Powered by Deep Web Technologies
Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Federal Information Security Management Act (FISMA) ...  

Science Conference Proceedings (OSTI)

Federal Information Security Management Act (FISMA) Implementation Project. Summary: The FISMA Implementation Project ...

2013-01-15T23:59:59.000Z

2

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

3

Program Review for Information Security Management ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

2013-01-15T23:59:59.000Z

4

Information technology - Security techniques - Information security management systems - Requirements  

E-Print Network (OSTI)

ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

International Organization for Standardization. Geneva

2005-01-01T23:59:59.000Z

5

V-192: Symantec Security Information Manager Input Validation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security...

6

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

7

Knowledge management within information security: the case of Barings Bank  

Science Conference Proceedings (OSTI)

Managing the growing problem of computer fraud within organisations has led researchers and practitioners to emphasise the need to take into account the 'social' aspects of information security. In addition, wider organisational issues such as ... Keywords: Barings Bank, KM, computer fraud, information security management, knowledge management, manager awareness, opportunities, organisational functions, social aspects, tacit knowledge, technical aspects

Shalini Kesar

2008-07-01T23:59:59.000Z

8

Enterprise Information Security Management Framework [EISMF  

E-Print Network (OSTI)

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

9

EEO Complaints Information for Managers | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information for Managers | National Nuclear Security Information for Managers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Complaints Information for Managers Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Complaints Information for Managers EEO Complaints Information for Managers

10

Information Security Management Handbook, Volume 1, 6th edition  

Science Conference Proceedings (OSTI)

Promoting the view that the management, ethics, and values of an organization leads directly to its information security program, this guide addresses up-to-date issues in this increasingly important area.

Harold F. Tipton; Micki Krause

2007-02-01T23:59:59.000Z

11

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

12

Information Model for Policy-Based Network Security Management  

Science Conference Proceedings (OSTI)

Policy Based Network Management (PBNM) for network security has been paid much attention as a solution to consistent and unified management of security systems including IDS (Intrusion Detection System) and Firewall. In this paper, we define NSPIM (Network ...

Sook-Yeon Kim; Myung-Eun Kim; Kiyoung Kim; Jongsoo Jang

2002-01-01T23:59:59.000Z

13

Guidelines for System Security and Information System Management  

Science Conference Proceedings (OSTI)

This document provides a concise set of guidelines and best practices for performing risk assessment, security management, and system management within utility automation networks.

2008-06-09T23:59:59.000Z

14

EEO Complaints Information for Managers | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Complaints Information for Managers Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Complaints Information for Managers EEO Complaints...

15

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

16

Information Management, Analytics & Optimization Services IMS Security Health Check Service Offering  

E-Print Network (OSTI)

Offering The IMS Security Health Check is a special service offering from the IMS Laboratory TechnicalInformation Management, Analytics & Optimization Services IMS Security Health Check Service two to three weeks after the conclusion of the on-site visit. · Service from the IMS Laboratory

17

Security Services Management (Section B)  

Science Conference Proceedings (OSTI)

To take the next step in information security, Security Services Management provides a comprehensive approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a balanced strategy ...

James S. Tiller

2007-07-01T23:59:59.000Z

18

Implementing Information Security and Its Technology: A LineManagement Perspective  

Science Conference Proceedings (OSTI)

Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

Barletta, William A.

2005-08-22T23:59:59.000Z

19

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

20

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness  

Science Conference Proceedings (OSTI)

Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information ... Keywords: behavioral issues of information security, compliance, information security awareness, information security management, information security policy, theory of planned behavior

Burcu Bulgurcu; Hasan Cavusoglu; Izak Benbasat

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Benchmarking e-business security: A model and framework, Proceedings of 3rd Australian information security management conference  

E-Print Network (OSTI)

The dynamic nature of threats and vulnerabilities within the E-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, E-business security has to become proactive, by reviewing and continuously improving security to strengthen E-business security measures and policies. This can be achieved through benchmarking the security measures and policies utilised within the Ebusiness, against recognised information technology (IT) and information security (IS) security standards.

Graeme Pye; Matthew J. Warren

2005-01-01T23:59:59.000Z

22

NIST SP 800-39, Managing Information Security Risk ...  

Science Conference Proceedings (OSTI)

... Provide oversight for the risk management activities carried out ... a greater understanding of risk with regard ... serve as a focal point for communicating ...

2012-02-06T23:59:59.000Z

23

Contribution of corporate social responsibility to information security management  

Science Conference Proceedings (OSTI)

Contemporary societies develop scepticism about the social responsibility of businesses. There are expectations that firms/corporations/industries/companies make more than just economic contributions. In the area of information technology, more and more ...

Theodosios Tsiakis

2009-11-01T23:59:59.000Z

24

Information Security Management Handbook, Sixth Edition, Volume 2, 6th edition  

Science Conference Proceedings (OSTI)

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered ...

Harold F. Tipton; Micki Krause

2008-03-01T23:59:59.000Z

25

Quantifying and managing the risk of information security breaches participants in a supply chain  

E-Print Network (OSTI)

Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

Bellefeuille, Cynthia Lynn

2005-01-01T23:59:59.000Z

26

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

27

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

28

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

29

A metadata calculus for secure information sharing  

Science Conference Proceedings (OSTI)

In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to information sharing that rely on security labels (e.g., Multi-Level Security (MLS)) ... Keywords: access control, information flow, risk management

Mudhakar Srivatsa; Dakshi Agrawal; Steffen Reidt

2009-11-01T23:59:59.000Z

30

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

31

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube Contact Information | National Nuclear Security Administration Our Mission Managing the Stockpile...

32

Application of autonomic agents for global information grid management and security  

Science Conference Proceedings (OSTI)

In the near future, the U.S. DoD will activate a newly created Global Information Grid (GIG) providing an agile, robust, interoperable and collaborative communication network. This GIG is viewed as the single most important contributor to combat power ... Keywords: autonomia, autonomic agents, global information grid, net-centric warfare, network security

Don P. Cox; Youssif Al-Nashif; Salim Hariri

2007-07-01T23:59:59.000Z

33

Convergence of Corporate and Information Security  

E-Print Network (OSTI)

As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper reports on how organizations have traditionally managed asset protection, why that is changing and how to establish convergence to optimize security value to the business within an enterprise.

Syed,; Donahue, Shannon E

2010-01-01T23:59:59.000Z

34

Emergency Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Emergency Information Home > Field Offices > Welcome to the Sandia Field Office > Emergency Information Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to

35

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

36

Current News and Information | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

News and Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

37

A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry  

Science Conference Proceedings (OSTI)

The power industry faces the implementation of smart grids, which will introduce new information security threats to the power automation systems. The ability to appropriately prepare for, and respond to, information security incidents, is of utmost ... Keywords: Information security, incident respons, smart grids

Maria B. Line

2013-03-01T23:59:59.000Z

38

Homeland Security and Emergency Management Coordination (HSEMC...  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation...

39

Security classification of information  

Science Conference Proceedings (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

40

Office of Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Emergency Management Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our activities. We hope you will find it useful. Much of this page's contents are oriented to reindustrialization and other managers of new DOE projects and programs. Feel free to contact the designated key personnel for assistance. Access Authorization Branch Using established guidelines and the "whole person concept," we evaluate and adjudicate informaton about those who need clearances which is developed during background investigations. The objective is to render access determinations that are in the best interest of national security. We also provide security education and awareness information, personnel security program support, and visitor control and foreign travel support to the Oak Ridge Office, the Paducah-Portsmouth Project Office, and the Thomas Jefferson National Accerelator Facility.

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

42

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

43

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contact Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Contact Information Contact Information At each of NNSA's eight sites, leading-edge research and development is

44

Integrating Security RMF with Requirements Management J ...  

Science Conference Proceedings (OSTI)

Integrating Security RMF with Requirements Management J Peeler ... Security controls at Low Risk are risk accepted & may not need mitigation. ...

2013-12-13T23:59:59.000Z

45

Cyber Security Management Memorandum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Management Memorandum Cyber Security Management Memorandum On December 7, 2009, the Deputy Secretary of Energy released this memorandum directing the creation of a...

46

Office of Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our...

47

Contacts for Information Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Management CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

48

Site Information | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

49

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

50

Freedom of Information Act (FOIA) | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

51

Public Safety and Security Information in MML  

Science Conference Proceedings (OSTI)

Public Safety and Security Information in MML. ... MML plays a key role in enhancing the nation's homeland security. Through ...

2010-10-05T23:59:59.000Z

52

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network (OSTI)

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

53

Security of Distributed Data Management  

E-Print Network (OSTI)

Security is a pervasive concept that cannot be decoupled from any distributed systems design. The constraints imposed by security considerations have a profound impact on the overall design of the services and interfaces of any Grid middleware and infrastructure, especially for data management. In this article we discuss the requirements, architecture and design of the security mechanisms that can be put in place for distributed data management. The advantages and disadvantages of different solutions and deployment models are discussed. We illustrate the discussion using the implementation of the EU funded Enabling Grids for E-SciencE (EGEE) project. We direct our focus on the security aspects of data access, data replication, data location and data consistency and how the security requirements of the applications are being addressed in the EGEE middleware stack gLite.

Frohner, A; Brito da Rocha, R; Laure, E

2006-01-01T23:59:59.000Z

54

Continuing Management Reform | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

Continuing Management Reform | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

55

Management Information Systems (MIS) Sample Occupations  

E-Print Network (OSTI)

Support Specialist Computer and Information Systems Manager Computer Training Specialist Consultant Data Recruiter Knowledge Manager Logistics Manager Management Analysis MIS Director/Specialist Network Securities & Exchange Commission Website Design Companies Wholesale & Retail Companies Operations Manager

Ronquist, Fredrik

56

Network Security Management for Transmission Systems  

Science Conference Proceedings (OSTI)

The electric power grid is increasingly dependent on information technology and telecommunication infrastructures. While great benefits will result from this influx of technology, a holistic and granular awareness of all elements of the information infrastructure supporting a control subsystem will be critical to ensure long term reliability and security. The management of this information infrastructure requires connectivity and analytics to support both IT and OT assets in a unified ...

2012-12-31T23:59:59.000Z

57

Information Security Policy & Guidelines and provides minimum policies and  

E-Print Network (OSTI)

guidelines for agencies to follow in their implementation of the Tasmanian Government Information Security Charter. This document outlines a Risk Assessment and Management process agencies can use to support their information security planning. The methodology expands on AS/NZS 4360:2004 Risk Management to provide a consistent framework for agencies to assess their information security risks. The standard is an essential reference document to the methodology.

unknown authors

2005-01-01T23:59:59.000Z

58

House of Security House of Security: Locale, Roles and Resources for Ensuring Information Security Research-in-Progress  

E-Print Network (OSTI)

In this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information custodians view to include information consumers and managers views), and resource (beyond technical dimensions to include managerial dimensions). Based on our definition, we develop a model of information security, which we call the House of Security.

Wee Horng Ang; Yang W. Lee; Stuart E. Madnick; Michael Siegel; Diane M. Strong; Richard Y. Wang; Chrisy Yao; Wee Horng Ang; Stuart E. Madnick; Michael Siegel; Richard Y. Wang; Yang W. Lee; Dinsha Mistress; Diane M. Strong; Chrisy Yao

2006-01-01T23:59:59.000Z

59

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

60

NMMSS Information, Reports & Forms | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information, Reports & Forms | National Nuclear Security Information, Reports & Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Information, Reports & Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms NMMSS Information, Reports & Forms

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Choice and Chance: A Conceptual Model of Paths to Information Security Compromise  

Science Conference Proceedings (OSTI)

No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from ... Keywords: computer crime, information security management, information systems risk management

Sam Ransbotham; Sabyasachi Mitra

2009-03-01T23:59:59.000Z

62

The National Information Systems Security Conference ...  

Science Conference Proceedings (OSTI)

The National Information Systems Security Conference announces its Keynote and Banquet Speakers. August Bequai, Esq ...

1996-10-28T23:59:59.000Z

63

Security Event and Log Management Service  

E-Print Network (OSTI)

Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management IBM Global Technology Services December 2007 #12;Executive Summary The economics of network security have changed. The high cost and complexity inherent in the use

64

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Conference Proceedings (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

65

Consequence Management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

66

Management and Administration | National Nuclear Security Administrati...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

67

Federal Computer Security Program Managers' Forum June ...  

Science Conference Proceedings (OSTI)

... Page 7. Google Google Apps Cloud Core Applications Available in Google ... 11 Page 12. Google Security Differentiators Configuration management ...

2012-06-21T23:59:59.000Z

68

Manager, Sandia National Laboratories | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

69

Information Technology (IT) Security Day, Boulder  

Science Conference Proceedings (OSTI)

Information Technology (IT) Security Day, Boulder. Purpose: The NIST ... Agenda: 9:00am- 10:00am Mobile Device Security. 10:30am ...

2013-06-10T23:59:59.000Z

70

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Advisory: Cisco Content Services Gateway Vulnerabilities V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands...

71

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

72

Managing the Stockpile | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Managing the Stockpile Home > Our Mission > Managing the Stockpile...

73

Applied Information Security, 1st edition  

Science Conference Proceedings (OSTI)

Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability ...

Randy Boyle

2009-07-01T23:59:59.000Z

74

National information security policy and its implementation: A case study in Taiwan  

Science Conference Proceedings (OSTI)

Cyberspace is no longer safe. From business organizations to countries, the requirements of information security and assurance have become one of the most important functions to ensure continued operations. The goal of this study is twofold. First, we ... Keywords: BS7799, ISO27001, Information security, Information security management system (ISMS), National information security policy

Cheng-Yuan Ku; Yi-Wen Chang; David C. Yen

2009-08-01T23:59:59.000Z

75

Information Security Architecture: An Integrated Approach to Security in the Organization, 2nd edition  

Science Conference Proceedings (OSTI)

By providing clear and organized methods, this text incorporates the knowledge developed during the past decade that has pushed the information security lifecycle from infancy to a more mature, understandable, and manageable state.

Jan Killmeyer

2006-01-01T23:59:59.000Z

76

Consequence Management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Consequence Management | National Nuclear Security Administration Consequence Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Consequence Management Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management Consequence Management NNSA's Consequence Management operations involve the deployment of the

77

NIST Launches New Information Technology Security Effort  

Science Conference Proceedings (OSTI)

... project focuses on cybersecurity for the electrical power grid by developing a prototype secure information architecture for substations and control ...

2010-10-05T23:59:59.000Z

78

Environmental information management plan  

Science Conference Proceedings (OSTI)

The Environmental Information Management Plan provides an overview of the management of environmental information generation by Hanford Site programs. The long-term nature of environmental programs requires that electronic data, documents, and other materials be kept for extended periods in a secure, controlled, and retrievable manner. An important part of the program is the maintenance of administrative records under the Hanford Federal Facility Agreement and Consent Order (Ecology et al. 1989). The Environmental Information Management Plan introduces Westinghouse Hanford records management and engineering document control systems and their relationship to environmental programs. Specific information is provided about the operation of the Environmental Data Management Center, a central facility that receives, processes, and maintains information related to environmental program activities. The Environmental Data Management Center maintains a reference file, coordinates administrative record activities, and distributes administrative record indexes and administrative record documents to the US Environmental Protection Agency, the US Department of Energy, the Washington State Department of Ecology, and four information repositories. 43 refs., 16 figs., 5 tabs.

Michael, L.E.; Main, G.C.; See, E.J.

1990-03-01T23:59:59.000Z

79

Delegating Network Security with More Information  

E-Print Network (OSTI)

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

80

TEPS/BPA Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

TEPS/BPA Information | National Nuclear Security Administration TEPS/BPA Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog TEPS/BPA Information Home > About Us > Our Operations > Acquisition and Project Management > Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs) > TEPS/BPA Information

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach  

Science Conference Proceedings (OSTI)

Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%--75% of security incidents originate from within an organization. ... Keywords: IS misuse, IS security, end-user security, general deterrence theory, security countermeasures, security management

John D'Arcy; Anat Hovav; Dennis Galletta

2009-03-01T23:59:59.000Z

82

Integrated safeguards and security management plan  

Science Conference Proceedings (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

83

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

84

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY  

E-Print Network (OSTI)

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

85

Circuits of power in creating de jure standards: shaping an international information systems security standard  

Science Conference Proceedings (OSTI)

This paper addresses the role of power and politics in setting standards. It examines the interaction of external contingencies, powerful agents, resources, meaning, and membership of relevant social and institutional groupings in generating successful ... Keywords: information systems security management, information systems security standards, institutionalization, power and politics, security management code of practice

James Backhouse; Carol W. Hsu; Leiser Silva

2006-08-01T23:59:59.000Z

86

Management and Administration | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Management and Administration | National Nuclear Security Administration Management and Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Management and Administration Home > About Us > Our Programs > Powering the Nuclear Navy > Management and Administration Management and Administration NNSA's Naval Reactors is committed to excellence and dedicated to meeting

87

Infrastructure and Facilities Management | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Infrastructure and Facilities Management | National Nuclear Security Infrastructure and Facilities Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Infrastructure and Facilities Management Home > content > Infrastructure and Facilities Management Infrastructure and Facilities Management NNSA restores, rebuilds, and revitalizes the physical infrastructure of the

88

Towards an ethical code for information security?  

Science Conference Proceedings (OSTI)

Most computer scientists reflexively reject the idea of a malicious universe due to its conflict with the dominant scientific paradigm of a non-teleological impartially disinterested universe. While computer scientists might not view the universe as ... Keywords: Kuhn, NSPW, code of ethics, command and control, computer security, cybersecurity, ethical code, ethics, information security, new security paradigms workshop, paradigm, professional ethics, regulation

Steven J. Greenwald; Brian D. Snow; Richard Ford; Richard Thieme

2009-08-01T23:59:59.000Z

89

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

... of the Federal Information Systems Security Educator's ... and those involved in instructional design and curriculum ... NIST that is designed to improve ...

2012-02-07T23:59:59.000Z

90

Network and System Management for Reliability and Cyber Security  

Science Conference Proceedings (OSTI)

The evolving control of the electric power grid is increasingly dependent on information technology and telecommunication infrastructures, which, like the grid itself, must be managed in a holistic way to ensure reliability and security. The management of this information infrastructure requires connectivity and analytics to support both information technology (IT) and operational technology (OT) assets in a unified manner.This project utilized a telecommunications modeled network ...

2012-11-28T23:59:59.000Z

91

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

NLE Websites -- All DOE Office Websites (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

92

Aviation Manager | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Aviation Manager | National Nuclear Security Administration Aviation Manager | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Joseph Ginanni Aviation Manager Joseph Ginanni Joseph Ginanni Role: Aviation Manager Award: U.S. General Services Administration (GSA) Federal Aviation Professional Award

93

Aviation Manager | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Aviation Manager | National Nuclear Security Administration Aviation Manager | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Joseph Ginanni Aviation Manager Joseph Ginanni Joseph Ginanni Role: Aviation Manager Award: U.S. General Services Administration (GSA) Federal Aviation Professional Award

94

NNSA Selects Consolidated Nuclear Security, LLC to Manage the...  

National Nuclear Security Administration (NNSA)

Consolidated Nuclear Security, LLC to Manage the Consolidated Contract for Nuclear Production Operations | National Nuclear Security Administration Our Mission Managing the...

95

Security Analysis and Project Management Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

96

Firms' information security investment decisions: Stock market evidence of investors' behavior  

Science Conference Proceedings (OSTI)

In the information society, it is important for firms to manage their core information resources securely. However, the difficulty of measuring the return on an IT security investment is one of the critical obstacles for firms in making such investment ... Keywords: Abnormal returns, Event methodology, Information security investment, Investors' behavior, Market value, Sarbanes-Oxley Act (SOX)

Sangmi Chai; Minkyun Kim; H. Raghav Rao

2011-03-01T23:59:59.000Z

97

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records Name Contact...

98

Towards evaluating security implementations using the Information Security Maturity Model (ISMM).  

E-Print Network (OSTI)

??Information security is a common and ever-present concern for both private and public sector organizations. Information security protects information from a wide range of threats, (more)

Alaboodi, Saad Saleh

2007-01-01T23:59:59.000Z

99

New NIST Pub Can Help IT Managers Assess Security ...  

Science Conference Proceedings (OSTI)

... the security controls in federal information systems ... with respect to meeting organizational security policies. ... the Departments of Energy, Justice and ...

2011-05-03T23:59:59.000Z

100

Electronic DOE Information Security System (eDISS) PIA, Office...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

ORISE: National Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Emergency Management Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is Making a Difference Overview Exercises and Planning Training and Technology Support Resources How to Work With Us Contact Us Oak Ridge Institute for Science Education National Security and Emergency Management The Oak Ridge Institute for Science and Education (ORISE) helps prepare the U.S. Department of Energy's (DOE) emergency response assets, as well as those of other federal and state agencies, by managing and conducting programs, studies, research, exercises and training. ORISE's national security and emergency management capabilities include: Providing incident response where weapons of mass destruction and/or improvised explosive devices are involved

102

Secure naming in information-centric networks  

Science Conference Proceedings (OSTI)

In this paper, we present a secure naming system to locate resources in information-centric networks. The main goal is to allow secure content retrieval from multiple unknown or untrusted sources. The proposal uses a new, flexible naming scheme that ... Keywords: architecture, information networking, naming system

Walter Wong; Pekka Nikander

2010-11-01T23:59:59.000Z

103

NIST SP 800-100, Information Security Handbook: A Guide for ...  

Science Conference Proceedings (OSTI)

... The handbook is therefore useful to any manager who requires a ... Agency information security policy should address the fundamentals of agency ...

2013-06-11T23:59:59.000Z

104

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

105

The Best Damn IT Security Management Book Period  

Science Conference Proceedings (OSTI)

The Best Damn Security Manager's Handbook Periodhas comprehensive coverage of all management isuses facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity ... Keywords: Security

Susan Snedaker; Robert McCrie

2007-12-01T23:59:59.000Z

106

Federal Energy Management Program: Energy Independence & Security Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence & Security Act to someone by E-mail Share Federal Energy Management Program: Energy Independence & Security Act on Facebook Tweet about Federal Energy Management Program: Energy Independence & Security Act on Twitter Bookmark Federal Energy Management Program: Energy Independence & Security Act on Google Bookmark Federal Energy Management Program: Energy Independence & Security Act on Delicious Rank Federal Energy Management Program: Energy Independence & Security Act on Digg Find More places to share Federal Energy Management Program: Energy Independence & Security Act on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act

107

PARS II New Contractor Information for Interconnection Security Agreement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Contractor Information for Interconnection Security Agreement New Contractor Information for Interconnection Security Agreement V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System (PARS) II System Owner and the contractor sign an Interconnection Security Agreement (ISA). The requirement for an Interconnection Security Agreement can be found on page 182 of the PCSP. The ISA template is available for review on the PARS II portal (http://management.energy.gov/online_resources/pars2.htm) under Contractor Documents. Before the contractor begins sending data to PARS II, DOE will send the ISA to the contractor for review and signature. In order to prepare the ISA for review and signature, the PARS II Support Team needs

108

Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach  

Science Conference Proceedings (OSTI)

Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. However, each security technology only addresses specific vulnerabilities and ... Keywords: Genetic algorithms, Information security

Mukul Gupta; Jackie Rees; Alok Chaturvedi; Jie Chi

2006-03-01T23:59:59.000Z

109

Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach  

Science Conference Proceedings (OSTI)

Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. However, each security technology only addresses specific vulnerabilities and ... Keywords: genetic algorithms, information security

Mukul Gupta; Jackie Rees; Alok Chaturvedi; Jie Chi

2006-03-01T23:59:59.000Z

110

Argonne's National Security Information Systems  

E-Print Network (OSTI)

was asked by the DOE National Nuclear Security Administration (NNSA) to install the ARG-US RFID equipment in the NNSA vehicles (a Peterbilt truck and a Dodge Sprinter van) and integration with the in-vehicle Omni about the DOE/NNSA's Global Threat Reduction Initiative (GTRI) for voluntary security enhancements

Kemner, Ken

111

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

112

An Introduction to Computer Security: the NIST Handbook  

Science Conference Proceedings (OSTI)

An Introduction to Computer Security: the NIST Handbook Keywords: computer security, contingency planning, cryptography, guidance, information assurance, risk management, security audit, security controls, security policy

Barbara Guttman; Edward A. Roback

1995-10-01T23:59:59.000Z

113

Port security and information technology  

E-Print Network (OSTI)

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

114

Audit Report, Evaluation of Classified Information Systems Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report, Evaluation of Classified Information Systems Security Program, DOEIG-0518 Audit Report, Evaluation of Classified Information Systems Security Program, DOEIG-0518 All...

115

T-560: Cisco Security Advisory: Management Center for Cisco Security Agent  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Cisco Security Advisory: Management Center for Cisco 0: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability February 18, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability. PLATFORM: Cisco Security Agent software releases 5.1, 5.2, and 6.0 are affected by this vulnerability. Note: Only the Management Center for Cisco Security Agent is affected by this vulnerability. Cisco Security Agent installations on end-point workstations or servers are not affected by this vulnerability. ABSTRACT: The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote

116

Verifying a secure information flow analyzer  

Science Conference Proceedings (OSTI)

Denotational semantics for a substantial fragment of Java is formalized by deep embedding in PVS, making extensive use of dependent types. A static analyzer for secure information flow for this language is proved correct, that is, it enforces noninterference.

David A. Naumann

2005-08-01T23:59:59.000Z

117

DOE P 205.1, Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security ...

2001-05-08T23:59:59.000Z

118

Security Survey of Internet Browsers Data Managers  

E-Print Network (OSTI)

The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

Boja, Catalin

2011-01-01T23:59:59.000Z

119

Managing critical information infrastructure security compliance: a standard based approach using ISO/IEC 17799 and 27001  

Science Conference Proceedings (OSTI)

Information technology constitutes a substantial component of the critical infrastructure of many nations Systems used by utilities and service industries such as electricity, water, wastewater treatment and gas are key components of these critical infrastructures ...

Wipul Jayawickrama

2006-10-01T23:59:59.000Z

120

Federal Energy Management Program: Energy Independence and Security Act,  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements to someone by E-mail Share Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Facebook Tweet about Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Twitter Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Google Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Delicious

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Information sharing and security in dynamic coalitions  

Science Conference Proceedings (OSTI)

Today, information sharing is critical to almost every institution. There is no more critical need for information sharing than during an international crisis, when international coalitions dynamically form. In the event of a crisis, whether it is humanitarian ... Keywords: access control, distributed systems, dynamic coalitions, information security

Charles E. Phillips, Jr.; T.C. Ting; Steven A. Demurjian

2002-06-01T23:59:59.000Z

122

OFFICE OF HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE  

NLE Websites -- All DOE Office Websites (Extended Search)

HEALH, SAFETY AND SECURITY HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE OMB 1910-0300: ES&H Reporting Systems Description of Collections April 10, 2012 The information obtained from DOE contractors by this information collection is used by Department management at the appropriate levels to manage the work pertaining to environment, safety and health throughout DOE and will include automated reporting of information into the following systems: Computerized Accident/Incident Reporting System (CAIRS) - The CAIRS is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE operations as described in DOE O 231.1B, Environment, Safety and Health Reporting. This system contains information from reporting contractors and

123

Information Security Policies Made Easy Version 11, Version 11 edition  

Science Conference Proceedings (OSTI)

Information Security Policies Made Easy, Version 11 is the new and updated version of the gold standard information security policy resource used by over 7000 organizations worldwide. Based on the 25 year consulting and security experience of Charles ...

Charles Cresson Wood; Dave Lineman

2009-09-01T23:59:59.000Z

124

Advantages of Dual Mode Imaging for Managing Sensitive Imaging Information  

Science Conference Proceedings (OSTI)

Paper addressing information security management of sensitive images in an Arms Control regime, to be presented at the 2010 INMM Meeting.

Pitts, W. Karl; Jarman, Kenneth D.; Miller, Erin A.; McDonald, Benjamin S.; Misner, Alex C.; Myjak, Mitchell J.; Robinson, Sean M.; Seifert, Allen; Seifert, Carolyn E.; Woodring, Mitchell L.

2010-08-11T23:59:59.000Z

125

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

126

A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis  

Science Conference Proceedings (OSTI)

With the increasing organizational dependence on information systems, information systems security has become a very critical issue in enterprise risk management. In information systems, security risks are caused by various interrelated internal and ... Keywords: Ant colony optimization, Bayesian networks, Information systems, Security risk, Vulnerability propagation

Nan Feng, Harry Jiannan Wang, Minqiang Li

2014-01-01T23:59:59.000Z

127

Security Forms and Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » New Employee Orientation » Security Forms and Services » New Employee Orientation » Security Forms and Information Security Forms and Information Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees assigned to the DOE Headquarters complex are required to present two identity source documents (i.e., U.S. Passport, driver's license, identification card with photograph issued by a Federal, state, or local government agency, etc.), have their fingerprints taken, and undergo a background investigation (the identity proofing process) prior to reporting for duty or being issued a DOE standard badge (identity or PIV badge). Most likely, your HR representative and/or administrative personnel have

128

A VIKOR technique based on DEMATEL and ANP for information security risk control assessment  

Science Conference Proceedings (OSTI)

As companies and organizations have grown to rely on their computer systems and networks, the issue of information security management has become more significant. To maintain their competitiveness, enterprises should safeguard their information and ... Keywords: Analytic network process (ANP), DEMATEL, Information security, Multiple criteria decision making (MCDM), Risk control assessment, VIKOR

Yu-Ping Ou Yang; How-Ming Shieh; Gwo-Hshiung Tzeng

2013-05-01T23:59:59.000Z

129

Smart Grid Information Security (IS) Functional Requirement  

E-Print Network (OSTI)

It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

130

Wayne Meitzler PNNL Component Security R&D Program Manager  

E-Print Network (OSTI)

Wayne Meitzler PNNL Component Security R&D Program Manager Wayne Meitzler, as Pacific Northwest National Laboratory (PNNL) Component Security R&D Program Manager, has over 15 years of cyber security R systems. In the 90s, Wayne was one of the early cyber security R&D leaders at PNNL, and his research

Perkins, Richard A.

131

Quantum-safe cryptography and information security  

E-Print Network (OSTI)

Quantum-safe cryptography and information security 2 August 2013 Michele Mosca #12;2 Information;6 Next generation cryptographic infrastructure · Must be quantum-safe · Should have algorithmic agility built-in #12;7 Quantum-safe cryptographic infrastructure quantum cryptography+ Both sets

Le Roy, Robert J.

132

Integrated Safeguards and Security Management Self-Assessment 2004  

Science Conference Proceedings (OSTI)

In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

Lunford, Dan; Ramsey, Dwayne

2005-04-01T23:59:59.000Z

133

FTCP Site Specific Information - Office of Health, Safety & Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security FTCP Site Specific Information - Office of Health, Safety & Security FTCP Agent Organization Name Phone E-Mail HSS HQ Pat Worthington Bradley Davy 301903-6929 301...

134

NIST SP 800-16 (Draft), Information Security Training ...  

Science Conference Proceedings (OSTI)

... security concepts that are fundamental for the ... 800-100, Information Security Handbook: A Guide ... Formative evaluation answers the question: Are ...

2013-04-25T23:59:59.000Z

135

National Interest Security Company NISC Formerly Technology Management...  

Open Energy Info (EERE)

windex.php?titleNationalInterestSecurityCompanyNISCFormerlyTechnologyManagementServicesTMSInc&oldid349069" Categories: Clean Energy Organizations Companies...

136

ORISE: National Security and Emergency Management Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

Resources Resources The Oak Ridge Institute for Science and Education (ORISE) applies the latest technology and training resources to its custom-developed national security and emergency management solutions. A few examples of ORISE-developed resources available to national security and emergency management personnel include: First Responders test WeB-MEDIS WeB-MEDIS WeB-MEDIS is a Web-based patient tracking system designed by ORISE to provide emergency responders and hospitals with a highly portable system for inputting, sharing and tracking patient data from the field. Exercise Builder software packaging Exercise Builder ORISE created this self-paced, computer-based tool to support the U.S. Department of Energy's (DOE) Emergency Management Issues Special Interest

137

Freedom of Information Act (FOIA) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

(FOIA) | National Nuclear Security (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information Act (FOIA) Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The FOIA establishes the premise that people should have access to

138

Management and Budget | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

management of human capital; enhanced cost-effective utilization of information technology; and greater integration of budget and performance data. The organization provides...

139

Homeland Security and Emergency Management Coordination (HSEMC) Program |  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Homeland Security and Emergency Management Coordination (HSEMC) Program Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > Homeland Security and Emergency Management Coordination

140

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

A privilege management system for a secure network  

Science Conference Proceedings (OSTI)

Modern research projects may involve dozens of geographically distributed collaborators who access distributed information, applications workstations and devices. We are developing an architecture and methods for distributed, decentralized privilege ... Keywords: CEBAF, Chinese Institute of High Energy Physics, Continuous Electron Beam Accelerator Facility, DICCE project, Distributed Informatics Computing and Collaborative Environments project, ESnet, Internet, Old Dominion University, US Department of Energy's Energy Science Network, World Wide Web based interfaces, X-windows, authentication, authorisation, authorization, computer network management, design, distributed computing environment networks, distributed information, implementation, network interfaces, privilege management system, secure network

K. J. Maly; A. Gupta; B. Kvande; I. B. Levinstein; R. Mukkamala; M. Olson; R. Whitney; R. Chambers

1996-06-01T23:59:59.000Z

142

HQ Emergency Management Team (EMT) | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

HQ Emergency Management Team (EMT) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

143

Information Security and Privacy Advisory Board (ISPAB)  

Science Conference Proceedings (OSTI)

... Institute of Standards and Technology (NIST), the Secretary of Commerce and the Director of the Office of Management and Budget on information ...

2013-01-15T23:59:59.000Z

144

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

145

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

146

NIM (NERSC Information Management) system  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information....

147

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

148

Improving web site security with data flow management  

E-Print Network (OSTI)

This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

Yip, Alexander Siumann, 1979-

2009-01-01T23:59:59.000Z

149

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... JOINT TASK FORCE TRANSFORMATION INITIATIVE ... aspects of information security (ie, technical ... physical, personnel, cyber-physical); and 4. Is ...

2013-05-09T23:59:59.000Z

150

ITL Bulletin - ITL Updates Glossary of Key Information Security ...  

Science Conference Proceedings (OSTI)

... ITL UPDATES GLOSSARY OF KEY INFORMATION SECURITY TERMS ... ITL plans to keep the glossary current by providing updates online. ...

2013-06-12T23:59:59.000Z

151

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

152

22nd National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... Techniques Dr. Roshan Thomas, NAI Labs ... Kubic, National Security Agency Tom Shake, MIT ... Security Implementations Bret Hartman, Concept Five ...

2000-10-25T23:59:59.000Z

153

Fifth Annual Health Information Security Conference Runs ...  

Science Conference Proceedings (OSTI)

... conference is an opportunity for HIPAA security rule implementers; security, privacy and compliance officers; assessment teams and audit staff in ...

2012-04-17T23:59:59.000Z

154

National Security Information Classification Guidance Fundamental Review, June 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Information Fundamental Classification Guidance Review Report to the Information Security Oversight Office June 2012 United States Department of Energy Washington, DC 20585 Department of Energy | June 2012 National Security Information Fundamental Classification Guidance Review | Page iii Executive Summary Section 1.9 of Executive Order (E.O.) 13526, Classified National Security Information, dated December 29, 2009, directs agency heads to complete a comprehensive review of agency classification guides to ensure they reflect current circumstances and to identify classified information that no longer requires protection and can be declassified. To meet this requirement, the Department of Energy (DOE), under the direction of the Senior Agency Official, devoted

155

Agenda - DOE Information Management Conference 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Monday - Risk Management Monday - Risk Management Risk Management 2:00-2:15 p.m. Welcome and Summit Overview Gil Vega, Chief Information Security Officer, U.S. Department of Energy Trinity Ballroom 4 2:00-5:00 p.m. OCIO Risk Management Summit Part II Diving Deep: Processes and Lessons Learned from Risk Management Implementation The OCIO is pleased to announce the Risk Management Summit, Part II at the 2012 Information Management Conference. This summit will begin with opening remarks from Alan Paller, Director of Research, SANS Institute, on the state of implementing risk-based management programs across the Federal government. Mr. Paller will also facilitate a panel of DOE site representatives to discuss "Diving Deep: Processes and Lessons Learned from Risk Management Implementation."

156

NNSA selects Consolidated Nuclear Security, LLC to manage the...  

NLE Websites -- All DOE Office Websites (Extended Search)

selects Consolidated ... NNSA selects Consolidated Nuclear Security, LLC to manage the consolidated contract for Nuclear Production Operations Posted: January 8, 2013 - 1:20pm In a...

157

National Security and Emergency Management: How ORISE is Making...  

NLE Websites -- All DOE Office Websites (Extended Search)

(ORISE) is recognized across the United States for its national security and emergency management planning expertise and operations support. Through exercises and...

158

Contract Administration & Business Management | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Contract Administration & Business Management | National Nuclear Security Contract Administration & Business Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Contract Administration & Business Management Home > Field Offices > Welcome to the Sandia Field Office > Contract Administration & Business Management

159

Advanced Metering Infrastructure Security Management Guidelines  

Science Conference Proceedings (OSTI)

Advanced Metering Infrastructure (AMI) systems have raised many security concerns since they connect traditionally self-contained power system operations with widely dispersed, un-trustable customer sites. Many different groups are identifying the security requirements for AMI systems, including the NIST Smart Grid Security Guidelines and the ASAP-SG AMI Security Profile v2.0. Vendors are applying security technologies to their products in an effort to meet those security requirements. However, AMI netwo...

2010-12-31T23:59:59.000Z

160

Office of Acquisition Management (OAM) | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

of Acquisition Management (OAM) | National Nuclear Security of Acquisition Management (OAM) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Acquisition Management (OAM) Home > About Us > Our Operations > Acquisition and Project Management > Office of Acquisition Management (OAM) Office of Acquisition Management (OAM) Office of Acquisition Management (OAM)

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Office of Acquisition Management (OAM) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

of Acquisition Management (OAM) | National Nuclear Security of Acquisition Management (OAM) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Acquisition Management (OAM) Home > About Us > Our Operations > Acquisition and Project Management > Office of Acquisition Management (OAM) Office of Acquisition Management (OAM) Office of Acquisition Management (OAM)

162

Drilling Waste Management Information System  

NLE Websites -- All DOE Office Websites (Extended Search)

The Drilling Waste Management Information System is an online resource for technical and regulatory information on practices for managing drilling muds and cuttings, including...

163

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

164

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

RSA SecurID User Guide VPN Home What is RSA SecurID? RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an...

165

Information and Records Management Transition Guidance | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information and Records Management Transition Guidance Information and Records Management Transition Guidance Information and Records Management Transition Guidance (March 2004)...

166

Office of Information Management - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

security of HSS Department-wide databases and systems in support of the HSS missions in health, safety, and security. Manages technology-related organizational change and advises...

167

List of Major Information Systems,National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

168

Managing Security and Privacy Risk in Healthcare ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2012-06-05T23:59:59.000Z

169

Project Management and Systems Support | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

170

Project Management and Systems Support | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

171

TIA TR-45.7, FOR FORWARDING TO 3GPP2, AND TR45-AHG ON IMT2000 SECURITY MANAGEMENT APPROVAL: Not yet Approved by Working Party 5/4 FOR: Information and Response  

E-Print Network (OSTI)

ITU-T Study Group 4 is currently developing a series of Recommendations for the X interface between IMT2000 operators belonging to different 3 rd generation families. We are also considering a broader work programme for the future, on the application of TMN to 3 rd generation mobile systems. We attach a new draft recommendations which address the requirements and analysis (Stage 1 and Stage 2) for the management information to be exchanged between Visited and Home Service Providers for the management of the prevention of fraud. Q24/4 are seeking comments from ITU-T SG7, as the lead Studygroup for Security, and comments and the support and of the 3 rd generation families for the proposed approach. We would appreciate your comments for discussion at our next Q24/4 experts meeting which will be held during October/November 2000 (Attach Draft Recommendations M.3210.imtsec)

Working Party; G. Caryer

2000-01-01T23:59:59.000Z

172

ORAU: National Security and Emergency Management Fact Sheet  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security and Emergency National Security and Emergency Management Services ORAU works with federal, state and local agencies to enhance emergency management planning and integrate their efforts to respond effectively to terrorism, natural disasters and other hazards. Our experienced team helps organizations identify and correct readiness gaps to strengthen their response plans.

173

NCNR Information Management System  

Science Conference Proceedings (OSTI)

... Use TLS 1.0 (Security section under Advanced tab); Enable Java Scripting (Scripting section from Custom Level under Security tab); ...

174

An architecture for policy-based security management for distributed multimedia services  

Science Conference Proceedings (OSTI)

In this paper, I will describe my Ph.D. research work on a multi level architecture to manage security for distributed multimedia services through the use of policies. Keywords: policy-driven management, security management, security policies

Sandrine Duflos; Brigitte Kervella; Eric Horlait

2002-12-01T23:59:59.000Z

175

Enterprise Information Management: When Information Becomes Inspiration  

Science Conference Proceedings (OSTI)

How an organization manages its information is arguably the most important skill in todays dynamic and hyper-competitive environment. In Enterprise Information Management, editor Paul Baan and a team of expert contributors present a holistic approach ...

Paul Baan

2012-11-01T23:59:59.000Z

176

List of Major Information Systems,National Nuclear Security Administra...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

177

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations Appendix F ...

2013-05-09T23:59:59.000Z

178

Security and Privacy Controls for Federal Information Systems  

Science Conference Proceedings (OSTI)

NIST Special Publication 800-53. Revision 4. Security and Privacy Controls for Federal Information Systems. and Organizations. JOINT TASK FORCE ...

2013-06-18T23:59:59.000Z

179

DOE O 471.6 Admin Chg. 1, Information Security  

Directives, Delegations, and Requirements

The protection and control of classified information is critical to our nation??s security. This Order establishes requirements and responsibilities for ...

2011-06-20T23:59:59.000Z

180

U-003:RPM Package Manager security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03:RPM Package Manager security update 03:RPM Package Manager security update U-003:RPM Package Manager security update October 4, 2011 - 1:30pm Addthis PROBLEM: A vulnerability was reported in RPM Package Manager. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 4.9.1.1 and prior versions. ABSTRACT: RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: RPM Package Manager Advisory RHSA-2011:1349-1 SecurityTracker Alert ID: 1026134 CVE-2011-3378 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted RPM package that, when queried or installed by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

182

DOE Selects Lawrence Livermore National Security, LLC to Manage its  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Laboratory DOE Selects Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Laboratory May 8, 2007 - 12:45pm Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced that Lawrence Livermore National Security, LLC (LLNS) has been selected to be the management and operating contractor for DOE's National Nuclear Security Administration's (NNSA) Lawrence Livermore National Laboratory in California. "Livermore National Laboratory is a critical part of our nuclear weapons complex and has been for the last 55 years," Secretary Bodman said. "For the first time since the beginning of the laboratory a new contractor is

183

Selection of Model in Developing Information Security Criteria for Smart Grid Security System  

E-Print Network (OSTI)

At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

Ling, Amy Poh Ai

2011-01-01T23:59:59.000Z

184

Antivirus Procedures, Cyber Security, Information Technology...  

NLE Websites -- All DOE Office Websites (Extended Search)

Anti-virus Software Trend OfficeScan for PCs & Trend Micro Security for Mac Anti-Virus procedures are an important component of BNL's host-based security architecture. Anti-Virus...

185

Usability meets Security - The Identity-Manager as your Personal Security Assistant for the Internet  

E-Print Network (OSTI)

In today's applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security functions correctly. In this paper, we present a new concept to improve the usability of security mechanisms, introducing an extended classification of protection goals. As a result, the everyday use of security functionality can be reduced to selecting the user's identity, which is the basis of the Identity-Manager, a new security tool presented in this paper. It offers a user interface for security functionality compatible to all internet applications. So even the inexperienced users are able to configure and negotiate their security needs in a convenient way.

Uwe Jendricke; Daniela Gerd tom Markotten

2000-01-01T23:59:59.000Z

186

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... 9:15 NIST Welcome William Barker, NIST Computer Security Division NO BIO and Presentation Available. ... BIO & Abstract Presentation. ...

187

NISTIR 7359, Information Security Guide For Government ...  

Science Conference Proceedings (OSTI)

... These benefits include: Business success/resilience. Effective security ensures that vital services are delivered in all operating conditions. ...

2012-02-29T23:59:59.000Z

188

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... Jim Wiggins, Federal IT Security Institute ... Gale Warshawsky, Department of Energy: Lawrence Livermore ... Notice & Privacy Policy Send comments or ...

189

National reconstruction information management system  

Science Conference Proceedings (OSTI)

National Reconstruction Information Management System (NARIMS) is a revolutionary concept designed and developed by the National Reconstruction Bureau, Government of Pakistan, to work as an aid in support of the Local Governments under the Devolution ... Keywords: administration, asset management, community development, decision support, e-governance, financial, geographical information system, human resource management, information management system, local government, monitoring, performance evaluation

Daniyal Aziz; Syed Adnan Shah; Deeba Gilani

2007-12-01T23:59:59.000Z

190

Quantum Public-Key Encryption with Information Theoretic Security  

E-Print Network (OSTI)

We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

Jiangyou Pan; Li Yang

2010-06-02T23:59:59.000Z

191

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

192

Hiring and Managing a Cyber Security Workforce:  

Science Conference Proceedings (OSTI)

... DHS cyber security workers and others from outside of ... Sell the mission! Protecting the US nuclear arsenal or the New York City water supply is a ...

2013-09-19T23:59:59.000Z

193

The Board's Role: Executive and board roles in information security  

Science Conference Proceedings (OSTI)

Corporate information in all its forms is a business asset and needs to be recognised as such. This implies that the ultimate responsibility for security must be accepted by the business and not merely delegated to a chief information security officer ...

Paul Williams

2007-08-01T23:59:59.000Z

194

Towards automatic security management: a model-based approach  

Science Conference Proceedings (OSTI)

This paper introduces a security management approach that integrates system monitoring, intrusion detection, and automatic control in order to detect, classify and protect against security attacks automatically. The model-based controller computes the ... Keywords: DoS attack, detection, optimization, protection

Qian Chen; Sherif Abdelwahed; Weston Monceaux

2013-01-01T23:59:59.000Z

195

Corporate information management guidance  

SciTech Connect

At the request of the Department of Energy`s (DOE) Information Management (IM) Council, IM representatives from nearly all Headquarters (HQ) organizations have been meeting over the past year as the Corporate Guidance Group (CGG) to develop useful and sound corporate information management (IM) guidance. The ability of the Department`s IM community to develop such unified guidance continues to be critical to the success of future Departmental IM planning processes and the establishment of a well-coordinated IM environment between Headquarters and field organizations. This report, with 26 specific corporate IM guidance items documented and unanimously agreed to, as well as 12 items recommended for further development and 3 items deferred for future consideration, represents a highly successful effort by the IM community. The effort has proven that the diverse DOE organizations can put aside individual preferences and work together towards a common and mutually beneficial goal. In examining most areas and issues associated with information management in the Department, they have developed specific, far-reaching, and useful guidance. The IM representatives recommend that the documented guidance items provided in this report and approved by the DOE IM Council be followed by all IM organizations. The representatives also strongly recommend that the guidance process developed by the CGG be the single process for developing corporate IM guidance.

NONE

1997-08-01T23:59:59.000Z

196

NNSA Selects Consolidated Nuclear Security, LLC to Manage the Consolidated  

National Nuclear Security Administration (NNSA)

Selects Consolidated Nuclear Security, LLC to Manage the Consolidated Selects Consolidated Nuclear Security, LLC to Manage the Consolidated Contract for Nuclear Production Operations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Field Offices > Welcome to the NNSA Production Office > NPO Press Releases > NNSA Selects Consolidated Nuclear Security, LLC to ...

197

Information Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Collection RequestsPRA (PDF) DOE Order 200.2 Information Collection Management Program - To set forth the Department of Energy (DOE) requirements and...

198

Training Management Information System  

Science Conference Proceedings (OSTI)

The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

Rackley, M.P.

1989-01-01T23:59:59.000Z

199

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

200

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of future of gov Network 2020/MTIPS/TIC Earl Crane, Director for Federal Cybersecurity, National Security Staff, The White House Tim Polk ...

2013-06-17T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

FISSEA - Federal Information Systems Security Educators' ...  

Science Conference Proceedings (OSTI)

... to two CISOs at the US Department of Energy. ... Prior to EES, Al worked for Keane Federal Systems, Inc ... the FBI on all matters of cyber security policy. ...

202

Site Information | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

nonproliferation, bio threats, global climate modeling and other critical problems. NTS Nevada National Security Site (NNSS), near Las Vegas, Nev., is where the U.S....

203

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... simulated testing set up in fifteen government facilities. ... It is essential to understand the relationship ... to present his paper on Cyber Security Doctrine. ...

2011-07-20T23:59:59.000Z

204

CGI Information Technology Security Evaluation & Test Facility  

Science Conference Proceedings (OSTI)

... [17CMH2/02] Test methods for Physical Security Level 4, in accordance with FIPS 140-2. Cryptographic Modules Software 1 Testing. ...

2013-08-02T23:59:59.000Z

205

20th National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... NIST does not accept any other credit cards. ... and CD-ROM of the conference proceedings will be ... In January 1981, the National Computer Security ...

206

Inspection Of Environment, Safety, And Health Management At The Y-12 National Security Complex  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Y-12 National Security Complex Office of Independent Oversight and Performance Assurance Office of the Secretary of Energy April 2003 ISM OVERSIGHT Table of Contents 1.0 INTRODUCTION .....................................................................1 2.0 RESULTS ..................................................................................3 3.0 CONCLUSIONS .......................................................................8 4.0 RATINGS ................................................................................ 10 APPENDIX A - SUPPLEMENTAL INFORMATION ...................... 11 APPENDIX B - SITE-SPECIFIC FINDINGS .................................. 12 APPENDIX C - GUIDING PRINCIPLES OF SAFETY MANAGEMENT IMPLEMENTATION ..................................... 13

207

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

208

Index of Energy Security Risk | Open Energy Information  

Open Energy Info (EERE)

Index of Energy Security Risk Index of Energy Security Risk Jump to: navigation, search Tool Summary Name: Index of Energy Security Risk Agency/Company /Organization: United States Chamber of Commerce, Institute for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.energyxxi.org/images/Energy_Index_2011_FINAL.pdf Cost: Free Index of Energy Security Risk Screenshot References: Index of Energy Security Risk[1] "This 2011 edition of the Index incorporates the most current energy data, including the Energy Information Administration's (EIA) Annual Energy Outlook 2011 (AEO 2011), to provide an up-to-date assessment of the trends having the greatest impact on energy security since the first Index was

209

The management of the National Nuclear Security Administration's Classified Enterprise Secure Network project  

Science Conference Proceedings (OSTI)

Original publisher: Washington, DC : U.S. Dept. of Energy, Office of Inspector General, Office of Audit Services, [2009] OCLC Number: (OCoLC)712149327 Subject: Nuclear weapons information -- Security measures -- Evaluation. Excerpt: ... support of ESN. ...

United States. Dept. of Energy. Office

2011-09-01T23:59:59.000Z

210

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements  

Science Conference Proceedings (OSTI)

This paper proposes a new approach for assessing the organization's vulnerability to information-security breaches. Although much research has been done on qualitative approaches, the literature on numerical approaches to quantify information-security ... Keywords: Information security, Information-security measurement, Risk analysis, Security threats, Vulnerability measurement

Sandip C. Patel; James H. Graham; Patricia A. S. Ralston

2008-12-01T23:59:59.000Z

211

Information Management Governance Council | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Management Governance Council Information Management Governance Council Describes the establishment of the Information Management Governance Council and What They Do....

212

NETL: Produced Water Management Information System  

NLE Websites -- All DOE Office Websites (Extended Search)

PWMIS Home Produced Water Management Information System The Produced Water Management Information System is an online resource for technical and regulatory information for managing...

213

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

214

Personal information management and learning  

Science Conference Proceedings (OSTI)

Students today collect and organise information on a daily basis in their PCs, laptops and mobiles, creating a personal information archive that contains items related to their learning tasks. Personal information management (PIM) is the activities users ...

Sharon Hardof-Jaffe; Rafi Nachmias

2011-02-01T23:59:59.000Z

215

Office of Headquarters Security Operations - Headquarters Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

216

HQ Emergency Management Team (EMT) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

HQ Emergency Management Team (EMT) | National Nuclear Security HQ Emergency Management Team (EMT) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog HQ Emergency Management Team (EMT) Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > HQ Emergency Management Team (EMT) HQ Emergency Management Team (EMT) NNSA ensures that capabilities are in place to respond to any NNSA and

217

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

218

Information-Theoretically Secure Communication Under Channel Uncertainty  

E-Print Network (OSTI)

Secure communication under channel uncertainty is an important and challenging problem in physical-layer security and cryptography. In this dissertation, we take a fundamental information-theoretic view at three concrete settings and use them to shed insight into efficient secure communication techniques for different scenarios under channel uncertainty. First, a multi-input multi-output (MIMO) Gaussian broadcast channel with two receivers and two messages: a common message intended for both receivers (i.e., channel uncertainty for decoding the common message at the receivers) and a confidential message intended for one of the receivers but needing to be kept asymptotically perfectly secret from the other is considered. A matrix characterization of the secrecy capacity region is established via a channel-enhancement argument and an extremal entropy inequality previously established for characterizing the capacity region of a degraded compound MIMO Gaussian broadcast channel. Second, a multilevel security wiretap channel where there is one possible realization for the legitimate receiver channel but multiple possible realizations for the eavesdropper channel (i.e., channel uncertainty at the eavesdropper) is considered. A coding scheme is designed such that the number of secure bits delivered to the legitimate receiver depends on the actual realization of the eavesdropper channel. More specifically, when the eavesdropper channel realization is weak, all bits delivered to the legitimate receiver need to be secure. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We show that the key to achieving efficient security embedding is to jointly encode the low-security and high-security bits. In particular, the low-security bits can be used as (part of) the transmitter randomness to protect the high-security ones. Finally, motivated by the recent interest in building secure, robust and efficient distributed information storage systems, the problem of secure symmetrical multilevel diversity coding (S-SMDC) is considered. This is a setting where there are channel uncertainties at both the legitimate receiver and the eavesdropper. The problem of encoding individual sources is first studied. A precise characterization of the entire admissible rate region is established via a connection to the problem of secure coding over a three-layer wiretap network and utilizing some basic polyhedral structure of the admissible rate region. Building on this result, it is then shown that the simple coding strategy of separately encoding individual sources at the encoders can achieve the minimum sum rate for the general S-SMDC problem.

Ly, Hung Dinh

2012-05-01T23:59:59.000Z

219

10 CFR 851, Security and Integrated Safety Management Presentation  

NLE Websites -- All DOE Office Websites (Extended Search)

, Security and , Security and Integrated Safety Management Bill McArthur, PhD, CIH Director, Office of Worker Safety and Health Policy (HS-11) Office of Health and Safety 10 CFR 851 * "Worker Safety and Health Program" Rule required final implementation May 25, 2007. * Applies to ALL contractors on DOE site and working in furtherance of DOE mission. * Contains S&H requirements Workplace Safety and Health * Security Force personnel have the same rights for a safe and healthful workplace as other contractor or federal workers * DOE and the Security Force contractor have spent considerable resources to hire and train personnel * Want to keep the Force accident free Recent Security Issues * Obscurant Smoke * Heat Stress * Noise * Carbon Monoxide - Meeting at OR this week

220

Inventory Tracking and Management: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Inventory Tracking and Management: Fact Sheet | National Nuclear Security Inventory Tracking and Management: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Inventory Tracking and Management: Fact Sheet Fact Sheet Inventory Tracking and Management: Fact Sheet Mar 23, 2012 Under International Atomic Energy Agency (IAEA) safeguards agreements,

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

222

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

223

Information Management Governance Frequently Asked Questions...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Management Governance Frequently Asked Questions (FAQs) Information Management Governance Frequently Asked Questions (FAQs) Frequently Asked Questions (FAQs) of The...

224

National Interest Security Company NISC Formerly Technology Management  

Open Energy Info (EERE)

Interest Security Company NISC Formerly Technology Management Interest Security Company NISC Formerly Technology Management Services TMS Inc Jump to: navigation, search Name National Interest Security Company (NISC) (Formerly Technology & Management Services (TMS) Inc.) Place Gaithersburg, Maryland Zip 20879 Product TMS provides technical and engineering analyses Coordinates 39.139866°, -77.193829° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.139866,"lon":-77.193829,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

225

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

226

Waste Management Magazine Highlights Nevada National Security Site |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Magazine Highlights Nevada National Security Site Management Magazine Highlights Nevada National Security Site Waste Management Magazine Highlights Nevada National Security Site March 28, 2013 - 12:00pm Addthis A worker at NNSS handles large, high-powered batteries called radioisotope thermoelectric generators (RTGs), which are discussed in the recent article on the NNSS in RadWaste Solutions magazine. Like most low-level waste, RTGs disposed of at the NNSS were handled without any special equipment or clothing because of the relatively low dose rate levels. A worker at NNSS handles large, high-powered batteries called radioisotope thermoelectric generators (RTGs), which are discussed in the recent article on the NNSS in RadWaste Solutions magazine. Like most low-level waste, RTGs disposed of at the NNSS were handled without any special equipment or

227

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

228

Federal Energy Management Program: Best Management Practice: Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

229

Federal Energy Management Program: Energy Independence & Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

synfuel unless its life-cycle GHG emissions are less than those for conventional petroleum sources. Back to top Office of Management and Budget Reporting Section 527...

230

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

231

Office of Information Systems Management (OISM)  

Science Conference Proceedings (OSTI)

... of Commerce (DOC) Office of the CIOComputer Security Resource Center (CSRC)Federal CIO CouncilOffice of Management and Budget (OMB). ...

2013-01-15T23:59:59.000Z

232

Membership Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Membership Information "Promoting Equal Opportunity and Cultural Diversity for APAs in Government" The FAPAC - New Mexico membership application form is...

233

Federal Energy Management Program: Energy Security Planning for Sustainable  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

234

Security issues at the Department of Energy and records management  

SciTech Connect

In order to discuss the connection between security issues within the Department of Energy and records management, the author covers a bit of security history and talks about what she calls ``the Amazing Project''. Initiated in late May 1999, it was to be a tri-laboratory (Lawrence Livermore National Laboratory of Livermore, California, Los Alamos National Laboratory of Los Alamos, New Mexico, and Sandia National Laboratories of Albuquerque, New Mexico, and Livermore, California) project. The team that formed was tasked to develop the best set of security solutions that still enabled weapon mission work to get done and the security solutions were to be the same set for everyone. The amazing project was called ''The Integrated Security Management Project'', or ''ISecM' for short. She'll describe why she thinks this project was so amazing and what it accomplished. There's a bit of sad news about the project, but then she'll move onto discuss what was learned at Sandia as a result of the project and what they're currently doing in records management.

NUSBAUM,ANNA W.

2000-03-13T23:59:59.000Z

235

Towards holistic security management through coherent measuring  

Science Conference Proceedings (OSTI)

Today's complex communication systems are vital for many businesses. The high skill needed to master those systems has created an economy of services where many specialised organisations participate in producing the end service. Managing that orchestra ...

Perttu Halonen; Kimmo Htnen

2010-08-01T23:59:59.000Z

236

Wireless networking security: open issues in trust, management, interoperation and measurement  

Science Conference Proceedings (OSTI)

The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve security mechanisms. The design, development and evaluation of security techniques ... Keywords: interoperation, management, measurement, network security, open security, trust, wireless networks, wireless security

Joseph B. Evans; Weichao Wang; Benjamin J. Ewy

2006-09-01T23:59:59.000Z

237

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

NLE Websites -- All DOE Office Websites (Extended Search)

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

238

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

239

Management Information Reporting Procedures  

Science Conference Proceedings (OSTI)

... but are not limited to assistance in developing environmental management systems, improving ... with a client that is already in the database, there is ...

2010-07-01T23:59:59.000Z

240

Sandia National Laboratories: About Sandia: Leadership: Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

vision and leadership of Sandia's information technology, information management, and cyber security strategy. The balance between information technology and information...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

20th National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... 7 and banquet on Oct. 8. The fee for the pre-conference workshops on Oct. 6 is $100. To receive registration information, contact: ...

242

The Department of Homeland Security Energy Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Homeland Security Homeland Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies conduct their environmental, transportation, and energy- related activities under the law in support of their respective missions in an environmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner." (Executive Order 13423, Section 1 - Policy) DHS Energy Program Overview Steven W. White, CEM May 2, 2007 3 Program Foundation  Comply with requirements of Laws, Regulations and Executive

243

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

244

Information Security Analysis Using Game Theory and Simulation  

SciTech Connect

Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

Schlicher, Bob G [ORNL; Abercrombie, Robert K [ORNL

2012-01-01T23:59:59.000Z

245

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and information intelligence challenges and strategies  

SciTech Connect

As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2010-01-01T23:59:59.000Z

246

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

247

WHO SHOULD REALLY MANAGE INFORMATION SECURITY ...  

Science Conference Proceedings (OSTI)

... Thus, the elimination of the TEMPEST individual workstation electronic shielding requirement saved the Federal government millions of dollars and ...

1997-10-15T23:59:59.000Z

248

Area Information | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Visiting Us / Area Information Visiting Us / Area Information Area Information Guides, Area Maps, Airport... Airport, About: McGhee Tyson Airport Airport: map to Oak Ridge/Knoxville Oak Ridge: City Guide for City of Oak Ridge, Tennessee Knoxville: maps for visitors Oak Ridge: area map with location of Y-12 Visitor's Center Oak Ridge: map of city streets Roane County: Roane County Guide Resources: News, History... Knoxville: Knoxville, Tennessee Knoxville: Museums Knoxville: Knoxville News-Sentinel Oak Ridge: City of Oak Ridge Oak Ridge: Chamber of Commerce Oak Ridge: Convention and Visitors Bureau Oak Ridge: Oak Ridger Oak Ridge: Secret City History Area Attractions: To Do and See Knoxville: Clarence Brown Theater Knoxville: Frank H. McClung Museum Knoxville: Knoxville Opera Company, Francis Graffeo, General

249

Monitoring informs management  

SciTech Connect

Improved regional monitoring and reporting of greenhouse-gas emissions depends on accurate estimates of emissions from different land-use regimes. An analysis suggests that measuring emissions per crop yield may be an optimum metric for refining land-management decisions.

West, Tristram O.

2011-10-24T23:59:59.000Z

250

An efficient approach to support querying secure outsourced XML information  

Science Conference Proceedings (OSTI)

Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption proposals treat confidential parts of an XML document as whole blocks of text and apply ...

Yin Yang; Wilfred Ng; Ho Lam Lau; James Cheng

2006-06-01T23:59:59.000Z

251

Information Collection Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Collection Management Information Collection Management The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the...

252

IBM Software Information Management  

E-Print Network (OSTI)

instances of private data so that they can be fully protected · Support compliance with privacy regulations protecting that data--and the applications that hold that data--makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organizations must

253

Glossary of Key Information Security Terms (Draft)  

E-Print Network (OSTI)

Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by Federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, Federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and

Richard Kissel; Richard Kissel

2012-01-01T23:59:59.000Z

254

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Conference Proceedings (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

255

Security data extraction from IEC 61850 ACSI models for network and system management  

Science Conference Proceedings (OSTI)

The international standard IEC 62351 proposed the format of abstract data object for secure smart grid controls which is named as Network and System Management (NSM). It is devised to respond not only deliberate attacks such as cyber hacking and sabotage, ... Keywords: IEC 61850, IEC 62351, network and system management, power grid security, smart grid security

Chung-Hyo Kim; Moon-Seok Choi; Seong-Ho Ju; Yong-Hun Lim; Jong-Mock Baek

2011-08-01T23:59:59.000Z

256

Formal validation of automated policy refinement in the management of network security systems  

Science Conference Proceedings (OSTI)

Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy ... Keywords: Formal validation, Model-based management, Network security, Policy based management, Security policies

Joo Porto de Albuquerque; Heiko Krumm; Paulo Lcio de Geus

2010-04-01T23:59:59.000Z

257

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

SciTech Connect

The Annual Cyber Security and Information Intelligence Research Workshop [CSIIRW] was be held at Oak Ridge National Laboratory in Oak Ridge, TN on April 21 - 23, 2010. The aim of this workshop is to introduce and discuss novel theoretical and empirical research focused on (the many) different aspects of software security/dependability, because as we know, the heart of the cyber infrastructure is software. As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value (wiki). The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. Cyber crime is a very serious and growing problem which now has an annual global turnover in the criminal world of more than 1000 BUSD [recent numbers from an FBI white paper] with the hardest hit industries being the banks and the insurance companies. A recent EU study of the banking world showed that more than 60% of cyber crime in banks was carried out by insiders of which ~65% by senior managers. Moreover, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require a transformation in computing and communication systems architecture and new capabilities that do not merely solve today s plethora of security enigmas, but enable comprehensive game-changing strategies [A Scientific R&D Approach to Cyber Security, C. Catlett, et al., Community-driven report submitted to the DOE, Dec. 2008]. The aim of this workshop is to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. We encourage the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the ever evolving context of cyberspace.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2010-01-01T23:59:59.000Z

258

Quantification, Optimization and Uncertainty Modeling in Information Security Risks: A Matrix-Based Approach  

Science Conference Proceedings (OSTI)

In this paper, the authors present a quantitative model for estimating security risk exposure for a firm. The model includes a formulation for the optimization of controls as well as determining sensitivity of the exposure of assets to different threats. ... Keywords: Cost Benefit Analysis, Data Simulation, Decision Models, IS Risk Management, Investment Justification, Security Management, Security Risk

Sanjay Goel; Eitel J.M. Laura

2010-04-01T23:59:59.000Z

259

WIMS - Waste Information Management System  

Office of Environmental Management (EM)

Welcome To WIMS Welcome To WIMS Waste Information Management System WIMS new web address: http://www.emwims.org WIMS is developed to provide DOE Headquarters and site waste managers with the tools necessary to easily visualize, understand, and manage the vast volumes, categories, and problems of forecasted waste streams. WIMS meets this need by providing a user-friendly online system to gather, organize, and present waste forecast data from DOE sites. This system provides a method for identification of waste forecast volumes, material classes, disposition pathways, and potential choke points and barriers to final disposition. Disclaimer: Disposition facility information presented is for planning purposes only and does not represent DOE's decisions or commitments. Any selection of disposition facility will be made after technical, economic, and policy considerations.

260

Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee  

Science Conference Proceedings (OSTI)

This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for former waste management units, legacy contamination source areas and distribution of contamination in soils, and environmental infrastructure (e.g., caps, monitoring systems, etc.) that is in place or planned in association with RAs. (3) Regulatory considerations and processes for management and disposition of waste soil upon generation, including regulatory drivers, best management practices (BMPs), waste determination protocols, waste acceptance criteria, and existing waste management procedures and BMPs for Y-12. This Soil Management Plan provides information to project planners to better coordinate their activities with other organizations and programs with a vested interest in soil disturbance activities at Y-12. The information allows project managers and maintenance personnel to evaluate and anticipate potential contaminant levels that may be present at a proposed soil disturbance site prior to commencement of activities and allows a more accurate assessment of potential waste management requirements.

None

2005-03-02T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

262

Los Alamos National Security LLC Selected to Manage Los Alamos National  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Security LLC Selected to Manage Los Alamos Los Alamos National Security LLC Selected to Manage Los Alamos National Laboratory Los Alamos National Security LLC Selected to Manage Los Alamos National Laboratory December 21, 2005 - 4:51pm Addthis WASHINGTON, D.C. - Secretary of Energy Samuel W. Bodman announced today that Los Alamos National Security LLC has been selected to be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of Bechtel National, Inc., the University of California, BWX Technologies, Inc., and the Washington Group International, Inc. The laboratory, one of three National Nuclear Security Administration (NNSA) nuclear weapons laboratories, performs sensitive national security

263

DOE G 413.3-3, Safeguards and Security for Program and Project Management  

Directives, Delegations, and Requirements

This Guide provides approaches for implementing security provisions within the functional areas contained in DOE O 413.3A, Program and Project Management for ...

2007-11-15T23:59:59.000Z

264

Secure quantum private information retrieval using phase-encoded queries  

Science Conference Proceedings (OSTI)

We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

2011-08-15T23:59:59.000Z

265

Secure Retrieval of FFTF Testing, Design, and Operating Information  

Science Conference Proceedings (OSTI)

One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.

Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

2009-10-01T23:59:59.000Z

266

Independent Oversight Inspection of Emergency Management at the Y-12 National Security Complex, Volume III  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex November 28, 2001 Washington, DC 20585 UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED 3 INDEPENDENT OVERSIGHT INSPECTION OF EMERGENCY MANAGEMENT AT THE Y-12 NATIONAL SECURITY COMPLEX VOLUME III Table of Contents Acronyms...................................................................................................................................................... 5 1.0 Introduction ........................................................................................................................................... 7 2.0 Results ................................................................................................................................................... 9 3.0 Conclusions..........................................................................................................................................

267

Risk-Informed Asset Management  

Science Conference Proceedings (OSTI)

This report contains business requirements for Risk-Informed Asset Management (RIAM) software. The requirements pertain to both a full-blown version of RIAM (including uncertainty analysis of the economic and safety risk of a proposed equipment improvement project) and for RIAM Level 1 project screening software. The RIAM Level 1 analysis is a bounding process intended to estimate the most optimistic effect that the proposed investment would have on plant safety, cost, and revenue. The optimistic assumpt...

2006-02-24T23:59:59.000Z

268

Security principles and management method for secure S/W introduction  

Science Conference Proceedings (OSTI)

An existing S/W development enterprises was negligent in S/W security problem because of imminent development period, insufficient fund and ignorance of security, and weakness problem of S/W almost has solved by beta test and a patch mostly. In addition, ... Keywords: S/W, S/W introduction, secure S/W, security

Jae Hong Han; Ho Seong Kim; Wan S. Yi; Yoo Jae Won

2008-11-01T23:59:59.000Z

269

NNSAs Management of the $245 million Nuclear Materials Safeguards and Security Upgrades Project Phase II at Los Alamos National Laboratory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA's Management of the $245 NNSA's Management of the $245 Million Nuclear Materials Safeguards and Security Upgrades Project Phase II DOE/IG-0901 January 2014 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 January 2, 2014 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Report on "NNSA's Management of the $245 million Nuclear Materials Safeguards and Security Upgrades Project Phase II at Los Alamos National Laboratory" BACKGROUND The National Nuclear Security Administration's Los Alamos National Laboratory (LANL) is responsible for the protection and control of a significant portion of the Nation's special nuclear

270

Proceedings of the 2nd international conference on Security of information and networks  

Science Conference Proceedings (OSTI)

It is our great pleasure to welcome you to the 2nd International Conference on Security of Information and Networks -- SIN 2009, this year organized in technical cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC). ...

Atilla Eli; Oleg Makarevich; Mehmet Orgun; Alexander Chefranov; Josef Pieprzyk; Yuri Anatolievich Bryukhomitsky; S?dd?ka Berna rs

2009-10-01T23:59:59.000Z

271

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

272

Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government  

E-Print Network (OSTI)

This paper mainly depicts the conceptual overview of vertical integration, semantic interoperability architecture such as Educational Sector Architectural Framework (ESAF) for New Zealand government and different interoperability framework solution for digital government. In this paper, we try to develop a secure information sharing approach for digital government to improve home land security. This approach is a role and cooperation based approach for security personnel of different government departments. In order to run any successful digital government of any country in the world, it is necessary to interact with their citizen and to share secure information via different network among the citizen or other government. Consequently, in order to smooth the progress of users to cooperate with and share information without darkness and flawlessly transversely different networks and databases universally, a safe and trusted information-sharing environment has been renowned as a very important requirement and t...

Headayetullah, Md; Biswas, Sanjay; Puthal, B

2011-01-01T23:59:59.000Z

273

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgwindex.php?titleEnergyIndependenceandSecurityActof2007&oldid255460" Category: Stubs...

274

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

275

Newsletters | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Newsletters Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Newsletters Newsletters U.S....

276

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), &  

NLE Websites -- All DOE Office Websites (Extended Search)

CONTACTS FOR INFORMATION MANAGEMENT: CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records Name Contact Information Area of Responsibility Troy Manigault Phone: 301-903-9926 Email: doerm@hq.doe.gov Director, Records Management Division Ivan King Phone: 202-586-4060 Email: ivan.king@hq.doe.gov Records Management Program (Lead) Tonya Meadows Phone: 301-903-1146 Email: tonya.meadows@hq.doe.gov Forms Management Program (Lead) Christina "Chris" Rouleau Phone: 301-903-6227 Email: Christina.Rouleau@hq.doe.gov Information Collection Management Program (Lead) Deidra "Dee Dee" Wilkinson Phone: 202-586-2398 Email: deidre.wilkinson@hq.doe.gov Records Management Program

277

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

278

Information flow analysis of energy management in a smart grid  

Science Conference Proceedings (OSTI)

Information flow security within the context of multilevel security deals with ways to avoid unwanted information flow from a high level domain to a low level domain. Several confidentiality and information flow properties have been formalized in literature. ... Keywords: bisimulation based non-deducibility on compositions, confidentiality, cyber-physical system, information flow, non-inference, security

Ravi Akella; Bruce M. McMillin

2010-09-01T23:59:59.000Z

279

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senate Homeland Security and Governmental Affairs Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen

280

7/26/2011 University of Texas at Austin Information Technology Services ITS Security Operations A. Security Consultant Scope of Work  

E-Print Network (OSTI)

7/26/2011 University of Texas at Austin ­ Information Technology Services ITS Security;7/26/2011 University of Texas at Austin ­ Information Technology Services ITS Security Operations 2 ii. Document of Texas at Austin ­ Information Technology Services ITS Security Operations 3 iii. Attend

Texas at Austin, University of

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

In defense of the realm: understanding the threats to information security  

Science Conference Proceedings (OSTI)

The popular press is replete with information about attacks on information systems. Viruses, worms, hackers, and employee abuse and misuse have created a dramatic need for understanding and implementing quality information security. In order to accomplish ...

Michael E. Whitman

2004-02-01T23:59:59.000Z

282

Security in the Telecommunications Information Networking Architecture --the CrySTINA Approach \\Lambda  

E-Print Network (OSTI)

Security in the Telecommunications Information Networking Architecture -- the CrySTINA Approach results of the CrySTINA project. We analyze and structure the security problem domain in the TINA­C architecture and present our approach to pro­ vide the necessary security functionality in the form of self

Bencsáth, Boldizsár

283

Security management in Wireless Sensor Networks for healthcare  

Science Conference Proceedings (OSTI)

This paper first discusses emerging security threats, requirements and solutions for WSNs. In addition, the current applications and architectures of WSNs in healthcare systems are explained in detail. Then an assessment framework for WSN security for ...

Tae Oh; Young B. Choi; Jungwoo Ryoo; Kristian Stokes

2011-05-01T23:59:59.000Z

284

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

285

Material Management/Strategic Reserve | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

and special nuclear materials and provides programmatic planning, analysis and forecasting for national security material requirements supporting Stockpile Stewardship and...

286

Security Policies as the Foundation for Cryptographic  

E-Print Network (OSTI)

Security Policies as the Foundation for Cryptographic Key Management Elaine Barker, CKMS Project to Layered Security Policies ­ From Information Management to Key Mngt. ­ From Dept. of Com. To NIST Employees · Security Domains ­ Simple to Complex · Key Management ­ Static to Configurable to Dynamic

287

Securing a Wireless Networked Control System Using Information Fusion  

Science Conference Proceedings (OSTI)

Security of a wireless sensor network practically governs its usability in several applications. Especially, in applications like Industrial control systems which use NCS and SCADA systems, the security affects the stability of the system. We propose ...

Brijesh Kashyap Chejerla, Sanjay Madria

2012-10-01T23:59:59.000Z

288

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

289

Implementing information-theoretically secure oblivious transfer from packet reordering  

Science Conference Proceedings (OSTI)

If we assume that adversaries have unlimited computational capabilities, secure computation between mutually distrusting players can not be achieved using an error-free communication medium. However, secure multi-party computation becomes possible when ... Keywords: delay, noisy channels, oblivious transfer, packet reordering, secure multi-party computation

Paolo Palmieri; Olivier Pereira

2011-11-01T23:59:59.000Z

290

Neutralization: new insights into the problem of employee systems security policy violations  

Science Conference Proceedings (OSTI)

Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers have traditionally viewed violations of IS security ... Keywords: IS security, IS security policies, compliance, deterrence theory, neutralization theory

Mikko Siponen; Anthony Vance

2010-09-01T23:59:59.000Z

291

Management of information warfare: emerging paradigm  

Science Conference Proceedings (OSTI)

Dramatic developments in technologies pertaining to information systems have made profound impact on developed and developing nations and societies. Besides the changes in the social dialectic, the concept and conduct of war fighting have also changed. ... Keywords: armed forces, defensive capabilities, developing countries, information dominance, information management, information technology dependence, information warfare, offensive capabilities, war fighting

Zafar Husain; A. K. Pathak; Ramkrishna Vyas

2005-03-01T23:59:59.000Z

292

Vencon Management | Open Energy Information  

Open Energy Info (EERE)

| Sign Up Search Page Edit with form History Facebook icon Twitter icon Vencon Management Jump to: navigation, search Name Vencon Management Place United States Sector...

293

Email in personal information management  

Science Conference Proceedings (OSTI)

Email's conduit function means the inbox, folders, search, and sort are used to support core PIM functions of task management, personal archiving, and contact management.

Steve Whittaker; Victoria Bellotti; Jacek Gwizdka

2006-01-01T23:59:59.000Z

294

Information Technology for Enterprise Asset Management  

Science Conference Proceedings (OSTI)

Enterprise asset management is a maturing discipline that facilitates business decisions about long-term planning, asset replacement, capital investments, maintenance priorities, and risk management. The growing number of new business processes and applications that support asset management depend on successful interaction with data and information in enterprise systems such as work management, operations data historians, graphical information systems, and financial systems. Concurrently, business applic...

2008-03-10T23:59:59.000Z

295

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

296

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities IAJIT First Online Publication  

E-Print Network (OSTI)

Abstract: In order to perform the analysis and mitigation efforts related with the Information Security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts. So ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. Also in the modelling of the threat domain, attack trees are frequently utilized. However the execution of attack tree modelling is costly from the effort and timing requirements and also has inherent scalability issues. So within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined.

Bugra Karabey; Nazife Baykal

2011-01-01T23:59:59.000Z

297

Information Collection Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance » Information Collection Management Guidance » Information Collection Management Information Collection Management The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the Office of Management and Budget (OMB) before undertaking a collection of information directed to 10 or more persons (including operations of Government-owned, contractor-operated facilities). Under the PRA, OMB approval for each information collection instrument can last a maximum of 3 years. This site provides information about the Paperwork Reduction Act's requirements and guidance in fulfilling those requirements. DOE's Chief Information Officer (CIO) is the Senior Official responsible for DOE's compliance with the Paperwork Reduction Act. Office of Management and

298

Nuclear Materials Management & Safeguards System CONTACT INFORMATION...  

National Nuclear Security Administration (NNSA)

Nuclear Materials Management & Safeguards System CONTACT INFORMATION UPDATE REPORTING IDENTIFICATION SYMBOL (RIS) RIS: Address: Facility Name: CONTACTS Business Name PhoneFax...

299

Scientific and Technical Information (STI) Managers | Scientific...  

Office of Scientific and Technical Information (OSTI)

Scientific and Technical Information (STI) Managers Print page Print page Email page Email page Roles and Responsibilities Last updated: February 17...

300

Inspection of Emergency Management at the Office of Secure Transportat...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OMO Offi ce of Mission Operations OST Offi ce of Secure Transportation PAR Protective Action Recommendation RAP Radiological Assistance Program TECC Transportation and Emergency...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Introduction SCADA Security for Managers and Operators | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA...

302

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems  

Science Conference Proceedings (OSTI)

In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, ... Keywords: Information confinement, Privacy, Probabilistic algorithm, RFID systems, Security

Roberto Di Pietro; Refik Molva

2011-05-01T23:59:59.000Z

303

Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations  

Science Conference Proceedings (OSTI)

This paper presents and compares four models of games and risk analyses designed to support strategic and policy decisions, three focusing on national security issues and one on project management. They share a common core of probability, linked decisions ... Keywords: analytics, counterterrorism, failure probability, game analysis, national security, nuclear proliferation, practice, principal--agent model, risk analysis

M. Elisabeth Pat-Cornell

2012-06-01T23:59:59.000Z

304

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services, and International Security Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications Major Management Challenges and Program Risks : Department of Energy GAO/OCG-99-6 GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects

305

Electronic collection management and electronic information services  

Science Conference Proceedings (OSTI)

As the life cycle of information products has become increasingly digital from cradle to grave, the nature of electronic information management has dramatically changed. These changes have brought new strategies and methods as well as new ...

Gladys Cotter; Bonnie Carroll; Gail Hodge; Andrea Japzon

2005-01-01T23:59:59.000Z

306

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

307

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

308

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

309

Life Cycle Management of Chemicals: Conceptual Design for Information Management  

Science Conference Proceedings (OSTI)

Tracking the acquisition, use, and disposition of chemicals allows companies to reduce costs; manage risks to health, safety, and the environment; and improve compliance and reporting efficiency. This report provides a means of identifying and evaluating chemical life cycle information management needs. The conceptual design presented here will guide utilities through development of a custom system for managing chemical life cycle data.

1999-08-10T23:59:59.000Z

310

CargoNet : micropower sensate tags for supply-chain management and security  

E-Print Network (OSTI)

This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state ...

Malinowski, Mateusz Ksawery

2007-01-01T23:59:59.000Z

311

Towards a Generic Security Framework for Cloud Data Management Environments  

Science Conference Proceedings (OSTI)

Providing an adequate security level in Cloud Environments is currently an extremely active research area. More specifically, malicious behaviors targeting large-scale Cloud data repositories e.g., Denial of Service attacks may drastically degrade the ... Keywords: Cloud Computing, Cloud Storage Service, Denial of Service, Policy Enforcement, Security

Alexandra Carpen-Amarie; Alexandru Costan; Catalin Leordeanu; Cristina Basescu; Gabriel Antoniu

2012-01-01T23:59:59.000Z

312

Chapter_10_Security_Awareness_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: * Title 32, CFR, Part 2001, Classified National Security Information * Executive Order 13526, Classified National Security Information * DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 * DOE Order 475.2A, Identifying Classified Information * DOE Order 475.1, Counterintelligence Program The Security Awareness Program Manager, within HS-92, manages the HQ security awareness program. The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, and security procedures specific to HQ. This goal is accomplished by providing HQ employees

313

U-200: Red Hat Directory Server Information Disclosure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Successful exploitation of the security issue requires that the audit log is enabled (disabled by default). 2) The vulnerability is caused due to an error when changing password...

314

ITL Bulletin Information Security in the System Development ...  

Science Conference Proceedings (OSTI)

... 800-17) c. CC product reevaluation (Additional References: CC) d. Assessment ... Security into the Capital Planning and Investment Control Process ...

2012-04-05T23:59:59.000Z

315

Federal Computer Security Managers' Forum April 11, 2013 ...  

Science Conference Proceedings (OSTI)

... Business Continuity Management Manage the creation, review, testing and activation of business continuity plans to ensure rapid recovery of your ...

2013-05-01T23:59:59.000Z

316

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

317

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

318

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

319

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

320

Quantifying security threats and their impact  

Science Conference Proceedings (OSTI)

In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this ... Keywords: cyber security metrics, information security, risk management

Anis Ben Aissa; Robert K. Abercrombie; Frederick T. Sheldon; Ali Mili

2009-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

322

Lawrence Livermore National Security Cost Model Functional Management Assessment  

Science Conference Proceedings (OSTI)

The scope of the Functional Management Assessment of the cost model included a review of the plan and progress of the Cost Model Review Team. The review focused on processes in place to ensure simplicity, compliance with cost accounting standards and indirect cost allocation methodology, and the change management plan. This was intended to be a high-level initial review in order to provide recommendations for a subsequent more comprehensive review. The single document reviewed by the team during the assessment was the Indirect Cost Recovery Model Review, which describes how the indirect rate restructure and new organizational structure have resulted in streamlined charging practices to better understand and strategically manage costs. ISSUE 1: The cost model focuses heavily on rate structure but not on cost management. Significant progress has been made to simplify the rate structure. The number of indirect rates has been reduced from 67 different indirect rates used under the prior contract to 32 rates in the first year of the LLNS contract, with a goal of further reduction to 16 for FY09. The reductions are being recommended by a broad-based Working Group driven by Lab leadership desiring a simplified rate structure that would make it easier to analyze the true cost of overhead, be viewed as equitable, and ensure appropriate use of Service, i.e., operations, Centers. This has been a real challenge due to the significant change in approach from one that previously involved a very complex rate structure. Under this prior approach, the goal was to manage the rates, and rates were established at very detailed levels that would 'shine the light' on pools of overhead costs. As long as rates stayed constant or declined, not as much attention tended to be given to them, particularly with so many pools to review (184 indirect rate pools in FY05). However, as difficult and important as simplifying the rate structure has been, the fundamental reason for the simplification is to make it easier to analyze the true cost of overhead so the costs can be effectively managed. For the current year, the overall the goal of keeping the total cost of an FTE to FY07 levels. This approach reflects the past practice of managing to rates rather than focusing on costs, although streamlined with the more simplified rate structure. Given all the challenges being faced with the contract transition, this was a reasonable interim tactic for dealing with the known cost increases such as fees and taxes. Nonetheless, in order to take full advantage of the opportunities that exist for making sound decisions for further reducing the rates themselves, the Laboratory needs to implement an ongoing and disciplined approach to understanding and managing overhead cost. ISSUE 2: The NIF has a significantly different rate structure than other Laboratory work. Because of its significant size and unique organizational structure as a major construction project, the National Ignition Facility (NIF) has indirect charges that vary from the norm. These variations were reviewed and approved by and disclosed to the NNSA in the Laboratory's past annual Disclosure Statements. In mid-FY 09, NIF will begin transition from a construction line item to an operational center. The reallocation of costs when this occurs could significantly impact the Laboratory's rates and rate structure planning for that transition from a cost- and rate- impact standpoint should begin soon. ISSUE 3: The new rate model must be finalized shortly in order to implement the model beginning in FY 09. As noted in Issue No.1, a Working Group has developed a simplified rate structure for the Lab to use for FY09. The Working Group has evaluated the cost impacts of the simplified rate structure at the major program level and identified a disparate impact in the Safeguards and Security area where a substantial increase in overhead cost allocation may need to be mitigated. The simplified rate structure will need to be approved by the Laboratory Director and issued within the Laboratory to formulate detailed bu

Tevis, J; Hirahara, J; Thomas, B; Mendez, M

2008-06-12T23:59:59.000Z

323

Cryptanalysis of two group key management protocols for secure multicast  

Science Conference Proceedings (OSTI)

Many emerging network applications are based upon group communication models and are implemented as either one-to-many or many-to-many multicast. As a result, providing multicast confidentiality is a critical networking issue and multicast security has ...

Wen Tao Zhu

2005-12-01T23:59:59.000Z

324

Security risk assessment: toward a comprehensive practical risk management  

Science Conference Proceedings (OSTI)

This paper introduces a unique approach to a more integrated security risk assessment SRA. This is formalised based on the proven mathematical methods described in various articles in the literature and combined with the work developed by the author. ...

Danilo Valeros Bernardo

2012-01-01T23:59:59.000Z

325

Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals  

Science Conference Proceedings (OSTI)

Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap ... Keywords: Security

Constantine Photopoulos

2008-04-01T23:59:59.000Z

326

Environmental Information Management System (EIMS)  

NLE Websites -- All DOE Office Websites (Extended Search)

from BNL's environmental sampling programs. Applications are available to users to query, display, export and print data as well as several data management utilities,...

327

Headquarters Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Security Operations Headquarters Security Operations Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

328

Nevada National Security Site Cleanup Information Is Just a Click Away with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Cleanup Information Is Just a Click Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public December 27, 2012 - 12:00pm Addthis Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. LAS VEGAS, NV - For decades, the Nevada Site Office (NSO) has been investigating, characterizing, identifying, and performing corrective

329

3-Year Renewal Request of OMB 1910-0818, Security, Information Request  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Topical Areas HSS Topical Areas Quality Assurance Enforcement / Oversight Environment HSS Outreach and Communications HSPD-12 Nuclear Materials Management & Safeguards System (NMMSS) HSS Internal Operations Council on Environmental Quality (CEQ) Office of Health, Safety and Security Collection Package Human Reliability Program OMB 1910-5122 Description of Collections 1. Human Reliability Program Certification (DOE F 470.3). Under the Department of Energy Human Reliability Program (HRP), individuals who are applicants for or incumbents in designated positions must be evaluated to ensure that they meet the requirements for certification in the program. This form documents that each part of the evaluation has been completed and records the determination by the HRP Certifying Official. The collection and documentation of this information is required by the HRP regulation found in the Code of Federal Regulations at 10 CFR 712. Form may be viewed at: http://energy.gov/cio/downloads/doe-f-4703

330

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

331

Remote Access to the BNL Network, Cyber Security, Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecureID tokens as soon as possible....

332

How to Lock Your Computer, Cyber Security, Information Technology...  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Lock Your Computer One way to increase security on your computer is to use a password-protected screen saver. All Brookhaven computers are now required to run a...

333

Current News and Information | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

Y-12 Earn 11 R&D 100 Awards Jul 2, 2013 US, International Partners Remove Last Remaining HEU from Vietnam, Set Nuclear Security Milestone View All > Timeline Curious about NNSA...

334

Feature: Information Security, Business and the Internet - Part 2  

Science Conference Proceedings (OSTI)

This article considers the perception of a selected number of small to medium-sized enterprises towards the security problems of E-commerce. It emphasizes the need for common sense and personal responsibility of individual business users. The centralized ...

Clive Blatchford

2000-02-01T23:59:59.000Z

335

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

336

Design for an information-management system  

DOE Green Energy (OSTI)

The design of an information management system to assemble, classify, and catalog existing documentation on the development of the Geysers/Calistoga Known Geothermal Resources Area (KGRA) is presented. The study consisted of several components: user need requirements, design of the system, survey of information management systems, and systems analysis and cost proposal. User input concerning information requirements and system characteristics were obtained from interviews (personal and telephone) and a questionnaire. The sample user population expressed a need for the identification and access to relevant information concerning local geothermal development. Furthermore, it was a consensus of opinion that the creation of an information center as a depository for relevant documentation would be useful in meeting information needs. The production of a book catalog utilizing automatic data processing (ADP) and a data base management system (DBMS) approach is proposed. The catalog would contain full bibliographic descriptions for all records as well as abstracts for highly significant documents.

Not Available

1979-03-08T23:59:59.000Z

337

Definition: Distribution Management System | Open Energy Information  

Open Energy Info (EERE)

Management System Management System Jump to: navigation, search Dictionary.png Distribution Management System A Distribution Management System (DMS) is a utility IT system capable of collecting, organizing, displaying and analyzing real-time or near real-time electric distribution system information. A DMS can also allow operators to plan and execute complex distribution system operations in order to increase system efficiency, optimize power flows, and prevent overloads. A DMS can interface with other operations applications such as geographic information systems (GIS), outage management systems (OMS), and customer information systems (CIS) to create an integrated view of distribution operations.[1] View on Wikipedia Wikipedia Definition In the recent years, utilization of electrical energy increased

338

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

339

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

340

Wireless mesh network security: A traffic engineering management approach  

Science Conference Proceedings (OSTI)

The wireless mesh network (WMN) is an emerging multihop, heterogeneous, easily scalable and low cost network. The architecture of the WMN is a connectionless-oriented, mobile and dynamic traffic of routed packets. The mesh infrastructure environment ... Keywords: IPSec, MPLS, Security, Traffic engineering, VPN, Wireless mesh networks

Okechukwu E. Muogilim; Kok-Keong Loo; Richard Comley

2011-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Scalable data management in distributed information systems  

Science Conference Proceedings (OSTI)

In the era of cloud computing and huge information systems, distributed applications should manage dynamic workloads; i.e., the amount of client requests per time unit may vary frequently and servers should rapidly adapt their computing efforts to those ... Keywords: NoSQL, cloud computing, data management, distributed system, high availability, scalability

M. Remedios Pallard-Lozoya; Javier Esparza-Peidro; Jos-Ramn Garca-Escriv; Hendrik Decker; Francesc D. Muoz-Esco

2011-10-01T23:59:59.000Z

342

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

343

Information Management Strategic Plan. Information: The fuel for success  

SciTech Connect

Reliable information is key to the ultimate success of the Departmental Strategic Plan. To help ensure that success, this Information Management Strategic Plan has been developed, which evolved from and directly supports the Departmental Strategic Plan and the Human Resources and Administration Strategic Plan.

1994-07-01T23:59:59.000Z

344

Information Management Division (HC-14) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Management Division (HC-14) Information Management Division (HC-14) Mission Statement This division provides operational support and consultative advice to the Chief...

345

Revision 1 Glossary of Key Information Security Terms  

E-Print Network (OSTI)

We have received numerous requests to provide a summary glossary for our publications and other relevant sources, and to make the glossary available to practitioners. As a result of these requests, this glossary of common security terms has been extracted from NIST Federal

Richard Kissel; Patrick D. Gallagher; Director Introduction

2011-01-01T23:59:59.000Z

346

Secure distribution of confidential information via self-destructing data  

Science Conference Proceedings (OSTI)

Control and ownership of data is difficult in any environment and with the increase in electronic data and records, the need to maintain ownership and control redistribution of data is becoming increasingly important. We propose a first-level protection ... Keywords: computer networks, data retrieval, data security

Jason Croft; Robert Signorile

2009-11-01T23:59:59.000Z

347

Verified implementations of the information card federated identity-management protocol  

Science Conference Proceedings (OSTI)

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity ... Keywords: CardSpace, cryptographic protocol verification, federated identity management, verified implementations, web services security

Karthikeyan Bhargavan; Cdric Fournet; Andrew D. Gordon; Nikhil Swamy

2008-03-01T23:59:59.000Z

348

Information Technology for Enterprise Asset Management  

Science Conference Proceedings (OSTI)

Integration of business applications across the electric utility enterprise is a high priority in the electric utility industry to reduce information technology (IT) costs and realize a range of business benefits. Asset management, a business process that integrates with most other utility business processes, is particularly enhanced by an integrated information technology solution.

2007-03-26T23:59:59.000Z

349

Exploration of Management Information System: Pemetreating Business Way  

Science Conference Proceedings (OSTI)

The indispensable role of Management Information Systems is common sense in the buisness and organizaiton circle. The use of Management Information Systems has gone from competitive advantage for few to business necessity for all. Its true value comes ... Keywords: Information management, management information system, information technology

Guo Xiang, Li Yanxiao, Li Weihua

2013-01-01T23:59:59.000Z

350

Contacts for Records Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Records Management CIO Leadership Organization Contact Us Acquisition Administration Cyber Security E-Gov Enterprise Architecture Geospatial Science Program Information...

351

Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies To Meet The Cyber Security And Information Intelligence Challenges Ahead  

Science Conference Proceedings (OSTI)

As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of the workshop was to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlined a strategy for cyber security and information intelligence that is founded on sound principles and technologies. We aimed to discuss novel theoretical and applied research focused on different aspects of software security/dependability, as software is at the heart of the cyber infrastructure.

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2008-01-01T23:59:59.000Z

352

ORISE National Security and Emergency Management: Contact Us  

NLE Websites -- All DOE Office Websites (Extended Search)

Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is Making a Difference Overview Exercises and Planning Training and Technology...

353

ORISE: Capabilities in National Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Capabilities ORISE Emergency Management Capabilities In preparation for a natural or man-made disaster, the Oak Ridge Institute for Science and Education (ORISE) provides national...

354

Security-Widefield, Colorado: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Security-Widefield, Colorado: Energy Resources Security-Widefield, Colorado: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 38.7640957°, -104.7404269° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.7640957,"lon":-104.7404269,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

355

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

356

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

357

Office of Health, Safety and Security - Information Collection  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment HSS Outreach and Communications HSPD-12 Nuclear Materials Management & Safeguards System (NMMSS) HSS Internal Operations Council on Environmental Quality (CEQ)...

358

Definition: Outage Management System | Open Energy Information  

Open Energy Info (EERE)

Outage Management System Outage Management System A software application that can process outage reports from a variety of utility operational systems including SCADA, AMI, and customer phone calls, and display outage information to utility operators. The OMS can help a utility interpret outage information and determine where the likely cause of an outage may be. It can also help the utility optimize its service restoration resources.[1] Related Terms advanced metering infrastructure References ↑ https://www.smartgrid.gov/category/technology/outage_management_system [[C LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ategory: Smart Grid Definitionssmart grid,smart grid, |Template:BASEPAGENAME]]smart grid,smart grid, Retrieved from "http://en.openei.org/w/index.php?title=Definition:Outage_Management_System&oldid=502507

359

Energy Security and Restoration Exercise Program/Best Practices and Information Sharing  

Science Conference Proceedings (OSTI)

The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

Barbara McCabe; John Kovach

2009-03-30T23:59:59.000Z

360

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Guidelines for Managing the Security of Mobile Devices in the ...  

Science Conference Proceedings (OSTI)

... is consistent with the requirements of the Office of Management and Budget (OMB) Circular A ... 3, AC-17, AC-19, AC-21, CM-6, CM-7, SA-8, SC-2, SC ...

2013-06-21T23:59:59.000Z

362

Federal Spectrum Management at the National Telecommunications and Information Administration  

Energy.gov (U.S. Department of Energy (DOE))

Slides from National Telecommunications and Information Administration's presentation on Federal spectrum management.

363

Information Management for Reverse Logistics  

E-Print Network (OSTI)

Introduction In this chapter, we examine how Information and Communication Technologies (ICT) are being used to support reverse logistics. In this respet, this chapter does not follow a quantitative approach as the rest of the book. Nonetheless, the topics covered in this section outline how ICT systems enable and support the quantitative approaches presented in other chapters of this book. Furthermore, this chapter provides a roadmap to the reader about what aspects of reverse logistics are implemented and what remains to be addressed in the future. Most ICT systems for reverse logistics have been developed to address needs in a specific sector (i.e. decision making on di#erent recovery options of returns, designing a product for optimal end of use recovery, etc.) or to cover the reverse logistics requirements of a particular company. Thus, in our attempt to present this area systematically we need to develop a framework of reference first. For that reason, we go back to the essent

Angelika Kokkinaki; Rob Zuidwijk

2002-01-01T23:59:59.000Z

364

Strategic plan for Hanford site information management  

SciTech Connect

The Hanford Site missions are to clean up the Site, to provide scientific knowledge and technology to meet global needs, and to partner in the economic diversification of the region. To achieve these long-term missions and increase confidence in the quality of the Site`s decision making process, a dramatically different information management culture is required, consistent with US Department of Energy (DOE) mandates on increased safety, productivity, and openness at its sites. This plan presents a vision and six strategies that will move the Site toward an information management culture that will support the Site missions and address the mandates of DOE.

1994-09-01T23:59:59.000Z

365

Environmental Restoration Information Resource Management Program Plan  

SciTech Connect

The Environmental Restoration Information Resources Management (ER IRM) Program Plan defines program requirements, organizational structures and responsibilities, and work breakdown structure and to establish an approved baseline against which overall progress of the program as well as the effectiveness of its management will be measured. This plan will guide ER IRM Program execution and define the program`s essential elements. This plan will be routinely updated to incorporate key decisions and programmatic changes and will serve as the project baseline document. Environmental Restoration Waste Management Program intersite procedures and work instructions will be developed to facilitate the implementation of this plan.

Not Available

1994-09-01T23:59:59.000Z

366

Securing information gateways with derivation-constrained access control  

Science Conference Proceedings (OSTI)

In pervasive computing environments, information gateways derive specific information, such as a person's location, from raw data provided by a service, such as a videostream offered by a camera. Here, access control to confidential raw data provided ...

Urs Hengartner; Peter Steenkiste

2006-04-01T23:59:59.000Z

367

A Privilege Management System For A Secure Network  

Science Conference Proceedings (OSTI)

Modern research projects may involve dozens of geographically distributed collaborators who access distributed information, devices, and even communication channels. Business enterprises worldwide have developed strategies which involve collaboration ...

K. J. Maly

1996-03-01T23:59:59.000Z

368

Information management as an enabler of knowledge management maturity: A South African perspective  

Science Conference Proceedings (OSTI)

This paper explores the much ignored but critically important subject of the perceived relationship between information and communications technology (ICT), information management (IM) and knowledge management (KM). Defining the border between ICT, IM ... Keywords: Information and communications technology, Information management, Knowledge management, Knowledge management maturity

C. J. (Neels) Kruger; Roy D. Johnson

2010-02-01T23:59:59.000Z

369

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... with the requirements of the Office of Management and Budget (OMB) Circular ... D-6 05-07-2013 Editorial Change SC-18 Priority Code from P1 to P2 ...

2013-05-08T23:59:59.000Z

370

DOE Cites Battelle Energy Alliance, LLC for Classified Information Security Violations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 25,2011 February 25,2011 CERTIFIED MAIL RETURN RECEIPT REQUESTED Mr. John 1. Grossenbacher Director, Idaho National Laboratory and President, Battelle Energy Alliance, LLC P. O. Box 1625 Idaho Falls, Idaho 83415-3695 SEA-20ll-01 Dear Mr. Grossenbacher: The Office of Health, Safety and Security's Office of Enforcement has completed its investigation into the facts and circumstances associated with an incident of security concern regarding the introduction of classified information into unapproved information systems (security event) at the U.S. Department of Energy's (DOE) Idaho National Laboratory (INL). Based on the on-site investigation and evaluation of the evidence in this matter, and in consideration of information presented by you and other Battelle Energy Alliance, LLC (BEA)

371

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

372

Freedom of Information Act Related Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

agency established by Congress in 1988 to provide safety oversight of the nuclear weapons complex operated by the DOE. National Technical Information Service A centralized...

373

Secure communication of static information by electronic means  

DOE Patents (OSTI)

A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

Gritton, Dale G. (Pleasanton, CA)

1994-01-01T23:59:59.000Z

374

Disable Automatic Login, Cyber Security, Information Technology Division,  

NLE Websites -- All DOE Office Websites (Extended Search)

Disable Automatic Login Disable Automatic Login Automatic Login MUST be disabled... Follow the steps below to verify that auto login is disabled. Verify Security Settings Select Personal Section: Click Make sure the following required boxes are checked. - Require password to wake this computer from sleep or screen saver - Disable automatic login If so, close panel. If not, continue... Note: Mac users should have the panel locked at all times. Click the lock image to lock the panel if its open to prevent further changes. To unlock the above panel, click the lock image to bring up the login box. Insert your username & password, click . You should now be able to make changes to the panel.

375

Secure communication of static information by electronic means  

DOE Patents (OSTI)

This invention is comprised of a method and apparatus for the secure transmission of static data from a tag to a remote reader. Each time the static data is to be transmitted to the reader, the 10 bits of static data are combined with 54 bits of binary data, which constantly change from one transmission to the next, into a 64-bit number. This number is then encrypted and transmitted to the remote reader where it is decrypted to produce the same 64 bit number that was encrypted in the tag. With a continual change in the value of the 64 bit number in the tag, the encrypted numbers transmitted to the reader will appear to be dynamic in character rather than being static.

Gritton, D.G.

1991-12-31T23:59:59.000Z

376

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

Science Conference Proceedings (OSTI)

Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Sheldon, Frederick T [ORNL; Peterson, Greg D [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2009-01-01T23:59:59.000Z

377

GFI Network Security and PCI Compliance Power Tools  

Science Conference Proceedings (OSTI)

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities. ... Keywords: Applied, Computer Science, Computers, Information Management, Security

Brien Posey

2008-09-01T23:59:59.000Z

378

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

2011-01-01T23:59:59.000Z

379

A decision support system for secure information sharing  

Science Conference Proceedings (OSTI)

In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundaries. Risk optimal decisions to disseminate mission critical tactical intelligence ... Keywords: description logic, flexible information sharing, justification for non-shareability, semantic reasoner

Achille Fokoue; Mudhakar Srivatsa; Pankaj Rohatgi; Peter Wrobel; John Yesberg

2009-06-01T23:59:59.000Z

380

Managing Energy Demand With Standards and Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Managing Energy Demand With Standards and Information Managing Energy Demand With Standards and Information Speaker(s): Sebastien Houde Date: September 13, 2012 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Christopher Payne The goal of this talk is to discuss two interrelated research projects that aim to assess the welfare effects of energy policies that rely on standards and information. The first project focuses on the Energy Star certification program. Using unique micro-data on the US refrigerator market, I first show that consumers respond to certification in different ways. Some consumers appear to rely heavily on Energy Star and pay little attention to electricity costs, others are the reverse, and still others appear to be insensitive to both electricity costs and Energy Star. I then develop a

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Ensuring a Secure and Robust Cyber Infrastructure (+$43.4 ...  

Science Conference Proceedings (OSTI)

... the Federal Information Security Management Act are ... the President's FY 2012 budget calls for ... National Program Office for the National Strategy for ...

2011-02-14T23:59:59.000Z

382

Office of Cyber Security Evaluations Appraisal Process Guide...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IARC Information Assurance Resource Center IG Office of the Inspector General IP Internet Protocol ISSM Integrated Safeguards and Security Management NNSA National Nuclear...

383

NMMSS Fill-able Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Fill-able Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > NMMSS Fill-able...

384

1www.secureworks.com Page The Information Security Experts  

E-Print Network (OSTI)

are a surprising sleeper · Measure `Vampire' energy drains #12;23 SustainableIT 13. AUDIT, ACT & MEASURE AGAINSaving Energy in the Office with IT Equipment Saving Energy in your Office with IT Equipment Joyce Dickerson, Director, Sustainable IT Department of Sustainability and Energy Management #12;2 Sustainable

Kim, Kwangjo

385

Office of Headquarters Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Security Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

386

PARS II New Contractor Information for Interconnection Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the tables below and return this form to the PARS II Support Team at DL-CF-40PARS2Support@hq.doe.gov. Contractor Point of Contact Information Name Position CompanyOrganization...

387

Information Assurance: Dependability and Security in Networked Systems  

Science Conference Proceedings (OSTI)

In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, ... Keywords: Networking

Yi Qian; David Tipper; Prashant Krishnamurthy; James Joshi

2007-11-01T23:59:59.000Z

388

Inspection of Emergency Management at the Office of Secure Transportation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 3.0 CONCLUSIONS ..................................................................................... 4 4.0 RATINGS ................................................................................................ 6 APPENDIX A - SUPPLEMENTAL INFORMATION ................................. 7 APPENDIX B - SITE-SPECIFIC FINDINGS.............................................. 9 APPENDIX C - EMERGENCY PLANNING ............................................ 11 APPENDIX D - EMERGENCY PREPAREDNESS .................................. 19 APPENDIX E - EMERGENCY RESPONSE ............................................. 23 APPENDIX F - READINESS ASSURANCE ............................................ 29 Abbreviations Used in This Report ARG Accident Response Group CCIC Convoy Commander in Charge

389

Cautionary tales from real world failures for managing security in the cyber world  

Science Conference Proceedings (OSTI)

Any field of endeavor benefits from a body of knowledge of failures that provide guidance on what to avoid. As a relatively young discipline whose failures can often be handled privately, information security professionals do not have access to the volume ... Keywords: bridges, catastrophic failure, civil engineering, failure, lessons learned

Bill Naber

2010-10-01T23:59:59.000Z

390

Information scraps: How and why information eludes our personal information management tools  

Science Conference Proceedings (OSTI)

In this article we investigate information scrapspersonal information where content has been scribbled on Post-it notes, scrawled on the corners of sheets of paper, stuck in our pockets, sent in email messages to ourselves, and stashed ... Keywords: Personal information management, information scraps, note taking

Michael Bernstein; Max Van Kleek; David Karger; M. C. Schraefel

2008-09-01T23:59:59.000Z

391

Final Report Implementing Office of Management and Budget Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) Final Report Implementing Office of Management and Budget...

392

Definition: Circuit Peak Load Management | Open Energy Information  

Open Energy Info (EERE)

Circuit Peak Load Management Jump to: navigation, search Dictionary.png Circuit Peak Load Management An application utilizing sensors, information processors, communications, and...

393

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

394

Data Management Plan and Functional System Design for the Information Management System of the Clinch River Remedial Investigation and Waste Area Grouping 6  

Science Conference Proceedings (OSTI)

The Data Management Plan and Functional System Design supports the Clinch River Remedial Investigation (CRRI) and Waste Area Grouping (WAG) 6 Environmental Monitoring Program. The objective of the Data Management Plan and Functional System Design is to provide organization, integrity, security, traceability, and consistency of the data generated during the CRRI and WAG 6 projects. Proper organization will ensure that the data are consistent with the procedures and requirements of the projects. The Information Management Groups (IMGs) for these two programs face similar challenges and share many common objectives. By teaming together, the IMGs have expedited the development and implementation of a common information management strategy that benefits each program.

Ball, T.; Brandt, C.; Calfee, J.; Garland, M.; Holladay, S.; Nickle, B.; Schmoyer, D.; Serbin, C.; Ward, M. [Oak Ridge National Lab., TN (United States)

1994-03-01T23:59:59.000Z

395

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

396

CMAD IV 11/14/96 Information Security  

E-Print Network (OSTI)

utilities, power pools, vendors etc.. #12;CMAD IV 11/14/96 #12; #12; GridCo LineCo PoolCo Energy Merchant INFO INFO INFO $ $ $ PWR PWR PWR #12;CMAD IV 11/14/96 "Future" Is At Hand · Federal Energy Regulatory Commission (FERC) 889 ­ information on transmission availability and prices. ­ equal access for wholesale

California at Davis, University of

397

Cyber Security Solutions for Instrumentation and Control Systems, Topic 2: Patch Management and Automated Change Management  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, have undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection (CIP) standards requirements of the North American Electric Reliability Corporation (NERC) and related requirements in the international ...

2013-04-18T23:59:59.000Z

398

Lawrence Livermore National Security CFO Processes Functional Management Assessment  

Science Conference Proceedings (OSTI)

The scope of the Functional Management Assessment of the CFO included a review of the CFO Organizational Structure, including deployed financial services and the division of responsibilities and internal controls between CFO and other organizations that perform financial functions across the Laboratory. In addition, the assessment team solicited input from end users and reviewers. Three issues discussed are: ISSUE 1: Financial activities and cash transactions are occurring outside the CFO organization. Approximately $200M of non-purchase order spending occurs in seven areas outside CFO control (travel, relocation, special disbursements, IPO, legal, risk management, and freight). NIF financial services have not been integrated into the CFO organization and operate outside CFO control. Business risks--There is no single point of financial accountably; Currently within the CFO and Business and Operations organizations there is a lack of clarity of roles and responsibilities for financial activities; Financial talent within the laboratory is fragmented; and Inefficiencies exist based on the current structure; An example of the above business risks associated with organizational structure can be observed in the process for reimbursement of relocation costs to employees. Currently, Human Resources and Travel both administer portions of an employee's relocation. Costs are reviewed for compliance with FAR travel guidelines and for compliance with the offer letter but there is no financial review for allowability of costs nor is there a single point where the total relocation costs are reviewed. Through the e-pay system the check is processed by the CFO organization but there is no review by that organization. ISSUE 2: Impact of involuntary separation on current and future activities. 3 risks are: (1) Loss of internal controls--with the upcoming involuntary reductions there will be a loss of personnel with institutional knowledge which will increase the risk of losing internal control on some processes. The organization needs to be cognizant of this risk and take measures to minimize financial risk and ensure on-going A-123 compliance. (2) Project Costing Implementation (PCI) delay--the implementation of PCI is key to achieving integration and reporting of financial data. Presently, business analysts spend half of their time collecting and compiling data and 94% of the labs financial management reports are created using spreadsheets. Currently, the PCI project is on schedule but the involuntary reductions may result in loss of support in this area. (3) Financial Performance Milestones not met--for FY-08 there are fixed, base and stretch financial performance milestones for the laboratory. With reductions in staff the risk of missing key milestones increases. ISSUE 3: Strategically growing the Work for Others (WFO) Portfolio. A key objective of the laboratory is to increase WFO. Greater reliance on WFO will result in additional funding sources and increase the number of control points and financial activities to be monitored thus increasing the level of financial complexity at the lab. The CFO organization should work now to improve controls and processes to accommodate these changes. In particular the following areas should be focused on: (1) Cost reporting needs to be streamlined; (2) Cost Transfer controls need to be increased; and (3) Timely monitoring and close out of contracts needs occur.

Sparks, A; Sampson, D; Thomas, B; Mendez, M

2008-06-12T23:59:59.000Z

399

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

400

Office of Information and Business Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information and Business Management Information and Business Management Office of Information and Business Management OIBM provides the foundation to propel the Office of Energy Efficiency and Renewable Energy (EERE) toward achieving its strategic goal of rapid and successful commercialization of EERE technologies. This foundation is comprised of meaningful portfolio management support, enterprise compliance, and an agile information technology suite of tools. This includes the following: Conducting assessments of EERE programs and management approaches and formulating findings, recommendations, and action plans to improve the effectiveness and efficiency of EERE's management of programs. Partnering across EERE, the Department of Energy (DOE), and industry to implement more effective portfolio, program, and project management.

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Federal Energy Management Program: Information Resources on Purchasing...  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Resources on Purchasing Renewable Power to someone by E-mail Share Federal Energy Management Program: Information Resources on Purchasing Renewable Power on Facebook...

402

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

403

Information Management Division (HC-14) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Management Division (HC-14) Information Management Division (HC-14) Information Management Division (HC-14) Mission Statement This division provides operational support and consultative advice to the Chief Human Capital Officer and Departmental Senior Management on matters pertaining to the acquisition, deployment and maintenance of enabling technology to support the tactical and strategic management of human capital related to accomplishing Department goals and program objectives. The mission also entails establishing and providing assistance and guidance on the use of technology-supported business process reengineering; investment analysis; performance measurement; strategic development and application of information systems and infrastructure; policies to provide improved management of information resources and technology; and better,

404

Information Technology for Energy and Maintenance Management  

E-Print Network (OSTI)

We describe the design of a tenant interface for energy and maintenance systems (TIEMS) in commercial buildings. TIEMS is designed for use by occupants (tenants) of commercial buildings. Our hypothesis is that by allowing tenants access to information from the energy and maintenance systems and by giving them some control over these systems, energy and maintenance performance can be improved. We used interviews with potential users and existing energy and maintenance databases to guide the design. Results of a field trial demonstrate the utility of TIEMS. We also describe the design of a maintenance and operations recommender (MORE). MORE uses information from computerized maintenance management systems (CMMS) and energy management and control systems (EMCS) to recommend what maintenance personnel should do in response to a maintenance service request. MORE integrates text descriptions of problems with sensor information related to the problem. After work orders are closed, MORE uses the information about what was actually done to solve the problem to learn how to improve its recommendations.

Villafana, L.; Federspiel, C.

2003-01-01T23:59:59.000Z

405

DOE O 200.1A, Information Technology Management  

Directives, Delegations, and Requirements

The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and ...

2008-12-23T23:59:59.000Z

406

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

407

The U.S. Department of Energy, National Nuclear Security Agency's Use of Geographic Information Systems for Nuclear Emergency Response Support  

SciTech Connect

The U.S, Department of Energy (DOE), National Nuclear Security Agency's (NNSA) Remote Sensing Laboratory (RSL) provides Geographic Information System (GIS) support during nuclear emergency response activities. As directed by the NNSA, the RSL GIS staff maintains databases and equipment for rapid field deployment during an emergency response. When on location, GIS operators provide information products to on-site emergency managers as well as to emergency managers at the DOE Headquarters (HQ) Emergency Operations Center (EOC) in Washington, D.C. Data products are derived from multiple information sources in the field including radiological prediction models, field measurements taken on the ground and from the air, and pertinent information researched on the Internet. The GIS functions as a central data hub where it supplies the information to response elements in the field, as well as to headquarters officials at HQ during emergency response activities.

A. L. Guber

2001-06-01T23:59:59.000Z

408

Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables  

Science Conference Proceedings (OSTI)

Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

Not Listed

2011-09-01T23:59:59.000Z

409

Spatially Informed Plant PRA Models for Security Assessment  

SciTech Connect

Traditional risk models can be adapted to evaluate plant response for situations where plant systems and structures are intentionally damaged, such as from sabotage or terrorism. This paper describes a process by which traditional risk models can be spatially informed to analyze the effects of compound and widespread harsh environments through the use of 'damage footprints'. A 'damage footprint' is a spatial map of regions of the plant (zones) where equipment could be physically destroyed or disabled as a direct consequence of an intentional act. The use of 'damage footprints' requires that the basic events from the traditional probabilistic risk assessment (PRA) be spatially transformed so that the failure of individual components can be linked to the destruction of or damage to specific spatial zones within the plant. Given the nature of intentional acts, extensive modifications must be made to the risk models to account for the special nature of the 'initiating events' associated with deliberate adversary actions. Intentional acts might produce harsh environments that in turn could subject components and structures to one or more insults, such as structural, fire, flood, and/or vibration and shock damage. Furthermore, the potential for widespread damage from some of these insults requires an approach that addresses the impacts of these potentially severe insults even when they occur in locations distant from the actual physical location of a component or structure modeled in the traditional PRA. (authors)

Wheeler, Timothy A. [Sandia National Laboratories, PO Box 5800, Albuquerque, NM 87185 (United States); Thomas, Willard [Omicron Safety and Risk Technologies, Inc., 2500 Louisiana Boulevard, Suite 410. Albuquerque, NM 87110 (United States); Thornsbury, Eric [U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001 (United States)

2006-07-01T23:59:59.000Z

410

Waste Management Facilities Cost Information Report  

Science Conference Proceedings (OSTI)

The Waste Management Facility Cost Information (WMFCI) Report, commissioned by the US Department of Energy (DOE), develops planning life-cycle cost (PLCC) estimates for treatment, storage, and disposal facilities. This report contains PLCC estimates versus capacity for 26 different facility cost modules. A procedure to guide DOE and its contractor personnel in the use of estimating data is also provided. Estimates in the report apply to five distinctive waste streams: low-level waste, low-level mixed waste, alpha contaminated low-level waste, alpha contaminated low-level mixed waste, and transuranic waste. The report addresses five different treatment types: incineration, metal/melting and recovery, shredder/compaction, solidification, and vitrification. Data in this report allows the user to develop PLCC estimates for various waste management options.

Feizollahi, F.; Shropshire, D.

1992-10-01T23:59:59.000Z

411

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

412

Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty  

E-Print Network (OSTI)

Modern distributed communication networks like the Internet and censorship-resistant networks (also a part of the Internet) are characterized by nodes (users) interconnected with one another via communication links. In this regard, the security of individual nodes depend not only on their own efforts, but also on the efforts and underlying connectivity structure of neighboring network nodes. By the term 'effort', we imply the amount of investments made by a user in security mechanisms like antivirus softwares, firewalls, etc., to improve its security. However, often due to the large magnitude of such networks, it is not always possible for nodes to have complete effort and connectivity structure information about all their neighbor nodes. Added to this is the fact that in many applications, the Internet users are selfish and are not willing to co-operate with other users on sharing effort information. In this paper, we adopt a non-cooperative game-theoretic approach to analyze individual user security in a co...

Pal, Ranjan

2011-01-01T23:59:59.000Z

413

Enterprise Digital Rights Management: Solutions against Information Theft by Insiders  

E-Print Network (OSTI)

Management (E-DRM) protects sensitive information by managing and enforcing access and usage rights to the information throughout its lifecycle, no matter where the information is distributed. However, the self-protection authorities to read/write the protected information. The DOFS architecture ensures that bits of a sensitive

Chiueh, Tzi-cker

414

NERSC Information Management (NIM) Guide for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Users NIM Guide for Users Getting Started The NERSC Information Management (NIM) system is a web portal that contains user, login name, usage, and allocations information. First Time Login The first time you log in to NIM, you will have to change your NIM password. Your NIM password is also your NERSC password and all NERSC passwords must abide by certain requirements. See Passwords. Logging In To log into the NIM system, point your web browser to the URL http://nim.nersc.gov. Please use this URL as a bookmark for NIM. If you have bookmarked a different URL, you may have to log in twice. Enter your NERSC username and NIM password. If you are having problems with your NIM password contact the NERSC Account Support Office, 1-800-66NERSC, option 2. You can only have one active NIM session on your local computer. If you try

415

Solar International Management Inc | Open Energy Information  

Open Energy Info (EERE)

Solar International Management Inc Jump to: navigation, search Name Solar International Management Inc Place Washington,DC, Washington, DC Zip 20006 Sector Solar Product Manager of...

416

Southern Energy Management | Open Energy Information  

Open Energy Info (EERE)

Energy Management Jump to: navigation, search Name Southern Energy Management Place Morrisville, NC Website http:www.southernenergymanag References Southern Energy Management1...

417

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

418

DOE O 5639.8A, Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities  

Directives, Delegations, and Requirements

The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities ...

1993-07-23T23:59:59.000Z

419

NCSec: a national cyber security referential for the development of a code of practice in national cyber security management  

Science Conference Proceedings (OSTI)

Governments worldwide have faced computer security challenges. These challenges are serious in a context where there is an absence of appropriate organizational and institutional structures to deal with incidents. But more important which agency or agencies ... Keywords: ISO27002, cyber criminality, cyber security, organizational structure, referential

Mohamed Dafir Ech-cherif el Kettani; Taieb Debbagh

2008-12-01T23:59:59.000Z

420

The Value of Information in Inventory Management  

E-Print Network (OSTI)

Inventory management traditionally assumes the precise knowledge of the ... stage inventory management in a robust optimization framework; the precise...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Information flow in the DAMA Project beyond database managers: Information flow managers  

Science Conference Proceedings (OSTI)

To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

Russell, L. [Argonne National Lab., IL (United States); Wolfson, O.; Yu, C. [Illinois Univ., Chicago, IL (United States)

1996-03-01T23:59:59.000Z

422

United States Department of Energy Information Management Strategic Plan - partners for progress in corporate management  

SciTech Connect

This plan establishes a shared vision for the information management community. The plan provides overall direction for management information, reflects a strong customer focus, seeks an increased understanding of of DOE business lines and missions, and fosters a corporate collaborative approach to information management.

1997-09-01T23:59:59.000Z

423

Evaluation of the Los Alamos National Security Emergency Operations Divison Emergency Management Self-assessment Practices, June 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06-08 06-08 Site: Los Alamos National Laboratory Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Evaluation of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment Practices Dates of Activity : 06/06/2011-06/08/2011 Report Preparer: John Bolling/Randy Griffin Activity Description/Purpose: Los Alamos National Security, LLC (LANS) and the Los Alamos Site Office (LASO) requested that the U.S. Department of Energy (DOE), Office of Health, Safety and Security (HSS), Office of Safety and Emergency Management Evaluations evaluate LANS's Emergency Operations Division emergency management self- assessment practices. Utilizing the self-assessment of the Los Alamos National Laboratory (LANL) emergency

424

Essentials of Management Information Systems, 5th edition  

Science Conference Proceedings (OSTI)

From the Publisher:Exceptionally practical in approach, this volume prepares readers for the constantly changing demands of using information systems as managers in today's fast-paced organizations. It relates MIS to management, the organization and ...

Kenneth C. Laudon

2002-05-01T23:59:59.000Z

425

FTCP Site Specific Information - Office of Environmental Management...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management FTCP Site Specific Information - Office of Environmental Management FTCP Agent Organization Name Phone E-Mail EM HQ Todd Lapointe 202-586-4653 Todd.Lapointe@em.doe.gov...

426

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

427

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

428

TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook  

Science Conference Proceedings (OSTI)

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic ... Keywords: Security

Jack Wiles

2007-10-01T23:59:59.000Z

429

Basis for an integrated security ontology according to a systematic review of existing proposals  

Science Conference Proceedings (OSTI)

The use of ontologies to represent knowledge provides us with organization, communication and reusability. The concepts and relations managed by any scientific community need to be formally defined. Since security in information technologies has evolved ... Keywords: Ontologies, Security, Systematic review

Carlos Blanco; Joaqun Lasheras; Eduardo Fernndez-Medina; Rafael Valencia-Garca; Ambrosio Toval

2011-06-01T23:59:59.000Z

430

ARM Tropical Western Pacific (TWP) Operations Management and Support: Securing ARM Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Tropical Western Pacific (TWP) Operations Tropical Western Pacific (TWP) Operations Management and Support: Securing ARM Data K. L. Nitschke South Pacific Regional Environment Programme Apia, Samoa L. Jones Los Alamos National Laboratory Los Alamos, New Mexico C. N. Long Pacific Northwest National Laboratory Richland, Washington Introduction The Tropical Western Pacific Office (TWPO) (a) has been tasked with providing operational management and support for three (b) climate station instrument facilities in the Tropical Western pacific (TWP) locale. The TWPO has the distinctive purview in ensuring data availability from two remote Pacific Islands and Australia to support the continued national and international scientific collaboration that exemplifies the Atmospheric Radiation Measurement (ARM) Program. Data from the international sites have been

431

Facilities Information Management System (FIMS) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities Information Management System Facilities Information Management System (FIMS) Facilities Information Management System (FIMS) FIMS is DOE's corporate database for real property as required by DOE Order 430.1B, Real Property Asset Management. The system provides DOE with an accurate inventory and management tool that assists with planning and managing all current real property assets. The DOE Office of Acquisition and Project Management, the Office of Management and Budget, Congress, and other Federal entities use the real property data reported through FIMS. All Office of Legacy Management (LM) real property assets (buildings, trailers, other structures, and land) are entered into FIMS at the time they are acquired. Annually LM is required to update maintenance cost, operating cost, replacement cost, and utilization details for each asset.

432

Green Capital Management | Open Energy Information  

Open Energy Info (EERE)

"Green Capital Management" Retrieved from "http:en.openei.orgwindex.php?titleGreenCapitalManagement&oldid346004" Categories: Clean Energy Organizations Companies...

433

Environmental Resources Management ERM | Open Energy Information  

Open Energy Info (EERE)

Page Edit with form History Facebook icon Twitter icon Environmental Resources Management ERM Jump to: navigation, search Name Environmental Resources Management (ERM) Place...

434

Greenstone Carbon Management Ltd | Open Energy Information  

Open Energy Info (EERE)

Search Page Edit with form History Facebook icon Twitter icon Greenstone Carbon Management Ltd Jump to: navigation, search Name Greenstone Carbon Management Ltd. Place London,...

435

Calpine Power Management LLC | Open Energy Information  

Open Energy Info (EERE)

Up Search Page Edit with form History Facebook icon Twitter icon Calpine Power Management LLC (Redirected from Calpine Power Management) Jump to: navigation, search Name...

436

Pacific Power Management | Open Energy Information  

Open Energy Info (EERE)

Up Search Page Edit with form History Facebook icon Twitter icon Pacific Power Management Jump to: navigation, search Name Pacific Power Management Place Auburn, California...

437

Ethanol Capital Management | Open Energy Information  

Open Energy Info (EERE)

Up Search Page Edit with form History Facebook icon Twitter icon Ethanol Capital Management Jump to: navigation, search Name Ethanol Capital Management Place Tucson, Arizona...

438

EDIG Construction Management | Open Energy Information  

Open Energy Info (EERE)

Search Page Edit with form History Facebook icon Twitter icon EDIG Construction Management Jump to: navigation, search Name EDIG Construction Management Place Israel Product...

439

Wista Management GMBH | Open Energy Information  

Open Energy Info (EERE)

| Sign Up Search Page Edit with form History Facebook icon Twitter icon Wista Management GMBH Jump to: navigation, search Name Wista-Management GMBH Place Germany Sector...

440

Technology Management Inc | Open Energy Information  

Open Energy Info (EERE)

Technology Management Inc Jump to: navigation, search Name Technology Management Inc Place Cleveland, Ohio Zip 44108 Product Ohio-based, developer of solid oxide fuel cell systems....

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Windelectric Management Ltd | Open Energy Information  

Open Energy Info (EERE)

Windelectric Management Ltd Jump to: navigation, search Name Windelectric Management Ltd Place United Kingdom Zip PL33 9BZ Sector Wind energy Product Developed the first wind farm...

442

EKO Asset Management Partners | Open Energy Information  

Open Energy Info (EERE)

Management Partners" Retrieved from "http:en.openei.orgwindex.php?titleEKOAssetManagementPartners&oldid344583" Categories: Clean Energy Organizations Companies...

443

Wind Management LLC | Open Energy Information  

Open Energy Info (EERE)

Management LLC Jump to: navigation, search Name Wind Management LLC Place South Yarmouth, Massachusetts Zip 2664 Sector Wind energy Product Massachussets wind project development...

444

Clean Energy Asset Management | Open Energy Information  

Open Energy Info (EERE)

Asset Management Jump to: navigation, search Name Clean Energy Asset Management Place Santa Monica, California Zip 94040 Sector Efficiency, Renewable Energy Product String...

445

Guinness Asset Management | Open Energy Information  

Open Energy Info (EERE)

Asset Management" Retrieved from "http:en.openei.orgwindex.php?titleGuinnessAssetManagement&oldid346270" Categories: Clean Energy Organizations Companies Organizations...

446

Calpine Power Management LLC | Open Energy Information  

Open Energy Info (EERE)

Calpine Power Management LLC Jump to: navigation, search Name Calpine Power Management LLC Place Texas Utility Id 49824 Utility Location Yes Ownership W NERC Location TRE NERC...

447

Sarsia Seed Management | Open Energy Information  

Open Energy Info (EERE)

Seed Management" Retrieved from "http:en.openei.orgwindex.php?titleSarsiaSeedManagement&oldid350630" Categories: Clean Energy Organizations Companies Organizations...

448

The Value of Information in Inventory Management  

E-Print Network (OSTI)

May 25, 2007 ... Abstract: Inventory management traditionally assumes the precise knowledge of the underlying demand distribution and a risk-neutral manager...

449

Office of Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Mission and Functions Mission and Functions Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process. Functions

450

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

451

Information Management and Supporting Documentation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Management and Supporting Documentation Information Management and Supporting Documentation Information Management and Supporting Documentation The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the Office of Management and Budget (OMB) before undertaking a collection of information directed to 10 or more persons (including operations of Government-owned, contractor-operated facilities). Under the PRA, OMB approval for each information collection instrument can last a maximum of 3 years. This site provides information about the Paperwork Reduction Act's requirements and guidance in fulfilling those requirements. DOE's Chief Information Officer (CIO) is the Senior Official responsible for DOE's compliance with the Paperwork Reduction Act. Office of Management and

452

Federal Energy Management Program: Information and Feedback Institutio...  

NLE Websites -- All DOE Office Websites (Extended Search)

Feedback Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Information and Feedback Institutional Change Principle on Facebook Tweet...

453

DOE O 200.2, Information Collection Management Program  

Directives, Delegations, and Requirements

This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of ...

2006-10-11T23:59:59.000Z

454

Industrial energy management information center | ENERGY STAR Buildings &  

NLE Websites -- All DOE Office Websites (Extended Search)

energy management information center energy management information center Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Get started with ENERGY STAR Make the business case Build an energy management program Measure, track, and benchmark Improve energy performance Industrial service and product providers Earn recognition Market impacts: Improvements in the industrial sector

455

Towards the secure modelling of OLAP users behaviour  

Science Conference Proceedings (OSTI)

Information Security is a crucial aspect for organizations, and must be considered during the development of Information Systems. The data in Data Warehouses (DWs) are highly sensitive since they manage historical information which is used to make strategic ... Keywords: OLAP, data warehouses, healthcare, inference, query evolution, security, state models, users behaviour

Carlos Blanco; Eduardo Fernndez-Medina; Juan Trujillo; Jan Jurjens

2010-09-01T23:59:59.000Z

456

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

457

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

458

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

459

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

460

Information Management | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Information Management Information Management Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Services Information Management Print Text Size: A A A RSS Feeds FeedbackShare Page Integrated Support Center information management professionals are an integral part of the Science Information Technology Modernized Organization. Staff in the ISC collaborate closely with the Site Offices and the SC Chief Information Officer to ensure federal staff in the field have the right products and services to efficiently fulfill the mission.

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

462

Program information architecture/document hierarchy. [Information Management Systems, it's components and rationale  

SciTech Connect

The Nuclear Waste Management System (NWMS) Management Systems Improvement Strategy (MSIS) (DOE 1990) requires that the information within the computer program and information management system be ordered into a precedence hierarchy for consistency. Therefore, the US Department of Energy (DOE). Office of Civilian Radioactive Waste Management (OCRWM) requested Westinghouse Hanford Company to develop a plan for NWMS program information which the MSIS calls a document hierarchy. This report provides the results of that effort and describes the management system as a program information architecture.'' 3 refs., 3 figs.

Woods, T.W.

1991-09-01T23:59:59.000Z

463

A web-based system for managing construction information  

Science Conference Proceedings (OSTI)

The efficient deployment of construction projects depends partly on the effective communication among project participants. This communication, however, is hindered by the large amount and wide variation of the information involved and the spatial dispersion ... Keywords: Communication, Construction industry, Construction management, Data-driven pages, Database, Information management, Internet, Web application

A. P. Chassiakos; S. P. Sakellaropoulos

2008-11-01T23:59:59.000Z

464

Office of Security Policy - Safeguards and Security Frequently Asked  

NLE Websites -- All DOE Office Websites (Extended Search)

Safeguards and Security Safeguards and Security New Frequently Asked Questions The following frequently asked questions (FAQs) are organized by the topical areas and offer answers to recurring questions or policy clarification requests. These entries represent the newest additions to the collection of S&S FAQs. 1. General 2. Program Planning and Management 3. Protection Program Operations 4. Information Security 5. Nuclear Material Control and Accountability General Q: Where can I find the national policies that may affect security programs I am responsible for? A: The national policies affecting DOE's safeguards and security programs are located on the Policy Information Resource tool at http://pir.pnl.gov. This collection is comprised of the most current version of each policy

465

Viresco International Capital Management | Open Energy Information  

Open Energy Info (EERE)

Viresco International Capital Management Viresco International Capital Management Jump to: navigation, search Name Viresco International Capital Management Place San Diego, California Zip 92130 Product San Diego-based hedge fund, who recently initiated a fund that will prioritize activity towards clean technology - Viresco Opportunities Global Fund. References Viresco International Capital Management[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Viresco International Capital Management is a company located in San Diego, California . References ↑ "Viresco International Capital Management" Retrieved from "http://en.openei.org/w/index.php?title=Viresco_International_Capital_Management&oldid=352843

466

Definition: Demand Side Management | Open Energy Information  

Open Energy Info (EERE)

Side Management Side Management Jump to: navigation, search Dictionary.png Demand Side Management The term for all activities or programs undertaken by Load-Serving Entity or its customers to influence the amount or timing of electricity they use.[1] View on Wikipedia Wikipedia Definition Energy demand management, also known as demand side management (DSM), is the modification of consumer demand for energy through various methods such as financial incentives and education. Usually, the goal of demand side management is to encourage the consumer to use less energy during peak hours, or to move the time of energy use to off-peak times such as nighttime and weekends. Peak demand management does not necessarily decrease total energy consumption, but could be expected to reduce the need

467

RAM Capital Management Group | Open Energy Information  

Open Energy Info (EERE)

RAM Capital Management Group RAM Capital Management Group Jump to: navigation, search Name RAM Capital Management Group Place Boca Raton, Florida Zip 33486 Sector Hydro, Hydrogen Product Private VC fund and investment banking advisory firm investing in fuel cells and hydrogen. References RAM Capital Management Group[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. RAM Capital Management Group is a company located in Boca Raton, Florida . References ↑ "RAM Capital Management Group" Retrieved from "http://en.openei.org/w/index.php?title=RAM_Capital_Management_Group&oldid=350184" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes

468

Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management  

Science Conference Proceedings (OSTI)

WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make good decisions, to get things done, to learn, and to gain better mastery of the world around us. But we do not always have good control of our information - not even in the "home waters" ... Keywords: Database Management, Library & Information Science, User Interfaces

William Jones

2007-11-01T23:59:59.000Z

469

Chapter_1_Physical_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

470

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

471

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > Field Offices > Welcome to the Sandia Field Office > Contact Us Contact Us If you have questions about activities at the Sandia Field Office, please contact the SFO Public Affairs Director at (505) 845-5264. Our mailing address is: U. S. Department of Energy, National Nuclear Security Administration, Sandia Field Office, P.O. Box 5400, Albuquerque, NM 87185. Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About SFO Contact Us Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance

472

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

473

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

474

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

475

Federal Energy Management Program: Information Resources  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

associated with energy management in the Federal sector. Frequently Asked Questions: Database of frequently asked questions (FAQs) across FEMP programs. News FEMP Launches New...

476

Coastal Management (Louisiana) | Open Energy Information  

Open Energy Info (EERE)

2013. EZFeed Policy Place Louisiana Applies to States or Provinces Louisiana Name Coastal Management (Louisiana) Policy Category Other Policy Policy Type Environmental Regulations...

477

NETL: Produced Water Management Information System  

NLE Websites -- All DOE Office Websites (Extended Search)

Produced Water Management Technology Descriptions Fact Sheet - Underground Injection for Disposal PWMIS Home Intro to Produced Water Technology Descriptions Basic Separation...

478

Energy Management Centre | Open Energy Information  

Open Energy Info (EERE)

India Zip 695014 Sector Efficiency Product Focussed on energy efficiency and conservation in Kerala. References Energy Management Centre1 LinkedIn Connections CrunchBase...

479

Audit Report on "The Office of Science's Management of Information Technology Resources"  

SciTech Connect

The Department of Energy's Office of Science (Science) and its facility contractors are aggressive users of information technology (IT) to support fundamental research in areas such as energy, environmental remediation and computational sciences. Of its $4 billion Fiscal Year 2008 budget, Science spent about $287 million to manage its IT program. This included cyber security activities, acquisition of hardware and software, and support service costs used to maintain the operating environments necessary to support the missions of the program. Prior Office of Inspector General reports have identified various issues with Science's management of its IT programs and resources. For instance, our report on Facility Contractor Acquisition and Management of Information Technology Hardware (DOE/IG-0768, June 2007) noted that the Science sites reviewed spent more than necessary when acquiring IT hardware. In another example, our review of The Department's Efforts to Implement Common Information Technology Services at Headquarters (DOE/IG-0763, March 2007) disclosed that Science's reluctance to adopt the Department of Energy Common Operating Environment (DOE-COE) at Headquarters contributed to the Department's inability to fully realize potential cost savings through consolidation and economies of scale. In light of the magnitude of the Office of Science IT program and previously identified program weaknesses, we initiated this audit to determine whether Science adequately managed its IT resources. Science had taken a number of actions to improve its cyber security posture and align its program to Federal requirements. Yet, our review disclosed that it had not taken some basic steps to enhance security and reduce costs. In particular, we found that: (1) For their non-scientific computing environments, all seven of the field sites reviewed (two Federal, five contractor) had implemented security configurations that were less stringent than those included in the Federal Desktop Core Configuration. This configuration was designed by the National Institute of Standards and Technology and its use was mandated by the Office of Management and Budget; (2) Although we previously highlighted weaknesses and recommended corrective actions, Science still had not fully established or enforced IT hardware standards for acquiring hardware such as desktop and laptop computers or related peripherals, contributing to significant unnecessary expenditures; and (3) While we have noted in a series of past reports that significant savings could be realized from aggregating demand for IT services and products across the enterprise, Science had not implemented a common infrastructure for users at its Federal sites and continued to maintain an IT environment independent of the Department's Common IT Operating Environment. The weaknesses identified were attributable, at least in part, to a lack of adequate policies and procedures for ensuring effective cyber security and hardware acquisition practices. In addition, Science had not effectively monitored the performance of its field sites to ensure that previously reported internal control weaknesses were addressed and had not implemented an appropriate mechanism to track its IT-related costs. Without improvements, Science may be unable to realize the benefits of improved security over its information systems, reduce costs associated with hardware acquisition, and lower IT support costs through consolidation of services. In particular, we determined that Science could potentially realize savings of more than $3.3 million over the next three years by better controlling hardware costs and implementing standards for certain equipment. Furthermore, Science could continue to pay for duplicative IT support services and fail to take advantage of opportunities to lower costs and apply potential savings to mission-related work. During the course of our audit work, we learned from Science officials that they had initiated the process of revising the Program Cyber Security Plan to better clarify its policy for implementing

None

2009-11-01T23:59:59.000Z

480

Audit Report on "The Office of Science's Management of Information Technology Resources"  

SciTech Connect

The Department of Energy's Office of Science (Science) and its facility contractors are aggressive users of information technology (IT) to support fundamental research in areas such as energy, environmental remediation and computational sciences. Of its $4 billion Fiscal Year 2008 budget, Science spent about $287 million to manage its IT program. This included cyber security activities, acquisition of hardware and software, and support service costs used to maintain the operating environments necessary to support the missions of the program. Prior Office of Inspector General reports have identified various issues with Science's management of its IT programs and resources. For instance, our report on Facility Contractor Acquisition and Management of Information Technology Hardware (DOE/IG-0768, June 2007) noted that the Science sites reviewed spent more than necessary when acquiring IT hardware. In another example, our review of The Department's Efforts to Implement Common Information Technology Services at Headquarters (DOE/IG-0763, March 2007) disclosed that Science's reluctance to adopt the Department of Energy Common Operating Environment (DOE-COE) at Headquarters contributed to the Department's inability to fully realize potential cost savings through consolidation and economies of scale. In light of the magnitude of the Office of Science IT program and previously identified program weaknesses, we initiated this audit to determine whether Science adequately managed its IT resources. Science had taken a number of actions to improve its cyber security posture and align its program to Federal requirements. Yet, our review disclosed that it had not taken some basic steps to enhance security and reduce costs. In particular, we found that: (1) For their non-scientific computing environments, all seven of the field sites reviewed (two Federal, five contractor) had implemented security configurations that were less stringent than those included in the Federal Desktop Core Configuration. This configuration was designed by the National Institute of Standards and Technology and its use was mandated by the Office of Management and Budget; (2) Although we previously highlighted weaknesses and recommended corrective actions, Science still had not fully established or enforced IT hardware standards for acquiring hardware such as desktop and laptop computers or related peripherals, contributing to significant unnecessary expenditures; and (3) While we have noted in a series of past reports that significant savings could be realized from aggregating demand for IT services and products across the enterprise, Science had not implemented a common infrastructure for users at its Federal sites and continued to maintain an IT environment independent of the Department's Common IT Operating Environment. The weaknesses identified were attributable, at least in part, to a lack of adequate policies and procedures for ensuring effective cyber security and hardware acquisition practices. In addition, Science had not effectively monitored the performance of its field sites to ensure that previously reported internal control weaknesses were addressed and had not implemented an appropriate mechanism to track its IT-related costs. Without improvements, Science may be unable to realize the benefits of improved security over its information systems, reduce costs associated with hardware acquisition, and lower IT support costs through consolidation of services. In particular, we determined that Science could potentially realize savings of more than $3.3 million over the next three years by better controlling hardware costs and implementing standards for certain equipment. Furthermore, Science could continue to pay for duplicative IT support services and fail to take advantage of opportunities to lower costs and apply potential savings to mission-related work. During the course of our audit work, we learned from Science officials that they had initiated the process of revising the Program Cyber Security Plan to better clarif

2009-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

482

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

483

Procurement | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement | National Nuclear Security Administration Procurement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Procurement Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Procurement Procurement NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

484

Adaptive information retrieval: Introduction to the special topic issue of information processing and management  

E-Print Network (OSTI)

Jose,J.M. Joho,H. van Rijsbergen,C.J. Information Processing & Management pp 1819-1821 Elsevier Science

Jose, J.M.

485

Coastal Zone Management Act | Open Energy Information  

Open Energy Info (EERE)

Zone Management Act Zone Management Act Jump to: navigation, search Statute Name Coastal Zone Management Act Year 1972 Url [[File:|160px|link=]] Description The Coastal Zone Management Act of 1972 (CZMA; Pub.L. 92-583, 86 Stat. 1280, enacted October 27, 1972, 16 U.S.C. §§ 1451-1464, Chapter 33) is an Act of Congress passed in 1972 to encourage coastal states to develop and implement coastal zone management plans (CZMPs). This act was established as a United States National policy to preserve, protect, develop, and where possible, restore or enhance, the resources of the Nation's coastal zone for this and succeeding generations. References Wikipedia[1] National Oceanic and Atmospheric Administration[2] The U.S. Congress recognized the importance of meeting the challenge of

486

Definition: Meter Data Management System | Open Energy Information  

Open Energy Info (EERE)

System System Jump to: navigation, search Dictionary.png Meter Data Management System A meter data management system (MDMS) collects and stores meter data from a head-end system and processes that meter data into information that can be used by other utility applications including billing, customer information systems, and outage management systems. The MDMS is a key resource for managing large quantities of meter data.[1] Related Terms system, outage management system References ↑ https://www.smartgrid.gov/category/technology/meter_data_management_system [[Ca LikeLike UnlikeLike You like this.Sign Up to see what your friends like. tegory: Smart Grid Definitionssmart grid,smart grid, |Template:BASEPAGENAME]]smart grid,smart grid, Retrieved from "http://en.openei.org/w/index.php?title=Definition:Meter_Data_Management_System&oldid=50258

487

NMMSS Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reports | National Nuclear Security Administration Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Reports Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > NMMSS Reports NMMSS Reports U.S. Department of Energy / U.S. Nuclear Regulatory Commission

488

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Action Codes Table | National Nuclear Security Administration Action Codes Table | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Action Codes Table Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Code Tables > Action Codes Table

489

Waste Isolation Pilot Plant Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WIPP WIPP Transportation Security Gregory M. Sahd Security Manager Carlsbad Field Office U.S. Department of Energy Contact Information Gregory M. Sahd Security Operations Carlsbad Field Office * U.S. Department of Energy 575.234.8117 * Greg.Sahd@wipp.ws WIPP Transportation "...The (WIPP transportation) system is safer than that employed for any other hazardous material in the U.S...." - National Academy of Sciences, WIPP Panel Hanford Idaho National Engineering and Environmental Laboratory Los Alamos National Laboratory Rocky Flats Environmental Technology Site Savannah River Site Waste Isolation Pilot Plant Argonne National Laboratory - East Nevada Test Site Argonne National Laboratory - West Lawrence Livermore National Laboratory CBFO Manager Senior Management

490

Change Request Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Change Request Forms | National Nuclear Security Administration Change Request Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Change Request Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Change Request Forms Change Request Forms

491

Data unification in personal information management  

Science Conference Proceedings (OSTI)

Users need ways to unify, simplify, and consolidate information too often fragmented by location, device, and software application.

David R. Karger; William Jones

2006-01-01T23:59:59.000Z

492

Strategic plan for Hanford Site Environmental Restoration Information Management  

SciTech Connect

This strategic plan addresses information management for the Environmental Restoration (ER) Program at the Hanford Site. This Program leads the cleanup of the Hanford Site`s soil, groundwater, buried waste, and the decontamination and decommissioning of facilities. The vision that drives this strategic plan is to ensure that quality information is available to the people who need it, when they need it, at a convenient location, in a usable form, and at an acceptable cost. Although investments are being made in managing the vast amounts of information, which include data, records and documents associated with the Hanford Site`s production history and new cleanup mission, it is widely recognized that efforts to date have not accomplished the vision. Effective information management involves more than the compilation of massive amounts of electronic and non-electronic information. It also involves integrating information management into business processes that support user`s needs and decisionmaking. Only then can information management complement and enable environmental restoration priorities and practices, help identify environmental restoration requirements, and enable communication within the Environmental Restoration Program and between the Program and its stakeholders. Successfully accomplishing the Hanford Site mission requires an integrated approach to information management that crosses organizational boundaries, streamlines existing systems, and builds new systems that support the needs of the future. This plan outlines that approach.

Cowley, P.J.; Beck, J.E.; Gephart, R.E. [and others

1994-06-01T23:59:59.000Z

493

Management of Bonneville Power Administration's Information Technology Program, IG-0861  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management of Bonneville Power Management of Bonneville Power Administration's Information Technology Program DOE/IG-0861 March 2012 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 March 26, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Bonneville Power Administration's Information Technology Program" INTRODUCTION AND OBJECTIVE The Bonneville Power Administration provides about 30 percent of wholesale electric power to regional utilities that service homes, hospitals, financial institutions, commercial entities and military installations in the Pacific Northwest. Bonneville makes extensive use of various

494

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

495

GHG Management Institute curriculum | Open Energy Information  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » GHG Management Institute curriculum Jump to: navigation, search Tool Summary LAUNCH TOOL Name: GHG Management Institute curriculum Agency/Company /Organization: Greenhouse Gas Management Institute (GHGMI) Partner: Various Sector: Energy, Land, Climate Focus Area: Non-renewable Energy, Energy Efficiency, Buildings, Buildings - Commercial, Buildings - Residential, Renewable Energy, Biomass, - Landfill Gas, - Anaerobic Digestion, Solar, Wind, Forestry, Offsets and Certificates, Greenhouse Gas, Land Use Topics: Finance, Implementation, GHG inventory, Market analysis

496

Oregon Coastal Management Program | Open Energy Information  

Open Energy Info (EERE)

Coastal Management Program Coastal Management Program Jump to: navigation, search Logo: Oregon Coastal Management Program Name Oregon Coastal Management Program Address 635 Capitol St. NE Place Salem, Oregon Zip 97301-2540 Website http://www.oregon.gov/LCD/OCMP Coordinates 44.943778°, -123.026308° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":44.943778,"lon":-123.026308,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

497

Definition: Congestion Management Report | Open Energy Information  

Open Energy Info (EERE)

Management Report Management Report Jump to: navigation, search Dictionary.png Congestion Management Report A report that the Interchange Distribution Calculator issues when a Reliability Coordinator initiates the Transmission Loading Relief procedure. This report identifies the transactions and native and network load curtailments that must be initiated to achieve the loading relief requested by the initiating Reliability Coordinator.[1] View on Wikipedia Wikipedia Definition Related Terms transmission lines, Reliability Coordinator, Interchange Distribution Calculator, transmission line, smart grid References ↑ Glossary of Terms Used in Reliability Standards An inli LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ne Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Congestion_Management_Report&oldid=502584"

498

Pacesetter Management Group | Open Energy Information  

Open Energy Info (EERE)

Pacesetter Management Group Pacesetter Management Group Jump to: navigation, search Name Pacesetter Management Group Place Stanley, Wisconsin Product Wisconsin based Pacesetter manages construction and operation of ethanol plants, as well as marketing the ethanol produced at the plant. Coordinates 44.958844°, -90.937009° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":44.958844,"lon":-90.937009,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

499

Property:SurfaceManager | Open Energy Information  

Open Energy Info (EERE)

SurfaceManager SurfaceManager Jump to: navigation, search Property Name SurfaceManager Property Type Page Pages using the property "SurfaceManager" Showing 25 pages using this property. (previous 25) (next 25) A AZA-009168 + COCONINO NF + AZA-009169 + COCONINO NF + AZA-009170 + COCONINO NF + AZA-009171 + FOREST SERVICE + AZA-009172 + FOREST SERVICE + AZA-009173 + FOREST SERVICE + AZA-009174 + FOREST SERVICE + AZA-009175 + COCONINO NF + AZA-009176 + BUREAU OF LAND MGMT + AZA-009177 + FOREST SERVICE + AZA-009178 + FOREST SERVICE + AZA-009179 + FOREST SERVICE + AZA-009180 + FOREST SERVICE + AZA-009181 + FOREST SERVICE + AZA-009182 + FOREST SERVICE + AZA-009183 + FOREST SERVICE + AZA-009184 + FOREST SERVICE + AZA-009185 + FOREST SERVICE + AZA-009186 + COCONINO NF +

500

Federal Emergency Management Agency | Open Energy Information  

Open Energy Info (EERE)

Emergency Management Agency Emergency Management Agency Jump to: navigation, search Logo: Federal Emergency Management Agency Name Federal Emergency Management Agency Address 500 C Street SW Place Washington, District of Columbia Zip 20472 Year founded 1979 Website http://www.fema.gov/ Coordinates 38.8858427°, -77.0182049° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8858427,"lon":-77.0182049,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

First Page Previous Page 1 2 3 4 5 6 7 8