print Network [OSTI]

    Toni, Francesca

    Automated Information Management via Abductive Logic Agents F.Toni 1 Imperial College of Science representation of networks and meta-data via abductive logic programs and make use of the reasoning engine abductive logic pro- grams are equipped with for checking as well as enforcing the properties represented

  8. Information Management Software Services IMS Services Overview

    E-Print Network [OSTI]

    Information Management Software Services IMS Services Overview You know how powerful and important performance and available manner. This requires that the IMS systems, applications, databases, and supporting and then create a written report on recommendations to improve setup, procedures and processes associated

  9. Management Information Systems Mexico City EMBA Program

    E-Print Network [OSTI]

    Ghosh, Joydeep

    Management Information Systems Mexico City EMBA Program Spring 2012 Professor : Professor Anitesh benefits. The true benefits of IT can be realized only when organizations exploit certain characteristics ISBN-13: 978-0123822291 Data Mining for Business Intelligence: Concepts, Techniques, and Applications

  10. NUMBER: 1626 TITLE: Information Technology Management

    E-Print Network [OSTI]

    cost of more than $100,000 but less than $1 million. E. University Advisory Council on Technology (UACT technology project estimated to cost $1 million or more or deemed to be mission-critical. VI. Designated1626 - 1 NUMBER: 1626 TITLE: Information Technology Management APPROVED: September 9, 2005 I

  11. Information System Security Officer (ISSO) | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe RankingReformManager (ISSM) Information System

  12. 29.01.03.M1.28 Information Resources Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.28 Information Resources ­ Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.28 Information Resources ­ Security Surveillance Approved April 13, 2010 Revised by the University Police Department #12;29.01.03.M1.28 Information Resources ­ Security Surveillance Page 2 of 4

  13. 29.01.03. M1.18 Information Resources Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.18 Information Resources ­ Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.18 Information Resources ­ Security Monitoring Approved July 18, 2005 Revised April 27, etc. Reason for SAP The purpose of the security monitoring policy is to ensure that information

  14. 29.01.03. M1.19 Information Resources Security Awareness Training Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.19 Information Resources ­ Security Awareness Training Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.19 Information Resources ­ Security Awareness and Training Approved July 18 Administrative Procedure Statement Understanding the importance of information security and individual

  15. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  16. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    SciTech Connect (OSTI)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08T23:59:59.000Z

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.

  17. Final Report Implementing Office of Management and Budget Information...

    Broader source: Energy.gov (indexed) [DOE]

    Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) Final Report Implementing Office of Management and Budget...

  18. SMB Information Security Seminar (2013) Exercise 2 Estimated costs from bad things happening to your

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01T23:59:59.000Z

    SMB Information Security Seminar (2013) Exercise 2 ­ Estimated costs from bad things happening to your important information. First, think about the information used in/by your organization. Second, enter into the table below your top two highest priority information types. Third, enter estimated costs

  19. CIRP Design Conference 2011 Product Lifecycle Management Model for Design Information Management in

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    CIRP Design Conference 2011 Product Lifecycle Management Model for Design Information Management Product Lifecycle Management (PLM) is one way to improve productivity in all manufacturing companies. Keywords: Product Lifecycle Management, Product Process Organisation Model, Unified Modelling Language 1

  20. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  1. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard

    E-Print Network [OSTI]

    Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard Stefan Fenz an ontology-based framework to improve the preparation of ISO/IEC 27001 audits, and to strengthen the security elaborate on how ISO/IEC 27001 artifacts can be inte- grated into this ontology. A basic introduction

  2. Gerry McCartney Vice President for Information

    E-Print Network [OSTI]

    Hedrick, Chief Information Security Officer, Interim IT Security and Policy Identity & Access Management Information Security Policy & Compliance Information Security Services Brent Drake Chief Data Officer, OfficeGerry McCartney Vice President for Information Technology and System Chief Information Officer

  3. Information needs for risk management/communication

    SciTech Connect (OSTI)

    Bennett, D.A. [Environmental Protection Agency, Washington, DC (United States)

    1990-12-31T23:59:59.000Z

    The hazardous waste cleanup program under the Comprehensive Environmental Response, Compensation, and Liability Act (Superfund) is delegated to the ten Regions of the US Environmental Protection Agency (EPA) and has, to date, identified more than 33,000 sites for consideration. The size and complexity of the program places great demands on those who would provide information to achieve national consistency in application of risk assessment while meeting site-specific needs for risk management and risk communication.

  4. Restricting information flow in security APIs via typing 

    E-Print Network [OSTI]

    Keighren, Gavin

    2014-06-27T23:59:59.000Z

    Security APIs are designed to enable the storage and processing of confidential data without that data becoming known to individuals who are not permitted to obtain it, and are central to the operation of Automated Teller ...

  5. GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor

    E-Print Network [OSTI]

    , was written by Karen Scarfone and Murugiah Souppaya of NIST, and by Amanda Cody and Angela Orebaugh of Booz Allen Hamilton. The new guide replaces NIST SP 800-42, Guideline on Network Security Testing. NIST SP

  6. HR System Access Request Form Security Administration, Human Resources (HR) For additional instructions and information, log onto http://hr.vanderbilt.edu/security/

    E-Print Network [OSTI]

    Simaan, Nabil

    instructions and information, log onto http://hr.vanderbilt.edu/security/ Home Department VUnet IDHR EmployeeHR System Access Request Form Security Administration, Human Resources (HR) For additional ID Name Email AddressWork Phone Home Dept Name Effective Date of Access Operator Information I

  7. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified...

  8. User Information for the NARSTO Quality Management Documents

    E-Print Network [OSTI]

    to Cite NARSTO's On-line Quality Management Documents. NARSTO Quality Systems Management Plan (ORNL's Quality Systems Management Plan, Quality Planning Handbook, and Data Management HandbookUser Information for the NARSTO Quality Management Documents Do You Have the Most Recent Version

  9. A Knowledge Base for Justified Information Security Decision-Making D. Stepanova, S. E. Parkin, A. van Moorsel.

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Information Security Officer (CISO) within an organisation to ensure that such information is adequately protected. External standards exist to advise CISOs on how to secure information, but these are essentially insecure employee behaviour. CISOs require more information than they are currently provided

  10. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V. [NSTec

    2014-05-30T23:59:59.000Z

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  11. Panel on protection and management of plutonium: Subpanel on safeguards and security

    SciTech Connect (OSTI)

    Tape, J.W.

    1995-07-01T23:59:59.000Z

    Nuclear materials safeguards and security systems are described in the context of the nuclear nonproliferation regime. Materials of interest to safeguards, threats, proposals to strengthen International Atomic Energy Agency safeguards, evolving safeguards issues and requirements, system effectiveness, and elements of a global nuclear materials management regime are discussed. Safeguards are seen as an essential element of nuclear materials management, but not a driver for decisions regarding nuclear power or the disposal of excess weapon nuclear materials.

  12. improve your position Master of Science Programme Information Management

    E-Print Network [OSTI]

    Twente, Universiteit

    improve your position Master of Science Programme Information Management and Technology Information Technology and Management Information technology has become a common and indispensable tool for modern this question you need a thorough understanding of the possible role of information technology in organizations

  13. PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Deanna Harvey, Program Analyst Allen Rome, Cyber Security Program Manger Chris Shipp, Information System Security Manager (504) 734-4339 Rick.Shutt@spr.doe.gov (504) 734-4316...

  14. Building boundary is necessary for the real estate industry, flood management, and homeland security applications.

    E-Print Network [OSTI]

    Shan, Jie

    Abstract Building boundary is necessary for the real estate industry, flood management, and homeland security applications. The extraction of building boundary is also a crucial and difficult step, and Purdue University campus are evaluated. Introduction Airborne lidar (light detection and ranging

  15. Secure Business Process Management: A Roadmap Thomas Neubauer, Markus Klemen, Stefan Biffl

    E-Print Network [OSTI]

    process life cycle. I. INTRODUCTION In many domains companies model and optimize their busi- ness process management (BPM) aims at efficiently creating business value there is a number of threats are continously increasing their resources to protect their business processes against security threats. Companies

  16. Waste Management Facilities Cost Information Report

    SciTech Connect (OSTI)

    Feizollahi, F.; Shropshire, D.

    1992-10-01T23:59:59.000Z

    The Waste Management Facility Cost Information (WMFCI) Report, commissioned by the US Department of Energy (DOE), develops planning life-cycle cost (PLCC) estimates for treatment, storage, and disposal facilities. This report contains PLCC estimates versus capacity for 26 different facility cost modules. A procedure to guide DOE and its contractor personnel in the use of estimating data is also provided. Estimates in the report apply to five distinctive waste streams: low-level waste, low-level mixed waste, alpha contaminated low-level waste, alpha contaminated low-level mixed waste, and transuranic waste. The report addresses five different treatment types: incineration, metal/melting and recovery, shredder/compaction, solidification, and vitrification. Data in this report allows the user to develop PLCC estimates for various waste management options.

  17. NNSA selects Consolidated Nuclear Security, LLC to manage the consolidated

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout UsNational Nuclear

  18. NNSA Field Office Manager Moves | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintainingAdministration B61NuclearField Office

  19. Safeguards and Security for Program and Project Management - DOE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection245C Unlimited ReleaseWelcome ton nSafeguards and Security

  20. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment of

  1. Security Analysis and Project Management Systems | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M MSecurity bySecurity

  2. Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security

    E-Print Network [OSTI]

    Kim, Kwangjo

    #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID Issues - ICU 5 Mobile RFID Technology (1/2) RFID readers would become ubiquitous Get easy and quick Mobile RFID Technology (2/2) A mobile phone or any portable device Also behaves as RFID reader

  3. What can I do with a degree in Telecommunications and Information Management (TIM)

    E-Print Network [OSTI]

    de Doncker, Elise

    Communications Manager Production Line Manager Management Consulting Materials Controller Market Research AnalystWhat can I do with a degree in Telecommunications and Information Management (TIM) Telecommunications and Information Management involves the integration of business information systems

  4. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30T23:59:59.000Z

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  5. CMAD IV 11/14/96 Information Security

    E-Print Network [OSTI]

    California at Davis, University of

    utilities, power pools, vendors etc.. #12;CMAD IV 11/14/96 #12; #12; GridCo LineCo PoolCo Energy Merchant INFO INFO INFO $ $ $ PWR PWR PWR #12;CMAD IV 11/14/96 "Future" Is At Hand · Federal Energy Regulatory protection and audit practices inadequate. · Internal priorities limiting attention to security concerns

  6. Delegating Network Security with More Information Stanford University

    E-Print Network [OSTI]

    's networks. Delegation makes administrators less of a bottle- neck when policy needs to be modified and allows network administration to follow organizational lines. To enable del- egation, we propose ident authority, the network administrator, that administrator has usually had to configure myriad security

  7. INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu

    E-Print Network [OSTI]

    Shyy, Wei

    what might be lurking there ready to attack. According to the SANS (SysAdmin, Audit, Network, Security the Internet with an administrator's account, your computer is at an even higher risk since most malicious code is designed to infiltrate your computer by using the total access of the administrator's account against you

  8. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  9. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  10. Technology & Information Management Minor Curriculum Chart: 2013-2014

    E-Print Network [OSTI]

    Stuart, Josh

    Technology & Information Management Minor Curriculum Chart: 2013-2014 http 11B or 19B TIM 105 Management of Technology I · ISM 50 or perm. of instructor Entry Level Writing Requirement TIM 158 Business Strategy & Information Systems · ISM 105 TIM 125 Management of Technology II

  11. Interactive Volumetric Information Visualization for Document Corpus Management

    E-Print Network [OSTI]

    Miller, Ethan L.

    Interactive Volumetric Information Visualization for Document Corpus Management David S Ebert U must be extracted. By contrast, information analysis or document corpus management seeks to understand system that aids in the document corpus management task by em- ploying 3D volumetric visualization

  12. Non-intrusive Lightweight Agents for Information Management

    E-Print Network [OSTI]

    Graham, Nick

    Non-intrusive Lightweight Agents for Information Management S. Varma D.B. Skillicorn November 1997 a non-intrusive approach to building information management systems, based on software agents. Software is a non-intrusive, lightweight software agent that manages bookmarks web browser pointers to favourite

  13. On the Computational Practicality of Private Information Retrieval Network Security and Applied Cryptography Lab

    E-Print Network [OSTI]

    Carbunar, Bogdan

    On the Computational Practicality of Private Information Retrieval Radu Sion Network Security of single-server computational pri- vate information retrieval (PIR) for the purpose of preserv- ing client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real

  14. The Value of Information in Inventory Management

    E-Print Network [OSTI]

    2007-05-24T23:59:59.000Z

    Inventory management traditionally assumes the precise knowledge of the ... stage inventory management in a robust optimization framework; the precise ...

  15. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01T23:59:59.000Z

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  16. AT&TConsulting Incident Management Program Security Services

    E-Print Network [OSTI]

    Fisher, Kathleen

    and best practices. The AT&T Incident Management Program service provides expert resources to assess overhaul. AT&T Consulting will create custom solutions that are practical, efficient and help address response to a proactive, preventative approach. Although new technology solutions, such as Intrusion

  17. Moving Objects Information Management: The Database (Vision Paper)

    E-Print Network [OSTI]

    Wolfson, Ouri E.

    transportation and air traffic control, weather forecasting, emergency response, mobile resource management, and mobile workforce. Location management, i.e. the management of transient location information, is an enabling technology for all these applications. Location management is also a fundamental component

  18. Information flow in the DAMA Project beyond database managers: Information flow managers

    SciTech Connect (OSTI)

    Russell, L. [Argonne National Lab., IL (United States); Wolfson, O.; Yu, C. [Illinois Univ., Chicago, IL (United States)

    1996-03-01T23:59:59.000Z

    To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

  19. FORECAST: CLOUDY Prepare for the future of electronic records management in the cloud by earning a Master's

    E-Print Network [OSTI]

    Su, Xiao

    Asset Manager, Risk Management Consultant, Technical Information Specialist, or Knowledge Manager ­ just Management Records Management BigData Data Curation Cyber Corporate Archives Security Preservation in their MLIS electives, including courses in Archives and Manuscripts, Preservation Management, Digitization

  20. Wild deer management An issues paper to inform the

    E-Print Network [OSTI]

    Wild deer management in Wales An issues paper to inform the preparation of a management strategy and action plan for wild deer in Wales #12;Contents Introduction and explanatory note.................................................... 3 1. Background: wild deer in Wales.................................................... 5 2. Current

  1. 29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.26 Information Resources ­ Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources ­ Information Security Risk Assessment Reviews system and the value and accuracy of their information security risk assessments. Reason Information

  2. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15T23:59:59.000Z

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  3. Management of Naval Reactors' Cyber Security Program, OIG-0884

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetterEconomyDr.Energy University ofOverviewManagement of

  4. University Policy No.: IM7400 Classification: Information Management

    E-Print Network [OSTI]

    Victoria, University of

    University Policy No.: IM7400 Classification: Information Management POLICY ON THE DISTRIBUTIONPherson Library · Petch · Sedgewick · Student Union · Theatre · University Centre · Visual Arts 1.2 Off

  5. 2014 Construction Management Program Information The UNLV Construction Management program is accredited by the American Council for

    E-Print Network [OSTI]

    Walker, Lawrence R.

    2014 Construction Management Program Information The UNLV Construction Management program is accredited by the American Council for Construction Education (ACCE). Our most recent accreditation visit this information for the UNLV Construction Management program. If you have questions about the information

  6. NMMSS Information, Reports & Forms | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining theSan Jose-San|NGSI Safeguards|

  7. TEPS/BPA Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmericaAdministration |SecurityNuclearTHE

  8. Evergreen Securities formerly Ethanol Investments | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazelPennsylvania: Energy Resources(RECP)Coolers Jump to:New York,Securities

  9. EcoSecurities Brasil Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazel Crest, Illinois: EnergyEastport, Maine:EauEcoFactor IncEcoSecurities

  10. The Value of Information in Inventory Management

    E-Print Network [OSTI]

    Gokhan Metan

    2007-05-25T23:59:59.000Z

    May 25, 2007 ... Abstract: Inventory management traditionally assumes the precise knowledge of the underlying demand distribution and a risk-neutral manager ...

  11. Akeida Capital Management | Open Energy Information

    Open Energy Info (EERE)

    Akeida Capital Management Jump to: navigation, search Name: Akeida Capital Management Place: New York, New York Zip: 10036 Region: Northeast - NY NJ CT PA Area Product: Financing...

  12. INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment

    SciTech Connect (OSTI)

    None

    2009-05-01T23:59:59.000Z

    The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

  13. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    SciTech Connect (OSTI)

    Not Listed

    2011-09-01T23:59:59.000Z

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  14. 2015 Information Management Conference Deadline May 22, 2015

    Broader source: Energy.gov [DOE]

    The 34th Information Management Conference (IMC) sponsored by the Office of the Chief Information Officer (OCIO) will be held at the Gaylord Opryland Convention Center in Nashville, TN, June 15-18....

  15. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732onMakeEducation Programs Business Enclave PIA - INLDepartment

  16. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctoberMultifamily Landlords1Reality2009 |

  17. V-192: Symantec Security Information Manager Input Validation Flaws Permit

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerabilityApple

  18. V-192: Symantec Security Information Manager Input Validation Flaws Permit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|Attacks |1:

  19. Secure Program Execution Via Dynamic Information Flow Tracking

    E-Print Network [OSTI]

    Suh, G. Edward

    2003-07-21T23:59:59.000Z

    We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...

  20. National Interest Security Company NISC Formerly Technology Management

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer PlantMunhall, Pennsylvania: EnergyEnergy Information Conference ofAnalyses | Place:

  1. The U.S. Department of Energy, National Nuclear Security Agency's Use of Geographic Information Systems for Nuclear Emergency Response Support

    SciTech Connect (OSTI)

    A. L. Guber

    2001-06-01T23:59:59.000Z

    The U.S, Department of Energy (DOE), National Nuclear Security Agency's (NNSA) Remote Sensing Laboratory (RSL) provides Geographic Information System (GIS) support during nuclear emergency response activities. As directed by the NNSA, the RSL GIS staff maintains databases and equipment for rapid field deployment during an emergency response. When on location, GIS operators provide information products to on-site emergency managers as well as to emergency managers at the DOE Headquarters (HQ) Emergency Operations Center (EOC) in Washington, D.C. Data products are derived from multiple information sources in the field including radiological prediction models, field measurements taken on the ground and from the air, and pertinent information researched on the Internet. The GIS functions as a central data hub where it supplies the information to response elements in the field, as well as to headquarters officials at HQ during emergency response activities.

  2. Private Information Retrieval, Optimal for Users and Secure Coprocessors

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    @dbis.informatik.hu­berlin.de Abstract. A private information retrieval (PIR) protocol allows a user to retrieve one of N records from a database while hiding the identity of the record from the database server. A PIR protocol is optimal Private Information Retrieval (PIR) protocols. Formally, a PIR protocol allows a user to retrieve one of N

  3. An Information Security Education Initiative for Engineering and Computer Science

    E-Print Network [OSTI]

    or cordless telephones. Elements of the U.S. civilian infrastructure such as the banking system, the electric Department of Electrical and Computer Engineering Syracuse University Syracuse, NY 13224 Cynthia Irvine- being of the nation's information infrastructure 14]. The information infrastructure includes

  4. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  5. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  6. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  7. A management information system model for convenience stores

    E-Print Network [OSTI]

    Moede, Eric Arne

    1978-01-01T23:59:59.000Z

    of infomna- tion that convenience store managers can use to accomplisll coimoany objecti v s . This model will serv as a guide with which convenience store companies can set up thei r own management information systems . ~si. Obj eii es 1) Identify...', and 6) the organizational impact of a manage- ment information system. E~i i 1 R h i ll g I I 0 ~tip. 5 -. +s The majority of research on management information systems has been theoretically oriented. Little empirical research has been achieved...

  8. Information Security Advisory Committee Report on Committee Activities in 2012-2013 Academic Year

    E-Print Network [OSTI]

    O'Toole, Alice J.

    it is the responsibility of the President and the Chief Information Security Officer (CISO) to ensure that the mandate a list of questions that were posed to the campus CISO on February 22, 2013. Responses to these questions were requested within two weeks. The CISO's responses were received on March 4, 2013. Based on its

  9. University of London International Academy MSc/PG Dip in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    from the criminal angle and presenting a study of computer crime and the computer criminal. We criminals. Pre-requisites None Essential Reading Cybercrime: The transformation of crime in the Information should be able to: follow trends in computer crime relate computer security methodologies to criminal

  10. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  11. Security-Widefield, Colorado: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro Industries Pvt Ltd JumpInformationScotts Corners, New York:YouInformation 4

  12. Guide to the Management of Scientific and Technical Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-11-23T23:59:59.000Z

    This Guide to the management of scientific and technical information (STI) provides nonmandatory guidelines for implementing the objective, requirements, and responsibilities of Department of Energy (DOE) O 241.1A, Scientific and Technical Information Management. Cancels DOE G 241.1-1. Canceled by DOE N 251.83. Best practices, instructions, and additional information are now accessible at www.osti.gov/stip.

  13. Information Collection Management | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Administration handles the approval process for statistical energy information collections and customer surveys. USC Title 44 Chapter 35, Section 3507 - Public information...

  14. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    James M. Chappell; Derek Abbott

    2012-12-31T23:59:59.000Z

    The idealized Kish-Sethuraman (KS) cipher is theoretically known to offer perfect security through a classical information channel. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a physical realization having benefits in increased security with reduced complexity.

  15. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    Chappell, James M

    2012-01-01T23:59:59.000Z

    The idealized Kish-Sethuraman (KS) cipher is known to offer perfect information theoretical security with classical physical means. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a three and four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a classical physical realization having benefits in increased security with reduced complexity.

  16. Putting Security in Context: Visual Correlation of Network Activity with Real-World Information

    SciTech Connect (OSTI)

    Pike, William A.; Scherrer, Chad; Zabriskie, Sean J.

    2008-06-04T23:59:59.000Z

    To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the analyst’s world knowledge that puts these attributes in context. What known exploits or new vulnerabilities might an anomalous traffic pattern suggest? What organizational, social, or geopolitical events help forecast or explain attacks and anomalies? Few visualization tools support creating, maintaining, and applying this knowledge of the threat landscape. Through a series of formative workshops with practicing security analysts, we have developed a visualization approach inspired by the human process of contextualization; this system, called NUANCE, creates evolving behavioral models of network actors at organizational and regional levels, continuously monitors external textual information sources for themes that indicate security threats, and automatically determines if behavior indicative of those threats is present on a network.

  17. Texas A&M AgriLife Research Procedures 29.01.03.A0.01 Information Resource Procedures

    E-Print Network [OSTI]

    information resources security and management guidelines for all Texas A&M AgriLife Research (Agri of these procedures. The Director (or a designee, usually the Information Security Officer), Information Technology shall coordinate exceptions of security controls with the Information Security Officer. D. Determine

  18. EcoSecurities India Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A Potential MicrohydroDistrictInformationEauEcoMotors Jump

  19. Audit Report on "The Office of Science's Management of Information Technology Resources"

    SciTech Connect (OSTI)

    None

    2009-11-01T23:59:59.000Z

    The Department of Energy's Office of Science (Science) and its facility contractors are aggressive users of information technology (IT) to support fundamental research in areas such as energy, environmental remediation and computational sciences. Of its $4 billion Fiscal Year 2008 budget, Science spent about $287 million to manage its IT program. This included cyber security activities, acquisition of hardware and software, and support service costs used to maintain the operating environments necessary to support the missions of the program. Prior Office of Inspector General reports have identified various issues with Science's management of its IT programs and resources. For instance, our report on Facility Contractor Acquisition and Management of Information Technology Hardware (DOE/IG-0768, June 2007) noted that the Science sites reviewed spent more than necessary when acquiring IT hardware. In another example, our review of The Department's Efforts to Implement Common Information Technology Services at Headquarters (DOE/IG-0763, March 2007) disclosed that Science's reluctance to adopt the Department of Energy Common Operating Environment (DOE-COE) at Headquarters contributed to the Department's inability to fully realize potential cost savings through consolidation and economies of scale. In light of the magnitude of the Office of Science IT program and previously identified program weaknesses, we initiated this audit to determine whether Science adequately managed its IT resources. Science had taken a number of actions to improve its cyber security posture and align its program to Federal requirements. Yet, our review disclosed that it had not taken some basic steps to enhance security and reduce costs. In particular, we found that: (1) For their non-scientific computing environments, all seven of the field sites reviewed (two Federal, five contractor) had implemented security configurations that were less stringent than those included in the Federal Desktop Core Configuration. This configuration was designed by the National Institute of Standards and Technology and its use was mandated by the Office of Management and Budget; (2) Although we previously highlighted weaknesses and recommended corrective actions, Science still had not fully established or enforced IT hardware standards for acquiring hardware such as desktop and laptop computers or related peripherals, contributing to significant unnecessary expenditures; and (3) While we have noted in a series of past reports that significant savings could be realized from aggregating demand for IT services and products across the enterprise, Science had not implemented a common infrastructure for users at its Federal sites and continued to maintain an IT environment independent of the Department's Common IT Operating Environment. The weaknesses identified were attributable, at least in part, to a lack of adequate policies and procedures for ensuring effective cyber security and hardware acquisition practices. In addition, Science had not effectively monitored the performance of its field sites to ensure that previously reported internal control weaknesses were addressed and had not implemented an appropriate mechanism to track its IT-related costs. Without improvements, Science may be unable to realize the benefits of improved security over its information systems, reduce costs associated with hardware acquisition, and lower IT support costs through consolidation of services. In particular, we determined that Science could potentially realize savings of more than $3.3 million over the next three years by better controlling hardware costs and implementing standards for certain equipment. Furthermore, Science could continue to pay for duplicative IT support services and fail to take advantage of opportunities to lower costs and apply potential savings to mission-related work. During the course of our audit work, we learned from Science officials that they had initiated the process of revising the Program Cyber Security Plan to better clarify its policy for implementing

  20. Supply chain management (SCM) involves the management of materials and information across the entire supply chain. This includes raw material

    E-Print Network [OSTI]

    Calgary, University of

    Supply chain management (SCM) involves the management of materials and information across this concentration will be required to take three core courses: Materials and Supply Chain Management, Transportation Purchasing identify global sources of materials, select vendors, and manage negotiati

  1. An Equal Opportunity Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may partner with the

    E-Print Network [OSTI]

    .S. Department of Energy's NNSA Los Alamos National Security, LLC Request for Information on how industry may Employer / Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA scaling

  2. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    Hudson, David B

    2014-02-13T23:59:59.000Z

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  3. Office of Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  4. Managing Information Flow between SysML and Modelica

    E-Print Network [OSTI]

    Managing Information Flow between SysML and Modelica A Model-Based Design Project for ME6101ML and Modelica languages. Once I apply the method, I discuss the utility, limitations, and necessary future work

  5. 15.568A Management Information Systems, Spring 2003

    E-Print Network [OSTI]

    Gibson, Cyrus F.

    The course purpose is to provide the substance and skill necessary to make sound business decisions relating to information systems, and to work with senior line managers in the resolution of issues and problems in this ...

  6. The Bureau of Land Management's Well Information System (WIS...

    Open Energy Info (EERE)

    Bureau of Land Management's Well Information System (WIS) How-To Guide Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Guide...

  7. Energy Department Seeks Information on Geothermal Risk and Uncertainty Management

    Broader source: Energy.gov [DOE]

    The Energy Department's Office of Energy Efficiency and Renewable Energy (EERE) has issued a Request for Information (RFI) to help quantify and manage risk in geothermal exploration, in an effort...

  8. UNIVERSITE LYON 3 JEAN MOULIN ED MANAGEMENT INFORMATION FINANCE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    UNIVERSITE LYON 3 ­ JEAN MOULIN ED MANAGEMENT INFORMATION FINANCE THESE pour l'obtention du, de l'ENSSIB, et du centre Hospitalier Saint-Jean de Dieu pour leur patience et leur sympathie. Je

  9. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

    2010-10-01T23:59:59.000Z

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  10. A Knowledge-Engine Architecture for a Competence Management Information

    E-Print Network [OSTI]

    Kimble, Chris

    A Knowledge-Engine Architecture for a Competence Management Information System José Braga de to develop a knowledge-engine architecture that is being specified and developed by a Portuguese software Engineering, Knowledge Management, Knowledge-Engine, Ontology Design, Organizational Knowledge #12;A Knowledge-Engine

  11. Fact-based Enterprise Information Management using NIAM

    SciTech Connect (OSTI)

    Rivord, G.

    1993-09-01T23:59:59.000Z

    The effort to consolidate the ``islands of information`` within an enterprise -- to manage information at the enterprise level rather than the department or sub-system level -- is known by many names, such as ``Information Resource Management`` and ``Corporate Data Administration``. Here we will call it ``Enterprise Information Management`` (EIM). This effort is becoming increasingly vital as the need for shared information grows, yet it is plagued by costly, time-consuming efforts that produce reams of hard-to-maintain documentation. The results are difficult to integrate, measure, or apply. Management needs a tool that can integrate models from diverse modeling efforts into a global knowledge base, produce metrics to clarify the value of the integration process, and provide a short, traceable route between information models and their physical implementations. The natural-language emphasis of NIAM makes it an ideal candidate for this tool. When integrated with enterprise-wide data administration, the collection of metrics, CASE tools that produce application code, and automated support tools, NIAM can effectively manage multiple Universes of Discourse (UOD). Prototypes of automated support tools, ``Fact Manager`` and ``Fact Designer``, will be discussed.

  12. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  13. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  14. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  15. Private Information Advisory Protecting the personal private information of our students, faculty and staff is of

    E-Print Network [OSTI]

    Qiu, Weigang

    . Similar risks can be illustrated if information is stolen or hacked from presumably secure computers. The CUNY Information Security Management Office has published direct links of major Internet search engines on how to prevent the search engines from collecting your information. Please refer to security

  16. Correct mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme on ping-pong protocol

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-16T23:59:59.000Z

    The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected.

  17. Establishing functional requirements for emergency management information systems

    SciTech Connect (OSTI)

    Reed, J.H.; Rogers, G.O.; Sorensen, J.H.

    1991-01-01T23:59:59.000Z

    The advancement of computer technologies has led to the development of a number of emergency management information systems (e.g., EIS, CAMEO, IEMIS). The design of these systems has tended to be technologically driven rather than oriented to meeting information management needs during an emergency. Of course, emergency management needs vary depending on the characteristics of the emergency. For example, in hurricanes, onset is typically slow enough to allow emergency managers to simulate evacuations dynamically while in chemical disasters onset may be sufficiently rapid to preclude such simulation(s). This paper describes a system design process in which the analysis of widely recognized emergency management functions was used to identify information requirements and the requisite software and hardware capabilities to deal with rapid onset, low probability, high consequence events. These requirements were then implemented as a prototype emergency management system using existing hardware and software to assure feasibility. Data, hardware, and software requirements were further developed, refined, and made more concrete through an iterative prototyping effort. This approach focuses attention directly on meeting emergency management information needs while avoiding unneeded technological innovations. 10 refs., 4 figs., 1 tab.

  18. Information Technology Standards Program management plan

    SciTech Connect (OSTI)

    NONE

    1998-05-01T23:59:59.000Z

    This document presents a logical and realistic plan to implement the Information Technology (IT) Standards Program throughout the Department of Energy (DOE). It was developed by DOE Chief Information Officer (CIO) staff, with participation from many other individuals throughout the DOE complex. The DOE IT Standards Program coordinates IT standards activities Department-wide, including implementation of standards to support the DOE Information Architecture. The Program is voluntary, participatory, and consensus-based. The intent is to enable accomplishment of the DOE mission, and the Program is applicable to all DOE elements, both Federal and contractor. The purpose of this document is to describe the key elements of the DOE IT Standards Program.

  19. This report is a part of the College's efforts to provide you with information on security procedures, services, and resources available on

    E-Print Network [OSTI]

    's efforts to provide you with information on security procedures, services, and resources available on our and General Counsel. This report will provide you with information on safety and security in complianceAnnual Security and Fire Safety Report BARNARD COLLEGE 2013 This report is a part of the College

  20. Information Technology for Energy and Maintenance Management 

    E-Print Network [OSTI]

    Villafana, L.; Federspiel, C.

    2003-01-01T23:59:59.000Z

    and control systems (EMCS) to recommend what maintenance personnel should do in response to a maintenance service request. MORE integrates text descriptions of problems with sensor information related to the problem. After work orders are closed, MORE uses...

  1. Information Technology for Energy and Maintenance Management

    E-Print Network [OSTI]

    Villafana, L.; Federspiel, C.

    2003-01-01T23:59:59.000Z

    and control systems (EMCS) to recommend what maintenance personnel should do in response to a maintenance service request. MORE integrates text descriptions of problems with sensor information related to the problem. After work orders are closed, MORE uses...

  2. Security of quantum bit string commitment depends on the information measure

    E-Print Network [OSTI]

    Harry Buhrman; Matthias Christandl; Patrick Hayden; Hoi-Kwong Lo; Stephanie Wehner

    2006-11-09T23:59:59.000Z

    Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classical and the quantum world. However, when committing to a string of n bits at once, how far can we stretch the quantum limits? In this letter, we introduce a framework of quantum schemes where Alice commits a string of n bits to Bob, in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are two-fold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a+b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we construct schemes where a=4 log n+O(1) and b=4, which is impossible classically. Our findings significantly extend known no-go results for quantum bit commitment.

  3. A Method for Estimating the Financial Impact of Cyber Information Security Breaches Utilizing the Common Vulnerability Scoring System and Annual Loss Expectancy

    E-Print Network [OSTI]

    Lindsey, Michael B.

    2010-05-14T23:59:59.000Z

    Information security is relatively new field that is experiencing rapid growth in terms of malicious attack frequency and the amount of capital that firms must spend on attack defense. This rise in security expenditures has prompted corporate...

  4. UNIVERSITY OF CENTRAL FLORIDA 348 Undergraduate Catalog 2014-2015 Health Informatics and Information Management -

    E-Print Network [OSTI]

    Wu, Shin-Tson

    hrs) HIM 3006 Foundations of Health Information Management (HIM) 3 hrs HIM 4508C Quality Management 3 hrs HIM 4656C Health Information Management Systems 3 hrs HSC 3537 Medical Terminology 3 hrs HIM 4226C and Information Management - Minor College of Health and Public Affairs Department of Health Management

  5. Texas Evening MBA Program INFORMATION TECHNOLOGY MANAGEMENT

    E-Print Network [OSTI]

    Ghosh, Joydeep

    IT strategically. The course introduces students to fundamental concepts of information economics and strategic-in. It explores how IT-enabled interconnections among products, customers, business processes, firms, industries corporate mergers, acquisitions, divestitures, and outsourcing and offshoring initiatives. Course packet We

  6. Evidential Grids Information Management in Dynamic Environments

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of Compiègne CNRS Heudiasyc UMR 7253, France Email: surname.name@utc.fr Abstract--An occupancy grid map conditions. The perception strategy involves map and scan grids [9], [10]. Indeed, an instantaneous scan grid-detections. The map grid acts as a filter that accumulate information and allows to detect moving objects. In dynamic

  7. Position Management and Classification (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-01-26T23:59:59.000Z

    This draft has been scheduled for final review before the Directives Review Board on 02/5/2015. All major comments and concerns should be provided to your DRB representative by 02/3/2015, following your organization process. If you do not know who your representative is, please see the list of DRB members. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-1014).

  8. California Coastal Management Program | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL Gas Recovery Biomass16 2013Management Program Jump to:

  9. California Groundwater Management Plans | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL Gas Recovery Biomass16 2013Management86 Jump to:OtherOther:

  10. Envisory Financial Risk Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJump to:EmminolEntergyEnvisory Financial Risk Management Jump to:

  11. Demand Management Institute (DMI) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A Potential Microhydro SiteDayton Power & LightDemand Management

  12. Technology Management Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f <Maintained ByManagement Inc Place: Cleveland, Ohio Zip: 44108 Product:

  13. Applied Energy Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcatAntrim County, Michigan:Applewood,StateManagement Jump to:

  14. Community Management Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:PowerCER.png ElColumbia, NorthCommunity Management Company Jump to:

  15. RAM Capital Management Group | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I GeothermalPotentialBiopowerSolidGenerationMethod JumpGeorgia: Energy Resources JumpRAM Capital Management

  16. UPC Solar Managment LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown of Ladoga, IndianaTurtle Airships JumpTypefor Africa | OpenSolar Managment LLC

  17. Ethanol Capital Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 No revision|LLCInsulation IncentivesEshoneEstonia:Management Jump

  18. Information Management Governance Council | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet),EnergyImprovementINDIANManagement Governance Council Information

  19. Waste management facilities cost information for hazardous waste. Revision 1

    SciTech Connect (OSTI)

    Shropshire, D.; Sherick, M.; Biagi, C.

    1995-06-01T23:59:59.000Z

    This report contains preconceptual designs and planning level life-cycle cost estimates for managing hazardous waste. The report`s information on treatment, storage, and disposal modules can be integrated to develop total life-cycle costs for various waste management options. A procedure to guide the US Department of Energy and its contractor personnel in the use of cost estimation data is also summarized in this report.

  20. Acquisition Career Management Program (Informational Purposes Only)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-11-21T23:59:59.000Z

    This draft has been scheduled for final review before the Directives Review Board on 4-2-15 (delayed from 12-4-14 session). All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-4014). All major comments and concerns should be submitted by COB 3-31-15.

  1. Cloud Service Security Requirements Questionnaire 1. What Cloud service will you be providing

    E-Print Network [OSTI]

    /docs/Exhibit-G/exhibit-g-definitions-acronyms-green.pdf 3. Has the information system been certified for Federal Information Security Management Act (FISMA for security and quality control? If so, please provide evidence. 5. Has your cloud service been industry have a current Configuration Management Plan? If so, please provide evidence. 7. Do you have a current

  2. Lockheed Martin Idaho Technologies Company information management technology architecture

    SciTech Connect (OSTI)

    Hughes, M.J.; Lau, P.K.S.

    1996-05-01T23:59:59.000Z

    The Information Management Technology Architecture (TA) is being driven by the business objectives of reducing costs and improving effectiveness. The strategy is to reduce the cost of computing through standardization. The Lockheed Martin Idaho Technologies Company (LMITCO) TA is a set of standards and products for use at the Idaho National Engineering Laboratory (INEL). The TA will provide direction for information management resource acquisitions, development of information systems, formulation of plans, and resolution of issues involving LMITCO computing resources. Exceptions to the preferred products may be granted by the Information Management Executive Council (IMEC). Certain implementation and deployment strategies are inherent in the design and structure of LMITCO TA. These include: migration from centralized toward distributed computing; deployment of the networks, servers, and other information technology infrastructure components necessary for a more integrated information technology support environment; increased emphasis on standards to make it easier to link systems and to share information; and improved use of the company`s investment in desktop computing resources. The intent is for the LMITCO TA to be a living document constantly being reviewed to take advantage of industry directions to reduce costs while balancing technological diversity with business flexibility.

  3. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect (OSTI)

    Farnham, Irene; Marutzky, Sam

    2014-12-01T23:59:59.000Z

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  4. A management information system model for convenience stores 

    E-Print Network [OSTI]

    Moede, Eric Arne

    1978-01-01T23:59:59.000Z

    Najor Subject: Agricultural Economics A MANAGEMENT INFORMATION SYSTEM MODEL FOR CONVENIENCE STORES A Thesfs by ERIC ARNE MOEDE Approved as to style and content by: Chairman of o ittee Dr. Willfam J. stine Head of Department Dr. Clfve R. Harston... Member Dr. Samuel M. Gillespie Mem er Dr, John I. Reynolds Member Dr. Thomas L. Sporleder December 1978 ABSTPJ CT A Management Information System I'1odel For Convenience Stores (December lg78 l Eric Arne I'loede, B. B. A. , Texas ARM University...

  5. Guinness Asset Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, search OpenEI ReferenceJumpEnergy InformationGrupo(Redirected from

  6. Calpine Power Management LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL Gas RecoveryInformationTransmissionCallowayCalpineCalpine

  7. Ethanol Management Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJump to:EmminolEntergyEnvisoryInformationEthanol 2000

  8. Gardner Energy Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJumpGermanFifeGEXA Corp.InformationGansuGantan

  9. 2015 Information Management Conference | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sure you wantJoin us for|IdahotheWhat is theBrianEnergy32015 Information

  10. Guardian Energy Management Solutions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetec AG| Open Energy InformationGettop Science Technology Co Ltd

  11. Vencon Management, Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown of Ladoga,planning methodologies andVacantVanInformationVelocys JumpVencon

  12. Coastal Zone Management Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformationNew York: Energy ResourcesCoastal Structures ModelingAct

  13. Effective Materials Property Information Management for the 21st Century

    SciTech Connect (OSTI)

    Ren, Weiju [ORNL; Cebon, David [Cambridge University; Barabash, Oleg M [ORNL

    2011-01-01T23:59:59.000Z

    This paper discusses key principles for the development of materials property information management software systems. There are growing needs for automated materials information management in various organizations. In part these are fuelled by the demands for higher efficiency in material testing, product design and engineering analysis. But equally important, organizations are being driven by the needs for consistency, quality and traceability of data, as well as control of access to proprietary or sensitive information. Further, the use of increasingly sophisticated nonlinear, anisotropic and multi-scale engineering analyses requires both processing of large volumes of test data for development of constitutive models and complex materials data input for Computer-Aided Engineering (CAE) software. And finally, the globalization of economy often generates great needs for sharing a single gold source of materials information between members of global engineering teams in extended supply-chains. Fortunately material property management systems have kept pace with the growing user demands and evolved to versatile data management systems that can be customized to specific user needs. The more sophisticated of these provide facilities for: (i) data management functions such as access, version, and quality controls; (ii) a wide range of data import, export and analysis capabilities; (iii) data pedigree traceability mechanisms; (iv) data searching, reporting and viewing tools; and (v) access to the information via a wide range of interfaces. In this paper the important requirements for advanced material data management systems, future challenges and opportunities such as automated error checking, data quality characterization, identification of gaps in datasets, as well as functionalities and business models to fuel database growth and maintenance are discussed.

  14. Manageable Fine-Grained Information Flow Petros Efstathopoulos and Eddie Kohler

    E-Print Network [OSTI]

    Kohler, Eddie

    control (DIFC), a promising tool for improving ap- plication security, gives application developers fine-grained control over security policy and privilege management. DIFC developers can partition much application are spread over several application pieces. Common programming errors may be indistinguishable from policy

  15. Fact Sheet Preliminary Notice of Violation: Classified Information...

    Broader source: Energy.gov (indexed) [DOE]

    to Sandia Corporation (Sandia) for violations of Department of Energy (DOE) classified information security program requirements. Sandia is the management and operating...

  16. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    SciTech Connect (OSTI)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01T23:59:59.000Z

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  17. Distributed Information Organization and Management Framework for Regulation Compliance

    E-Print Network [OSTI]

    Stanford University

    such a system for a specific regulation compliance area that has an urgent demand. We select hazardous waste to hazardous waste management, we investigate the issues towards building an information infrastructure Government's Lines of Business and its services to the citizen. The BRM identifies three major business areas

  18. University Policy No.: IM7305 Classification: Information Management

    E-Print Network [OSTI]

    Victoria, University of

    University Policy No.: IM7305 Classification: Information Management COPYRIGHT AND THE USE OF VIDEO of Victoria Libraries, McPherson Library Loan Policy (Policy 2550, section 2.1.2); "Fair Dealing" means a fair as it has in the University of Victoria Libraries, McPherson Library Loan Policy (Policy 2550, section 2

  19. University Policy No.: IM7300 Classification: Information Management

    E-Print Network [OSTI]

    Victoria, University of

    University Policy No.: IM7300 Classification: Information Management POLICY ON COPYRIGHT. The Act is available for you to read at the reference desks of the McPherson Library, the Diana Priestly Law Library, and the Curriculum Laboratory. Computer programs are usually licensed rather than

  20. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...