National Library of Energy BETA

Sample records for information security management

  1. Information Security Office Risk Management

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Information Security Office Risk Management Exception Template #12;Risk Management Exception or Approved) 6/01/2013 CISO Jason Pufahl, CISO Approved 6/01/2013 RMAC Risk Management Advisory Council Reviewed #12;Risk Management Exception Template 2 | P a g e Please check one of the following: Requester

  2. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

  3. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Broader source: Energy.gov (indexed) [DOE]

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE More Documents & Publications PIA - INL Education Programs...

  4. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information...

  5. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information...

  6. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS of Standards and Technology The management of risks to information technology (IT) systems is a fundamental component of every organization's information security program. An effective risk management process enables

  7. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery for Homeland Security Information Management and Knowledge Discovery Authors Tamara Kolda, Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  8. ISMS for Microsoft's Cloud Infrastructure 1 Information Security Management System

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    ISMS for Microsoft's Cloud Infrastructure 1 Information Security Management System for Microsoft's Cloud Infrastructure Online Services Security and Compliance Executive summary This paper describes the Microsoft Cloud Infrastructure and Operations (MCIO) Information Security Management System (ISMS) program

  9. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  10. ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION AND INFORMATION SYSTEM VIEW Shirley Radack, Editor Computer Security Division Information Technology Laboratory. Managing information security risk is an essential element of the organization's overall risk management

  11. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  12. ISM6328 -Boca Raton Campus-Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT

    E-Print Network [OSTI]

    Richman, Fred

    ISM6328 - Boca Raton Campus- Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT FALL 2011 security. Emphasis is on the management of information security efforts as well as progression in adopting, regularity and policy aspects of Information Security Management. We will examine security management

  13. Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20, 2013)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20 year (FY) 2013 reporting requirements for the Federal Information Security Management Act (FISMA is steadily working to improve its overall information technology (IT) security posture. Nevertheless

  14. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity Date Version Author Comments

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management Information Security Policy 2004 09/2008 D01 Duncan Woodhouse Adaption and consolidation of best practices Registrar for Information Security, Risk Management and Business Continuity 2 University of Warwick

  15. Implementing Information Security and Its Technology: A LineManagement...

    Office of Scientific and Technical Information (OSTI)

    Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat...

  16. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  17. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  18. A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng

    E-Print Network [OSTI]

    Zheng, Yuliang

    A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage,chandag,yuliangg@fcit.monash.edu.au Abstract Information security is based on access control models and cryptographic techniques of comprehensive information security within organizations. There is a need to study upper level issues

  19. CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT

    E-Print Network [OSTI]

    CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley and environments. The risks associated with these changing situations can be managed through an integrated programs based on the management of risk. Information Security Continuous Monitoring and the Risk

  20. Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13, 2014)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13) identified for this year's Federal Information Security Management Act (FISMA) review; however, the Agency Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  3. Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12-002, October 17, 2011)

    E-Print Network [OSTI]

    Christian, Eric

    Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12's information technology (IT) security posture. For FY 2011, we adopted a risk-based approach in which we required areas of review for FY 2011 Federal Information Security Management Act (FISMA) reporting: · Risk

  4. Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2

    E-Print Network [OSTI]

    Hwang, Kai

    Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1 and optimize energy usage to meet sustainability goals. Managing the energy information lifecycle ­ from, feedback, and query/response interactions, which are transmitted across a widely distributed infrastructure

  5. Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1

    E-Print Network [OSTI]

    Chen, Li-Chiou

    Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

  6. MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

    E-Print Network [OSTI]

    MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor U.S. Department of Commerce Organizations have to make frequent changes to their information systems result in adjustments being made to the configuration of information systems; these activities could have

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  8. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  10. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  14. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  15. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    Radack, Editor Computer Security Division Information Technology Laboratory National Institute-35, Guide to Information Technology Security Ser vices, Recommendations of the National InstituteJune 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley

  16. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  17. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  18. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  19. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  1. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  3. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  4. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  5. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  6. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  7. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

    E-Print Network [OSTI]

    Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

    2010-01-01

    -Government and Cyber Security: The Role of Cyber Security Exercises. Proceedings of the 39th Hawaii International Conference on System Sciences. Kauai, Hawaii. January 4–7, 2006. IBM Center for The Business of Government8 CYBERSECURITY MANAGEMENT IN THE STATES...

  8. AT&TSecurity Consulting Information Assurance Federal Information Security

    E-Print Network [OSTI]

    Fisher, Kathleen

    AT&TSecurity Consulting Information Assurance ­ Federal Information Security Management Act (FISMA requirements under the Federal Information Security Management Act of 2002, of general support systems the security controls for the information system. The AT&T Consulting methodology is based on National

  9. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  10. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  11. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  12. Information Technology and Management Department of Information Technology and Management

    E-Print Network [OSTI]

    in the information technology and cyber security fields. The Information Technology and Management degrees apply- riculum to give cyber security and forensics practitioners a thorough grounding in legal issues Forensics and Security Certificate Programs Advanced Software Development Cyber Security Management Cyber

  13. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  14. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  15. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  16. Order Code RL33494 Security Classified and Controlled Information

    E-Print Network [OSTI]

    Laughlin, Robert B.

    Order Code RL33494 Security Classified and Controlled Information: History, Status, and Emerging Government and Finance Division #12;Security Classified and Controlled Information: History, Status in the creation, management, and declassification of national security information followed over the succeeding

  17. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. OFFICE of the CHIEF INFORMATION SECURITY OFFICER

    E-Print Network [OSTI]

    Matrajt, Graciela

    security and privacy. Services are designed to help UW units understand risks by analyzing and forecasting Chief Information Security Officer In reflecting back on all our hard work during 2012, I would like of Contents Asset-Based Risk Management

  19. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  1. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  2. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved POLICY TITLE: Information Technology Security Policy POLICY PURPOSE: The purpose of this Information Technology Security Policy is to ensure and describe the steps necessary to secure information

  3. Physical and Information Security Policy Category: Campus Life

    E-Print Network [OSTI]

    Physical and Information Security Policy Category: Campus Life Facilities Information Management 1. The Security Office (Bentley Campus) will provide information to assist staff and students in protecting Manager. 2.7 Information security University information must be protected in a manner that is appropriate

  4. Appendix III to OMB Circular No. A-130 -Security of Federal Automated Information Resources

    E-Print Network [OSTI]

    Appendix III to OMB Circular No. A-130 - Security of Federal Automated Information Resources A automated information security programs; assigns Federal agency responsibilities for the security of automated information; and links agency automated information security programs and agency management

  5. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  6. Securing the information infrastructure for EV charging

    E-Print Network [OSTI]

    Poll, Erik

    Securing the information infrastructure for EV charging Fabian van den Broek1 , Erik Poll1 , and B for the information exchanges in the infrastructure for EV charging being tri- alled in the Netherlands, which. Key words: EV charging, congestion management, end-to-end security, smart grids 1 Introduction

  7. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  8. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  9. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision management issue for all organizations, including the University of Connecticut. Furthermore, as more or framework within which University of Connecticut incident handlers can work to ensure a complete

  10. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  11. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  12. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  13. Find It. Delete It. Protect It. Information Technology Security Strategy

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Find It. Delete It. Protect It. Information Technology Security Strategy Executive Summary The general proposed strategy is to optimize risk management for information security incrementally and over that security will be a process rather than project. Achievement of the goal, optimized risk management

  14. Material Management and Minimization | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Management and Minimization | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering...

  15. Consequence Management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Consequence Management | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  16. NA IM- Associate Administrator for Information Management & Chief...

    National Nuclear Security Administration (NNSA)

    IM- Associate Administrator for Information Management & Chief Information Officer | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

  17. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  18. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  19. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  20. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  1. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  2. Secure Information Sharing and Dissemination in the Context of Public Security

    E-Print Network [OSTI]

    Secure Information Sharing and Dissemination in the Context of Public Security Professor Nabil R. Adam Director, The Center for Information Management Integration & Connectivity (CIMIC) Executive://cimic.rutgers.edu/~adam/ Abstract In the context of homeland security, one of the key challenges in such environment is achieving

  3. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  4. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  5. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  6. Building an Information Technology Security Awareness

    E-Print Network [OSTI]

    by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests of technical, physical, administrative, and management standards and guidelines for the cost-effective security Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899

  7. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  8. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  9. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    is directed to develop cyber security standards, guidelines, and associated methods and techniques. ITLNISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew

  10. Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code: CS4520

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    students to take an active role in the design, planning, evaluation and management of secure information -- Ability to analyse security risks and deliver a fit-for-purpose information security management system security * Professional/Subject-Specific Skills -- Ability identify risks in software programs, computer

  11. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful financial institutions or e-commerce organizations. On December 6, SEAS' Information Security Office held some basic security awareness information. More information on how to remain secure during the busy

  12. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  13. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  14. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  15. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  16. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  17. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Operations Acquisition and Project Management Major Contract Solicitation National Security Campus Management and...

  18. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  19. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)

    E-Print Network [OSTI]

    Proceedings of the Third International Symposium on Human Aspects of Information Security the scope of remediation, is a pervasive feature of Information Technology Security Management (ITSM of Information Security & Assurance (HAISA 2009) 120 which is security incident response. We extend those results

  20. Integrated Safeguards and Security Management (ISSM) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

  1. Information Security Policy Manual Latest Revision: May 16, 2012

    E-Print Network [OSTI]

    Alpay, S. Pamir

    1 Information Security Policy Manual Latest Revision: May 16, 2012 #12;2 Table of Contents Information Security Policy Manual...............................................................................................................................................17 Information Security Glossary

  2. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all

  3. Information Security Specialist | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security Specialist Information Security Specialist Submitted by admin on Sun, 2015-09-13 00:15 Job Summary Organization Name Department Of Energy Agency SubElement...

  4. Self Managed Security Cell, a security model for the Internet of Things and Services

    E-Print Network [OSTI]

    de Leusse, Pierre; Dimitrakos, Theo; Nair, Srijith K; 10.1109/AFIN.2009.15

    2012-01-01

    The Internet of Things and Services is a rapidly growing concept that illustrates that the ever increasing amount of physical items of our daily life which become addressable through a network could be made more easily manageable and usable through the use of Services. This surge of exposed resources along with the level of privacy and value of the information they hold, together with the increase of their usage make for an augmentation in the number of the security threats and violation attempts that existing security systems do not appear robust enough to address. In this paper, the authors underline this increase in risk and identify the requirements for resources to be more resilient in this type of environment while keeping an important level of flexibility. In addition, the authors propose an architectural model of Self Managed Security Cell, which leverages on current knowledge in large scale security systems, information management and autonomous systems.

  5. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  6. Information Technology Security for Small Business

    E-Print Network [OSTI]

    Magee, Joseph W.

    Information Technology Security for Small Business (video script) Descriptive Text for the Visually symbolic of information technology security and cyber crime. Narration: "No matter how well you protect, "Information Technology Security for Small Business" and "It's not just good business. It's essential business

  7. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, As we write the summer issue, with the hire of Indir Advagic, SEAS is launching an Office of Information Security. Besides assessing the general state of information security at SEAS, one of Indir's first tasks will be to revive the cross

  8. Secured Information Flow for Asynchronous Sequential Processes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Secured Information Flow for Asynchronous Sequential Processes Isabelle Attali, Denis Caromel for unauthorized information flows. As a final result, all authorized communication paths are secure: no disclosure a new issue in data confidentiality: authorization of secured information flow transiting (by the mean

  9. 06 DEC 2013 1 Information Security Guideline

    E-Print Network [OSTI]

    Queitsch, Christine

    06 DEC 2013 1 Information Security Guideline Definitions can be found in Administrative Policy Statement 2.4, Information Security and Privacy Roles, Responsibilities, and Definitions. 1 Purpose Administrative Policy Statement (APS) 2.6, Information Security Controls and Operational Practices, states

  10. Information Security 26:198:643:01

    E-Print Network [OSTI]

    Lin, Xiaodong

    Information Security 26:198:643:01 Spring 2012 Rutgers University M 2:30-5:20pm, 1WP-534 Panagiotis and interconnecting networks, raising demands for security measures to protect the information and relevant systems, students will learn the theoretical advancements in information security, state-of-the- art techniques

  11. Start your information security planning here!

    E-Print Network [OSTI]

    Magee, Joseph W.

    Start your information security planning here! Save the Date July 15, 2008 8:30 am ­ 12:30 pm-technology crimes. For additional information, visit http://csrc.nist.gov/secure iz/b or contact: securebiz developed a workshop to help the small business owner increase information system security. Learn how

  12. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision requirements for the protection of that information on the University. The University has had security of the University. The Information Technology Security Office has created this Incident Response Plan to assist

  13. Formalizing Information Security Knowledge Stefan Fenz

    E-Print Network [OSTI]

    Formalizing Information Security Knowledge Stefan Fenz Vienna University of Technology Vienna ontology which provides an on- tological structure for information security domain knowl- edge. Besides of the considered organization is incorporated. An evaluation conducted by an information security expert team has

  14. OFFICE of the CHIEF INFORMATION SECURITY OFFICER

    E-Print Network [OSTI]

    Matrajt, Graciela

    OFFICE of the CHIEF INFORMATION SECURITY OFFICER 2013 Information Security and Privacy Annual conversation,The Office of the Chief Information Security Officer (CISO) invites readers to email ciso@uw.edu by May 1st, 2014 with privacy-themed cap- tions for the cartoon on the right.Winning captions

  15. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  16. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

  17. Secure Key Management in the Cloud Ivan Damgrd1, Thomas P. Jakobsen1,,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Key Management in the Cloud Ivan Damgård1, Thomas P. Jakobsen1,, Jesper Buus Nielsen1 of assistance from outside the cloud when doing the transition. We study the levels of security one can on their practical performance. Keywords: Information security, cloud computing, cloud cryptography, secure key man

  18. The Department of Energy's National Security Information Fundamental...

    Energy Savers [EERE]

    The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental...

  19. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  20. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  1. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes program planning and management requirements for the Departments Safeguards and Security (S&S) Program. Cancels: DOE N 473.9 and DOE M 470.1-1

  2. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes program planning and management requirements for the Departments Safeguards and Security. Chg 1, dated 3-7-06 Cancels DOE N 473.9, DOE M 470.1-1 Chg 2.

  3. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  4. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  5. GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor

    E-Print Network [OSTI]

    to improve their overall security. The Information Technology Laboratory of the National Institute-115, Technical Guide to Information Security Testing and Assessment: Recommendations of the National InstituteGUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security

  6. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  7. Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE

    E-Print Network [OSTI]

    Martin, Jeff

    Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE Demand for technical security and information assurance professionals has risen dramatically in recent years OPPORTUNITIES: TUITION: Required Courses (78 Hours): · Information Assurance and Security Level 1: Information

  8. USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY

    E-Print Network [OSTI]

    USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY Shirley about the security of information systems for the decision makers of organizations. When organizations to strengthen the overall security of their information and their information systems. Organizations

  9. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access technology security incident. A standard Universitywide approach to information security is important the Information Technology Services Office has completed its investigation and authorizes such activity. 3

  10. The Handbook of Information Security 25. Routers and Switches The Handbook of Information Security

    E-Print Network [OSTI]

    Dommel, Hans-Peter

    The Handbook of Information Security 25. Routers and Switches 1 The Handbook of Information Security John Wiley & Sons Chapter 25. Routers and Switches Mar 31, 2005 - FINAL VERSION - #12;The Handbook of Information Security 25. Routers and Switches 2 OUTLINE INTRODUCTION Principles of Routing and Switching

  11. National Interest Security Company NISC Formerly Technology Management...

    Open Energy Info (EERE)

    Interest Security Company NISC Formerly Technology Management Services TMS Inc Jump to: navigation, search Name: National Interest Security Company (NISC) (Formerly Technology &...

  12. Safeguards and Security Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18

    The proposed revision to this Department of Energy Guide focuses on alignment of guidance for implementing key safeguard and security components to the DOE capital asset acquisition process with the revised DOE O 413.3B, Program and Project Management for Acquisition of Capital Assets, the revised DOE O 470.4B, Safeguard and Security Program, and the new series of DOE Orders replacing the DOE M 470.4 series of manuals.

  13. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2002

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2002 Section 5.8 Information Security Revised: May 2011 Policy 5.8.1 Information Security Function Responsibility: Chief Information Security Officer Page 1 of 1 INFORMATION SECURITY FUNCTION

  14. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    E-Print Network [OSTI]

    Thaw, David Bernard

    2011-01-01

    assets. Current information security law in the Unitedimplications for information security professionalism inbeing abundant in the information security community: Yes,

  15. CMAD IV 11/14/96 Information Security

    E-Print Network [OSTI]

    California at Davis, University of

    CMAD IV 11/14/96 Information Security and the Electric Power Industry Ab Kader Ron Skelton Electric;CMAD IV 11/14/96 EPRI Security Initiatives · Information Security Workshop ­ Utility Security Survey (MIS Training) · Information Security Applications ­ Power System Security (LANL) ­ Residential

  16. Tackling the Loss of Control: Standards-based Conjoint Management of Security Requirements for Cloud Services

    E-Print Network [OSTI]

    Schneider, Jean-Guy

    .versteeg@ca.com Abstract--The loss of control over information assets is a major security and privacy concern in the Cloud manage security requirements for a Cloud service following the ISO 27001 standard for infor- mation approach is demonstrated with an example scenario. Keywords-cloud computing, cloud computing security

  17. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Supersedes DOE O 200.1.

  18. Security Risk Management via Dynamic Games with Learning

    E-Print Network [OSTI]

    Alpcan, Tansu

    Security Risk Management via Dynamic Games with Learning Praveen Bommannavar Management Science@stanford.edu Abstract--This paper presents a game theoretic and learning approach to security risk management based agent, e.g. security and risk management division of the organization, which aims to mitigate risks. We

  19. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en NNSA sitesInformation/%2ARLUOB

  20. Information Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence of TopologicalISTI

  1. University of Warwick Information Security Policy 1. Introduction

    E-Print Network [OSTI]

    Davies, Christopher

    University of Warwick Information Security Policy 1. Introduction The University recognises's strategic objectives. Information security is important to the protection of the University's reputation implications for individuals and is subject to legal obligations. The consequences of information security

  2. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  3. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

  4. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2002

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Science Center staff members delegated with the responsibility of responding to: a. Information security approve CIRT membership as recommended by the Health Science Center Information Security Council. 3

  5. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: July 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services, must use the Health Science Center Information Security approved malware protection software Information Security monitoring practices as defined in #12;HEALTH SCIENCE CENTER HANDBOOK OF OPERATING

  6. HQ Emergency Management Team (EMT) | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    HQ Emergency Management Team (EMT) | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  7. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  8. Safeguards and Security Program Planning and Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes program planning and management requirements for the Department’s Safeguards and Security (S&S) Program. Change 2 is a revision to Section M of both the Manual and the CRD to realign the process for establishing deviations from DOE directives containing safeguards and security requirements to reflect established Departmental policy as set forth in DOE O 251.1C. Original publication, 8-26-05; Chg 1, 3-7-06. Canceled by DOE O 470.4B

  9. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    o471.6AdminChg2-Certified.pdf -- PDF Document, 665 KB Writer: Carl Piechowski Subjects: Administration Information Technology Security ID: DOE O 471.6 Admin Chg 2 Type:...

  10. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  11. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Walker, Lawrence R.

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsmLE OFFICE(S): ORIGINALLY ISSUED: ApPROVALS: VICE PROVOST FOR INFORMATION TECHNOLOGY OFFICE OF THE VICE PROVOST FOR INFORMATION TECHNOLOGY ApPROVED BY: ~ Date ~ts-tl2- Date li/rO/I?... I I Date REVISION DATE

  12. Electronic DOE Information Security System (eDISS) PIA, Office...

    Energy Savers [EERE]

    Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and...

  13. NIST Computer Security Division csrc.nist.gov Supplemental Guidance on

    E-Print Network [OSTI]

    -03, Enhancing the Security of Federal Information and Information Systems, stated that, "Our nation's security monitoring, or security authorization. Keywords Federal Information Security Management Act, Information Information For additional information on NIST's Computer Security Division programs, projects

  14. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  15. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003 Section 5.8 Information Security Revised: January 2012 Policy 5.8.13 Security Monitoring Responsibility: Chief Information Security Officer Page 1 of 2 SECURITY MONITORING Policy

  16. Guide for Security-Focused Configuration Management of

    E-Print Network [OSTI]

    U R I T Y Computer Security Division Information Technology Laboratory National Institute and privacy of other than national security-related information in federal information systems. The Special information systems, but such standards and guidelines shall not apply to national security systems without

  17. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  18. Washington and Lee University Guidance on Information Security

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidance on Information Security This guidance addresses common issues that have come up during information security discussions with offices and departments across, Information Security Program Committee Chair (sdittman@wlu.edu) or Dean Tallman, Information Security Officer

  19. Smart Grid Information Security (IS) Functional Requirement

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01

    It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

  20. Cloud Computing Security in Business Information Systems

    E-Print Network [OSTI]

    Ristov, Sasko; Kostoska, Magdalena

    2012-01-01

    Cloud computing providers' and customers' services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analyze main international and industrial standards targeting information security and their conformity with cloud computing security challenges. We evaluate that almost all main cloud service providers (CSPs) are ISO 27001:2005 certified, at minimum. As a result, we propose an extension to the ISO 27001:2005 standard with new control objective about virtualization, to retain generic, regardless of company's type, size and nature, that is, to be applicable for cloud systems, as well, where virtualization is its baseline. We also define a quantitative metric and evaluate the importance factor of ISO 27001:2005 control objecti...

  1. When security meets software engineering: A case of modelling secure information systems

    E-Print Network [OSTI]

    When security meets software engineering: A case of modelling secure information systems Engineering: towards the Modeling of Secure Information Systems" paper presented at the 15th International. This is mainly because private information is stored in computer systems and without security, organisations (and

  2. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

    E-Print Network [OSTI]

    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems for information systems. Traditionally, security is considered after the definition of the system. However the health sector to military. As the use of Information Systems arises, the demand to secure those systems

  3. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  4. Improving web site security with data flow management

    E-Print Network [OSTI]

    Yip, Alexander Siumann, 1979-

    2009-01-01

    This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

  5. Ontological Mapping of Information Security Best-Practice Guidelines

    E-Print Network [OSTI]

    Ontological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner security knowl- edge. While information security ontologies already exist, no methods have been proposed. Therefore, this paper presents a method for mapping the information security knowledge of the French EBIOS

  6. The Center for Information Systems Security Studies and

    E-Print Network [OSTI]

    The Center for Information Systems Security Studies and Research (CISR) has created the ISSE) and the Department of Homeland Security (DHS) have designated NPS as a Center of Academic Excellence in Information developments where cyber security is a concern. Information Systems Security Engineering (ISSE) Certificate

  7. Banner Job Installation Security Form Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Job Installation Security Form Office of Information Technology 424 Roy S. Nicks Hall, Box: ______________________________ Job Description: ______________________________ Section 3. Security Information Banner Module 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu Section 1. Requestor Information

  8. Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY

    E-Print Network [OSTI]

    Policy 3505 ­ Information Technology Security 1 OLD DOMINION UNIVERSITY University Policy Policy #3505 INFORMATION TECHNOLOGY SECURITY POLICY Responsible Oversight Executive: Vice President of this policy is to state the codes of practice with which the University aligns its information technology

  9. CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records...

    Energy Savers [EERE]

    CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records Maria Levesque, Director Records & Privacy Management...

  10. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003 Section 5.8 Information Security Revised: September 2014 Policy 5.8.10 Information Resources Acceptable Use and Security Policy Responsibility: Chief Information Security Officer Page 1 of 6

  11. Managing environmental information

    SciTech Connect (OSTI)

    Solyst, J. [Chemical Manufacturers Association, Arlington, VA (United States)

    1998-12-31

    The public`s right to know about environmental policy has moved to the forefront with the technological advances in recent years. Congress has not kept pace with these developments having twice considered and twice rejected legislation that is necessary in this field. Congress should provide leadership to the Environmental Protection Agency (EPA) for a broad strategy to improve information resources and management.

  12. Teaching Aggressive Information Security Labs

    E-Print Network [OSTI]

    information platforms used by organizations to conduct business and share information and data. 3. I and unlawful ways. 4. I will not "hack" the NPGS domain. _______________________ Print your name and are relevant to the discussion... 8 #12;So Why Do They Hack? · Script Kiddies: ­ According to Sarah Gordon

  13. Information Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    Provides a framework for managing information, information resources, and information technology investment, which supports the operating elements of the Department in the accomplishment of its missions and functions in both an efficient and effective manner and in accordance with Departmental policy. Cancels: DOE 1324.5B, DOE 5900.1A, DOE 1130.8A, DOE 1330.1D, DOE 1410.2, DOE 1450.3A, DOE 1700.1, DOE 1800.1A, DOE 5300.1C

  14. Los Alamos National Security LLC Selected to Manage Los Alamos...

    Energy Savers [EERE]

    be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of...

  15. NNSA Selects Consolidated Nuclear Security, LLC to Manage the...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex in Oak Ridge, Tenn., and the Pantex Plant near Amarillo, Texas. The contract also includes construction project management of the Uranium Processing...

  16. NNSA selects Consolidated Nuclear Security, LLC to manage the...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    selects Consolidated ... NNSA selects Consolidated Nuclear Security, LLC to manage the consolidated contract for Nuclear Production Operations Posted: January 8, 2013 - 1:20pm In a...

  17. Secure Information and Resource Sharing in Cloud Institute for Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Secure Information and Resource Sharing in Cloud Yun Zhang Institute for Cyber Security Univ Institute for Cyber Security Univ of Texas at San Antonio San Antonio, TX 78249 Ravi.Sandhu@utsa.edu ABSTRACT The significant threats from information security breaches in cyber world is one of the most

  18. ESRCThe economics of information security ESRC Seminar Series

    E-Print Network [OSTI]

    Pym, David J.

    by the Economic and Social Research Council (ESRC), the Cyber Security Knowledge Transfer Network (KTNThe economics of information security Cyber Security KTN The Cyber Security Knowledge Transfer Network (KTN) under the Directorship of Nigel A Jones provides a single focal point for UK Cyber Security

  19. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  20. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  1. A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING Daria Stepanova, Simon E.K. dasha stepanova@list.ru, s.e.parkin@ncl.ac.uk, aad.vanmoorsel@ncl.ac.uk Keywords: Information security Information Security Officer (CISO) within an organisation to ensure that such information is adequately

  2. Quantum non-locality and information security Muhammad Nadeem

    E-Print Network [OSTI]

    1 Quantum non-locality and information security Muhammad Nadeem Department of Basic Sciences-locality, as discussed here, is sufficient to achieve unconditional information security without requiring advanced, integrity, authenticity and availability of information to legitimate users. These information security

  3. Page 1 of 2 Policy Name: Information Technology (IT) Security

    E-Print Network [OSTI]

    Carleton University

    Page 1 of 2 Policy Name: Information Technology (IT) Security Originating/Responsible Department Information Officer (CIO) Policy: Information Technology (IT) Security Purpose: The purpose of this Policy is to outline Carleton University's approach to campus- wide IT security for networks, enterprise information

  4. Accident management information needs

    SciTech Connect (OSTI)

    Hanson, D.J.; Ward, L.W.; Nelson, W.R.; Meyer, O.R. (EG and G Idaho, Inc., Idaho Falls, ID (USA))

    1990-04-01

    In support of the US Nuclear Regulatory Commission (NRC) Accident Management Research Program, a methodology has been developed for identifying the plant information needs necessary for personnel involved in the management of an accident to diagnose that an accident is in progress, select and implement strategies to prevent or mitigate the accident, and monitor the effectiveness of these strategies. This report describes the methodology and presents an application of this methodology to a Pressurized Water Reactor (PWR) with a large dry containment. A risk-important severe accident sequence for a PWR is used to examine the capability of the existing measurements to supply the necessary information. The method includes an assessment of the effects of the sequence on the measurement availability including the effects of environmental conditions. The information needs and capabilities identified using this approach are also intended to form the basis for more comprehensive information needs assessment performed during the analyses and development of specific strategies for use in accident management prevention and mitigation. 3 refs., 16 figs., 7 tabs.

  5. Management and Budget | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion toMSDS onBudget | National Nuclear Security

  6. The Promotion of Access to and Protection of National Security Information in South Africa

    E-Print Network [OSTI]

    Klaaren, Jonathan E.

    2003-01-01

    broadly, a military information security policy has beenfor secrecy and therefore information security measures in asection describes the information security implementation

  7. Army Regulation 2550 Information Management: Records

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Regulation 25­50 Information Management: Records Management Preparing and Managing Information Management: Records Management Preparing and Managing Correspondence *Army Regulation 25. This regulation on the prepa- ration and management of Army corre- spondence has been revised. This revision

  8. 6 Enterprise information risk management: Dealing with cloud computing

    E-Print Network [OSTI]

    Pym, David J.

    6 Enterprise information risk management: Dealing with cloud computing Adrian Baldwin HP Labs for the enterprise risk and security management lifecycle. Specifically, the economies of scale that large providers federated assurance for the cloud. 6.1 Introduction Managing IT risks remains a significant challenge

  9. Security Risk Management using Internal Controls Simon Foley,

    E-Print Network [OSTI]

    Foley, Simon

    . In this paper we consider how Enterprise Risk Manage- ment (ERM) might be used to manage security risk. Copyright 2009 ACM 978-1-60558-787-5/09/11 ...$10.00. introduction to ERM frameworks such as COSO [2 be considered as an early example of using Internal Controls for security--compares with a modern ERM framework

  10. Training Management Information System

    SciTech Connect (OSTI)

    Rackley, M.P.

    1989-01-01

    The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

  11. Security robots for nuclear materials management

    SciTech Connect (OSTI)

    Deming, R.

    1986-01-01

    Robots have successfully invaded industry where they have replaced costly personnel performing their tasks cheaper and better in most cases. There may be a place for a unique class of robots, security robots, in nuclear materials management. Robots could be employed in the functions of general response, patrol and neutralizing dangerous situations. The last is perhaps most important. Ion Track Instruments of Burlington, Massachusetts has designed an excellent unit to protect life in hazardous situations. The unit can detect, disrupt or remove explosives. It can enter dangerous areas to reconnoiter the extent of danger. It can communicate with those in a dangerous area. It can fight fires or clean an area using a 2 1/2 inch, two man hose. If necessary, it can engage an adversary in a fire fight using a twelve gauge shot gun.

  12. Constructivist Approach To Information Security Awareness In The Middle East

    E-Print Network [OSTI]

    Wang, Yongge

    Constructivist Approach To Information Security Awareness In The Middle East Mohammed Boujettif the application of an approach to en- hance information security awareness amongst employees within middle- eastern companies, in effort to improve information security. We aim at surveying the current attitudes

  13. The Complexity of Synchronous Notions of Information Flow Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Complexity of Synchronous Notions of Information Flow Security Franck Cassez1, , Ron van der flow security is concerned with the ability for agents in a system to deduce information about an information flow security policy has proved to be a subtle matter. A substantial literature has developed

  14. SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS

    E-Print Network [OSTI]

    Williamson, John

    SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS Maryam Al-Awadi University This paper will explore and identify success factors related to the implementation of information security was to identify those factors required to ensure successful implementation of information security, particularly

  15. A Comprehensive and Comparative Metric for Information Security

    E-Print Network [OSTI]

    Breu, Ruth

    A Comprehensive and Comparative Metric for Information Security Steffen Weiß1 , Oliver Weissmann2 security GmbH, Germany Abstract Measurement of information security is important for organizations , Falko Dressler1* 1 Dept. of Computer Science 7, University of Erlangen, Germany 2 atsec information

  16. A Survey of Interdependent Information Security Games ARON LASZKA1

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    A A Survey of Interdependent Information Security Games ARON LASZKA1 , MARK FELEGYHAZI1 , LEVENTE by the security-related decisions of others. This interdependence between information system operators and users Information security has traditionally been considered a strategic cat-and-mouse game between the defending

  17. Information Security and Computer Systems: An Integrated Approach

    E-Print Network [OSTI]

    Holliday, Mark A.

    Information Security and Computer Systems: An Integrated Approach Mark A. Holliday Dept in information security that build upon concepts the students will already have seen in their computer systems this integrated approach to information security and computer systems. Categories and Subject Descriptors D.4

  18. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Lee, Dongwon

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  19. October 2006 LOG MANAGEMENT: USING

    E-Print Network [OSTI]

    to Computer Security Log Management NIST's Information Technology Laboratory recently issued SpecialOctober 2006 LOG MANAGEMENT: USING COMPUTER AND NETWORK RECORDS TO IMPROVE INFORMATION SECURITY LOG MANAGEMENT: USING COMPUTER AND NETWORK RECORDS TO IMPROVE INFORMATION SECURITY Shirley Radack, Editor

  20. Proposed platform for improving grid security by trust management system

    E-Print Network [OSTI]

    Siadat, Safieh; Mohsenzadeh, Mehran

    2009-01-01

    With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

  1. Risk Based Security Management at Research Reactors

    SciTech Connect (OSTI)

    Ek, David R.

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  2. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1 Zenebe: Department of Management Information Systems,Bowie State University,14000 Jericho Park Road - 3, 2009 ISBN 1-933510-96-7/$15.00 2009 CISSE Abstract ­ The Maryland Alliance for Information

  3. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access, and University policy and procedures regarding use, privacy and confidentiality of information. University data University (University) functions that are: a) stored on University information systems, b) maintained

  4. The Promotion of Access to and Protection of National Security Information in South Africa

    E-Print Network [OSTI]

    Klaaren, Jonathan E.

    2003-01-01

    to and Protection of National Security Information in Southmost relevant to national security information have similarbeen extended. 2 The national security ground of refusal to

  5. TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27

    E-Print Network [OSTI]

    TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27 29.01.03.V1.01 INFORMATION SECURITY, COMPUTER USE AND SOFTWARE INSTALLATION/USE Approved: May 10.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines

  6. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-14

    The Order establishes requirements and responsibilities for managing DOE's scientific and technical information. Cancels DOE O 241.1. Canceled by DOE O 241.1B.

  7. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-11-15

    This Guide provides approaches for implementing security provisions within the functional areas contained in DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets. Canceled by DOE G 413.3-3A.

  8. Security and Emergency Management Independent Oversight and Performance Assurance Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-03-01

    Establishes the DOE Security and Emergency Management Independent Oversight and Performance Assurance Program. Cancels DOE O 470.2, Paragraph 5b(2) of DOE O 231.1 and Chapter IV of DOE M 231.1-1.

  9. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services to allow them to properly protect Health Science Center information resources. In the case of contractors Effective: June 2003 Section 5.8 Information Security Revised: March 2012 Policy 5.8.17 Information Security

  10. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security STATUS: Approved POLICY of the requesting department to send pricing requests to Information Technology Services, have funds available the requesting department should coordinate with Information Technology Services to ensure dependencies

  11. U-200: Red Hat Directory Server Information Disclosure Security...

    Broader source: Energy.gov (indexed) [DOE]

    A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat...

  12. List of Major Information Systems,National Nuclear Security Administra...

    Broader source: Energy.gov (indexed) [DOE]

    emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

  13. NISTIR 7621 Small Business Information Security

    E-Print Network [OSTI]

    . .......................................8 3.3 Security concerns about popup windows and other hacker tricks

  14. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  15. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  16. Management Information Systems (MIS) This sheet has sample occupations, work settings, employers, and career development activities associated with this major. Some of these

    E-Print Network [OSTI]

    Ronquist, Fredrik

    Management Information Systems (MIS) This sheet has sample occupations, work settings, employers Security Specialist Computer Software Engineer Computer Support Specialist Computer and Information Systems/Officer Information Systems Analyst Information Technology Specialist Internet Recruiter Knowledge Manager Logistics

  17. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-11-21

    This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

  18. Bounds on Information and the Security of Quantum Cryptography

    E-Print Network [OSTI]

    E. Biahm; T. Mor

    1997-01-08

    Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed states, and we find bounds on the information leaked to an eavesdropper. Our result suggests that quantum cryptography is ultimately secure.

  19. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  20. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2002

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services of Information Security incidents at the UT Health Science Center at San Antonio (Health Science Center with the Health Science Center. Policy Definition An information security incident is an unplanned event affecting

  1. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: September 2004

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: September 2004 Section 5.8 Information Security Revised: March 2012 Policy 5.8.2 Definitions Responsibility: Chief Information Security Officer Page 1 of 5 DEFINITIONS Definitions ACCESS CONTROL EXECUTIVE

  2. PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application

    Energy Savers [EERE]

    Assistant Project Manager, Technical Assurance Deanna Harvey, Program Analyst Allen Rome, Cyber Security Program Manger Chris Shipp, Information System Security Manager (504)...

  3. Strategic Plan Information Resources Management

    E-Print Network [OSTI]

    Rock, Chris

    Resources Management Organizations, Policies, and Practices 12 Priorities 12 Planning 12 Quality AssuranceStrategic Plan for Information Resources Management For the Fiscal Years 2003-2007 Period by Texas Operations 14 Standards 15 Organization 15 Computer Networks 15 2 #12;Introduction & Summary Committed

  4. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  5. Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction This document contains the information security control requirements for Dartmouth College. The Dartmouth Information Security Commitee (DISC) developed these controls based on industry best practice, using Dartmouth

  6. J. Douglas Streit, Information Security Officer Office of Computing and Communications Services

    E-Print Network [OSTI]

    J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated February 6, 2012 Old Dominion University Information Technology Security Program #12;J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated

  7. Washington and Lee University Guidelines for Responding to Information Security Breaches

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidelines for Responding to Information Security Breaches Notifications 1. As further detailed in the university's Guidelines for Reporting Information Security Breaches regarding an actual or suspected data breach should contact: i. the university's Information Security

  8. Information Technology Security Training Requirements Appendix E --Training Cross Reference E-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX E Appendix E -- Training Cross Reference E-1 #12;Information Technology Security Training Requirements Appendix E -- Training Cross Reference E-2 #12;Information Technology Security Training Requirements APPENDIX E -- JOB FUNCTION

  9. Hobsons Information Security Introduction and Purpose

    E-Print Network [OSTI]

    Aickelin, Uwe

    . Among the foreseeable risks are external hacks, unauthorised access, thefts, inadvertent destruction of access by employees, students or business associates. The Data Security Coordinator, along with other

  10. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Health, Safety and Security Status: Archive Approved Date: Jun 20, 2011 CRD: Yes DNFSB: No Related History Exemptions Standards Related to: Request to Make Administrative...

  11. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Health, Safety and Security Status: Archive Approved Date: Jun 20, 2011 CRD: Yes DNFSB: No Related History Exemptions Standards Related to: Delegation of Authority - Acting...

  12. Information Security: Coordination of Federal Cyber Security Research and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11,SecurityHomeRemarksEnergyConfigurationsEGS

  13. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Victoria, University of

    key privacy and security concepts specific to academic units; · Integrate the knowledge through/security questions; · External Review recommended wider education and training at the university #12;Why Are You Here principles · Proactive · Better practices #12;University's commitment Protection of Privacy Policy

  14. Secure Authentication and Session State Management for Web Services

    E-Print Network [OSTI]

    Young, R. Michael

    Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young #12;Lehman 1 1. Introduction Web services protocol. In a web service, the server invokes a function based on the message sent from the client

  15. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  16. Global plutonium management: A security option

    SciTech Connect (OSTI)

    Sylvester, K.W.B.

    1998-12-31

    The US surplus plutonium disposition program was created to reduce the proliferation risk posed by the fissile material from thousands of retired nuclear weapons. The Department of Energy has decided to process its Put into a form as secure as Pu in civilian spent fuel. While implementation issues have been considered, a major one (Russian reciprocity) remains unresolved. Russia has made disposition action conditional on extracting the fuel value of its Pu but lacks the infrastructure to do so. Assistance in the construction of the required facilities would conflict with official US policy opposing the development of a Pu fuel cycle. The resulting stagnation provides impetus for a reevaluation of US nonproliferation objectives and Pu disposition options. A strategy for satisfying Russian fuel value concerns and reducing the proliferation risk posed by surplus weapons-grade plutonium (WGPu) is proposed. The effectiveness of material alteration (e.g., isotopic, chemical, etc.{hor_ellipsis}) at reducing the desire, ability and opportunity for proliferation is assessed. Virtually all the security benefits attainable by material processing can be obtained by immobilizing Pu in large unit size/mass monoliths without a radiation barrier. Russia would be allowed to extract the Pu at a future date for use as fuel in a verifiable manner. Remote tracking capability, if proven feasible, would further improve safeguarding capability. As an alternate approach, the US could compensate Russia for its Pu, allowing it to be disposed of or processed elsewhere. A market based method for pricing Pu is proposed. Surplus Pu could represent access to nuclear fuel at a fixed price at a future date. This position can be replicated in the uranium market and priced using derivative theory. The proposed strategy attempts to meet nonproliferation objectives by recognizing technical limitations and satisfying political constraints.

  17. Ninth Annual Cyber and Information Security Research Conference...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ninth Annual Cyber and Information Security Research Conference Apr 08 2014 04-08-2014 08:30 AM - 04-10-2014 04:00 PM Multiple speakers, multiple disciplines, multiple affiliations...

  18. The Benefits of Student Research in Information Systems Security Education

    E-Print Network [OSTI]

    for Information Systems Security Studies and Research Code CSIc Naval Postgraduate School Monterey, CA 93943 for the younger students. For example, in fourth grade I painted some cardboard boxes to look like houses

  19. Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf

    E-Print Network [OSTI]

    Xia, Yu "Brandon"

    1 Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf it must collect, store and use Sensitive Information relating to its students, employees and individuals Information properly and securely. Reason for Policy / Implication Statement Boston University is committed

  20. Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study Rostyslav-up of security risk management teams and their performance. Three different models were used to construct team security risk management tasks. The study has shown that there is a possible correlation between the teams

  1. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  2. Information system revives materials management

    SciTech Connect (OSTI)

    Hansen, T.

    1995-12-01

    Through a change in philosophy and the development of a new, more efficient information management system, Arizona Public Service Co. (APSW) has, in less than two years, reduced material and service costs by 10 percent. The utility plans to cut these costs form 1993 figures by 25 percent before 2000. The utility is breaking new ground with ongoing implementation of new business processes and the new Materials Logistics Information System (MLIS), which has been co-developed with Texas Instruments Software Division (TISD).

  3. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST PROCEDURE SELECTION LIST/2014 Testing based on criteria in 45 CFR Part 170, Health Information Technology: Standards, Implementation to the Permanent Certification Program for Health Information Technology; Final Rule (September 4, 2012). Complete

  4. Acquisition Management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a C O09OurManagement | National Nuclear

  5. Acquisition and Project Management | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a C O09OurManagement |

  6. acquisition management | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLos Alamos verifies largestnamedGroup!management | National Nuclear

  7. Emergency Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

  8. project management | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fmProject Information

  9. Infrastructure and Facilities Management | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence502PAdministration Facilities

  10. Management and Administration | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion toMSDS on

  11. Material Management and Minimization | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion toMSDS onBudgetMaterial Disposal

  12. ORISE: National Security and Emergency Management Resources

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE TheForensic ScienceHow toMentor(MARSSIM)ORISE

  13. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  14. Privacy Management at UC Information and Records Management

    E-Print Network [OSTI]

    Hickman, Mark

    or criminal records. See a full list of the types of information collected about individuals at UC in SectionPrivacy. Privacy Management at UC Information and Records Management (IRM) www Records Management 3 1. Introduction Information that staff or contractors create and collect at UC needs

  15. Stay protected when connected Visit security.duke.edu for more information.

    E-Print Network [OSTI]

    McShea, Daniel W.

    Stay protected when connected Visit security.duke.edu for more information. Follow these guidelines Visit security.duke.edu for more information. Follow these tips for securing mobile devices: iOS 6/software/. Windows Mac Another free option: Microsoft Security Essentials: http://windows.microsoft.com/en- US/windows/products/security

  16. Information theoretic security by the laws of classical physics

    E-Print Network [OSTI]

    Mingesz, R; Gingl, Z; Granqvist, C G; Wen, H; Peper, F; Eubank, T; Schmera, G

    2013-01-01

    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.

  17. Mutual information, bit error rate and security in Wójcik's scheme

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-21

    In this paper the correct calculations of the mutual information of the whole transmission, the quantum bit error rate (QBER) are presented. Mistakes of the general conclusions relative to the mutual information, the quantum bit error rate (QBER) and the security in W\\'{o}jcik's paper [Phys. Rev. Lett. {\\bf 90}, 157901(2003)] have been pointed out.

  18. Information Collection Management | Department of Energy

    Energy Savers [EERE]

    Information Collection RequestsPRA (PDF) DOE Order 200.2 Information Collection Management Program - To set forth the Department of Energy (DOE) requirements and...

  19. First Analysis Securities Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport Jump to: navigation, searchSecurities Corporation Jump

  20. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  1. Supporting Classroom Information Management Quranna Khan

    E-Print Network [OSTI]

    McCrickard, Scott

    Supporting Classroom Information Management with SCOUT Quranna Khan D. Scott McCrickard Sherian such as classroom information management. We address these problems with an information management tool called SCOUT@hotmail.com INTRODUCTION The classroom of the new millennium will not look like the pencil-and-paper versions that we

  2. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security,

    E-Print Network [OSTI]

    Gering, Jon C.

    connection. 3. Dual (split) tunneling is not permitted; only one network connection is allowed. 4. All VPN gateways or concentrators on the Truman network will be installed and managed by ITS. 5. All computers, etc. - IPSec ­ A secure network protocol used for VPN sessions. - VPN Gateway/Concentrator - A device

  3. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    SciTech Connect (OSTI)

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for former waste management units, legacy contamination source areas and distribution of contamination in soils, and environmental infrastructure (e.g., caps, monitoring systems, etc.) that is in place or planned in association with RAs. (3) Regulatory considerations and processes for management and disposition of waste soil upon generation, including regulatory drivers, best management practices (BMPs), waste determination protocols, waste acceptance criteria, and existing waste management procedures and BMPs for Y-12. This Soil Management Plan provides information to project planners to better coordinate their activities with other organizations and programs with a vested interest in soil disturbance activities at Y-12. The information allows project managers and maintenance personnel to evaluate and anticipate potential contaminant levels that may be present at a proposed soil disturbance site prior to commencement of activities and allows a more accurate assessment of potential waste management requirements.

  4. Security Forms and Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES Pursuant to the contract clauseProgramSecurity Forms and

  5. The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute at The Johns Hopkins University (JHUISI) is planning for substantial multi-year growth in the area of

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute of Information Security and Cryptography. Our administration is committed at the highest level to substantially: Applicants in Information Security would also be associated with: · The Information Security Institute

  6. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  7. Vencon Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin, NewArkansas: Energy ResourcesVecariusEnergy India LtdManagement

  8. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Well, what are the manifestations of insecurities?insecurities? Virus/WormsVirus/Worms Denial of serviceIt''s all about the softwares all about the software ""Behind every computer security problem andBehind every computer security problem and malicious attack lies a common enemymalicious attack lies a common

  9. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    9 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation In Ubiquitous Environments Mohamed Aymen Chalouf1 make the concerned communications vulnerable to security attacks because of the open medium on which

  10. Short collusion-secure ngerprint codes against three pirates Research Center for Information Security (RCIS), National Institute of Advanced Industrial

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 1Short collusion-secure #12;ngerprint codes against three pirates Koji Nuida Research Center a new construction of probabilistic collusion-secure #12;ngerprint codes against up to three pirates

  11. Short collusion-secure fingerprint codes against three pirates Research Center for Information Security (RCIS), National Institute of Advanced Industrial

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 1Short collusion-secure fingerprint codes against three pirates Koji Nuida Research Center a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates

  12. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE and expanded its catalog of security controls to help organizations protect their information and information, the revised catalog brings together, for the first time, comprehensive information about security controls

  13. Roadmap: Computer Science Information Security -Bachelor of Science

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Computer Science ­ Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012­2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

  14. Information Uncertainty to Compare Qualitative Reasoning Security Risk Assessment Results

    SciTech Connect (OSTI)

    Chavez, Gregory M [Los Alamos National Laboratory; Key, Brian P [Los Alamos National Laboratory; Zerkle, David K [Los Alamos National Laboratory; Shevitz, Daniel W [Los Alamos National Laboratory

    2009-01-01

    The security risk associated with malevolent acts such as those of terrorism are often void of the historical data required for a traditional PRA. Most information available to conduct security risk assessments for these malevolent acts is obtained from subject matter experts as subjective judgements. Qualitative reasoning approaches such as approximate reasoning and evidential reasoning are useful for modeling the predicted risk from information provided by subject matter experts. Absent from these approaches is a consistent means to compare the security risk assessment results. Associated with each predicted risk reasoning result is a quantifiable amount of information uncertainty which can be measured and used to compare the results. This paper explores using entropy measures to quantify the information uncertainty associated with conflict and non-specificity in the predicted reasoning results. The measured quantities of conflict and non-specificity can ultimately be used to compare qualitative reasoning results which are important in triage studies and ultimately resource allocation. Straight forward extensions of previous entropy measures are presented here to quantify the non-specificity and conflict associated with security risk assessment results obtained from qualitative reasoning models.

  15. A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    E-Print Network [OSTI]

    Xu, Haiping

    333 A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage Daniel F. Fitch, however, with data security, reliability, and availability in the cloud. In this paper, we address these concerns by proposing a novel security mechanism for secure and fault-tolerant cloud-based information

  16. Management information systems software evaluation

    SciTech Connect (OSTI)

    Al-Tunisi, N.; Ghazzawi, A.; Gruyaert, F.; Clarke, D. [Saudi Aramco, Dhahran (Saudi Arabia). Process and Control Systems Dept.

    1995-11-01

    In November 1993, Saudi Aramco management endorsed a proposal to coordinate the development of the Management Information Systems (MISs) of four concurrent projects for its facilities Controls Modernization Program. The affected projects were the Ras Tanura Refinery Upgrade Project, the Abqaiq Plant Controls Modernization and the Shedgum and Uthmaniyah Gas plants Control Upgrade Projects. All of these projects had a significant requirement of MISs in their scope. Under the leadership of the Process and Control Systems Department, and MIS Coordination Team was formed with representatives of several departments. An MIS Applications Evaluation procedure was developed based on the Kepner Tregoe Decisions Analysis Process and general questionnaires were sent to over a hundred potential Vendors. The applications were divided into several categories, such as: Data Capture and Historization, Human User Interface, Trending, Reporting, Graphic Displays, Data Reconciliation, Statistical Analysis, Expert Systems, Maintenance Applications, Document Management and Operations Planning and Scheduling. For each of the MIS Application areas, detailed follow-up questionnaires were used to short list the candidate products. In May and June 1994, selected Vendors were invited to Saudi Arabia for an Exhibition which was open to all Saudi Aramco employees. In conjunction with this, the Vendors were subjected to a rigorous product testing exercise by independent teams of testers. The paper will describe the methods used and the lessons learned in this extensive software evaluation phase, which was a first for Saudi Aramco.

  17. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Science Center enterprise information security architecture, any incidents of possible misuse.8.10, "Acceptable Use of Information Resources Policy", of the HOP, #12;HEALTH SCIENCE CENTER HANDBOOK OF OPERATING

  18. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2000

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services the Health Science Center's information resources and computer network. See the Handbook of Operating Effective: June 2000 Section 5.8 Information Security Revised: May 2014 Policy 5.8.12 Portable Computing

  19. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: December 2005

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services by the Information Security Office (ISO). Risk assessments will be conducted on any entity within the Health Science or organizational assets. #12;HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information

  20. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: September 2002

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Science Center, and: the distribution of critical information, security-related patches/updates, virus, Chair, or Director. #12;HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information

  1. Allan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003.

    E-Print Network [OSTI]

    Camp, L. Jean

    With the increased concern over national security there has been increased debate over reliability and securityAllan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003. Making Security Manifest Security and Autonomy for End Users

  2. The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories

    Broader source: Energy.gov [DOE]

    The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories was presented to CRENEL 9/15/2014.

  3. Informational Materials | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence ofMedia on LightingInformational

  4. The University of Texas at Austin Management of UTnet Wireless Access Policy Office of the Chief Information Officer Written By: Information Technology Services

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The University of Texas at Austin Management of UTnet Wireless Access Policy Office of the Chief Information Officer Written By: Information Technology Services ­ Networking;Information Security Office Document Version: Approved Last Edited: 3/4/2011 1 Management of UTnet Wireless Access Policy 1

  5. The Need for Effective Information Security Awareness

    E-Print Network [OSTI]

    Aloul, Fadi

    hacking methods that can be used to steal money and information from the general public. Furthermore to conduct business in the Middle East and allowed many existing sectors, such as education, health, airline incidents in the Middle East. Local media occasionally report incidents of online fraud, attempts to hack

  6. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Supersedes DOE 5639.8.

  7. INFORMATION NETWORKS TECHNOLOGY MANAGEMENT Spring 2015

    E-Print Network [OSTI]

    MSIS 5623 INFORMATION NETWORKS TECHNOLOGY MANAGEMENT Spring 2015 Spears School of Business Oklahoma State University Instructor: Dr. Jeretta Horn Nord, Professor Management Science and Information Systems Classroom: Online Class: http://oc.okstate.edu Contact Information: Office: Business 223 Stillwater Email

  8. Managing Information Fusion with Formal Concept Analysis

    E-Print Network [OSTI]

    Winckler, Marco Antonio Alba

    Information Fusion with Formal Concept Analysis 105 Table 1. Information dataset given by sources m1 m2 g1 [1Managing Information Fusion with Formal Concept Analysis Zainab Assaghir1 , Mehdi Kaytoue1 , Amedeo of numerical information provided by several sources (databases, ex- perts...). Merging pieces of information

  9. NNSA Field Office Manager Moves | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving BasicSecurity Complex DeliversField

  10. NNSA selects Consolidated Nuclear Security, LLC to manage the consolidated

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof EnergyY-12 National Security Complex NNSA

  11. Stateful UML Design with Security Constraints for Information Assurance The design of software applications using UML embodies

    E-Print Network [OSTI]

    Demurjian, Steven A.

    Stateful UML Design with Security Constraints for Information Assurance Abstract The design design state containing security constraints and insures that information assurance with respect. Keywords: RBAC, MAC, UML, access control, information assurance, secure software design. 1. Introduction

  12. Communications of the Association for Information Systems | Number 1Volume 28 Article 22

    E-Print Network [OSTI]

    -1-2011 Information Security Risk Management: In Which Security Solutions Is It Worth Investing? Stefan Fenz Vienna, Thomas (2011) "Information Security Risk Management: In Which Security Solutions Is It Worth Investing://aisel.aisnet.org/cais/vol28/iss1/22 #12;Volume 28 Article 22 Information Security Risk Management: In Which Security Solutions

  13. Department of Energy: National Security Campus Technical Manager -Materials Engineering (Polymers)

    E-Print Network [OSTI]

    Alpay, S. Pamir

    ) Description The National Security Campus (NSC) is a U.S. Department of Energy (DOE), National Nuclear SecurityDepartment of Energy: National Security Campus Technical Manager - Materials Engineering (Polymers technology maturation at FM&T and works to mitigate those risks. · Conducts activities in a safe and health

  14. Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr. The proposed cloud-based re-encryption model is secure, efficient, and highly scalable in a cloud computing the performance of the model. Keywords-Distributed systems, mobile computing, security. I. INTRODUCTION Cloud

  15. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en NNSA sitesInformation | National

  16. Contact Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National NuclearaCSGFNuclearCongressmen tourInformation

  17. Site Information | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque|Sensitive Species3 Outlook forSimulations YieldRichardInformation

  18. 29.01.03.M1.20 Information Resources Platform Management Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    , phones, and other information technology devices) are relied upon to deliver data in a secure, reliable29.01.03.M1.20 Information Resources ­ Platform Management Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.20 Information Resources ­ Platform Management Approved July 18, 2005 Revised February

  19. Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts

    E-Print Network [OSTI]

    Queitsch, Christine

    Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts Page 1 of 16 Document Name: Information Security and Privacy Laws Version #: vF Created By: Ann Nagel, Associate Chief Information Security Officer Date Created: June 2, 2009 Updated By: Melissa Albin-Wurzer, Education

  20. Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.

    E-Print Network [OSTI]

    Lee, Ruby B.

    Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr. Computer Science in one crisis and adversaries in another, raising difficult security issues with respect to information on the information sharing and security risks when coalitions are formed in response to a crisis. This paper defines

  1. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series FISMA AND TECHNOLOGY 5 FISMA Strategic Vision We are building a solid foundation of information security across one of the largest information technology infrastructures in the world based on comprehensive security standards

  2. Master of Science in Information SecurityFlexible, Applied, Master's Degrees.

    E-Print Network [OSTI]

    Snider, Barry B.

    GPS ONLINE Master of Science in Information SecurityFlexible, Applied, Master's Degrees. Join our professionals in both the private and public sectors. The Master of Science in Information Security provides its risks to the security of proprietary information in an organization. Understand the technical

  3. 1 8th of january 2014 CNRS Information System Security Charter

    E-Print Network [OSTI]

    Jeanjean, Louis

    1 8th of january 2014 CNRS Information System Security Charter This charter, annexed or availability. Any breach of rules governing information systems security is indeed likely to have significant or the scientific and technical potential). The User makes a contribution to information system security. As such

  4. Guideline for Identifying an Information System as a National Security System

    E-Print Network [OSTI]

    Guideline for Identifying an Information System as a National Security System NIST Special Publication 800-59 Guideline for Identifying an Information System as a National Security System William C;Guideline for Identifying an Information System as a National Security System Reports on Computer Systems

  5. Information Technology Security Training Requirements Appendix A --Learning Continuum A-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX A Appendix A -- Learning Continuum A-1 #12;Information Technology Security Training Requirements Appendix A -- Learning Continuum A-2 #12;Information Technology Security Training Requirements APPENDIX A -- LEARNING CONTINUUM T R A I N I N G E D U

  6. Before the Senate Homeland Security and Governmental Affairs...

    Energy Savers [EERE]

    and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland...

  7. Add me to your mailing list for future information about energy management courses.

    E-Print Network [OSTI]

    California at Davis, University of

    management control systems, natural gas purchasing opportunities in the spot market, thermal energy storage, alternative energy supplies, energy security and energy trading. Explore reliability and risk analysis methodsAdd me to your mailing list for future information about energy management courses. Name Job Title

  8. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  9. 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN- CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION

    Broader source: Energy.gov [DOE]

    2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

  10. Information System Security Critical Elements Please note that prior to including this language in the performance plans of employees covered by

    E-Print Network [OSTI]

    Information System Security Critical Elements Please note that prior to including this language fulfilled. Stand-Alone Critical Elements Senior Agency Information Security Officer/Chief Information Security Officer/ Information Technology Security Officer Critical Element and Objective · Senior Agency

  11. 2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID#: ____________________

    E-Print Network [OSTI]

    Mountziaris, T. J.

    2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID YYYY My correct Social Security Number is: ________ - _____ - _________ B. SIGNATURE- For corrections to date of birth. · Signed Social Security card or passport- For corrections to social security

  12. Army Regulation 2555 Information Management: Records

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Regulation 25­55 Information Management: Records Management The Department of the Army Freedom Incorporates the Interim Change No. I01, which expires 30 June 1996 into the baseline regulation dated 10 of Information Act Program *Army Regulation 25­55 Effective 1 December 1997 History. This revision was originally

  13. Information Management Services (IMS) VPN Connection (Windows)

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    Information Management Services (IMS) VPN Connection (Windows) 1. Verify there is an active (Junos Pulse) 12-5-2014 #12;Information Management Services (IMS) 6. Select Run, Allow, or Yes when prompted. 7. A successful connection will load a page with Use Instruction, Log-Out Instructions

  14. Manager, Digital Developer Risk & Information Management Group

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    server · Deep understanding of the Web technology stack (TCP/IP, HTTP, HTML, XHTML, XML, JavaScript, CSS with at least one web programming languages such as Python, PHP, C/C++, C#, Ruby, or Java, especially on web, or other Web 2.0 solutions · Experience in machine learning, information retrieval, large-scale data mining

  15. Waste Management Information System (WMIS) User Guide

    SciTech Connect (OSTI)

    R. E. Broz

    2008-12-22

    This document provides the user of the Waste Management Information System (WMIS) instructions on how to use the WMIS software. WMIS allows users to initiate, track, and close waste packages. The modular design supports integration and utilization of data throuh the various stages of waste management. The phases of the waste management work process include generation, designation, packaging, container management, procurement, storage, treatment, transportation, and disposal.

  16. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  17. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1: it is bad code. This perspective on computer security education informs the design of our new approach, computer security education is often relegated to a secondary role in undergraduate curricula. Exposure

  18. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Ray, Indrakshi

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how}@cs.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  19. A Virtual Environment for Interactive Visualization of Power System Economic and Security Information

    E-Print Network [OSTI]

    visualization of power system economic and security information. Keywords: Power System Economics, SecurityA Virtual Environment for Interactive Visualization of Power System Economic and Security Information Thomas J. Overbye Raymond P. Klump Jamie D. Weber Senior Member Member Student Member University

  20. Published in IET Information Security Received on 10th December 2009

    E-Print Network [OSTI]

    Ansari, Nirwan

    Published in IET Information Security Received on 10th December 2009 Revised on 19th March 2010 doi: 10.1049/iet-ifs.2009.0261 Special Issue on Multi-Agent & Distributed Information Security ISSN 1751-8709 Survey of security services on group communications P. Sakarindr N. Ansari Advanced Networking Laboratory

  1. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  2. Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare

    E-Print Network [OSTI]

    Smith, Sean W.

    Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare Joseph A. Cooleyand USA {jac,sws}@cs.dartmouth.edu Abstract "Jekyll and Hyde" embodies how information security af- fects today's healthcare ecosystem. When security works, it promotes patient health and a smooth operating

  3. Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum, MD 21090

    E-Print Network [OSTI]

    Lee, Ruby B.

    1 Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum security of the Global Information Grid (GIG). The context for "hardening" this infrastructure also describes the Department of Defense (DoD) activities aimed toward defining security requirements

  4. UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY

    E-Print Network [OSTI]

    Suri, Manil

    UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

  5. Coalitional Game Theory for Security Risk Management Walid Saad1, Tansu Alpcan2, Tamer Basar3, and Are Hjrungnes1

    E-Print Network [OSTI]

    Alpcan, Tansu

    Coalitional Game Theory for Security Risk Management Walid Saad1, Tansu Alpcan2, Tamer Bas¸ar3--Quantitative models for security risk management in organizations are recently receiving an increased attention protocol are analyzed. Index Terms--risk management, coalitional game theory, game theory, security. I

  6. Secure Retrieval of FFTF Testing, Design, and Operating Information

    SciTech Connect (OSTI)

    Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

    2009-10-01

    One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.

  7. American Health Information Management Association Code of Ethics

    E-Print Network [OSTI]

    Zhou, Yaoqi

    1 American Health Information Management Association Code of Ethics Preamble The ethical obligations of the health information management (HIM) professional include the protection of patient privacy and confidential information; disclosure of information; development, use, and maintenance of health information

  8. Personalized Information Management for Web Intelligence

    E-Print Network [OSTI]

    Tan, Ah-Hwee

    intelligence collection as primary sources. We how- ever believe that the importance of published information. CI professionals have referred to published information collection as secondary sources and humanPersonalized Information Management for Web Intelligence Ah-Hwee Tan Kent Ridge Digital Labs 21

  9. ITL BULLETIN FOR MAY 2011 USING SECURITY CONFIGURATION CHECKLISTS AND THE NATIONAL

    E-Print Network [OSTI]

    ITL BULLETIN FOR MAY 2011 USING SECURITY CONFIGURATION CHECKLISTS AND THE NATIONAL CHECKLIST PROGRAM Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce The secure management of information

  10. Office of Legacy Management. Information and Records Management. Transition Guidance

    SciTech Connect (OSTI)

    none,

    2004-03-01

    The Office of Legacy Management (LM) is an integral part of the U.S. Department of Energy’s (DOE’s) strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. LM will work with each site using an integrated team approach to ensure a successful transition. Part of this process will include transition of Government records and information. The Office of Legacy Management Information and Records Management Transition Guidance focuses on LM’s goal to preserve and protect legacy records and information. This guidance document establishes a framework for the transfer of records management responsibilities for sites transferring to LM. It describes the requirements, responsibilities, and procedures for the efficient and cost-effective transfer of custody, ownership, and management of records and other information products from the transfer site to LM. Records management practices are critical to the functions of Federal agencies because records provide information about, or evidence of, the organization, functions, policies, decisions, procedures, operations, or other activities. Therefore, the information generated by an agency is created, maintained, and dispositioned through records management processes that ensure the appropriate preservation and retrieval of essential information. Because of their intrinsic value, best practices to preserve information and records should be utilized when records are transferred from one organization to another. As the transfer program completes cleanup activities at closure sites, a transitional process will facilitate the transparent shift in the management of site records activities to LM. The roles and responsibilities of the transfer site and/or program and LM described in this document are a necessary foundation for cooperation and coordination and are essential to the successful transition of records and information responsibilities. The DOE Office of the Chief Information Officer (OCIO) has a central role in DOE records management by providing guidance, expertise, and coordination to all DOE offices and organizations and coordination with the National Archives and Records Administration (NARA). LM and the transfer site will complete an integrated transition plan which will integrate all transition elements including information and records. As part of the overall transition plan, an Information and Records Transition Plan will be developed consistent with the integrated transition plan for the site transfer and included as an attachment. The Information and Records Management Transition Plan will be developed to assist both organizations in organizing the tasks; establishing a timetable and milestones for their completion; and identifying manpower, funding and other resources that will be needed to complete the ownership transfer. In addition, the plan will provide a valuable exchange of institutional knowledge that will assist LM in meeting the obligations of responsibly managing legacy records. Guidance for the development of the plan is included in this document. Records management concerns that may arise during site closure, such as management support, contract language and agreements, interactions with the OCIO and NARA, resource and budget considerations, and procedures to safeguard records are addressed. Guidelines and criteria for records management transition activities are also provided. These include LM expectations for the inventory, scheduling, and disposition of records; the management and transfer of electronic files, including databases and software; records finding aids, indices, and recordkeeping systems; and the process for the transfer of hard copy and electronic records to LM.

  11. Standard information system for construction management 

    E-Print Network [OSTI]

    Sultanbekov, Kanat A

    2000-01-01

    , data communication and integration between different organizations still remains a "gray" area in construction management. There are several means of communication used in the industry: mail, phone, fax and information technology. Yet, only...

  12. INFORMATION RESOURCES MANAGEMENT IN HETEROGENEOUS, DISTRIBUTED ENVIRONMENTS

    E-Print Network [OSTI]

    Hsu, Cheng

    for Manufacturing Productivity and Technology Transfer RENSSELAER POLYTECHNIC INSTITUTE Troy, NY 12180-3590 #12INFORMATION RESOURCES MANAGEMENT IN HETEROGENEOUS, DISTRIBUTED ENVIRONMENTS: A METADATABASE Conference on Computer Integrated Manufacturing, Rensselaer Polytechnic Institute, Troy, NY 12180, May 1990

  13. Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code: CS3190

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    -- Operation and limitations of common information safeguards -- Current leading technologies and standards information from unstructured sources at a level sufficient to keep up to date and communicate with computing of information security. Legal, ethical and human aspects of security. Module Delivery Methods of Delivery

  14. Management Information Systems Mexico City EMBA Program

    E-Print Network [OSTI]

    Ghosh, Joydeep

    Management Information Systems Mexico City EMBA Program Spring 2012 Professor : Professor Anitesh efficiency, and business partner and strategic values. Managers need to be able to articulate the impact) Required Books Analyzing Social Media Networks with NodeXL: Insights from a Connected World by Derek Hansen

  15. Guidance for FY2014 Facilities Information Management System...

    Office of Environmental Management (EM)

    Guidance for FY2014 Facilities Information Management System Data Validations Guidance for FY2014 Facilities Information Management System Data Validations FY 2014 FIMS Data...

  16. Audit of Bonneville Power Administration's Management of Information...

    Office of Environmental Management (EM)

    Bonneville Power Administration's Management of Information Resources, WR-B-96-06 Audit of Bonneville Power Administration's Management of Information Resources, WR-B-96-06...

  17. Information Management Division (HC-14) | Department of Energy

    Energy Savers [EERE]

    Information Management Division (HC-14) Information Management Division (HC-14) Mission Statement This division provides operational support and consultative advice to the Chief...

  18. Policy Name: Information Security Policy Originating/Responsible Departments: Computing and Communication Services (CCS)

    E-Print Network [OSTI]

    Carleton University

    Policy Name: Information Security Policy Originating/Responsible Departments: Computing: Chief Information Officer (CIO) Corporate Archivist and Assistant Privacy Officer Introduction Records in all formats contain information that is vital to ongoing operations - for insuring accountability

  19. A Formal Approach for Network Security Management Based on Qualitative Risk Analysis

    E-Print Network [OSTI]

    Wang, Yongge

    A Formal Approach for Network Security Management Based on Qualitative Risk Analysis Mohammad Emails: {mrahman4,ealshaer}@uncc.edu Abstract--The risk analysis is an important process for en- forcing security risk low. In this paper, we first present a declarative model for the qualitative risk analysis

  20. Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh) to become the root cause of exploitable security vulnerabilities. This paper proposes Watchdog, a hardware full hardware-enforced memory safety at low overheads. 1. Introduction Languages such as C and C

  1. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect (OSTI)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  2. Cyber safety : a systems thinking and systems theory approach to managing cyber security risks

    E-Print Network [OSTI]

    Salim, Hamid M

    2014-01-01

    If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet ...

  3. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Office of Energy Efficiency and Renewable Energy (EERE)

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  4. Promoting safety, security, and sustainability: Institute fosters programs on natural resource science and management 

    E-Print Network [OSTI]

    Wythe, Kathy

    2011-01-01

    =windows-1252 Summer 2011 tx H2O 27 Story by Kathy Wythe Promoting safety, security, and sustainabilit y Institute fosters programs on natural resource science and management Through its research and extension programs focusing on natural...

  5. CargoNet : micropower sensate tags for supply-chain management and security

    E-Print Network [OSTI]

    Malinowski, Mateusz Ksawery

    2007-01-01

    This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state ...

  6. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-15

    The Guide provides a methodology for implementing the safeguards and security requirements of DOE O 413.3B. Supersedes DOE G 413.3-3.

  7. Introduction SCADA Security for Managers and Operators | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publications Intermediate SCADA Security Training Course Slides (September 2006) Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Recommended...

  8. Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information prepared by the Office of Security and Public

    E-Print Network [OSTI]

    Collins, Gary S.

    of Security and Public Safety. Information prepared by the Office of Security and Public Safety at WSU Spokane and Security Department Information 3 Reporting, Access and Programs 3-5 Policies and Procedures 6Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office

  9. A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS

    E-Print Network [OSTI]

    Baras, John S.

    A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS several information security goals, such as authentication, integrity and secrecy, have often been and the Institute for Systems Research, University of Maryland, College Park, MD, 20742 ABSTRACT Most information

  10. 6/17/13 (v1.2) Information Security Exit Process

    E-Print Network [OSTI]

    Kay, Mark A.

    6/17/13 (v1.2) Information Security Exit Process All Stanford related PHI, and other Restricted and Prohibited information (see http://dataclass.stanford.edu for details) must be securely may be held liable in the future. Once the applicable Stanford information has been removed

  11. A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp

    E-Print Network [OSTI]

    George, Edward I.

    Page 1 I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103 and Responsibility Information Systems and Computing is responsible for the operation of Penn's data networks (Penn-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer

  12. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-13

    The purpose of this directive is to ensure that STI is appropriately managed as part of the DOE mission to enable the advancement of scientific knowledge and technological innovation. Supersedes DOE O 241.1A and DOE O 241.1A Chg 1.

  13. Toward a Security Domain Model for Static Analysis and Verification of Information Systems

    E-Print Network [OSTI]

    Toward a Security Domain Model for Static Analysis and Verification of Information Systems Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Tim Levin Computer Science Department Naval Postgraduate School

  14. Making Collusion-Secure Codes (More) Robust against Bit Erasure Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AISTMaking Collusion-Secure Codes (More) Robust against Bit Erasure Koji Nuida Research Center.nuida@aist.go.jp Abstract A collusion-secure code is called robust if it is secure against erasure of a limited number

  15. SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01

    SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of threats note of the data security issues covered in these publications. Ask yourself "Is my business vulnerable network with your peers, talk about cyber security issues. Give and get advice, hints, tips, etc. 4. Make

  16. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon Institute for Cyber Security World-Leading Research with Real Ravi Sandhu, Khalid Zaman Bijon Institute for Cyber Security University of Texas at San Antonio Oct. 15, 2011 International

  17. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

  18. ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION

    E-Print Network [OSTI]

    Lazos, Loukas

    ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast

  19. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    ­ Software 1 Testing (Security Levels 1 to 3) 17CMS2 = Cryptographic Modules ­ Software 2 Testing (Security of this document. 17/CMS1 Cryptographic Modules ­ Software 1 Testing (Security Levels 1 to 3) 17CMS1/01 All testCMS2 Cryptographic Modules ­ Software 2 Testing (Security Levels 4

  20. ITL BULLETIN FOR NOVEMBER 2012 PRACTICES FOR MANAGING SUPPLY CHAIN RISKS TO PROTECT FEDERAL INFORMATION

    E-Print Network [OSTI]

    ICT supply chain risk management (SCRM) considerations can be integrated into the #12;federal logistics, reliability, security, and safety. The specific ICT SCRM practices are directed toward federal by different system developers, suppliers, and integrators. The information and communications technology (ICT

  1. Social Security Administration Information Phone:(706)5422900Fax:(706)5830123Web:international.uga.edu Email:issis@uga.edu

    E-Print Network [OSTI]

    Arnold, Jonathan

    Social Security Administration Information Phone:(706)5422900Fax:(706)5830123Web number. For additional information you may visit the Social Security Administration's (SSA) website Security Administration (SSA) Social Security Administration Federal Building 1650 Prince Avenue, Athens

  2. Waste Management Magazine Highlights Nevada National Security Site

    Broader source: Energy.gov [DOE]

    LAS VEGAS – The Nevada National Security Site’s (NNSS) successful low-level waste disposal program was the subject of a recent spread in RadWaste Solutions magazine.

  3. A Cyber Security Study of a SCADA Energy Management System: Stealthy

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State of state estimators in supervisory control and data acquisition (SCADA) systems for energy management on a state-of-the-art SCADA EMS software for a power network example with 14 substations, 27 buses, and 40

  4. Power Management Mechanism Exploiting Network and Video Information over Wireless

    E-Print Network [OSTI]

    Bouras, Christos

    Power Management Mechanism Exploiting Network and Video Information over Wireless Links Christos- layer information from higher network layers may be utilized for more efficient power management that fine- tune transmission power according to information received from the transport (feedback reports

  5. Power Management Mechanism Exploiting Network and Video Information over Wireless

    E-Print Network [OSTI]

    Bouras, Christos

    Power Management Mechanism Exploiting Network and Video Information over Wireless Links Christos information from higher network layers may be utilized for more efficient power management in wireless- tune transmission power according to information received from the transport (feedback reports from

  6. Security Awareness Programs During orientation in September, students are informed of services offered by the University

    E-Print Network [OSTI]

    Escher, Christine

    Security Awareness Programs During orientation in September, students are informed of services. Video and slide presentations outline ways to maintain personal safety and residence hall security. Students are told about crime on campus and in surrounding neighborhoods. Similar information is presented

  7. University of Connecticut / Jason Pufahl, CISSP, CISM 1 INFORMATION SECURITY STRATEGIC

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 INFORMATION SECURITY STRATEGIC PLAN, CISSP, CISM 2 2 MISSION STATEMENT The mission of the Information Security Office (ISO) is to design ­ IMPLEMENTATION CYCLE #12;University of Connecticut / Jason Pufahl, CISSP, CISM 3 3 GOVERNANCE In recognition

  8. ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY

    E-Print Network [OSTI]

    ARCHITECTURE TO PROVIDE INFORMATION SECURITY AND PRIVACY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce Improved, more effective healthcare is a high priority in the United States today. While the U

  9. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-09

    To establish Department of Energy (DOE) requirements and responsibilities to ensure that scientific and technical information (STI) is identified, processed, disseminated, and preserved in a manner that (a) enables the scientific community and the public to locate and use the unclassified and unlimited STI resulting from DOE's research and related endeavors and (b) ensures access to classified and sensitive unclassified STI is protected according to legal or Departmental requirements. Cancels DOE O 241.1. Canceled by DOE O 241.1A Chg 1.

  10. Ross Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc Jump to:Newberg,EnergyEast JumpInformation Sanjunyan SmallSManagement Jump

  11. LTS Information Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp Graduate student Subtask22Background About Us LTS Home PageIn

  12. NERSC Information Management (NIM) portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving Basic Energy SciencesEnvironment NERSC

  13. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    played an active role in implementation planning for the Comprehensive National Cyber Security InitiativeComputer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act

  14. Wista Management GMBH | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEtGeorgia:Illinois: EnergyIllinois:Winton,InformationWista Management

  15. Product Information Management 2004 IBM Corporation

    E-Print Network [OSTI]

    Brock, David

    Product Information Management © 2004 IBM Corporation Intelligent Networks MIT Smart World 2004 Center © 2004 IBM Corporation2 Networks are both clusters of computers and clusters of people! We now use © 2004 IBM Corporation3 Three looks into Intelligent Networks Global Data Synchronization Electronic

  16. NUMBER: 1626 TITLE: Information Technology Management

    E-Print Network [OSTI]

    cost of more than $100,000 but less than $1 million. E. University Advisory Council on Technology (UACT technology project estimated to cost $1 million or more or deemed to be mission-critical. VI. Designated1626 - 1 NUMBER: 1626 TITLE: Information Technology Management APPROVED: September 9, 2005 I

  17. Management of Bonneville Power Administration's Information Technology...

    Office of Environmental Management (EM)

    had made only limited use of standard security baselines designed to ensure that operating systems were secured. Specifically, even though the U.S. Government...

  18. Sandia National Laboratories: About Sandia: Leadership: Information...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Michael is responsible for the vision and leadership of Sandia's information technology, information management, and cyber security strategy. The balance between information...

  19. Final Report Implementing Office of Management and Budget Information...

    Energy Savers [EERE]

    Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) Final Report Implementing Office of Management and Budget...

  20. Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)

    E-Print Network [OSTI]

    1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS, Acting Chief, Computer Security Division, Information Technology Laboratory (ITL), NIST 9 Data Using Encryption Matthew Scholl, Computer Security Division, Information Technology Laboratory

  1. 29.01.03.M1.28 Information Resources Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.28 Information Resources ­ Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.28 Information Resources ­ Security Surveillance Approved April 13, 2010 Revised by the University Police Department #12;29.01.03.M1.28 Information Resources ­ Security Surveillance Page 2 of 4

  2. 29.01.03. M1.18 Information Resources Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.18 Information Resources ­ Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.18 Information Resources ­ Security Monitoring Approved July 18, 2005 Revised April 27, etc. Reason for SAP The purpose of the security monitoring policy is to ensure that information

  3. SMB Information Security Seminar (2013) Exercise 2 Estimated costs from bad things happening to your

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01

    SMB Information Security Seminar (2013) Exercise 2 ­ Estimated costs from bad things happening to your important information. First, think about the information used in/by your organization. Second, enter into the table below your top two highest priority information types. Third, enter estimated costs

  4. Fact Sheet Preliminary Notice of Violation: Classified Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Security, LLC (LANS) for violations of Department of Energy (DOE) classified information security program requirements. LANS is the management and operating contractor...

  5. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  6. Energy Management and Information Systems Study - 2014 BTO Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Information Systems Study - 2014 BTO Peer Review Energy Management and Information Systems Study - 2014 BTO Peer Review Presenter: Jessica Granderson, Lawrence Berkeley...

  7. GDMN : An Information Management Network for Distributed Systems

    E-Print Network [OSTI]

    Sengupta, Raja

    GDMN : An Information Management Network for Distributed Systems Amit Mahajan {amahajan from the system. 1 Introduction There are many systems that produce and con- sume information at many sites distributed over large geographical areas. Battlefield networks, traffic management systems

  8. Information needs for risk management/communication

    SciTech Connect (OSTI)

    Bennett, D.A.

    1990-12-31

    The hazardous waste cleanup program under the Comprehensive Environmental Response, Compensation, and Liability Act (Superfund) is delegated to the ten Regions of the US Environmental Protection Agency (EPA) and has, to date, identified more than 33,000 sites for consideration. The size and complexity of the program places great demands on those who would provide information to achieve national consistency in application of risk assessment while meeting site-specific needs for risk management and risk communication.

  9. Information Collection Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancial OpportunitiesDepartmentInformation Collection Management

  10. MSIS 3123: Information Assurance Management Spring Semester 2015

    E-Print Network [OSTI]

    ) is the cornerstone of business security and has become recognized as a critical element of national security of various forms and degrees of hacking Identify the ethical responsibilities of Information Assurance and consumer attitudes surrounding issues of intellectual property rights Business Knowledge and Competency

  11. Panel on protection and management of plutonium: Subpanel on safeguards and security

    SciTech Connect (OSTI)

    Tape, J.W.

    1995-07-01

    Nuclear materials safeguards and security systems are described in the context of the nuclear nonproliferation regime. Materials of interest to safeguards, threats, proposals to strengthen International Atomic Energy Agency safeguards, evolving safeguards issues and requirements, system effectiveness, and elements of a global nuclear materials management regime are discussed. Safeguards are seen as an essential element of nuclear materials management, but not a driver for decisions regarding nuclear power or the disposal of excess weapon nuclear materials.

  12. Rutgers Applied Probability Conference Department of Management Science & Information Systems

    E-Print Network [OSTI]

    2nd Rutgers Applied Probability Conference Department of Management Science & Information Systems and the Management Sciences, New Jersey Chapter Stochastic Methods in Information Technology December 6 in memory of Research and the Management Sciences, New Jersey Chapter Stochastic Methods in Information Technology Ben

  13. Objective Risk Evaluation for Automated Security Management Mohammad Salim Ahmed1

    E-Print Network [OSTI]

    Wang, Yongge

    Objective Risk Evaluation for Automated Security Management Mohammad Salim Ahmed1 , Ehab Al-Shaer2. Since, we can model a system in such a way, risk evaluation of individual services can help. Network risk and service risk. As the name implies, the former one corresponds to risk associated

  14. Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems Sk. Md, University of Tsukuba, Tsukuba, 305-8573 Japan okamoto@risk.tsukuba.ac.jp ABSTRACT A peer-to-peer database augments a conventional database man- agement system with an inter-operability layer (i.e. map- pings

  15. Routing, Storage Management and Caching, and Security of Peer-to-Peer Storage Systems

    E-Print Network [OSTI]

    Zhu, Yingwu "Jason"

    Routing, Storage Management and Caching, and Security of Peer-to-Peer Storage Systems Yingwu Zhu such as Napster, Gnutella and Freenet, has inspired a whole new breed of P2P storage systems, which aims-tolerant, and highly-available storage without centralized servers. Many P2P storage systems have been proposed

  16. Dams Securing Water for Our Future 1 ICOLD Bulletin on Dam Safety Management

    E-Print Network [OSTI]

    Bowles, David S.

    Dams ­ Securing Water for Our Future 1 ICOLD Bulletin on Dam Safety Management David S. Bowles 1 , Michel Poupart 6 , David Stewart 5 , Przemyslaw A. Zielinski 7 1 Institute for Dam Safety Risk The ICOLD Committee on Dam Safety (CODS) "was established as a coordinating body to assure

  17. Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing_

    E-Print Network [OSTI]

    Chervenak, Ann

    Secure, Efficient Data Transport and Replica Management for High-Performance Data environment, we present the design and initial performance measurements of our GridFTP protocol for efficient- energy physics and climate modeling, we conclude that these applications require two fundamental data

  18. An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions

    E-Print Network [OSTI]

    Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

    2006-01-01

    This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions...

  19. Restricting information flow in security APIs via typing 

    E-Print Network [OSTI]

    Keighren, Gavin

    2014-06-27

    Security APIs are designed to enable the storage and processing of confidential data without that data becoming known to individuals who are not permitted to obtain it, and are central to the operation of Automated Teller ...

  20. 29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources ­ Portable Devices: Information Security Approved on the responsibilities of information resource owners to adequately protect data residing on portable devices

  1. On The Security of Mobile Cockpit Information Systems Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast,

    E-Print Network [OSTI]

    Snoeren, Alex

    expanded to include live data such as weather and traffic information that is used to make flight decisions, information kiosks, home automation controls, and so on--our expectations of security and reliability information services supported by the receiver, the display may also include a graphical weather overlay (FIS

  2. Gerry McCartney Vice President for Information

    E-Print Network [OSTI]

    Hedrick, Chief Information Security Officer, Interim IT Security and Policy Identity & Access Management Information Security Policy & Compliance Information Security Services Brent Drake Chief Data Officer, OfficeGerry McCartney Vice President for Information Technology and System Chief Information Officer

  3. HR System Access Request Form Security Administration, Human Resources (HR) For additional instructions and information, log onto http://hr.vanderbilt.edu/security/

    E-Print Network [OSTI]

    Simaan, Nabil

    instructions and information, log onto http://hr.vanderbilt.edu/security/ Home Department VUnet IDHR EmployeeHR System Access Request Form Security Administration, Human Resources (HR) For additional ID Name Email AddressWork Phone Home Dept Name Effective Date of Access Operator Information I

  4. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W. Hamlen and Murat Kantarcioglu

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W to the cloud kernel software, OS/hypervisor, VM, or cloud file system, SilverLine automatically in-lines secure information flow security for Hadoop clouds with easy maintainability (through modularity) and low overhead

  5. National Information Assurance Education and Training Program (NIETP) National Security Agency ~ 9800 Savage Road ~ Ft. Meade, MD 20755-6744 ~ ATTN: I083, Suite 6744

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    National Information Assurance Education and Training Program (NIETP) National Security Agency University courseware meets all of the elements of the Committee on National Security Systems (CNSS) National Training Standards for: Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011 System

  6. Tools for Visual Information Management in Geographical and Biomedical Applications

    E-Print Network [OSTI]

    management, and geographic information systems (GIS). They are also examples of the type of small and nimbleTools for Visual Information Management in Geographical and Biomedical Applications IRIS Phase III, and medical information systems. The proposed research in image database query, geometric information

  7. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  8. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V.

    2014-05-30

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  9. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART A: SYSTEMS AND HUMANS, VOL. 36, NO. 3, MAY 2006 429 Secure Knowledge Management

    E-Print Network [OSTI]

    Sandhu, Ravi

    will be explored. Index Terms--Data mining, privacy, role-based access control (RBAC), secure knowledge management, multimedia, collaboration, and the web. Therefore, security in web data management, multi- media systems is main- taining security. Knowledge management includes many tech- nologies such as data mining

  10. UPC Solar Managment LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin, New York: EnergyU.S. EPA Regionfor Africa | OpenSolar Managment

  11. Calpine Power Management LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmentalBowerbank, Maine:Kansas:Information(Redirected from Calpine Power Management)

  12. Electronic DOE Information Security System (eDISS) PIA, Office...

    Broader source: Energy.gov (indexed) [DOE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Injury & Illness System...

  13. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  14. An Efficient Approach to Support Querying Secure Outsourced XML Information

    E-Print Network [OSTI]

    Ng, Wilfred Siu Hung

    and Technology {yini, wilfred, lauhl, csjames}@cs.ust.hk Abstract. Data security is well-recognized a vital issue encrypted XML. XQEnc is based on two important techniques of vectorization and skele- ton compression. Essentially, vectorization, which is a generalization of columns of a relational table, makes use the basic

  15. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: November 2007

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    Effective: November 2007 Section 5.8 Information Security Revised: January 2012 Policy 5.8.29 Web Application Security Responsibility: Chief Information Security Officer Page 1 of 3 WEB APPLICATION SECURITY Overview The Health Science Center's Internet web applications reflect the University's reputation

  16. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  17. HQ Emergency Management Team (EMT) | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunitiesNERSCGrid-based29 1.921HEPChargingHPX on Babbage

  18. Homeland Security and Emergency Management Coordination (HSEMC) Program |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday FoodPages default

  19. Law Enforcement & Emergency Management Liaison | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse Bergkamp GraduateResidential Energy Consumption Survey FormE.Lauren

  20. ORAU: National Security and Emergency Management Fact Sheet

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE The 2014 surveyNuclear andTwo-Phase75 hoursandOak

  1. ORISE National Security and Emergency Management: Contact Us

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE The 2014 surveyNuclear

  2. ORISE: Capabilities in National Security and Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE The 2014 surveyNuclearHowAssetonCapabilities

  3. Securing Tags to Control Information Flows within the Internet of Things

    E-Print Network [OSTI]

    Cambridge, University of

    Securing Tags to Control Information Flows within the Internet of Things Jatinder Singh, Thomas F.lastname@cl.cam.ac.uk Abstract--To realise the full potential of the Internet of Things (IoT), IoT architectures are moving. INTRODUCTION Information sharing underpins the broad vision of the "Internet of Things" (IoT). Io

  4. Information flow in the DAMA Project beyond database managers: Information flow managers

    SciTech Connect (OSTI)

    Russell, L.; Wolfson, O.; Yu, C.

    1996-03-01

    To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

  5. Using mobile phone contextual information to facilitate managing image collections

    E-Print Network [OSTI]

    -awareness, metadata, image collections, mobile phones, embedded sensors INTRODUCTION Personal information management@gmail.com ABSTRACT In this paper, we describe a prototype application that utilizes the embedded sensors in advanced information management. We hypothesize that information inferred from embedded mobile phone sensors can offer

  6. Waste Information Management System-2012 - 12114

    SciTech Connect (OSTI)

    Upadhyay, H.; Quintero, W.; Shoffner, P.; Lagos, L.; Roelant, D. [Applied Research Center, Florida International University, 10555 West Flagler Street, Suite 2100, Miami, FL 33174 (United States)

    2012-07-01

    The Waste Information Management System (WIMS) -2012 was updated to support the Department of Energy (DOE) accelerated cleanup program. The schedule compression required close coordination and a comprehensive review and prioritization of the barriers that impeded treatment and disposition of the waste streams at each site. Many issues related to waste treatment and disposal were potential critical path issues under the accelerated schedule. In order to facilitate accelerated cleanup initiatives, waste managers at DOE field sites and at DOE Headquarters in Washington, D.C., needed timely waste forecast and transportation information regarding the volumes and types of radioactive waste that would be generated by DOE sites over the next 40 years. Each local DOE site historically collected, organized, and displayed waste forecast information in separate and unique systems. In order for interested parties to understand and view the complete DOE complex-wide picture, the radioactive waste and shipment information of each DOE site needed to be entered into a common application. The WIMS application was therefore created to serve as a common application to improve stakeholder comprehension and improve DOE radioactive waste treatment and disposal planning and scheduling. WIMS allows identification of total forecasted waste volumes, material classes, disposition sites, choke points, technological or regulatory barriers to treatment and disposal, along with forecasted waste transportation information by rail, truck and inter-modal shipments. The Applied Research Center (ARC) at Florida International University (FIU) in Miami, Florida, developed and deployed the web-based forecast and transportation system and is responsible for updating the radioactive waste forecast and transportation data on a regular basis to ensure the long-term viability and value of this system. WIMS continues to successfully accomplish the goals and objectives set forth by DOE for this project. It has replaced the historic process of each DOE site gathering, organizing, and reporting their waste forecast information utilizing different databases and display technologies. In addition, WIMS meets DOE's objective to have the complex-wide waste forecast and transportation information available to all stakeholders and the public in one easy-to-navigate system. The enhancements to WIMS made since its initial deployment include the addition of new DOE sites and facilities, an updated waste and transportation information, and the ability to easily display and print customized waste forecast, the disposition maps, GIS maps and transportation information. The system also allows users to customize and generate reports over the web. These reports can be exported to various formats, such as Adobe{sup R} PDF, Microsoft Excel{sup R}, and Microsoft Word{sup R} and downloaded to the user's computer. Future enhancements will include database/application migration to the next level. A new data import interface will be developed to integrate 2012-13 forecast waste streams. In addition, the application is updated on a continuous basis based on DOE feedback. (authors)

  7. Information management and Process Improvement Using Data Mining Techniques

    E-Print Network [OSTI]

    University of Technology, Finland, Abstract This paper describes a computer component manufacturing scenario management and process improvement within the manufacturing environment concerned. In brief, the current information management and process improvement situation within the manufacturing consortium is examined

  8. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    SciTech Connect (OSTI)

    Not Listed

    2011-09-01

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  9. FORECAST: CLOUDY Prepare for the future of electronic records management in the cloud by earning a Master's

    E-Print Network [OSTI]

    Su, Xiao

    Asset Manager, Risk Management Consultant, Technical Information Specialist, or Knowledge Manager ­ just Management Records Management BigData Data Curation Cyber Corporate Archives Security Preservation in their MLIS electives, including courses in Archives and Manuscripts, Preservation Management, Digitization

  10. 29.01.03.M1.28 Information Resources Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    by the Associate Vice President for Information Technology & Chief Information Officer to review AVST installations for Information Technology & Chief Information Officer, Networking and Information Security, University P ol i ce is to provide recommendations to the Associate Vice President for Information Technology & Chief Information

  11. 29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE

    E-Print Network [OSTI]

    29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE 29.01.03.M1 Security of Electronic Information Resources Approved May 27, 2002 Revised May 28, 2009 Revised October 15&M) electronic information resources are vital academic and administrative assets which require appropriate

  12. 3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University

    E-Print Network [OSTI]

    Keil, David M.

    3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University CSCI 135 Information Technology and Society 3. Security and privacy 1. Crime, law protections David Keil Information Technology and Society 5/13 1 Readings: Baase, Chapters 2 and 5 David Keil

  13. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  14. Information Technology and Middle Management Downsizing: A Tale of Two Cities

    E-Print Network [OSTI]

    Pinsonneault, Alain; Kraemer, Kenneth L.

    1997-01-01

    of Information Technology,” Management Science, in press,K.L. Kraemer, “Technology and Urban Management: The PowerInformation Technology and Middle Management Downsizing: A

  15. Caisson: A Hardware Description Language for Secure Information Flow

    E-Print Network [OSTI]

    Sherwood, Tim

    : Unclassified Secret Top Secret. An important information flow policy based on such lattices is non to higher elements in the lattice (e.g., Secret information can flow to Top Secret, but not vice on information flow. Policies may target confidentiality, so that secret Permission to make digital or hard

  16. A Reference Platform for Systematic Information Security Management Tool Support

    E-Print Network [OSTI]

    Schneider, Jean-Guy

    work is to address the above challenges and to support organisations to obtain ISO 27001 certification), Melbourne, Victoria 3004, Australia steve.versteeg@ca.com Abstract. The ISO 27001 standard specifies. However, ISO 27001 does not provide guidance on these issues because tool support is beyond its scope

  17. EEO Complaints Information for Managers | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a CConversion|

  18. Implementing Information Security and Its Technology: A LineManagement

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing(Journal Article)lasers(Journal Article) |SciTechphysicalNH3 OverHydrocode

  19. Implementing Information Security and Its Technology: A LineManagement

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfate Reducing(Journal Article)lasers(Journal Article) |SciTechphysicalNH3 OverHydrocodePerspective

  20. V-192: Symantec Security Information Manager Input Validation Flaws Permit

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilitiesApple

  1. Information System Security Manager (ISSM) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation StandardsEnergyDepartmentOwner (ISO)

  2. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in theLegislativeIComplaints - Golden Field Office PIA

  3. University Policy No.: IM7400 Classification: Information Management

    E-Print Network [OSTI]

    Victoria, University of

    University Policy No.: IM7400 Classification: Information Management POLICY ON THE DISTRIBUTIONPherson Library · Petch · Sedgewick · Student Union · Theatre · University Centre · Visual Arts 1.2 Off

  4. Office of Information and Business Management | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    comprised of meaningful portfolio management support, enterprise compliance, and an agile information technology suite of tools. This includes the following: Conducting assessments...

  5. LM Records and Information Management Transition Guidance (January...

    Broader source: Energy.gov (indexed) [DOE]

    document establishes a framework for developing a Records and Information Management Transition Plan as part of the overall transition effort for a legacy site. LM Records and...

  6. Best Management Practice #2: Information and Education Programs...

    Energy Savers [EERE]

    Best Management Practice 2: Information and Education Programs Educating users about water conservation is essential to sustain the savings of water-efficient technologies and...

  7. GEOGRAPHIC INFORMATION SYSTEMS CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS

    E-Print Network [OSTI]

    GEOGRAPHIC INFORMATION SYSTEMS CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS CEMML | 1490@cemml.colostate.edu | http://www.cemml.colostate.edu A Geographic Information System (GIS) is a necessary tool for effective

  8. 2015 Information Management Conference Deadline May 22, 2015

    Broader source: Energy.gov [DOE]

    The 34th Information Management Conference (IMC) sponsored by the Office of the Chief Information Officer (OCIO) will be held at the Gaylord Opryland Convention Center in Nashville, TN, June 15-18....

  9. Bachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis, 2012-2013

    E-Print Network [OSTI]

    Barrash, Warren

    HLTHST 420 Strategic Planning and Project Management HLTHST 427 Health Information Management ClinicalBachelor of Science, Health Science Studies, Health Informatics and Information Management Emphasis Health Informatics and Information Management Emphasis ACCT 205 Introduction to Financial Accounting ACCT

  10. Secure Program Execution Via Dynamic Information Flow Tracking

    E-Print Network [OSTI]

    Suh, G. Edward

    2003-07-21

    We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...

  11. INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment

    SciTech Connect (OSTI)

    None

    2009-05-01

    The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

  12. Secure communication of static information by electronic means

    DOE Patents [OSTI]

    Gritton, Dale G. (Pleasanton, CA)

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  13. On Managing Temporal Information for Handling Durative Actions in LPG

    E-Print Network [OSTI]

    Gerevini, Alfonso E.

    On Managing Temporal Information for Handling Durative Actions in LPG Alfonso Gerevini, Alessandro Branze 38, 25123 Brescia, Italy fgerevini,saetti,serinag@ing.unibs.it Abstract. LPG is a recent planner good performance. This paper focuses on how LPG represents and manages temporal information to handle

  14. Page 1 of 8 Information Technologies Change Management Standard

    E-Print Network [OSTI]

    Habib, Ayman

    Page 1 of 8 hi Information Technologies Change Management Standard Definitions 1 Change and supports change management processes by providing assistance in assessing and prioritizing change requests (CI): Any technical component (e.g. hardware, software) that needs to be managed in order to deliver

  15. Carnegie Mellon University 70-451 Management Information Systems: Spring 2012Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon Univ

    E-Print Network [OSTI]

    Gatterbauer, Wolfgang

    Carnegie Mellon University 70-451 Management Information Systems: Spring 2012Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring

  16. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  17. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  18. CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations

    E-Print Network [OSTI]

    Locasto, Michael E.

    permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

  19. 11World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    11World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing client © Ravi Sandhu World-Leading Research with Real-World Impact! Goal: Share but protect Policy-Centric Collaboration © Ravi Sandhu World-Leading Research with Real-World Impact! Collaboration Group Individual

  20. Guide to the Management of Scientific and Technical Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-11-23

    This Guide to the management of scientific and technical information (STI) provides nonmandatory guidelines for implementing the objective, requirements, and responsibilities of Department of Energy (DOE) O 241.1A, Scientific and Technical Information Management. Cancels DOE G 241.1-1. Canceled by DOE N 251.83. Best practices, instructions, and additional information are now accessible at www.osti.gov/stip.

  1. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES ScienceInformation Company NamenewEmail ListsLaboratoryEmergency

  2. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect (OSTI)

    Hudson, David B

    2014-02-13

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  3. Finance, IT Operations& InformationSecurity Dear Colleagues,

    E-Print Network [OSTI]

    Chen, Yiling

    section of this newsletter. In this issue, we also want to inform the community about the various audits through which SEAS goes on a regular basis and what to expect if your lab is selected for an audit important guidelines on the distinction between gifts and grants, receiving awards from the European Union

  4. Transcript: NUIT Information Security News Podcast, May 24, 2012

    E-Print Network [OSTI]

    Ottino, Julio M.

    . Anyway what we're talking about with Facebook is a story that I read that came out actually just before by Northwestern University Information Technology. We'll start today's news with the Facebook. And Facebook has people thought, and now there's already a lawsuit--welcome to the to the world Facebook, boy what a bad

  5. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  6. Generating and Managing Metadata for Web-Based Information Systems

    E-Print Network [OSTI]

    van Harmelen, Frank

    Generating and Managing Metadata for Web-Based Information Systems Heiner Stuckenschmidt and Frank, aggregate and visualize the metadata of an existing information system. We conclude that the possibility by potential users. In this paper we describe a system for the validation of semi-structured information

  7. International Journal of Network Security, Vol.16, No.4, PP.289303, July 2014 289 Penny: Secure, Decentralized Data Management

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    International Journal of Network Security, Vol.16, No.4, PP.289­303, July 2014 289 Penny: Secure in these networks. This paper presents Penny, a structured P2P network that efficiently supports integrity that Penny can efficiently handle realistic P2P network traffic and robust enough to prevent malicious

  8. Zicom Electronic Security Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavyAgencyTendo NewYanbu, Saudi Arabia:InformationZicom

  9. Credit Leona Securities Asia CLSA UK | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePower VenturesInformation EU-UNDP ClimatePublic Schools WindLeona

  10. Freedom of Information Act - Costs | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvanServicesAmesFour Los AlamosFranklinFred

  11. Freedom of Information Act Related Sites | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvanServicesAmesFour Los

  12. NNSA Awards Information Technology Contract | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving Basic NERSCKey StaffNEWTAdministration

  13. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    Chappell, James M

    2012-01-01

    The idealized Kish-Sethuraman (KS) cipher is known to offer perfect information theoretical security with classical physical means. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a three and four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a classical physical realization having benefits in increased security with reduced complexity.

  14. The double-padlock problem: is secure classical information transmission possible without key exchange?

    E-Print Network [OSTI]

    James M. Chappell; Derek Abbott

    2012-12-31

    The idealized Kish-Sethuraman (KS) cipher is theoretically known to offer perfect security through a classical information channel. However, realization of the protocol is hitherto an open problem, as the required mathematical operators have not been identified in the previous literature. A mechanical analogy of this protocol can be seen as sending a message in a box using two padlocks; one locked by the Sender and the other locked by the Receiver, so that theoretically the message remains secure at all times. We seek a mathematical representation of this process, considering that it would be very unusual if there was a physical process with no mathematical description and indeed we find a solution within a four dimensional Clifford algebra. The significance of finding a mathematical description that describes the protocol, is that it is a possible step toward a physical realization having benefits in increased security with reduced complexity.

  15. This report is a part of the College's efforts to provide you with information on security procedures, services, and resources available on

    E-Print Network [OSTI]

    's efforts to provide you with information on security procedures, services, and resources available on our ............................................................................................................................... 6 CLERY GEOGRAPHY

  16. Responsible University Officer Chief Information Officer

    E-Print Network [OSTI]

    Whitton, Mary C.

    Responsible University Officer Chief Information Officer Responsible Office Information Technology at Chapel Hill that manages its own or subcontracts its information technology must: Establish and maintain Management Plan, contact the Information Security Office (ISO) at 919-445-9393 or security@unc.edu. Designate

  17. REGIONAL MANAGEMENT INFORMATION SYSTEM. REPORT ON SECOND YEAR ACTIVITIES 1975-76

    E-Print Network [OSTI]

    Postle, W.

    2010-01-01

    data base on commercially available data management systemsData Bases of the Employment & Training Administration Regional Management Information System

  18. Audit Report on "The Office of Science's Management of Information Technology Resources"

    SciTech Connect (OSTI)

    None

    2009-11-01

    The Department of Energy's Office of Science (Science) and its facility contractors are aggressive users of information technology (IT) to support fundamental research in areas such as energy, environmental remediation and computational sciences. Of its $4 billion Fiscal Year 2008 budget, Science spent about $287 million to manage its IT program. This included cyber security activities, acquisition of hardware and software, and support service costs used to maintain the operating environments necessary to support the missions of the program. Prior Office of Inspector General reports have identified various issues with Science's management of its IT programs and resources. For instance, our report on Facility Contractor Acquisition and Management of Information Technology Hardware (DOE/IG-0768, June 2007) noted that the Science sites reviewed spent more than necessary when acquiring IT hardware. In another example, our review of The Department's Efforts to Implement Common Information Technology Services at Headquarters (DOE/IG-0763, March 2007) disclosed that Science's reluctance to adopt the Department of Energy Common Operating Environment (DOE-COE) at Headquarters contributed to the Department's inability to fully realize potential cost savings through consolidation and economies of scale. In light of the magnitude of the Office of Science IT program and previously identified program weaknesses, we initiated this audit to determine whether Science adequately managed its IT resources. Science had taken a number of actions to improve its cyber security posture and align its program to Federal requirements. Yet, our review disclosed that it had not taken some basic steps to enhance security and reduce costs. In particular, we found that: (1) For their non-scientific computing environments, all seven of the field sites reviewed (two Federal, five contractor) had implemented security configurations that were less stringent than those included in the Federal Desktop Core Configuration. This configuration was designed by the National Institute of Standards and Technology and its use was mandated by the Office of Management and Budget; (2) Although we previously highlighted weaknesses and recommended corrective actions, Science still had not fully established or enforced IT hardware standards for acquiring hardware such as desktop and laptop computers or related peripherals, contributing to significant unnecessary expenditures; and (3) While we have noted in a series of past reports that significant savings could be realized from aggregating demand for IT services and products across the enterprise, Science had not implemented a common infrastructure for users at its Federal sites and continued to maintain an IT environment independent of the Department's Common IT Operating Environment. The weaknesses identified were attributable, at least in part, to a lack of adequate policies and procedures for ensuring effective cyber security and hardware acquisition practices. In addition, Science had not effectively monitored the performance of its field sites to ensure that previously reported internal control weaknesses were addressed and had not implemented an appropriate mechanism to track its IT-related costs. Without improvements, Science may be unable to realize the benefits of improved security over its information systems, reduce costs associated with hardware acquisition, and lower IT support costs through consolidation of services. In particular, we determined that Science could potentially realize savings of more than $3.3 million over the next three years by better controlling hardware costs and implementing standards for certain equipment. Furthermore, Science could continue to pay for duplicative IT support services and fail to take advantage of opportunities to lower costs and apply potential savings to mission-related work. During the course of our audit work, we learned from Science officials that they had initiated the process of revising the Program Cyber Security Plan to better clarify its policy for implementing

  19. 29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE

    E-Print Network [OSTI]

    Technology & Chief Information Officer. 2. RESPONSIBILITIES 2.1 The Associate Vice President for Information Technology & Chief Information Officer, or designee, is responsible for administering the provisions29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE 29.01.03.M1

  20. 29.01.03. M1.19 Information Resources Security Awareness Training Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    and require acknowledgement as determined by the department. 2.3 Departmental information technology personnel For interpretation or clarification, contact Information Technology Risk Management. OFFICE OF RESPONSIBILITY: Associate Vice President for Information Technology & Chief Information Officer #12;

  1. Energy Department Seeks Information on Geothermal Risk and Uncertainty Management

    Broader source: Energy.gov [DOE]

    The Energy Department's Office of Energy Efficiency and Renewable Energy (EERE) has issued a Request for Information (RFI) to help quantify and manage risk in geothermal exploration, in an effort...

  2. The Bureau of Land Management's Well Information System (WIS...

    Open Energy Info (EERE)

    Bureau of Land Management's Well Information System (WIS) How-To Guide Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Guide...

  3. Managing Information Flow between SysML and Modelica

    E-Print Network [OSTI]

    Managing Information Flow between SysML and Modelica A Model-Based Design Project for ME6101ML and Modelica languages. Once I apply the method, I discuss the utility, limitations, and necessary future work

  4. UNIVERSITE LYON 3 JEAN MOULIN ED MANAGEMENT INFORMATION FINANCE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    UNIVERSITE LYON 3 ­ JEAN MOULIN ED MANAGEMENT INFORMATION FINANCE THESE pour l'obtention du, de l'ENSSIB, et du centre Hospitalier Saint-Jean de Dieu pour leur patience et leur sympathie. Je

  5. The Certification Information System: Managing Chain-of-Custody

    E-Print Network [OSTI]

    Inbound Materials Logistics Operations End-to-End Coordination CIS Based Logistics Management #12;CISThe Certification Information System: Managing Chain-of-Custody Lucie K. Ozanne, Ph.D. Senior quality (quality assurance and production) and the logistical precision required to meet the needs

  6. NASA's Information Power Grid William E. Johnston, Project Manager

    E-Print Network [OSTI]

    NASA's Information Power Grid William E. Johnston, Project Manager Arsi Vaziri, Deputy Project that Grids and Web Services combined represent as powerful a new tool for accessing and managing distributed and Data Grids? · Grids are technology and an emerging architecture that involve several types

  7. Collaborative Human Computation as a Means of Information Management

    E-Print Network [OSTI]

    Cortes, Corinna

    Collaborative Human Computation as a Means of Information Management Manas Tungare1,2 , Ben amortizing the cost of tag- ging and email management across all stakeholders. We dis- cuss how such shared with minimal global cognitive load by the sender of the message. We provide scenarios of collaborative infor

  8. Texas A&M AgriLife Research Procedures 29.01.03.A0.01 Information Resource Procedures

    E-Print Network [OSTI]

    information resources security and management guidelines for all Texas A&M AgriLife Research (Agri of these procedures. The Director (or a designee, usually the Information Security Officer), Information Technology shall coordinate exceptions of security controls with the Information Security Officer. D. Determine

  9. INFORMATION IIT SCHOOL OF

    E-Print Network [OSTI]

    Heller, Barbara

    INFORMATION TECHNOLOGY AND MANAGEMENT IIT SCHOOL OF APPLIED TECHNOLOGY CYBER SECURITY an undergraduate degree in Information Technology and Management (ITM) from Illinois Tech's School of Applied. · You'll learn relevant skills so you can integrate information technology and management into your

  10. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Allan, Benjamin A. (Sandia National Laboratories, Livermore, CA) [Sandia National Laboratories, Livermore, CA; Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  11. Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem

    E-Print Network [OSTI]

    Pal, Ranjan

    2012-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as \\emph{self-defense} mechanisms. However, according to security experts, such software (and their subsequent advancements) will not completely eliminate risk. Recent research efforts have considered the problem of residual risk elimination by proposing the idea of \\emph{cyber-insurance}. In this regard, an important research problem is resolving information asymmetry issues associated with cyber-insurance contracts. In this paper we propose \\emph{three} mechanisms to resolve information asymmetry in cyber-insurance. Our mechanisms are based on the \\emph{Principal-Agent} (PA) model in microeconomic theory. We show that (1) optimal cyber-insurance contracts induced by our mechanisms only provide partial...

  12. An Architecture for Concurrent Execution of Secure Environments in Clouds

    E-Print Network [OSTI]

    Capkun, Srdjan

    An Architecture for Concurrent Execution of Secure Environments in Clouds Ramya Jayaram Masti, Claudio Marforio, Srdjan Capkun Institute of Information Security ETH Zurich, Switzerland {rmasti,maclaudi,capkuns}@inf.ethz.ch ABSTRACT We propose an architecture that enables the creation and management of multiple, concurrent secure

  13. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  14. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  15. Technologies for Communities: Managing Information from the Grassroots

    E-Print Network [OSTI]

    Parikh, Tapan S.

    Technologies for Communities: Managing Information from the Grassroots Tapan S. Parikh Dept live in developing countries (many in rural areas)4.8B people live in developing countries (many in rural areas) Rural developing world people have many information needsRural developing world people have

  16. Correct mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme on ping-pong protocol

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-16

    The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected.

  17. Information Technology for Energy and Maintenance Management 

    E-Print Network [OSTI]

    Villafana, L.; Federspiel, C.

    2003-01-01

    and application specific information about the building maintenance process. They could be designed with similar terms in the same query, producing a simplified thesaurus. A key advantage of using codified actions instead of trying to predict action similarity...

  18. Private Information Advisory Protecting the personal private information of our students, faculty and staff is of

    E-Print Network [OSTI]

    Qiu, Weigang

    . Similar risks can be illustrated if information is stolen or hacked from presumably secure computers. The CUNY Information Security Management Office has published direct links of major Internet search engines on how to prevent the search engines from collecting your information. Please refer to security

  19. Security of quantum bit string commitment depends on the information measure

    E-Print Network [OSTI]

    Harry Buhrman; Matthias Christandl; Patrick Hayden; Hoi-Kwong Lo; Stephanie Wehner

    2006-11-09

    Unconditionally secure non-relativistic bit commitment is known to be impossible in both the classical and the quantum world. However, when committing to a string of n bits at once, how far can we stretch the quantum limits? In this letter, we introduce a framework of quantum schemes where Alice commits a string of n bits to Bob, in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are two-fold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a+b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we construct schemes where a=4 log n+O(1) and b=4, which is impossible classically. Our findings significantly extend known no-go results for quantum bit commitment.

  20. The use of information technology security assessment criteria to protect specialized computer systems

    SciTech Connect (OSTI)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.