Powered by Deep Web Technologies
Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Information Technology Management ((Information Security))  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as an Information Technology Specialist (Information Security) with responsibility for the implementation of a wide range of technically complex...

2

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy Savers (EERE)

SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

3

Information System Security Manager (ISSM) | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

ISSM Core Competency Training Worksheet More Documents & Publications Information System Security Officer (ISSO) Cybersecurity Program Manager (CSPM) Authorizing Official (AO)...

4

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

5

An ontology-based approach to information systems security management  

Science Journals Connector (OSTI)

Complexity of modern information systems (IS), impose novel security requirements. On the other hand, the ontology paradigm aims to support knowledge sharing and reuse in an explicit and mutually agreed manner. Therefore, in this paper we set the foundations ... Keywords: IS security, security management, security ontology, security policy

Bill Tsoumas; Stelios Dritsas; Dimitris Gritzalis

2005-09-01T23:59:59.000Z

6

Enterprise Information Security Management Framework [EISMF  

E-Print Network (OSTI)

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

7

EEO Complaints Information for Managers | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information for Managers | National Nuclear Security Information for Managers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Complaints Information for Managers Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Complaints Information for Managers EEO Complaints Information for Managers

8

RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS  

E-Print Network (OSTI)

organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

9

SP 800-128. Guide for Security-Focused Configuration Management of Information Systems  

Science Journals Connector (OSTI)

The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems ... Keywords: Configuration management, SecCM, control, information systems, monitoring, risk management framework, security content automation protocol (SCAP), security program, security-focused continuous monitoring

L. Arnold Johnson; Kelley L. Dempsey; Ronald S. Ross; Sarbari Gupta; Dennis Bailey

2011-08-01T23:59:59.000Z

10

The Relationship Between Information Security and Fraud Risk Management  

E-Print Network (OSTI)

of Regional Security & Fraud Risk HSBC THE CHINESE UNIVERSITY OF HONG KONG Department of Information current role in HSBC, as the Head of Regional Security & Fraud for Asia Pacific involves financial crime

Huang, Jianwei

11

A multidimensional approach to information security risk management using FMEA and fuzzy theory  

Science Journals Connector (OSTI)

Abstract Because of the evolution and widespread use of the Internet, organisations are becoming more susceptible to attacks on Information Technology Systems. These attacks result in data losses and alterations, and impact services and business operations. Therefore, to minimise these potential failures, this paper presents an approach to information security risk management, encompassing Failure Mode and Effects Analysis (FMEA) and fuzzy theory. This approach analyses five dimensions of information security: access to information and systems, communication security, infrastructure, security management and secure information systems development. To illustrate the proposed model, it was applied to a University Research Group project. The results show that the most important aspects of information security risk are communication security, followed by infrastructure.

Maisa Mendona Silva; Ana Paula Henriques de Gusmo; Thiago Poleto; Lcio Camara e Silva; Ana Paula Cabral Seixas Costa

2014-01-01T23:59:59.000Z

12

TEC Information Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

13

CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT  

E-Print Network (OSTI)

and the decision of acceptable risk; · Monitor security controls in the information system on an ongoing1 basis that organization-wide operations remain within an acceptable level of risk when changes are made, and that timelyCONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley

14

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up, 1st edition  

Science Journals Connector (OSTI)

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap ...

Evan Wheeler

2011-05-01T23:59:59.000Z

15

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

16

Implementing Information Security and Its Technology: A LineManagement Perspective  

SciTech Connect

Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

Barletta, William A.

2005-08-22T23:59:59.000Z

17

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

18

Information Security  

Directives, Delegations, and Requirements

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

19

Information Security  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

20

SP 800-37 Rev. 1. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach  

Science Journals Connector (OSTI)

The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to federal information systems to include conducting the activities of security categorization, security control selection and implementation, security ... Keywords: FISMA, Risk management framework, categorize, common controls, continuous monitoring, information systems, roles and responsibilities, security authorization, security controls

Joint Task Force Transformation Initiative

2010-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

22

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

23

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

24

Information Security Policy Policy Title Information Security Policy  

E-Print Network (OSTI)

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

25

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

26

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

27

Office of Information Security  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

28

Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

29

Department of Energy Cyber Security Management Program  

Directives, Delegations, and Requirements

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

30

Department of Energy Cyber Security Management  

Directives, Delegations, and Requirements

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

31

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network (OSTI)

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security Planning and Policy Committee Policy Statement The Information Resources Planning, and Policy a security plan to protect information identified as confidential, sensitive or both. 3. Assign management

O'Toole, Alice J.

32

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

33

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

34

Information Security Program  

Directives, Delegations, and Requirements

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

35

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

36

Emergency Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Emergency Information Home > Field Offices > Welcome to the Sandia Field Office > Emergency Information Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to

37

Office of Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Emergency Management Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our activities. We hope you will find it useful. Much of this page's contents are oriented to reindustrialization and other managers of new DOE projects and programs. Feel free to contact the designated key personnel for assistance. Access Authorization Branch Using established guidelines and the "whole person concept," we evaluate and adjudicate informaton about those who need clearances which is developed during background investigations. The objective is to render access determinations that are in the best interest of national security. We also provide security education and awareness information, personnel security program support, and visitor control and foreign travel support to the Oak Ridge Office, the Paducah-Portsmouth Project Office, and the Thomas Jefferson National Accerelator Facility.

38

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

39

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network (OSTI)

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

40

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Security In Information Systems  

E-Print Network (OSTI)

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

42

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network (OSTI)

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

43

Integrated safeguards and security management plan  

E-Print Network (OSTI)

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

44

Cyber Security Requirements for Risk Management  

Directives, Delegations, and Requirements

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

45

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contact Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Contact Information Contact Information At each of NNSA's eight sites, leading-edge research and development is

46

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network (OSTI)

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security it is confidential, sensitive, both or neither. 2. Prepare a security plan to protect information identified as confidential, sensitive or both. 3. Assign management responsibility for implementing the security plan. 4

O'Toole, Alice J.

47

consequence management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

consequence management consequence management Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

48

Site Information | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

49

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

50

Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers  

E-Print Network (OSTI)

The importance of safeguarding information created and shared on computers and the Internet has increased significantly in recent years, as society has become increasingly dependent on information technology in government, ...

Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

2010-01-01T23:59:59.000Z

51

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

2009-01-05T23:59:59.000Z

52

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

53

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

54

Information security knowledge sharing inorganizations: Investigating the effect ofbehavioral information security governance andnational culture  

Science Journals Connector (OSTI)

Abstract This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries namely, USA and Sweden allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledge sharing differs based on national culture. The study followed a mixed methods research design, wherein qualitative data was collected to both establish the study's research model and develop a survey instrument that was distributed to 578 information security executives. The results suggest that processes to coordinate implemented security knowledge sharing mechanisms have a major direct influence on the establishment of security knowledge sharing in organizations; the effect of organizational structure (e.g., centralized security function to develop and deploy uniform firm-wide policies, and use of steering committees to facilitate information security planning) is slightly weaker, while business-based information security management has no significant direct effect on security knowledge sharing. A mediation analysis revealed that the reason for the nonsignificant direct relation between business-based information security management and security knowledge sharing is the fully mediating effect of coordinating information security processes. Thus, the results disentangles the interrelated influences of behavioral information security governance factors on security knowledge sharing by showing that information security governance sets the platform to establish security knowledge sharing, and coordinating processes realize the effect of both the structure of the information security function and the alignment of information security management with business needs. A multigroup analysis identified that national culture had a significant moderating effect on the association between four of the six proposed relations. In Sweden which is seen as a less individualist, feminine country managers tend to focus their efforts on implementing controls that are aligned with business activities and employees' need; monitoring the effectiveness of the implemented controls, and assuring that the controls are not too obtrusive to the end-user. On the contrary, US organizations establish security knowledge sharing in their organization through formal arrangements and structures. These results imply that Swedish managers perceive it to be important to involve, or at least know how their employees cope with the decisions that have been made, thus favoring local participation in information security management, while US managers may feel the need to have more central control when running their information security function. The findings suggest that national culture should be taken into consideration in future studies in particular when investigating organizations operating in a global environment and understand how it affects behaviors and decision-making.

Waldo Rocha Flores; Egil Antonsen; Mathias Ekstedt

2014-01-01T23:59:59.000Z

55

NMMSS Information, Reports & Forms | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information, Reports & Forms | National Nuclear Security Information, Reports & Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Information, Reports & Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms NMMSS Information, Reports & Forms

56

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

57

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

58

Information Security Manual  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

59

Information Security Manual  

Directives, Delegations, and Requirements

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

60

Future directions for behavioral information security research  

Science Journals Connector (OSTI)

Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness ... Keywords: Behavioral information security, Deviant security behavior, Future research, Information security, Research challenges

Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard Baskerville

2013-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Integrated Safeguards and Security Management Self-Assessment 2004  

E-Print Network (OSTI)

provided. Appendix A. Safeguards and Security Plan AppendixLBNL/PUB-3183 Integrated Safeguards and Security Management76SF00098. Integrated Safeguards and Security Management

Lunford, Dan; Ramsey, Dwayne

2005-01-01T23:59:59.000Z

62

Consequence Management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Consequence Management | National Nuclear Security Administration Consequence Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Consequence Management Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management Consequence Management NNSA's Consequence Management operations involve the deployment of the

63

Recommended Security Controls for Federal Information Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

NIST 800-53 Revision 3 + Draft Revision 4 Recommended Security Controls for Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines...

64

Security Issues of Grid Resource Management  

Science Journals Connector (OSTI)

Secure management of Grid resources presents many challenges. This chapter will examine the security requirements that are essential to Grids and some of the software that is ... them. We will discuss how well th...

Mary R. Thompson; Keith R. Jackson

2004-01-01T23:59:59.000Z

65

Safeguards and Security for Program and Project Management -...  

NLE Websites -- All DOE Office Websites (Extended Search)

3A, Safeguards and Security for Program and Project Management by Ruben Sanchez Functional areas: Program Management, Property Management, Safety and Security The Guide provides a...

66

The Economics of Information Security  

Science Journals Connector (OSTI)

...with wide variation in consumer valuation for services, where personalized...complex networks is an emerging tool for analyzing information security...theory, and in turn provides tools for modeling and investigating such...The causes of insurgency, and tools for understanding and dealing...

Ross Anderson; Tyler Moore

2006-10-27T23:59:59.000Z

67

06 DEC 2013 1 Information Security Guideline  

E-Print Network (OSTI)

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

68

Security Control Assessor | Department of Energy  

Energy Savers (EERE)

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

69

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records Name Contact...

70

Architecture-driven smart grid security management  

Science Journals Connector (OSTI)

The introduction of smart grids goes along with an extensive use of ICT technologies in order to support the integration of renewable energy sources. However, the use of ICT technologies bears risks in terms of cyber security attacks which could negatively ... Keywords: risks, security, security management, smart grid

Markus Kammerstetter; Lucie Langer; Florian Skopik; Wolfgang Kastner

2014-06-01T23:59:59.000Z

71

TEPS/BPA Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

TEPS/BPA Information | National Nuclear Security Administration TEPS/BPA Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog TEPS/BPA Information Home > About Us > Our Operations > Acquisition and Project Management > Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs) > TEPS/BPA Information

72

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network (OSTI)

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

73

Integrated safeguards and security management plan  

SciTech Connect

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

74

Integrated Safeguards and Security Management (ISSM) Policy  

Directives, Delegations, and Requirements

The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

2001-05-08T23:59:59.000Z

75

Infrastructure and Facilities Management | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Infrastructure and Facilities Management | National Nuclear Security Infrastructure and Facilities Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Infrastructure and Facilities Management Home > content > Infrastructure and Facilities Management Infrastructure and Facilities Management NNSA restores, rebuilds, and revitalizes the physical infrastructure of the

76

Management and Administration | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Management and Administration | National Nuclear Security Administration Management and Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Management and Administration Home > About Us > Our Programs > Powering the Nuclear Navy > Management and Administration Management and Administration NNSA's Naval Reactors is committed to excellence and dedicated to meeting

77

Aviation Manager | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Aviation Manager | National Nuclear Security Administration Aviation Manager | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Joseph Ginanni Aviation Manager Joseph Ginanni Joseph Ginanni Role: Aviation Manager Award: U.S. General Services Administration (GSA) Federal Aviation Professional Award

78

Aviation Manager | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Aviation Manager | National Nuclear Security Administration Aviation Manager | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Joseph Ginanni Aviation Manager Joseph Ginanni Joseph Ginanni Role: Aviation Manager Award: U.S. General Services Administration (GSA) Federal Aviation Professional Award

79

T-614: Cisco Unified Communications Manager Database Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

80

Security Analysis and Project Management Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Building an Information Technology Security Awareness  

E-Print Network (OSTI)

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

82

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

83

ORISE: National Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Emergency Management Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is Making a Difference Overview Exercises and Planning Training and Technology Support Resources How to Work With Us Contact Us Oak Ridge Institute for Science Education National Security and Emergency Management The Oak Ridge Institute for Science and Education (ORISE) helps prepare the U.S. Department of Energy's (DOE) emergency response assets, as well as those of other federal and state agencies, by managing and conducting programs, studies, research, exercises and training. ORISE's national security and emergency management capabilities include: Providing incident response where weapons of mass destruction and/or improvised explosive devices are involved

84

Safeguards and Security Program Planning and Management  

Directives, Delegations, and Requirements

Establishes program planning and management requirements for the Departments Safeguards and Security (S&S) Program. Cancels: DOE N 473.9 and DOE M 470.1-1

2005-08-26T23:59:59.000Z

85

Safeguards and Security Program Planning and Management  

Directives, Delegations, and Requirements

The manual establishes program planning and management requirements for the Departments Safeguards and Security. Chg 1, dated 3-7-06 Cancels DOE N 473.9, DOE M 470.1-1 Chg 2.

2005-08-26T23:59:59.000Z

86

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

NLE Websites -- All DOE Office Websites (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

87

Federal Energy Management Program: Energy Independence & Security Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence & Security Act to someone by E-mail Share Federal Energy Management Program: Energy Independence & Security Act on Facebook Tweet about Federal Energy Management Program: Energy Independence & Security Act on Twitter Bookmark Federal Energy Management Program: Energy Independence & Security Act on Google Bookmark Federal Energy Management Program: Energy Independence & Security Act on Delicious Rank Federal Energy Management Program: Energy Independence & Security Act on Digg Find More places to share Federal Energy Management Program: Energy Independence & Security Act on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act

88

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

89

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

90

PARS II New Contractor Information for Interconnection Security Agreement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Contractor Information for Interconnection Security Agreement New Contractor Information for Interconnection Security Agreement V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System (PARS) II System Owner and the contractor sign an Interconnection Security Agreement (ISA). The requirement for an Interconnection Security Agreement can be found on page 182 of the PCSP. The ISA template is available for review on the PARS II portal (http://management.energy.gov/online_resources/pars2.htm) under Contractor Documents. Before the contractor begins sending data to PARS II, DOE will send the ISA to the contractor for review and signature. In order to prepare the ISA for review and signature, the PARS II Support Team needs

91

University of Connecticut Information Technology Security  

E-Print Network (OSTI)

University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision, including the University of Connecticut. Furthermore, as more personally identifiable information which University of Connecticut incident handlers can work to ensure a complete and consistent approach

Alpay, S. Pamir

92

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

93

Federal Energy Management Program: Energy Independence and Security Act,  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements to someone by E-mail Share Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Facebook Tweet about Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Twitter Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Google Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Delicious

94

T-560: Cisco Security Advisory: Management Center for Cisco Security Agent  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Cisco Security Advisory: Management Center for Cisco 0: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability February 18, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability. PLATFORM: Cisco Security Agent software releases 5.1, 5.2, and 6.0 are affected by this vulnerability. Note: Only the Management Center for Cisco Security Agent is affected by this vulnerability. Cisco Security Agent installations on end-point workstations or servers are not affected by this vulnerability. ABSTRACT: The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote

95

University of Connecticut / Jason Pufahl, CISSP, CISM 1 INFORMATION SECURITY STRATEGIC  

E-Print Network (OSTI)

University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 #12;University of Connecticut / Jason Pufahl of Connecticut recognizes that information is a critical asset and that how information is managed, controlled

Alpay, S. Pamir

96

January 2007 SECURITY CONTROLS FOR  

E-Print Network (OSTI)

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

97

2015 Information Management Conference  

Energy.gov (U.S. Department of Energy (DOE))

The 34th Information Management Conference (IMC) sponsored by the Office of the Chief Information Officer (OCIO) will be held at the Gaylord Opryland Convention Center in Nashville, TN, June 15-18,...

98

Information Management Conference  

Energy.gov (U.S. Department of Energy (DOE))

The 34th Information Management Conference (IMC) sponsored by the Office of the Chief Information Officer (OCIO) will be held at the Gaylord Opryland Convention Center in Nashville, TN, June 15-18,...

99

Information Technology Management  

Directives, Delegations, and Requirements

The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Cancels DOE O 200.1.

2008-12-23T23:59:59.000Z

100

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING  

E-Print Network (OSTI)

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST METHOD SELECTION LIST ­ CRYPTOGRAPHIC AND SECURITY TESTING NVLAP CRYPTOGRAPHIC AND SECURITY TESTING APPLICATION FORM (REV. 2013 and Security (BCS)" testing and is considered the foundation of all scopes of accreditation

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Classified Automated Information System Security Program  

Directives, Delegations, and Requirements

To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

1994-07-15T23:59:59.000Z

102

OFFICE OF HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE  

NLE Websites -- All DOE Office Websites (Extended Search)

HEALH, SAFETY AND SECURITY HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE OMB 1910-0300: ES&H Reporting Systems Description of Collections April 10, 2012 The information obtained from DOE contractors by this information collection is used by Department management at the appropriate levels to manage the work pertaining to environment, safety and health throughout DOE and will include automated reporting of information into the following systems: Computerized Accident/Incident Reporting System (CAIRS) - The CAIRS is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE operations as described in DOE O 231.1B, Environment, Safety and Health Reporting. This system contains information from reporting contractors and

103

NIM (NERSC Information Management) system  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information....

104

Port security and information technology  

E-Print Network (OSTI)

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

105

Homeland Security and Emergency Management Coordination (HSEMC) Program |  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Homeland Security and Emergency Management Coordination (HSEMC) Program Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > Homeland Security and Emergency Management Coordination

106

ORISE: National Security and Emergency Management Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

Resources Resources The Oak Ridge Institute for Science and Education (ORISE) applies the latest technology and training resources to its custom-developed national security and emergency management solutions. A few examples of ORISE-developed resources available to national security and emergency management personnel include: First Responders test WeB-MEDIS WeB-MEDIS WeB-MEDIS is a Web-based patient tracking system designed by ORISE to provide emergency responders and hospitals with a highly portable system for inputting, sharing and tracking patient data from the field. Exercise Builder software packaging Exercise Builder ORISE created this self-paced, computer-based tool to support the U.S. Department of Energy's (DOE) Emergency Management Issues Special Interest

107

Safeguards and Security Program Planning and Management  

Directives, Delegations, and Requirements

The manual establishes program planning and management requirements for the Departments Safeguards and Security (S&S) Program. Change 2 is a revision to Section M of both the Manual and the CRD to realign the process for establishing deviations from DOE directives containing safeguards and security requirements to reflect established Departmental policy as set forth in DOE O 251.1C. Original publication, 8-26-05; Chg 1, 3-7-06. Canceled by DOE O 470.4B

2005-08-26T23:59:59.000Z

108

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

109

Certification and Accreditation Process for Information Systems Including National Security Systems  

Directives, Delegations, and Requirements

The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

2004-02-19T23:59:59.000Z

110

Agenda - DOE Information Management Conference 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Monday - Risk Management Monday - Risk Management Risk Management 2:00-2:15 p.m. Welcome and Summit Overview Gil Vega, Chief Information Security Officer, U.S. Department of Energy Trinity Ballroom 4 2:00-5:00 p.m. OCIO Risk Management Summit Part II Diving Deep: Processes and Lessons Learned from Risk Management Implementation The OCIO is pleased to announce the Risk Management Summit, Part II at the 2012 Information Management Conference. This summit will begin with opening remarks from Alan Paller, Director of Research, SANS Institute, on the state of implementing risk-based management programs across the Federal government. Mr. Paller will also facilitate a panel of DOE site representatives to discuss "Diving Deep: Processes and Lessons Learned from Risk Management Implementation."

111

Security Forms and Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » New Employee Orientation » Security Forms and Services » New Employee Orientation » Security Forms and Information Security Forms and Information Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees assigned to the DOE Headquarters complex are required to present two identity source documents (i.e., U.S. Passport, driver's license, identification card with photograph issued by a Federal, state, or local government agency, etc.), have their fingerprints taken, and undergo a background investigation (the identity proofing process) prior to reporting for duty or being issued a DOE standard badge (identity or PIV badge). Most likely, your HR representative and/or administrative personnel have

112

Freedom of Information Act (FOIA) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

(FOIA) | National Nuclear Security (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information Act (FOIA) Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The FOIA establishes the premise that people should have access to

113

Information Collection Management Program  

Directives, Delegations, and Requirements

This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

2006-10-11T23:59:59.000Z

114

Information and Records Management Transition Guidance | Department...  

Energy Savers (EERE)

Information and Records Management Transition Guidance Information and Records Management Transition Guidance Information and Records Management Transition Guidance (March 2004)...

115

Security Risk Management via Dynamic Games with Learning  

E-Print Network (OSTI)

Security Risk Management via Dynamic Games with Learning Praveen Bommannavar Management Science@stanford.edu Abstract--This paper presents a game theoretic and learning approach to security risk management based mathematical rigor. We aim to take a decision-theoretic approach to risk management. By quantitatively

Alpcan, Tansu

116

Principles of Secure Information Flow Analysis Geoffrey Smith  

E-Print Network (OSTI)

Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

Smith, Geoffrey

117

Securing Dynamic Membership Information in Multicast Communications  

E-Print Network (OSTI)

insiders and outsiders. We collectively refer to groiq~rl!namics information (GDI) as information performs group management and has the knowledge of GDI. Although the service provider may release some

Liu, K. J. Ray

118

Securing Dynamic Membership Information in Multicast Communications  

E-Print Network (OSTI)

insiders and outsiders. We collectively refer to group dynamics information (GDI) as information describing performs group management and has the knowledge of GDI. Although the service provider may release some

Sun, Yan Lindsay

119

Improving web site security with data flow management  

E-Print Network (OSTI)

This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

Yip, Alexander Siumann, 1979-

2009-01-01T23:59:59.000Z

120

Security Requirements Model for Grid Data Management Systems  

Science Journals Connector (OSTI)

In this paper, we present our ongoing work of a policy-driven approach to security requirements of grid data management systems (GDMS). We analyse the security functionalities of existing GDMS to determine their ...

Syed Naqvi; Philippe Massonet; Alvaro Arenas

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

122

Contacts for Information Collection Management | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Collection Management Contacts for Information Collection Management Information Collection Program, and Information Quality Guidelines Christina Rouleau, IM-23 Records...

123

Classified Information Systems Security Manual  

Directives, Delegations, and Requirements

This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

1999-08-03T23:59:59.000Z

124

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network (OSTI)

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

125

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

126

Optimal Information Security Investment with Penetration Testing  

E-Print Network (OSTI)

gathering prior to investing into protection against so-identified threats. Penetration testing is alsoOptimal Information Security Investment with Penetration Testing Rainer B¨ohme and M´ark F´elegyh´azi International Computer Science Institute, Berkeley, California {rainer.boehme|mark}@icsi.berkeley.edu Abstract

Bencsáth, Boldizsár

127

SIA: Secure information aggregation in sensor networks  

Science Journals Connector (OSTI)

In sensor networks, data aggregation is a vital primitive enabling efficient data queries. An on-site aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the off-site querier, thus reducing the communication ... Keywords: Sensor networks, approximate interactive proofs, information aggregation, security

Haowen Chan; Adrian Perrig; Bartosz Przydatek; Dawn Song

2007-01-01T23:59:59.000Z

128

Office of Acquisition Management (OAM) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

of Acquisition Management (OAM) | National Nuclear Security of Acquisition Management (OAM) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Acquisition Management (OAM) Home > About Us > Our Operations > Acquisition and Project Management > Office of Acquisition Management (OAM) Office of Acquisition Management (OAM) Office of Acquisition Management (OAM)

129

Office of Acquisition Management (OAM) | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

of Acquisition Management (OAM) | National Nuclear Security of Acquisition Management (OAM) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Acquisition Management (OAM) Home > About Us > Our Operations > Acquisition and Project Management > Office of Acquisition Management (OAM) Office of Acquisition Management (OAM) Office of Acquisition Management (OAM)

130

National Interest Security Company NISC Formerly Technology Management...  

Open Energy Info (EERE)

search Name: National Interest Security Company (NISC) (Formerly Technology & Management Services (TMS) Inc.) Place: Gaithersburg, Maryland Zip: 20879 Product: TMS provides...

131

Contract Administration & Business Management | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Contract Administration & Business Management | National Nuclear Security Contract Administration & Business Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Contract Administration & Business Management Home > Field Offices > Welcome to the Sandia Field Office > Contract Administration & Business Management

132

Project Management and Systems Support | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

133

Project Management and Systems Support | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

134

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network (OSTI)

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

135

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network (OSTI)

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

136

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

137

ORAU: National Security and Emergency Management Fact Sheet  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security and Emergency National Security and Emergency Management Services ORAU works with federal, state and local agencies to enhance emergency management planning and integrate their efforts to respond effectively to terrorism, natural disasters and other hazards. Our experienced team helps organizations identify and correct readiness gaps to strengthen their response plans.

138

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network (OSTI)

2010- 2011 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS Relevance and currency -- that is what drives the Aviation Safety and Security Program of the USC Viterbi that our core course, Aviation Safety Management Systems, is so necessary in ensuring the safety

Wang, Hai

139

Security Certification & Accreditation of Federal Information Systems A Tutorial  

E-Print Network (OSTI)

& Accreditation ? Certification Accreditation Information + Evidence Risk Thresholds 1. Security Plan 2. C Output of C&A Process Security Plan Risk Assessments Contingency Plans Incident Response Plans Security Does the potential risk to the agency operations, assets or individuals described in the Security Plan

Madisetti, Vijay K.

140

National Security Information Classification Guidance Fundamental Review, June 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Information Fundamental Classification Guidance Review Report to the Information Security Oversight Office June 2012 United States Department of Energy Washington, DC 20585 Department of Energy | June 2012 National Security Information Fundamental Classification Guidance Review | Page iii Executive Summary Section 1.9 of Executive Order (E.O.) 13526, Classified National Security Information, dated December 29, 2009, directs agency heads to complete a comprehensive review of agency classification guides to ensure they reflect current circumstances and to identify classified information that no longer requires protection and can be declassified. To meet this requirement, the Department of Energy (DOE), under the direction of the Senior Agency Official, devoted

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Training Management Information System  

SciTech Connect

The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

Rackley, M.P.

1989-01-01T23:59:59.000Z

142

AT&TSecurity Consulting Information Assurance Federal Information Security  

E-Print Network (OSTI)

and procedures include: · Interviews with agency personnel associated with the security aspects of the system, firmware and operations · Conducting demonstrations and exercises If needed, we will create tailored agency's information systems are implemented correctly, operating as intended and producing the desired

Fisher, Kathleen

143

LEGACY MANAGEMENT REQUIRES INFORMATION  

SciTech Connect

''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

CONNELL, C.W.; HILDEBRAND, R.D.

2006-12-14T23:59:59.000Z

144

PIA - Human Resources Management Information System (HRMIS) ...  

Energy Savers (EERE)

Information System (HRMIS) PIA - Human Resources Management Information System (HRMIS) PIA - Human Resources Management Information System (HRMIS) PIA - Human Resources Management...

145

U-003:RPM Package Manager security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03:RPM Package Manager security update 03:RPM Package Manager security update U-003:RPM Package Manager security update October 4, 2011 - 1:30pm Addthis PROBLEM: A vulnerability was reported in RPM Package Manager. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 4.9.1.1 and prior versions. ABSTRACT: RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: RPM Package Manager Advisory RHSA-2011:1349-1 SecurityTracker Alert ID: 1026134 CVE-2011-3378 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted RPM package that, when queried or installed by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code

146

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

147

DOE Selects Lawrence Livermore National Security, LLC to Manage its  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Laboratory DOE Selects Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Laboratory May 8, 2007 - 12:45pm Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced that Lawrence Livermore National Security, LLC (LLNS) has been selected to be the management and operating contractor for DOE's National Nuclear Security Administration's (NNSA) Lawrence Livermore National Laboratory in California. "Livermore National Laboratory is a critical part of our nuclear weapons complex and has been for the last 55 years," Secretary Bodman said. "For the first time since the beginning of the laboratory a new contractor is

148

Proposed platform for improving grid security by trust management system  

E-Print Network (OSTI)

With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

Siadat, Safieh; Mohsenzadeh, Mehran

2009-01-01T23:59:59.000Z

149

List of Major Information Systems,National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

150

Rethinking information privacy-security: does it really matter?  

Science Journals Connector (OSTI)

This paper reports some of the findings of a bigger study that examined the role of technological, individual, cultural, and informational traits in shaping the intention to buy and sell online. The focus of this paper is on information privacy-security ... Keywords: culture, information privacy, information security, online buying and selling, structural equation modeling

Waseem Afzal

2013-11-01T23:59:59.000Z

151

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

152

Federal Energy Management Program: Best Management Practice: Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

153

Security plan for the Automated Transportation Management System  

SciTech Connect

The Automated Transportation Management System (ATMS) is an unclassified non-sensitive system consisting of hardware and software designed to facilitate the shipment of goods for the US Department of Energy (DOE). The system is secured against waste, fraud, abuse, misuse, and programming errors through a series of security measures that are discussed in detail in this document.

Not Available

1994-04-01T23:59:59.000Z

154

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network (OSTI)

2011- 2012 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS of aviation safety. Endings signal new beginnings and new beginnings mean evolving challenges for safety. This was the world in which the USC Aviation Safety and Security Program was born in 1952 and this is the world

Wang, Hai

155

NNSA Selects Consolidated Nuclear Security, LLC to Manage the...  

National Nuclear Security Administration (NNSA)

to be the management and operating contractor for the Y-12 National Security Complex in Oak Ridge, Tenn., and the Pantex Plant near Amarillo, Texas. The contract also includes...

156

Safeguards and Security for Program and Project Management  

Directives, Delegations, and Requirements

This Guide provides approaches for implementing security provisions within the functional areas contained in DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets. Canceled by DOE G 413.3-3A.

2007-11-15T23:59:59.000Z

157

Security and Emergency Management Independent Oversight and Performance Assurance Program  

Directives, Delegations, and Requirements

Establishes the DOE Security and Emergency Management Independent Oversight and Performance Assurance Program. Cancels DOE O 470.2, Paragraph 5b(2) of DOE O 231.1 and Chapter IV of DOE M 231.1-1.

2000-03-01T23:59:59.000Z

158

NNSA Selects Consolidated Nuclear Security, LLC to Manage the Consolidated  

National Nuclear Security Administration (NNSA)

Selects Consolidated Nuclear Security, LLC to Manage the Consolidated Selects Consolidated Nuclear Security, LLC to Manage the Consolidated Contract for Nuclear Production Operations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Field Offices > Welcome to the NNSA Production Office > NPO Press Releases > NNSA Selects Consolidated Nuclear Security, LLC to ...

159

Line Management Perspective: National Nuclear Security Administration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim McConnell, Acting Associate Administrator for Infrastructure and...

160

Inspection Of Environment, Safety, And Health Management At The Y-12 National Security Complex  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Y-12 National Security Complex Office of Independent Oversight and Performance Assurance Office of the Secretary of Energy April 2003 ISM OVERSIGHT Table of Contents 1.0 INTRODUCTION .....................................................................1 2.0 RESULTS ..................................................................................3 3.0 CONCLUSIONS .......................................................................8 4.0 RATINGS ................................................................................ 10 APPENDIX A - SUPPLEMENTAL INFORMATION ...................... 11 APPENDIX B - SITE-SPECIFIC FINDINGS .................................. 12 APPENDIX C - GUIDING PRINCIPLES OF SAFETY MANAGEMENT IMPLEMENTATION ..................................... 13

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network (OSTI)

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

162

Acceptable Information Technology Devices | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Acceptable Information Technology Devices Within Y-12's Limited Areas, Exclusion Areas, Material Access Areas, and Protected Areas (security areas designated by DOE for the...

163

Scientific and Technical Information Management  

Directives, Delegations, and Requirements

The Order establishes requirements and responsibilities for managing DOE's scientific and technical information. Cancels DOE O 241.1. Canceled by DOE O 241.1B.

2003-10-14T23:59:59.000Z

164

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

165

Information Technology Project Management  

Directives, Delegations, and Requirements

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

2012-12-03T23:59:59.000Z

166

Information Technology Project Management  

Directives, Delegations, and Requirements

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

2012-12-03T23:59:59.000Z

167

Management and Budget | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management and Budget Management and Budget The organization provides timely, cost-effective, and efficient administrative and financial support for NNSA headquarters...

168

HQ Emergency Management Team (EMT) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

HQ Emergency Management Team (EMT) | National Nuclear Security HQ Emergency Management Team (EMT) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog HQ Emergency Management Team (EMT) Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > HQ Emergency Management Team (EMT) HQ Emergency Management Team (EMT) NNSA ensures that capabilities are in place to respond to any NNSA and

169

DRAFT DRAFT Peer Production of Privacy and Security Information  

E-Print Network (OSTI)

DRAFT DRAFT Peer Production of Privacy and Security Information L Jean Camp* Informatics Indiana_Friedman@ksgphd.harvard.edu #12;2 L. Jean Camp and Allan Friedman, "Peer Production of Privacy and Security Information" Ethical operators in the model of the turn of the twentieth century, as it required at the turn of the nineteenth

Camp, L. Jean

170

Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY  

E-Print Network (OSTI)

to the advancement of higher education through the effective use of information technology. Members include representatives from institutions of higher education, higher education technology companiesPolicy 3505 ­ Information Technology Security 1 OLD DOMINION UNIVERSITY University Policy Policy

171

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

172

SUSAN SNEDAKER IT Security Project Management Handbook. Syngress (2006). ISBN 1-59749-076-8. 47.95/32.99/$59.95. 612 pp. Softbound.  

Science Journals Connector (OSTI)

......Security Project Management Handbook. Syngress (2006). ISBN...Security Project Management Handbook aims to present an operational...Security Project Managment Handbook or with a security twist...project managers, although it does have a security angle. IT......

Elizabeth Harrin

2007-01-01T23:59:59.000Z

173

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

174

Inventory Tracking and Management: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Inventory Tracking and Management: Fact Sheet | National Nuclear Security Inventory Tracking and Management: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Inventory Tracking and Management: Fact Sheet Fact Sheet Inventory Tracking and Management: Fact Sheet Mar 23, 2012 Under International Atomic Energy Agency (IAEA) safeguards agreements,

175

Cyber Security Requirements for Wireless Devices and Information Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

176

10 CFR 851, Security and Integrated Safety Management Presentation  

NLE Websites -- All DOE Office Websites (Extended Search)

, Security and , Security and Integrated Safety Management Bill McArthur, PhD, CIH Director, Office of Worker Safety and Health Policy (HS-11) Office of Health and Safety 10 CFR 851 * "Worker Safety and Health Program" Rule required final implementation May 25, 2007. * Applies to ALL contractors on DOE site and working in furtherance of DOE mission. * Contains S&H requirements Workplace Safety and Health * Security Force personnel have the same rights for a safe and healthful workplace as other contractor or federal workers * DOE and the Security Force contractor have spent considerable resources to hire and train personnel * Want to keep the Force accident free Recent Security Issues * Obscurant Smoke * Heat Stress * Noise * Carbon Monoxide - Meeting at OR this week

177

Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing the means for the administration of certificates. This paper describes the interface between security enhanced application and the CMS. The interface layer with which the security applications are extended is named CMS Client. The CMS Client comprises a set of functions that enable the certification of users of security applications, retrieval of certificates and verification of retrieved certificates. The paper gives a short description of the CMS system and a detailed description of the CMS Client functions. Furthermore it describes how to extend the existing or create new security applications based on the CMS system.

Nada Kapidzic

1998-01-01T23:59:59.000Z

178

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

179

Acquisition and Project Management | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Contractor Human Resources Performance Evaluations Acquisition Management Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs)...

180

Consequence Management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

acquisition management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

182

Index of Energy Security Risk | Open Energy Information  

Open Energy Info (EERE)

Index of Energy Security Risk Index of Energy Security Risk Jump to: navigation, search Tool Summary Name: Index of Energy Security Risk Agency/Company /Organization: United States Chamber of Commerce, Institute for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.energyxxi.org/images/Energy_Index_2011_FINAL.pdf Cost: Free Index of Energy Security Risk Screenshot References: Index of Energy Security Risk[1] "This 2011 edition of the Index incorporates the most current energy data, including the Energy Information Administration's (EIA) Annual Energy Outlook 2011 (AEO 2011), to provide an up-to-date assessment of the trends having the greatest impact on energy security since the first Index was

183

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

184

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

185

Waste Management Magazine Highlights Nevada National Security Site |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Magazine Highlights Nevada National Security Site Management Magazine Highlights Nevada National Security Site Waste Management Magazine Highlights Nevada National Security Site March 28, 2013 - 12:00pm Addthis A worker at NNSS handles large, high-powered batteries called radioisotope thermoelectric generators (RTGs), which are discussed in the recent article on the NNSS in RadWaste Solutions magazine. Like most low-level waste, RTGs disposed of at the NNSS were handled without any special equipment or clothing because of the relatively low dose rate levels. A worker at NNSS handles large, high-powered batteries called radioisotope thermoelectric generators (RTGs), which are discussed in the recent article on the NNSS in RadWaste Solutions magazine. Like most low-level waste, RTGs disposed of at the NNSS were handled without any special equipment or

186

National Interest Security Company NISC Formerly Technology Management  

Open Energy Info (EERE)

Interest Security Company NISC Formerly Technology Management Interest Security Company NISC Formerly Technology Management Services TMS Inc Jump to: navigation, search Name National Interest Security Company (NISC) (Formerly Technology & Management Services (TMS) Inc.) Place Gaithersburg, Maryland Zip 20879 Product TMS provides technical and engineering analyses Coordinates 39.139866°, -77.193829° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.139866,"lon":-77.193829,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

187

Training for Records and Information Management  

Energy.gov (U.S. Department of Energy (DOE))

Records Management Training: NARA Records Management Training NARA Targeted Assistance NARA Brochures Training Presentation: Information Collection Requests/PRA (pdf)

188

Energy Management and Information Systems  

E-Print Network (OSTI)

?infrastructure energy?audits,?HVAC?upgrades,? heat?recovery,?etc. Improve?operations processes?and?day?to?day? operations,?retro? commissioning ENERGY?MANAGEMENT?INFORMATION?SYSTEM the?project Hardware ? $3.0?million?investment ? 400+?meters...

Conraud, J.

2013-01-01T23:59:59.000Z

189

Information Collection Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Collection Management Information Collection Management The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the...

190

Records and Information Management Transition Guidance (November...  

Energy Savers (EERE)

Records and Information Management Transition Guidance (November 2013) Records and Information Management Transition Guidance (November 2013) This guidance document establishes a...

191

Information security: where computer science, economics and psychology meet  

Science Journals Connector (OSTI)

...trade became too hazardous. Camp Wolfram (2000) built on this...vulnerabilities There has been debate for centuries about whether security is helped...Cambridge, UK, 26-28 June 2006. Camp, J. Wolfram, C. 2000 Pricing...information security L.J. Camp and S. Lewis2004pp. 1-15...

2009-01-01T23:59:59.000Z

192

Transcript: NUIT Information Security News Podcast, August 2, 2012  

E-Print Network (OSTI)

is Thursday, August 2 and you're listening to the information security news podcast brought to you, I don't think this is any surprise to anybody who is listening to this here. People despise having when it comes to some computer security is having a password on the device that you're trying

Shahriar, Selim

193

Interpreting Deep Structures of Information Systems Security  

Science Journals Connector (OSTI)

......network, infrastructure and regulatory) of the organization...adopting stringent regulatory review of the security policies...present ways to deal with regulatory actions such as developing contingency plans (disaster recovery in......

Manoj Thomas; Gurpreet Dhillon

2012-10-01T23:59:59.000Z

194

Farmland Security Zone | Open Energy Information  

Open Energy Info (EERE)

Zone Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Farmland Security ZoneLegal Abstract California Department of Conservation,...

195

Federal Energy Management Program: Energy Security Planning for Sustainable  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

196

Information Security Framework for Small and Medium Sized Businesses  

E-Print Network (OSTI)

Information security issues are a challenge to everyone who uses computers. The rise of the personal computer as a common business tool and the Internet as a common means of business communication and commerce have also created an environment...

Michnick, Steven M.

2009-06-17T23:59:59.000Z

197

Towards holistic security management through coherent measuring  

Science Journals Connector (OSTI)

Today's complex communication systems are vital for many businesses. The high skill needed to master those systems has created an economy of services where many specialised organisations participate in producing the end service. Managing that orchestra ...

Perttu Halonen; Kimmo Htnen

2010-08-01T23:59:59.000Z

198

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

199

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

NLE Websites -- All DOE Office Websites (Extended Search)

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

200

PBKM: A Secure Knowledge Management Framework (extended abstract)  

E-Print Network (OSTI)

- sideration in the knowledge-dissemination procedure, and abuse-accountability which is incorporated: knowledge management, knowledge extraction, knowledge breaching, abuse accountability, security, pri- vacy 1 popular, such use of data mining is lim- ited and needs to be extended. As the Internet quickly evolves

Xu, Shouhuai

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure  

Science Journals Connector (OSTI)

Key management for secure communications of Advanced Metering Infrastructure is an unsolved problem until now. The ... proposing a key management scheme based on a hybrid-tree graph for AMI. The cyber security...

Jinshan Chen; Nian Liu; Wenxia Liu; Hong Luo

2011-01-01T23:59:59.000Z

202

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

203

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

204

The Department of Homeland Security Energy Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Homeland Security Homeland Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies conduct their environmental, transportation, and energy- related activities under the law in support of their respective missions in an environmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner." (Executive Order 13423, Section 1 - Policy) DHS Energy Program Overview Steven W. White, CEM May 2, 2007 3 Program Foundation  Comply with requirements of Laws, Regulations and Executive

205

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

206

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network (OSTI)

security 1. PROBLEM STATEMENT Software engineers used standard software engineering processes to develop of software are annoying, but delays of an hour are not catastrophic. But in certain environments (notably to use techniques, and--more importantly--how to analyze social, political, and cultural environments

207

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network (OSTI)

security 1. PROBLEM S A EMEN Software engineers used standard software engineering processes to develop and scenarios drawn from political science, history, and other humanities to force students to apply or derive the process enjoyable, stimulating, and effective. Key words: environment, judgment, instruction, computer

Bishop, Matt

208

The Need for Effective Information Security Awareness  

E-Print Network (OSTI)

, the high internet penetration growth rate in the Middle East and the limited security awareness among users internet penetration rates in the Middle East as of June 30, 2010 with rates equivalent to 88%, 75 had the highest e-commerce penetration rate in 2008. Specifically, 21.5% of UAE, 14.3% of Saudi Arabia

Aloul, Fadi

209

Modeling behavioral considerations related to information security.  

SciTech Connect

The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral study of upcoming threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F. (Decision and Information Sciences); (SNL); (Univ. at Albany)

2011-01-01T23:59:59.000Z

210

Manual of Security Requirements for the Classified Automated Information System Security Program  

Directives, Delegations, and Requirements

This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

1994-07-15T23:59:59.000Z

211

WIMS - Waste Information Management System  

Office of Environmental Management (EM)

Welcome To WIMS Welcome To WIMS Waste Information Management System WIMS new web address: http://www.emwims.org WIMS is developed to provide DOE Headquarters and site waste managers with the tools necessary to easily visualize, understand, and manage the vast volumes, categories, and problems of forecasted waste streams. WIMS meets this need by providing a user-friendly online system to gather, organize, and present waste forecast data from DOE sites. This system provides a method for identification of waste forecast volumes, material classes, disposition pathways, and potential choke points and barriers to final disposition. Disclaimer: Disposition facility information presented is for planning purposes only and does not represent DOE's decisions or commitments. Any selection of disposition facility will be made after technical, economic, and policy considerations.

212

Program Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Contract International Association of Machinists and Aerospace Workers Agreement HS&E Management System Description and Worker Safety and Health Program 2015 Small Business...

213

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

214

Information Flow for Secure Distributed Applications  

E-Print Network (OSTI)

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-08-27T23:59:59.000Z

215

Information flow for secure distributed applications  

E-Print Network (OSTI)

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-01-01T23:59:59.000Z

216

Information Security Risk Modeling Using Bayesian Index  

Science Journals Connector (OSTI)

......not allowed to access the intranet and the information equipment...1 Banking 3 1 2 1 2 0 High technology 5 2 3 2 1 2 Information technology 8 3 5 4 2 2 Manufacture 11...banking industry, 5 from the technology industry, 8 from the information......

Chien-Lung Chan

2011-04-01T23:59:59.000Z

217

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27  

E-Print Network (OSTI)

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines for all Texas Veterinary Medical Diagnostic Laboratory (TVMDL) positions. Reason for Procedure Under

218

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Journals Connector (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

219

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

220

Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee  

SciTech Connect

This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for former waste management units, legacy contamination source areas and distribution of contamination in soils, and environmental infrastructure (e.g., caps, monitoring systems, etc.) that is in place or planned in association with RAs. (3) Regulatory considerations and processes for management and disposition of waste soil upon generation, including regulatory drivers, best management practices (BMPs), waste determination protocols, waste acceptance criteria, and existing waste management procedures and BMPs for Y-12. This Soil Management Plan provides information to project planners to better coordinate their activities with other organizations and programs with a vested interest in soil disturbance activities at Y-12. The information allows project managers and maintenance personnel to evaluate and anticipate potential contaminant levels that may be present at a proposed soil disturbance site prior to commencement of activities and allows a more accurate assessment of potential waste management requirements.

None

2005-03-02T23:59:59.000Z

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

CrySTINA: Security in the Telecommunications Information  

E-Print Network (OSTI)

CrySTINA: Security in the Telecommunications Information Networking Architecture L.Butty'an, S.Wilhelmg@epfl.ch Abstract TINA specifies an open architecture for telecommunication services in the broadband, multimedia are increasingly used for the control of telecommunication systems. The use of computers enables more flexibility

Bencsáth, Boldizsár

222

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING  

E-Print Network (OSTI)

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST PROCEDURE SELECTION LIST ­ HEALTHCARE IT TESTING NVLAP HEALTHCARE IT TESTING APPLICATION (2013-01-02) PAGE 1 OF 3 Instructions: Please check the method for which you are requesting accreditation. NVLAP Code Test Procedure Description 2011

223

Office of the CISO, December 2010 Information Security Risk Advisory  

E-Print Network (OSTI)

Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

Queitsch, Christine

224

CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), &  

NLE Websites -- All DOE Office Websites (Extended Search)

CONTACTS FOR INFORMATION MANAGEMENT: CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Information Collection (PRA), & Records Name Contact Information Area of Responsibility Troy Manigault Phone: 301-903-9926 Email: doerm@hq.doe.gov Director, Records Management Division Ivan King Phone: 202-586-4060 Email: ivan.king@hq.doe.gov Records Management Program (Lead) Tonya Meadows Phone: 301-903-1146 Email: tonya.meadows@hq.doe.gov Forms Management Program (Lead) Christina "Chris" Rouleau Phone: 301-903-6227 Email: Christina.Rouleau@hq.doe.gov Information Collection Management Program (Lead) Deidra "Dee Dee" Wilkinson Phone: 202-586-2398 Email: deidre.wilkinson@hq.doe.gov Records Management Program

225

Area Information | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Visiting Us / Area Information Visiting Us / Area Information Area Information Guides, Area Maps, Airport... Airport, About: McGhee Tyson Airport Airport: map to Oak Ridge/Knoxville Oak Ridge: City Guide for City of Oak Ridge, Tennessee Knoxville: maps for visitors Oak Ridge: area map with location of Y-12 Visitor's Center Oak Ridge: map of city streets Roane County: Roane County Guide Resources: News, History... Knoxville: Knoxville, Tennessee Knoxville: Museums Knoxville: Knoxville News-Sentinel Oak Ridge: City of Oak Ridge Oak Ridge: Chamber of Commerce Oak Ridge: Convention and Visitors Bureau Oak Ridge: Oak Ridger Oak Ridge: Secret City History Area Attractions: To Do and See Knoxville: Clarence Brown Theater Knoxville: Frank H. McClung Museum Knoxville: Knoxville Opera Company, Francis Graffeo, General

226

Information Systems Management (ISM) 2011 Department of Supply Chain & Information Systems  

E-Print Network (OSTI)

Information Systems Management (ISM) 2011 Department of Supply Chain & Information Systems Information Systems Management Minor Application Overview The Information Systems Management focuses Systems Management and Applications c. MIS 431 (3) Business Data Management d. MIS 446 (3) Information

Yener, Aylin

227

Study on security based on PKI for e-commerce of statistics information system  

Science Journals Connector (OSTI)

In this paper, issues about the trend of statistics information merchandizing, and the present situation of statistics information network and statistics information system security, are analyzed. Security construction scheme is put forward, which is ... Keywords: PKI, e-commerce, security, statistics information

Min Liu; Shudong Sun; Miaotiao Xing

2005-08-01T23:59:59.000Z

228

An intelligent biological information management system  

Science Journals Connector (OSTI)

......Mishra 3 1Computer Science Department...and Information Science, Indiana University...for information management from data retrieval...filtering (IF) approach as a possible...and Information Science, University...1985) A New Approach to the Design...of information management, i.e. mapping......

Mathew Palakal; Snehasis Mukhopadhyay; Javed Mostafa; Rajeev Raje; Mathias N'Cho; Santosh Mishra

2002-10-01T23:59:59.000Z

229

Los Alamos National Security LLC Selected to Manage Los Alamos National  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Security LLC Selected to Manage Los Alamos Los Alamos National Security LLC Selected to Manage Los Alamos National Laboratory Los Alamos National Security LLC Selected to Manage Los Alamos National Laboratory December 21, 2005 - 4:51pm Addthis WASHINGTON, D.C. - Secretary of Energy Samuel W. Bodman announced today that Los Alamos National Security LLC has been selected to be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of Bechtel National, Inc., the University of California, BWX Technologies, Inc., and the Washington Group International, Inc. The laboratory, one of three National Nuclear Security Administration (NNSA) nuclear weapons laboratories, performs sensitive national security

230

The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories  

Energy.gov (U.S. Department of Energy (DOE))

The Quality of Management and of the Science and Engineering at the NNSA National Security Laboratories was presented to CRENEL 9/15/2014.

231

NNSAs Management of the $245 million Nuclear Materials Safeguards and Security Upgrades Project Phase II at Los Alamos National Laboratory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA's Management of the $245 NNSA's Management of the $245 Million Nuclear Materials Safeguards and Security Upgrades Project Phase II DOE/IG-0901 January 2014 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 January 2, 2014 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Report on "NNSA's Management of the $245 million Nuclear Materials Safeguards and Security Upgrades Project Phase II at Los Alamos National Laboratory" BACKGROUND The National Nuclear Security Administration's Los Alamos National Laboratory (LANL) is responsible for the protection and control of a significant portion of the Nation's special nuclear

232

The 5 Waves of Information Security From Kristian Beckman to the Present  

E-Print Network (OSTI)

The 5 Waves of Information Security ­ From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security ­ the Third Wave (von Solms, 2000) and Information Security ­ the Fourth Wave (von Solms, 2006), as well as a paper

Boyer, Edmond

233

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network (OSTI)

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing), CASOS ­ the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon network and knowledge management approach to discovering organizational vulnerabilities within companies

Sadeh, Norman M.

234

InformationTechnologies& BusinessandManagement  

E-Print Network (OSTI)

interactive planning Learn to transition your management style from rigid frameworks and plans to a cultureInformationTechnologies& BusinessandManagement extension.uci.edu/agile Agile Project Management standard of excellence. Agile Project Management Certificate Program Annual employer demand for individuals

Barrett, Jeffrey A.

235

Independent Oversight Inspection of Emergency Management at the Y-12 National Security Complex, Volume III  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex November 28, 2001 Washington, DC 20585 UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED 3 INDEPENDENT OVERSIGHT INSPECTION OF EMERGENCY MANAGEMENT AT THE Y-12 NATIONAL SECURITY COMPLEX VOLUME III Table of Contents Acronyms...................................................................................................................................................... 5 1.0 Introduction ........................................................................................................................................... 7 2.0 Results ................................................................................................................................................... 9 3.0 Conclusions..........................................................................................................................................

236

LTS Information Management - Hanford Site  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental information Radon and environmental hazard monitoring information Groundsurfaceleachate water monitoring information National Environmental Policy Act (NEPA)...

237

Security  

Energy.gov (U.S. Department of Energy (DOE))

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

238

MANAGEMENT INFORMATION SYSTEMS (MIS) CONCENTRATION FOR UNDERGRADUATES  

E-Print Network (OSTI)

MANAGEMENT INFORMATION SYSTEMS (MIS) CONCENTRATION FOR UNDERGRADUATES The management information systems concentration, like a major, focuses on the use of information technology for value creation creation. Link to Rensselaer 2012-2013 Catalog Required Courses MGMT 4240 Systems Analysis & Design MGMT

Salama, Khaled

239

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

240

2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN- CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION  

Energy.gov (U.S. Department of Energy (DOE))

2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Information Collection Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance » Information Collection Management Guidance » Information Collection Management Information Collection Management The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the Office of Management and Budget (OMB) before undertaking a collection of information directed to 10 or more persons (including operations of Government-owned, contractor-operated facilities). Under the PRA, OMB approval for each information collection instrument can last a maximum of 3 years. This site provides information about the Paperwork Reduction Act's requirements and guidance in fulfilling those requirements. DOE's Chief Information Officer (CIO) is the Senior Official responsible for DOE's compliance with the Paperwork Reduction Act. Office of Management and

242

A Secure Grid Medical Data Manager Interfaced to the gLite Middleware.  

E-Print Network (OSTI)

A Secure Grid Medical Data Manager Interfaced to the gLite Middleware. Johan Montagnat (johan@i3s. Keywords: Secure grid storage, gLite middleware, medical data management 1. Context 1.1. Objectives Many archiving, processing and analysis is needed. Grid infrastructures are promising for dealing with challenges

Paris-Sud XI, Université de

243

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senate Homeland Security and Governmental Affairs Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen

244

Customizable application for personal information management  

E-Print Network (OSTI)

As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are ...

Liu, Jamie, M. Eng. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

245

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY  

E-Print Network (OSTI)

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

Adali, Tulay

246

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

247

Manager, Digital Developer Risk & Information Management Group  

E-Print Network (OSTI)

server · Deep understanding of the Web technology stack (TCP/IP, HTTP, HTML, XHTML, XML, JavaScript, CSS with at least one web programming languages such as Python, PHP, C/C++, C#, Ruby, or Java, especially on web, or other Web 2.0 solutions · Experience in machine learning, information retrieval, large-scale data mining

Plotkin, Joshua B.

248

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

249

Waste Management Information System (WMIS) User Guide  

SciTech Connect

This document provides the user of the Waste Management Information System (WMIS) instructions on how to use the WMIS software. WMIS allows users to initiate, track, and close waste packages. The modular design supports integration and utilization of data throuh the various stages of waste management. The phases of the waste management work process include generation, designation, packaging, container management, procurement, storage, treatment, transportation, and disposal.

R. E. Broz

2008-12-22T23:59:59.000Z

250

EcoSecurities Brasil Ltd | Open Energy Information  

Open Energy Info (EERE)

EcoSecurities Brasil Ltd Jump to: navigation, search Name: EcoSecurities Brasil Ltd. Place: Rio de Janeiro, Rio de Janeiro, Brazil Sector: Carbon Product: Brazilian subsidiary...

251

New_Contractor_Information_for_Interconnection_Security_Agreement...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NewContractorInformationforInterconnectionSecurityAgreement.pdf NewContractorInformationforInterconnectionSecurityAgreement.pdf NewContractorInformationforIntercon...

252

Vencon Management | Open Energy Information  

Open Energy Info (EERE)

States Sector: Services Product: General Financial & Legal Services ( Partnership (investment, law etc) ) References: Vencon Management1 This article is a stub. You can help...

253

Security in Information Systems: New Challenges and Opportunities  

E-Print Network (OSTI)

systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

Jurjens, Jan

254

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

255

Strategic Plan Information Resources Management  

E-Print Network (OSTI)

for Information Technology Approved: _________________________________________ Dr. David Schmidly, President, Strategies, and Programs 3 Table 2: Agency Databases 8 Table 3: Agency Applications 10 Table 4: Information university, provides the highest standards of excellence in higher education, fosters intellectual

Gelfond, Michael

256

Information Flow Control for Secure Web Sites Maxwell Norman Krohn  

E-Print Network (OSTI)

smaller, and configure the Web site's security policies. They need only change when the policy changes

257

Information-Theoretically Secure Communication Under Channel Uncertainty  

E-Print Network (OSTI)

. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We...

Ly, Hung Dinh

2012-07-16T23:59:59.000Z

258

THE UNIVERSITY OF TEXAS AT DALLAS INFORMATION SECURITY  

E-Print Network (OSTI)

. Instead, these requirements should be integrated into a comprehensive system security plan. II. Scope

O'Toole, Alice J.

259

Definition: Distribution Management System | Open Energy Information  

Open Energy Info (EERE)

Management System Management System Jump to: navigation, search Dictionary.png Distribution Management System A Distribution Management System (DMS) is a utility IT system capable of collecting, organizing, displaying and analyzing real-time or near real-time electric distribution system information. A DMS can also allow operators to plan and execute complex distribution system operations in order to increase system efficiency, optimize power flows, and prevent overloads. A DMS can interface with other operations applications such as geographic information systems (GIS), outage management systems (OMS), and customer information systems (CIS) to create an integrated view of distribution operations.[1] View on Wikipedia Wikipedia Definition In the recent years, utilization of electrical energy increased

260

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services, and International Security Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications Major Management Challenges and Program Risks : Department of Energy GAO/OCG-99-6 GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Future Trends in Secure Chip Data Management Nicolas Anciaux, Luc Bouganim and Philippe Pucheral  

E-Print Network (OSTI)

management techniques. 1 Introduction Secure chips, i.e. chips with a high level of tamper resistance concern in this latter case, the strong demand of individual for enforcing their elementary rights to store the data securely (thanks to the chip tamper resistance) and act as a trusted doorkeeper, which

262

Performing Energy Security Assessments- A How-To Guide for Federal Facility Managers  

Energy.gov (U.S. Department of Energy (DOE))

Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facilitys energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

263

CargoNet : micropower sensate tags for supply-chain management and security  

E-Print Network (OSTI)

This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state ...

Malinowski, Mateusz Ksawery

2007-01-01T23:59:59.000Z

264

A Dynamic Management Framework for Security Policies in Open Grid Computing Environments  

Science Journals Connector (OSTI)

A computational grid is a kind of open and distributed ... dynamic virtual organization (VO) membership. Dynamic security policy management for multiple VOs in grids is challenging due to the heterogeneous nature...

Chiu-Man Yu; Kam-Wing Ng

2004-01-01T23:59:59.000Z

265

Special feature: Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing ...

Nada Kapidzic

1998-01-01T23:59:59.000Z

266

Safeguards and Security for Program and Project Management  

Directives, Delegations, and Requirements

The Guide provides a methodology for implementing the safeguards and security requirements of DOE O 413.3B. Cancels DOE G 413.3-3.

2013-08-15T23:59:59.000Z

267

Information security: where computer science, economics and psychology meet  

Science Journals Connector (OSTI)

...Gilbert 2006). Since 2004, computer crime has become organized...Commemoration Commission and by NSF grant DGE-0636782 (T.M...In Proc. Seventeenth Annual Computer Security Applications Conf...Schechter, S. E. 2004 Computer security strength and risk...

2009-01-01T23:59:59.000Z

268

A generic security API for symmetric key management on cryptographic devices  

Science Journals Connector (OSTI)

Abstract We present a new symmetric key management API for cryptographic devices intended to implement security protocols in distributed systems. Our API has a formal security policy and proofs of security in the symbolic model, under various threat scenarios. This sets it apart from previous \\{APIs\\} such as RSA PKCS#11, which are under-specified, lack a clear security policy and are often subject to attacks. Our design is based on the principle of explicitness: the security policy for a key must be given at creation time, and this policy is then included in any ciphertext containing the key. Our API also contains novel features such as the possibility of insisting on a freshness check before accepting an encrypted key for import. To show the applicability of our design, we give an algorithm for automatically instantiating the API commands for a given key management protocol and apply it on the ClarkJacob protocols suite.

Vronique Cortier; Graham Steel

2014-01-01T23:59:59.000Z

269

Chapter_10_Security_Awareness_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: * Title 32, CFR, Part 2001, Classified National Security Information * Executive Order 13526, Classified National Security Information * DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 * DOE Order 475.2A, Identifying Classified Information * DOE Order 475.1, Counterintelligence Program The Security Awareness Program Manager, within HS-92, manages the HQ security awareness program. The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, and security procedures specific to HQ. This goal is accomplished by providing HQ employees

270

Security in the Telecommunications Information Networking Architecture --the CrySTINA Approach \\Lambda  

E-Print Network (OSTI)

Security in the Telecommunications Information Networking Architecture -- the CrySTINA Approach Butty??an Jean­Pierre Hubaux Swiss Federal Institute of Technology Telecommunications Laboratory EPFL for the Telecommunication Information Networking Architecture (TINA) is security. TINA is intended to provide

Bencsáth, Boldizsár

271

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

272

Water security in the Canadian Prairies: science and management challenges  

Science Journals Connector (OSTI)

...action. DMUU approaches are being...resources management-[25...environmental science and decision...whither water management??. Science 319, 573-574...1126/science.1151915...alternative approach to assessing...Resources Management Model (WRMM...

2013-01-01T23:59:59.000Z

273

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

274

PKI-based security for peer-to-peer information sharing  

SciTech Connect

The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

2004-05-02T23:59:59.000Z

275

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security, 1st edition  

Science Journals Connector (OSTI)

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security ...

Stephen D. Gantz; Daniel R. Philpott

2012-12-01T23:59:59.000Z

276

Definition: Outage Management System | Open Energy Information  

Open Energy Info (EERE)

Outage Management System Outage Management System A software application that can process outage reports from a variety of utility operational systems including SCADA, AMI, and customer phone calls, and display outage information to utility operators. The OMS can help a utility interpret outage information and determine where the likely cause of an outage may be. It can also help the utility optimize its service restoration resources.[1] Related Terms advanced metering infrastructure References ↑ https://www.smartgrid.gov/category/technology/outage_management_system [[C LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ategory: Smart Grid Definitionssmart grid,smart grid, |Template:BASEPAGENAME]]smart grid,smart grid, Retrieved from "http://en.openei.org/w/index.php?title=Definition:Outage_Management_System&oldid=502507

277

Toward A Secure and Usable Cloud-based Password Manager for Web Browsers  

E-Print Network (OSTI)

on different websites. Password manager, particularly Browser-based Password Manager (BPM), is one of the most, we propose a novel Cloud-based Storage-Free BPM (CSF-BPM) design to achieve a high level of security with the desired confidentiality, integrity, and availability properties. We have implemented a CSF-BPM system

Yue, Chuan

278

UPDATE/PATCH MANAGEMENT SYSTEMS: a protocol taxonomy with security implications  

E-Print Network (OSTI)

UPDATE/PATCH MANAGEMENT SYSTEMS: a protocol taxonomy with security implications Andrew Colarik, patches and updates are issued periodically to extend the functional life cycle of software products industry has responded with update and patch management systems. Because of the proprietary nature

Thomborson, Clark

279

UNIVERSITY OF PITTSBURGH AT GREENSBURG Management -Information Systems  

E-Print Network (OSTI)

UNIVERSITY OF PITTSBURGH AT GREENSBURG Management - Information Systems u n d e r g r a d u a t e p r o g r a m Management - Information Systems 48 credits Bachelor of Science Management - Information Accounting MGMT 1818 Management Science INFSCI 0010 Introduction to Information Systems and Society Area

Sibille, Etienne

280

Federal Spectrum Management at the National Telecommunications and Information Administration  

Energy.gov (U.S. Department of Energy (DOE))

Slides from National Telecommunications and Information Administration's presentation on Federal spectrum management.

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Personal Information Management: The Case for an Evolutionary Approach  

Science Journals Connector (OSTI)

......cognitive science and be rigorously...information management (PIM...backwards-compatible approach is more likely...e-mail-centric task management and its relation...2nd Web Science Conference...user-subjective approach to personal information management systems design......

Paul Warren

2014-05-01T23:59:59.000Z

282

Scientific and Technical Information Management  

Directives, Delegations, and Requirements

To establish Department of Energy (DOE) requirements and responsibilities to ensure that scientific and technical information (STI) is identified, processed, disseminated, and preserved in a manner that (a) enables the scientific community and the public to locate and use the unclassified and unlimited STI resulting from DOE's research and related endeavors and (b) ensures access to classified and sensitive unclassified STI is protected according to legal or Departmental requirements. Cancels DOE O 241.1. Canceled by DOE O 241.1A Chg 1.

2001-04-09T23:59:59.000Z

283

Headquarters Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Security Operations Headquarters Security Operations Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

284

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

285

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

286

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

287

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

288

Information Security Policy Manual Latest Revision: May 16, 2012  

E-Print Network (OSTI)

..................................................................................................... 5 1. ACCEPTABLE USE............................................................................................................................................. 9 6. RISK MANAGEMENT

Alpay, S. Pamir

289

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

290

Nuclear safety information sharing agreement between NRC and DOEs Office of Environment, Health, Safety and Security  

Energy.gov (U.S. Department of Energy (DOE))

Nuclear safety information sharing agreement between NRC and DOEs Office of Environment, Health, Safety and Security.

291

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

292

Environmental remediation and waste management information systems  

SciTech Connect

The purpose of this paper is to document a few of the many environmental information systems that currently exist worldwide. The paper is not meant to be a comprehensive list; merely a discussion of a few of the more technical environmental database systems that are available. Regulatory databases such as US Environmental Protection Agency`s (EPA`s) RODS (Records of Decision System) database [EPA, 1993] and cost databases such as EPA`s CORA (Cost of Remedial Action) database [EPA, 1993] are not included in this paper. Section 2 describes several US Department of Energy (DOE) Environmental Restoration and Waste Management (EM) information systems and databases. Section 3 discusses several US EPA information systems on waste sites and technologies. Section 4 summarizes a few of the European Community environmental information systems, networks, and clearinghouses. And finally, Section 5 provides a brief overview of Geographical Information Systems. Section 6 contains the references, and the Appendices contain supporting information.

Harrington, M.W.; Harlan, C.P.

1993-12-31T23:59:59.000Z

293

3-Year Renewal Request of OMB 1910-0818, Security, Information Request  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Topical Areas HSS Topical Areas Quality Assurance Enforcement / Oversight Environment HSS Outreach and Communications HSPD-12 Nuclear Materials Management & Safeguards System (NMMSS) HSS Internal Operations Council on Environmental Quality (CEQ) Office of Health, Safety and Security Collection Package Human Reliability Program OMB 1910-5122 Description of Collections 1. Human Reliability Program Certification (DOE F 470.3). Under the Department of Energy Human Reliability Program (HRP), individuals who are applicants for or incumbents in designated positions must be evaluated to ensure that they meet the requirements for certification in the program. This form documents that each part of the evaluation has been completed and records the determination by the HRP Certifying Official. The collection and documentation of this information is required by the HRP regulation found in the Code of Federal Regulations at 10 CFR 712. Form may be viewed at: http://energy.gov/cio/downloads/doe-f-4703

294

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

295

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

296

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

297

Nevada National Security Site Cleanup Information Is Just a Click Away with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Cleanup Information Is Just a Click Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public December 27, 2012 - 12:00pm Addthis Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. LAS VEGAS, NV - For decades, the Nevada Site Office (NSO) has been investigating, characterizing, identifying, and performing corrective

298

Managing Energy Demand With Standards and Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Managing Energy Demand With Standards and Information Managing Energy Demand With Standards and Information Speaker(s): Sebastien Houde Date: September 13, 2012 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Christopher Payne The goal of this talk is to discuss two interrelated research projects that aim to assess the welfare effects of energy policies that rely on standards and information. The first project focuses on the Energy Star certification program. Using unique micro-data on the US refrigerator market, I first show that consumers respond to certification in different ways. Some consumers appear to rely heavily on Energy Star and pay little attention to electricity costs, others are the reverse, and still others appear to be insensitive to both electricity costs and Energy Star. I then develop a

299

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network (OSTI)

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

300

Office of Information and Business Management | Department of...  

Office of Environmental Management (EM)

Business Management Office of Information and Business Management OIBM provides the foundation to propel the Office of Energy Efficiency and Renewable Energy (EERE) toward...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Final Report Implementing Office of Management and Budget Information...  

Energy Savers (EERE)

Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) Final Report Implementing Office of Management and Budget...

302

Portland State University Confidentiality and Information Management Policy and Procedures  

E-Print Network (OSTI)

Portland State University Confidentiality and Information Management Policy and Procedures I:\\Staff\\DEV\\Office\\KATRINA\\WEB\\Policies Page\\Info Mgmt Policy & Procedures.doc 8/15/2008 PORTLAND STATE UNIVERSITY CONFIDENTIALITY and INFORMATION MANAGEMENT POLICY and PROCEDURES Confidentiality and Information Management Policy Information

Bertini, Robert L.

303

U-200: Red Hat Directory Server Information Disclosure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Passwords to Remote Authenticated and Local Users V-041: Red Hat CloudForms Multiple Vulnerabilities T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

304

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgw...

305

Incorporating hacking projects in computer and information security education: an empirical study  

Science Journals Connector (OSTI)

Incorporating hacking projects in information security education is controversial. However, several studies discussed the benefits of including offensive exercises (e.g., hacking) in information security courses. In this paper, we present our experiment in incorporating hacking projects in the laboratory exercises for an undergraduate-level Computer and Information Security (CIS) course at King Abdulaziz University (KAU), Saudi Arabia. We conducted a survey to measure the effectiveness of incorporating hacking projects from the students' perspective. We also questioned the ethical aspects of these projects. The results strongly suggest that hacking projects have helped the students better understanding computer and information security principles. Furthermore, the majority of the students stated that they do not intend to misuse the learned skills, mainly for religious and ethical reasons. We also present the precautions that we took to avoid legal or ethical consequences that may be connected with these activities.

Eman Alashwali

2014-01-01T23:59:59.000Z

306

An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions  

E-Print Network (OSTI)

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

2006-01-01T23:59:59.000Z

307

J. Douglas Streit, Information Security Officer Office of Computing and Communications Services  

E-Print Network (OSTI)

Last updated February 6, 2012 Old Dominion University Information Technology Security Program #12;J and collaborative network environment required for higher education institutions to foster scholarly activity II delegated authority from the Commonwealth under the Virginia Restructured Higher Education

308

Information needs for risk management/communication  

SciTech Connect

The hazardous waste cleanup program under the Comprehensive Environmental Response, Compensation, and Liability Act (Superfund) is delegated to the ten Regions of the US Environmental Protection Agency (EPA) and has, to date, identified more than 33,000 sites for consideration. The size and complexity of the program places great demands on those who would provide information to achieve national consistency in application of risk assessment while meeting site-specific needs for risk management and risk communication.

Bennett, D.A. [Environmental Protection Agency, Washington, DC (United States)

1990-12-31T23:59:59.000Z

309

NNSA Field Office Manager Moves | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

has previously served as the Pantex Site Office Manager and the Pantex Site Office Senior Scientific and Technical Advisor. He has both the breadth of experience and the right...

310

Office of Information and Business Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information and Business Management Information and Business Management Office of Information and Business Management OIBM provides the foundation to propel the Office of Energy Efficiency and Renewable Energy (EERE) toward achieving its strategic goal of rapid and successful commercialization of EERE technologies. This foundation is comprised of meaningful portfolio management support, enterprise compliance, and an agile information technology suite of tools. This includes the following: Conducting assessments of EERE programs and management approaches and formulating findings, recommendations, and action plans to improve the effectiveness and efficiency of EERE's management of programs. Partnering across EERE, the Department of Energy (DOE), and industry to implement more effective portfolio, program, and project management.

311

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

312

Information Management Division (HC-14) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Management Division (HC-14) Information Management Division (HC-14) Information Management Division (HC-14) Mission Statement This division provides operational support and consultative advice to the Chief Human Capital Officer and Departmental Senior Management on matters pertaining to the acquisition, deployment and maintenance of enabling technology to support the tactical and strategic management of human capital related to accomplishing Department goals and program objectives. The mission also entails establishing and providing assistance and guidance on the use of technology-supported business process reengineering; investment analysis; performance measurement; strategic development and application of information systems and infrastructure; policies to provide improved management of information resources and technology; and better,

313

Bureau of Land Management - WO-210 - Contact Information | Open...  

Open Energy Info (EERE)

- Contact Information Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Bureau of Land Management - WO-210 - Contact Information Abstract This page...

314

Integrated Information Base For Sustainable Water Resources Management  

Science Journals Connector (OSTI)

Water resources management has to be based on informed decision making, where information in three dimensions, namely economic, social and environmental, is required to identify indicators for sustainabili...

N. B. Harmancioglu

2008-01-01T23:59:59.000Z

315

Combining Provenance and Security Policies in a Web-based Document Management System  

E-Print Network (OSTI)

Combining Provenance and Security Policies in a Web-based Document Management System Brian J policies with provenance tracking. For instance, an on- line stock trading website might restrict access. Similarly, the application might need to track the provenance of transaction infor- mation to support

Hicks, Michael

316

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

317

ORISE: Capabilities in National Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

will assist public information officials determine the best response to an emergency. Forensic Science Forensic Science ORISE possesses the forensic and analytical capabilities to...

318

Information System Security Officer (ISSO) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

system. ISSO Core Competency Training Worksheet More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR)...

319

Toward sensitive information redaction in a collaborative, multilevel security environment  

Science Journals Connector (OSTI)

Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, government, and research environments it is often necessary to control access ... Keywords: collaboration, multilevel security, redaction

Peter Gehres; Nathan Singleton; George Louthan; John Hale

2010-07-01T23:59:59.000Z

320

Securely Managing Cryptographic Keys used within a Cloud Environment  

E-Print Network (OSTI)

to rapidly develop/host cloud applications Infrastructure as a Service (Iaas) - Networked access to processing power, storage Cloud Deployment Models Public Cloud Private Cloud Community Cloud Hybrid administers the Cloud Infrastructure? Who has access to my data? My activity history? Key Management Where

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Los Alamos Field Office Emergency Public Information | National...  

National Nuclear Security Administration (NNSA)

Emergency Public Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering...

322

Mobile Technology Management - DOE Directives, Delegations, and...  

NLE Websites -- All DOE Office Websites (Extended Search)

203.2, Mobile Technology Management by Denise Hill Functional areas: Mobile Technology, Information Technology, Information Security The order establishes requirements, assigns...

323

Security of Information Flow in the Electric Power Grid  

Science Journals Connector (OSTI)

The confidentiality of information in a system can be breached through unrestricted information flow. The formal properties of non-deducibility and non-inference are often used to assess information flow in purel...

Han Tang; Bruce McMillin

2008-01-01T23:59:59.000Z

324

An Advanced Security Infrastructure for Heterogeneous Relational Grid Data Sources  

Science Journals Connector (OSTI)

In this paper we deal with the problem of secure access to metadata information in Grid computing environments. The heterogeneity of the eventual ... database management systems) and the enforcement of security p...

Javier Jan Martnez; JosH. Cans

2004-01-01T23:59:59.000Z

325

Welcome to the Kansas City Field Office | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

(816) 488-3341 Manager, Office of Business & Security Operations (816) 488-5321 Contracting Officer (816) 488-3249 Team Lead, Security & Information Systems (816) 488-5109...

326

Energy Security and Restoration Exercise Program/Best Practices and Information Sharing  

SciTech Connect

The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

Barbara McCabe; John Kovach

2009-03-30T23:59:59.000Z

327

Waste Management Facilities Cost Information Report  

SciTech Connect

The Waste Management Facility Cost Information (WMFCI) Report, commissioned by the US Department of Energy (DOE), develops planning life-cycle cost (PLCC) estimates for treatment, storage, and disposal facilities. This report contains PLCC estimates versus capacity for 26 different facility cost modules. A procedure to guide DOE and its contractor personnel in the use of estimating data is also provided. Estimates in the report apply to five distinctive waste streams: low-level waste, low-level mixed waste, alpha contaminated low-level waste, alpha contaminated low-level mixed waste, and transuranic waste. The report addresses five different treatment types: incineration, metal/melting and recovery, shredder/compaction, solidification, and vitrification. Data in this report allows the user to develop PLCC estimates for various waste management options.

Feizollahi, F.; Shropshire, D.

1992-10-01T23:59:59.000Z

328

Security-Widefield, Colorado: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Security-Widefield, Colorado: Energy Resources Security-Widefield, Colorado: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 38.7640957°, -104.7404269° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.7640957,"lon":-104.7404269,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

329

Ethanol Capital Management | Open Energy Information  

Open Energy Info (EERE)

Management Jump to: navigation, search Name: Ethanol Capital Management Place: Tucson, Arizona Zip: 85711 Product: Manages funds investing in Ethanol plants in the US Coordinates:...

330

Solar International Management Inc | Open Energy Information  

Open Energy Info (EERE)

Management Inc Jump to: navigation, search Name: Solar International Management Inc Place: Washington,DC, Washington, DC Zip: 20006 Sector: Solar Product: Manager of the Solar Bank...

331

NERSC Information Management (NIM) Guide for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Users NIM Guide for Users Getting Started The NERSC Information Management (NIM) system is a web portal that contains user, login name, usage, and allocations information. First Time Login The first time you log in to NIM, you will have to change your NIM password. Your NIM password is also your NERSC password and all NERSC passwords must abide by certain requirements. See Passwords. Logging In To log into the NIM system, point your web browser to the URL http://nim.nersc.gov. Please use this URL as a bookmark for NIM. If you have bookmarked a different URL, you may have to log in twice. Enter your NERSC username and NIM password. If you are having problems with your NIM password contact the NERSC Account Support Office, 1-800-66NERSC, option 2. You can only have one active NIM session on your local computer. If you try

332

Inspection of Emergency Management at the Office of Secure Transportation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 3.0 CONCLUSIONS ..................................................................................... 4 4.0 RATINGS ................................................................................................ 6 APPENDIX A - SUPPLEMENTAL INFORMATION ................................. 7 APPENDIX B - SITE-SPECIFIC FINDINGS.............................................. 9 APPENDIX C - EMERGENCY PLANNING ............................................ 11 APPENDIX D - EMERGENCY PREPAREDNESS .................................. 19 APPENDIX E - EMERGENCY RESPONSE ............................................. 23 APPENDIX F - READINESS ASSURANCE ............................................ 29 Abbreviations Used in This Report ARG Accident Response Group CCIC Convoy Commander in Charge

333

Dr. Ron Ross Computer Security Division,  

E-Print Network (OSTI)

SPEAKERS Dr. Ron Ross Computer Security Division, Information Technology Laboratory, National Professor & Chair, Computer Science Department, North Carolina, A&T State University Dr. Vipin Swarup Chief for Information Assurance, University of Memphis 8:10 ­ 8:40 Ron Ross "Managing Information Security Risk" 8

Dasgupta, Dipankar

334

Cautionary tales from real world failures for managing security in the cyber world  

Science Journals Connector (OSTI)

Any field of endeavor benefits from a body of knowledge of failures that provide guidance on what to avoid. As a relatively young discipline whose failures can often be handled privately, information security professionals do not have access to the volume ... Keywords: bridges, catastrophic failure, civil engineering, failure, lessons learned

Bill Naber

2010-10-01T23:59:59.000Z

335

A flexible information management system for supporting manufacturing activities  

Science Journals Connector (OSTI)

The lack of seamless information interchange hinders the accomplishment of manufacturing activities, which are related to the efficient bi-directional flow of information, coordination of decisions and enhancement of assimilation of practices within ... Keywords: data exchange, flexibility, information flow, information management, information sharing, information systems, manufacturing activities, object technology

G. T. S. Ho; H. C. W. Lau; C. K. M. Lee; A. W. H. Ip

2007-04-01T23:59:59.000Z

336

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network (OSTI)

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing resource records, and organizational accounting information. Recent cases of industrial espionage all point addressed if both technological and organizational issues are considered simultaneously. How should

Sadeh, Norman M.

337

Office of Headquarters Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Security Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process.

338

The Certification Information System: Managing Chain-of-Custody  

E-Print Network (OSTI)

-based Information Interchange #12;Transition To CIS-Based Certification Channel Management Buyer CIS Based LogisticsThe Certification Information System: Managing Chain-of-Custody Lucie K. Ozanne, Ph.D. Senior of chain-of-custody (COC) specifications. COC is a materials management and production exercise. COC

339

Modified Letter from Tom Formanek, Manager, Ithaca Social Security Administration September 2011  

E-Print Network (OSTI)

for a Social Security number, becoming insured under Social Security, planning for retirement, and filing

Hemami, Sheila S.

340

PIA - Foreign Travel Management System (FTMS) | Department of...  

Office of Environmental Management (EM)

(FTMS) PIA - Foreign Travel Management System (FTMS) More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

PIA - HSS Electronic Visitor Management System (HSEVMS) | Department...  

Office of Environmental Management (EM)

- HSS Electronic Visitor Management System (HSEVMS) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL PeopleSoft - Human...

342

DOE Cites Battelle Energy Alliance, LLC for Classified Information Security Violations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 25,2011 February 25,2011 CERTIFIED MAIL RETURN RECEIPT REQUESTED Mr. John 1. Grossenbacher Director, Idaho National Laboratory and President, Battelle Energy Alliance, LLC P. O. Box 1625 Idaho Falls, Idaho 83415-3695 SEA-20ll-01 Dear Mr. Grossenbacher: The Office of Health, Safety and Security's Office of Enforcement has completed its investigation into the facts and circumstances associated with an incident of security concern regarding the introduction of classified information into unapproved information systems (security event) at the U.S. Department of Energy's (DOE) Idaho National Laboratory (INL). Based on the on-site investigation and evaluation of the evidence in this matter, and in consideration of information presented by you and other Battelle Energy Alliance, LLC (BEA)

343

Promoting safety, security, and sustainability: Institute fosters programs on natural resource science and management  

E-Print Network (OSTI)

science and management, the Texas A&M Institute of Renewable Natural Resources (IRNR) protects and promotes the safety, security, and sustainability of land, water, and wildlife. IRNR, a unit of Texas AgriLife Research and the Texas Agri... projects that promote sustainable land use through stewardship practices, land-use forecasting and policy, restoration ecology, and ecosystem services. Involved in working on landscape-scale restoration projects, IRNR developed the Trinity River...

Wythe, Kathy

2011-01-01T23:59:59.000Z

344

Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables  

SciTech Connect

Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

Not Listed

2011-09-01T23:59:59.000Z

345

INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment  

SciTech Connect

The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

None

2009-05-01T23:59:59.000Z

346

Service oriented architecture governance tools within information security .  

E-Print Network (OSTI)

??Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for (more)

Mokgosi, Letlhogonolo

2012-01-01T23:59:59.000Z

347

Freedom of Information Act Related Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

of Defense scientific and technical information. Radiation Effects Research Foundation A Cooperative Japan-United States Research Organization, conducts research and...

348

Headquarters Security Operations  

Energy.gov (U.S. Department of Energy (DOE))

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

349

Green Bulletin Information for pest management professionals and pesticide applicators  

E-Print Network (OSTI)

Vol. 3 l No. 3 l May 2013 Green Bulletin Information for pest management professionals subscription to the Green Bulletin at http://www.ipm.ucdavis.edu/greenbulletin! What Can Landscape Managers Do

Ishida, Yuko

350

Facilities Information Management System (FIMS) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities Information Management System Facilities Information Management System (FIMS) Facilities Information Management System (FIMS) FIMS is DOE's corporate database for real property as required by DOE Order 430.1B, Real Property Asset Management. The system provides DOE with an accurate inventory and management tool that assists with planning and managing all current real property assets. The DOE Office of Acquisition and Project Management, the Office of Management and Budget, Congress, and other Federal entities use the real property data reported through FIMS. All Office of Legacy Management (LM) real property assets (buildings, trailers, other structures, and land) are entered into FIMS at the time they are acquired. Annually LM is required to update maintenance cost, operating cost, replacement cost, and utilization details for each asset.

351

Exploiting adversary's risk profiles in imperfect information security games  

Science Journals Connector (OSTI)

At present much of the research which proposes to provide solutions to Imperfect Information Non-Cooperative games provides superficial analysis which then requires a priori knowledge of the game to be played. We propose that High Card, a simple Multiplayer ... Keywords: adversarial game theory, high card, imperfect information

Gabriel Fortunato Stocco; George Cybenko

2011-11-01T23:59:59.000Z

352

Disable Automatic Login, Cyber Security, Information Technology Division,  

NLE Websites -- All DOE Office Websites (Extended Search)

Disable Automatic Login Disable Automatic Login Automatic Login MUST be disabled... Follow the steps below to verify that auto login is disabled. Verify Security Settings Select Personal Section: Click Make sure the following required boxes are checked. - Require password to wake this computer from sleep or screen saver - Disable automatic login If so, close panel. If not, continue... Note: Mac users should have the panel locked at all times. Click the lock image to lock the panel if its open to prevent further changes. To unlock the above panel, click the lock image to bring up the login box. Insert your username & password, click . You should now be able to make changes to the panel.

353

Commercial Algae Management | Open Energy Information  

Open Energy Info (EERE)

Commercial Algae Management Jump to: navigation, search Name: Commercial Algae Management Address: 320 Arbor Lane Place: Franklin, NC Zip: 28734 Year Founded: 2002 Phone Number:...

354

California Coastal Management Program | Open Energy Information  

Open Energy Info (EERE)

California Coastal Management Program Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: California Coastal Management ProgramLegal...

355

Sarsia Seed Management | Open Energy Information  

Open Energy Info (EERE)

Sarsia Seed Management Jump to: navigation, search Name: Sarsia Seed Management Place: Norway Sector: Services Product: General Financial & Legal Services ( Private ...

356

Information Management and Supporting Documentation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Management and Supporting Documentation Information Management and Supporting Documentation Information Management and Supporting Documentation The Paperwork Reduction Act (PRA) of 1995 requires each Federal agency to seek and obtain approval from the Office of Management and Budget (OMB) before undertaking a collection of information directed to 10 or more persons (including operations of Government-owned, contractor-operated facilities). Under the PRA, OMB approval for each information collection instrument can last a maximum of 3 years. This site provides information about the Paperwork Reduction Act's requirements and guidance in fulfilling those requirements. DOE's Chief Information Officer (CIO) is the Senior Official responsible for DOE's compliance with the Paperwork Reduction Act. Office of Management and

357

Industrial energy management information center | ENERGY STAR Buildings &  

NLE Websites -- All DOE Office Websites (Extended Search)

energy management information center energy management information center Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Get started with ENERGY STAR Make the business case Build an energy management program Measure, track, and benchmark Improve energy performance Industrial service and product providers Earn recognition Market impacts: Improvements in the industrial sector

358

Using Ontologies for Collaborative Information Management: Some Challenges and Ideas  

Science Journals Connector (OSTI)

Emerging collaborative networks (CNs) bring together the need for an effective collaborative information management (CIM) infrastructure. Achieving a common understanding of ... a big challenge for the developers...

Victor Guevara-Masis; Ozgul Unal; Ersin C. Kaletas

2005-01-01T23:59:59.000Z

359

LM Records and Information Management Transition Guidance (January 2015)  

Energy.gov (U.S. Department of Energy (DOE))

This guidance document establishes a framework for developing a Records and Information Management Transition Plan as part of the overall transition effort for a legacy site.

360

Best Management Practice #2: Information and Education Programs...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Best Management Practice 2: Information and Education Programs Educating users about water conservation is essential to sustain the savings of water-efficient technologies and...

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Ground Water Management District Rules | Open Energy Information  

Open Energy Info (EERE)

District Rules Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Ground Water Management District Rules Abstract This webpage provides information...

362

Information Management | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Information Management Information Management Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Services Information Management Print Text Size: A A A RSS Feeds FeedbackShare Page Integrated Support Center information management professionals are an integral part of the Science Information Technology Modernized Organization. Staff in the ISC collaborate closely with the Site Offices and the SC Chief Information Officer to ensure federal staff in the field have the right products and services to efficiently fulfill the mission.

363

Dynamic Resource Management for Adaptive Distributed Information Fusion in  

E-Print Network (OSTI)

Dynamic Resource Management for Adaptive Distributed Information Fusion in Large Volume for distributed information fusion to address large volume surveil- lance challenges, assuming a multitude of different sensor types on multi- ple mobile platforms for intelligence, surveillance and reconnaissance. Our

Zhang, Richard "Hao"

364

CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations  

E-Print Network (OSTI)

permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

Locasto, Michael E.

365

Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy  

E-Print Network (OSTI)

Lucas Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT controls Supported by the Zurich Information Security Center. Work done while at ETH Zurich, Switzerland

Maurer, Ueli

366

HybridSecure MPC: Trading InformationTheoretic Robustness for Computational Privacy  

E-Print Network (OSTI)

Lucas # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT--- Cryptographic controls # Supported by the Zurich Information Security Center. + Work done while at ETH Zurich

Maurer, Ueli

367

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided ...

Claire Elliott

2010-08-01T23:59:59.000Z

368

Securing Dynamic Group Membership Information over Multicast: Attacks and Immunization  

E-Print Network (OSTI)

(GDI) as information describing the dynamic membership of a group application, such as the number the service during a time interval. In many multicast applications, GDI is confidential and should of the GDI to competitors could enable them to analyze the statistical behavior of the audience and help them

Sun, Yan Lindsay

369

Citizens' social media use and homeland security information policy: Some evidences from Twitter users during the 2013 North Korea nuclear test  

Science Journals Connector (OSTI)

Abstract In the era of Web 2.0, managing risk communication on social networking sites has increasingly become crucial and complicated issues in the field of homeland security. The response to the 2013 nuclear test in North Korea was largely based on a coordinated effort by Korea's Ministry of Defense, the United Nations, and many countries from around the globe. By analyzing risk communication networks emerged from Twitter users for the period from January 30 to February 24, 2013, this study investigates the way in which citizens' risk communication is formulated through social media and how they transmit risk information in homeland security. Analysis results show the dynamic evolution of risk communication networks based on influential actors with critical information who played pivotal roles in distributing this information to other actors.

Kyujin Jung; Han Woo Park

2014-01-01T23:59:59.000Z

370

UUNNIIVVEERRSSIITTYY OOFF FFLLOORRIIDDAA INFORMATION PRIVACY  

E-Print Network (OSTI)

Requirements Security of Restricted Information: General Privacy Safeguards 16 o Physical Safeguards: Securing Paper and Electronic Records o Administrative Safeguards 17 Policies and Procedures Incident Management Notice of Termination o Technical Safeguards 17 Access Controls Password Controls Account

Pilyugin, Sergei S.

371

GIDAP Best Management Practice | Open Energy Information  

Open Energy Info (EERE)

Best Management Practice Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: GIDAP Best Management PracticeLegal Abstract Generator...

372

Green Capital Management | Open Energy Information  

Open Energy Info (EERE)

Green Capital Management Place: London, United Kingdom Zip: SW10 0BB Sector: Services Product: The Green Capital Management Fund LP is a private equity fund dedicated to investing...

373

Division of Information Information Systems Documentation Enterprise Systems Management Framework Version 6.0  

E-Print Network (OSTI)

Division of Information Information Systems Documentation Enterprise Systems Management Framework Version 6.0 Enterprise Systems Management Framework Version: 6.0 Date: 2 Jan 2008 Status: Endorsed Systems Management Framework Version 6.0 DOCUMENT DETAILS Document Number CIS 0002/200504466 Document

Botea, Adi

374

Information Center | Department of Energy  

Office of Environmental Management (EM)

Center Information Center The U.S. Department of Energy's (DOE) Office of Enterprise Assessments (EA) provides expert evaluations of management performance in safety, security and...

375

What can I do with a degree in Telecommunications and Information Management (TIM)  

E-Print Network (OSTI)

What can I do with a degree in Telecommunications and Information Management (TIM) Telecommunications and Information Management involves the integration of business information systems with telecommunications. Telecommunication and Information Management majors learn how to effectively run a business

de Doncker, Elise

376

Carnegie Mellon University 70-451 Management Information Systems: Spring 2012Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon Univ  

E-Print Network (OSTI)

Carnegie Mellon University 70-451 Management Information Systems: Spring 2012Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring 2012 1Carnegie Mellon University 70-451 Management Information Systems: Spring

Gatterbauer, Wolfgang

377

Evaluation of the Los Alamos National Security Emergency Operations Divison Emergency Management Self-assessment Practices, June 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06-08 06-08 Site: Los Alamos National Laboratory Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Evaluation of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment Practices Dates of Activity : 06/06/2011-06/08/2011 Report Preparer: John Bolling/Randy Griffin Activity Description/Purpose: Los Alamos National Security, LLC (LANS) and the Los Alamos Site Office (LASO) requested that the U.S. Department of Energy (DOE), Office of Health, Safety and Security (HSS), Office of Safety and Emergency Management Evaluations evaluate LANS's Emergency Operations Division emergency management self- assessment practices. Utilizing the self-assessment of the Los Alamos National Laboratory (LANL) emergency

378

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information  

SciTech Connect

To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the analysts world knowledge that puts these attributes in context. What known exploits or new vulnerabilities might an anomalous traffic pattern suggest? What organizational, social, or geopolitical events help forecast or explain attacks and anomalies? Few visualization tools support creating, maintaining, and applying this knowledge of the threat landscape. Through a series of formative workshops with practicing security analysts, we have developed a visualization approach inspired by the human process of contextualization; this system, called NUANCE, creates evolving behavioral models of network actors at organizational and regional levels, continuously monitors external textual information sources for themes that indicate security threats, and automatically determines if behavior indicative of those threats is present on a network.

Pike, William A.; Scherrer, Chad; Zabriskie, Sean J.

2008-06-04T23:59:59.000Z

379

Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management  

Science Journals Connector (OSTI)

WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make good decisions, to get things done, to learn, and to gain better mastery of the world around us. But we do not always have good control of our information - not even in the "home waters" ... Keywords: Database Management, Library & Information Science, User Interfaces

William Jones

2007-11-01T23:59:59.000Z

380

Definition: Demand Side Management | Open Energy Information  

Open Energy Info (EERE)

Side Management Side Management Jump to: navigation, search Dictionary.png Demand Side Management The term for all activities or programs undertaken by Load-Serving Entity or its customers to influence the amount or timing of electricity they use.[1] View on Wikipedia Wikipedia Definition Energy demand management, also known as demand side management (DSM), is the modification of consumer demand for energy through various methods such as financial incentives and education. Usually, the goal of demand side management is to encourage the consumer to use less energy during peak hours, or to move the time of energy use to off-peak times such as nighttime and weekends. Peak demand management does not necessarily decrease total energy consumption, but could be expected to reduce the need

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

RAM Capital Management Group | Open Energy Information  

Open Energy Info (EERE)

RAM Capital Management Group RAM Capital Management Group Jump to: navigation, search Name RAM Capital Management Group Place Boca Raton, Florida Zip 33486 Sector Hydro, Hydrogen Product Private VC fund and investment banking advisory firm investing in fuel cells and hydrogen. References RAM Capital Management Group[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. RAM Capital Management Group is a company located in Boca Raton, Florida . References ↑ "RAM Capital Management Group" Retrieved from "http://en.openei.org/w/index.php?title=RAM_Capital_Management_Group&oldid=350184" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes

382

Viresco International Capital Management | Open Energy Information  

Open Energy Info (EERE)

Viresco International Capital Management Viresco International Capital Management Jump to: navigation, search Name Viresco International Capital Management Place San Diego, California Zip 92130 Product San Diego-based hedge fund, who recently initiated a fund that will prioritize activity towards clean technology - Viresco Opportunities Global Fund. References Viresco International Capital Management[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Viresco International Capital Management is a company located in San Diego, California . References ↑ "Viresco International Capital Management" Retrieved from "http://en.openei.org/w/index.php?title=Viresco_International_Capital_Management&oldid=352843

383

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

384

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

385

Security Specialist  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

386

You Cannot Manage What You Cannot Measure: An Information Systems Based Asset Management Perspective  

Science Journals Connector (OSTI)

Measuring the impact of implementation of information systems for asset management is a complex issue; due to the stochastic nature of process variables, substantial effects of information systems on the way u...

Abrar Haider; Andy Koronios; Gerald Quirchmayr

2006-01-01T23:59:59.000Z

387

Greenstone Carbon Management Ltd | Open Energy Information  

Open Energy Info (EERE)

London-based specialist carbon solutions provider to measure, manage and mitigate their carbon emissions and realise business and financial benefits. References: Greenstone...

388

ARM Tropical Western Pacific (TWP) Operations Management and Support: Securing ARM Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Tropical Western Pacific (TWP) Operations Tropical Western Pacific (TWP) Operations Management and Support: Securing ARM Data K. L. Nitschke South Pacific Regional Environment Programme Apia, Samoa L. Jones Los Alamos National Laboratory Los Alamos, New Mexico C. N. Long Pacific Northwest National Laboratory Richland, Washington Introduction The Tropical Western Pacific Office (TWPO) (a) has been tasked with providing operational management and support for three (b) climate station instrument facilities in the Tropical Western pacific (TWP) locale. The TWPO has the distinctive purview in ensuring data availability from two remote Pacific Islands and Australia to support the continued national and international scientific collaboration that exemplifies the Atmospheric Radiation Measurement (ARM) Program. Data from the international sites have been

389

Standard information system for construction management  

E-Print Network (OSTI)

of the Internet with public domain from the Extranet used by the partners, and from the Intranet, which is available only to a company' s permanent employees. The Construction Industry Institute (CII) at the University of Texas at Austin has done a... compatibility problems; 5. User-friendliness and clearness of XML documents (Walsh 1998) Virtual Private Networks Virtual Private Networks (VPN) use the Internet to securely link two or more private networks (Intranets) . VPN consist of 'tunnels' created...

Sultanbekov, Kanat A

2012-06-07T23:59:59.000Z

390

TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook  

Science Journals Connector (OSTI)

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic ... Keywords: Security

Jack Wiles

2007-10-01T23:59:59.000Z

391

Basis for an integrated security ontology according to a systematic review of existing proposals  

Science Journals Connector (OSTI)

The use of ontologies to represent knowledge provides us with organization, communication and reusability. The concepts and relations managed by any scientific community need to be formally defined. Since security in information technologies has evolved ... Keywords: Ontologies, Security, Systematic review

Carlos Blanco; Joaqun Lasheras; Eduardo Fernndez-Medina; Rafael Valencia-Garca; Ambrosio Toval

2011-06-01T23:59:59.000Z

392

Definition: Meter Data Management System | Open Energy Information  

Open Energy Info (EERE)

System System Jump to: navigation, search Dictionary.png Meter Data Management System A meter data management system (MDMS) collects and stores meter data from a head-end system and processes that meter data into information that can be used by other utility applications including billing, customer information systems, and outage management systems. The MDMS is a key resource for managing large quantities of meter data.[1] Related Terms system, outage management system References ↑ https://www.smartgrid.gov/category/technology/meter_data_management_system [[Ca LikeLike UnlikeLike You like this.Sign Up to see what your friends like. tegory: Smart Grid Definitionssmart grid,smart grid, |Template:BASEPAGENAME]]smart grid,smart grid, Retrieved from "http://en.openei.org/w/index.php?title=Definition:Meter_Data_Management_System&oldid=50258

393

Office of Headquarters Security Operations  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

394

Coastal Zone Management Act | Open Energy Information  

Open Energy Info (EERE)

Zone Management Act Zone Management Act Jump to: navigation, search Statute Name Coastal Zone Management Act Year 1972 Url [[File:|160px|link=]] Description The Coastal Zone Management Act of 1972 (CZMA; Pub.L. 92-583, 86 Stat. 1280, enacted October 27, 1972, 16 U.S.C. §§ 1451-1464, Chapter 33) is an Act of Congress passed in 1972 to encourage coastal states to develop and implement coastal zone management plans (CZMPs). This act was established as a United States National policy to preserve, protect, develop, and where possible, restore or enhance, the resources of the Nation's coastal zone for this and succeeding generations. References Wikipedia[1] National Oceanic and Atmospheric Administration[2] The U.S. Congress recognized the importance of meeting the challenge of

395

Management of Bonneville Power Administration's Information Technology Program, IG-0861  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management of Bonneville Power Management of Bonneville Power Administration's Information Technology Program DOE/IG-0861 March 2012 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 March 26, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Bonneville Power Administration's Information Technology Program" INTRODUCTION AND OBJECTIVE The Bonneville Power Administration provides about 30 percent of wholesale electric power to regional utilities that service homes, hospitals, financial institutions, commercial entities and military installations in the Pacific Northwest. Bonneville makes extensive use of various

396

GHG Management Institute curriculum | Open Energy Information  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » GHG Management Institute curriculum Jump to: navigation, search Tool Summary LAUNCH TOOL Name: GHG Management Institute curriculum Agency/Company /Organization: Greenhouse Gas Management Institute (GHGMI) Partner: Various Sector: Energy, Land, Climate Focus Area: Non-renewable Energy, Energy Efficiency, Buildings, Buildings - Commercial, Buildings - Residential, Renewable Energy, Biomass, - Landfill Gas, - Anaerobic Digestion, Solar, Wind, Forestry, Offsets and Certificates, Greenhouse Gas, Land Use Topics: Finance, Implementation, GHG inventory, Market analysis

397

Office of Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Mission and Functions Mission and Functions Mission The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is the database owner for the principal personnel security information processing activities of the Department and personnel security administrative review process. Functions

398

Federal Emergency Management Agency | Open Energy Information  

Open Energy Info (EERE)

Emergency Management Agency Emergency Management Agency Jump to: navigation, search Logo: Federal Emergency Management Agency Name Federal Emergency Management Agency Address 500 C Street SW Place Washington, District of Columbia Zip 20472 Year founded 1979 Website http://www.fema.gov/ Coordinates 38.8858427°, -77.0182049° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8858427,"lon":-77.0182049,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

399

Energy Management Services LLC | Open Energy Information  

Open Energy Info (EERE)

Energy Management Services LLC Energy Management Services LLC Jump to: navigation, search Name Energy Management Services LLC Place Encinitas, California Zip CA. 92024 Sector Services Product Energy Management Services, Inc coordinates consumers and natural gas supplyers. It also offers marketing and financing consultation. Coordinates 33.045436°, -117.292518° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":33.045436,"lon":-117.292518,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

400

Oregon Coastal Management Program | Open Energy Information  

Open Energy Info (EERE)

Coastal Management Program Coastal Management Program Jump to: navigation, search Logo: Oregon Coastal Management Program Name Oregon Coastal Management Program Address 635 Capitol St. NE Place Salem, Oregon Zip 97301-2540 Website http://www.oregon.gov/LCD/OCMP Coordinates 44.943778°, -123.026308° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":44.943778,"lon":-123.026308,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Definition: Congestion Management Report | Open Energy Information  

Open Energy Info (EERE)

Management Report Management Report Jump to: navigation, search Dictionary.png Congestion Management Report A report that the Interchange Distribution Calculator issues when a Reliability Coordinator initiates the Transmission Loading Relief procedure. This report identifies the transactions and native and network load curtailments that must be initiated to achieve the loading relief requested by the initiating Reliability Coordinator.[1] View on Wikipedia Wikipedia Definition Related Terms transmission lines, Reliability Coordinator, Interchange Distribution Calculator, transmission line, smart grid References ↑ Glossary of Terms Used in Reliability Standards An inli LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ne Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Congestion_Management_Report&oldid=502584"

402

Pacesetter Management Group | Open Energy Information  

Open Energy Info (EERE)

Pacesetter Management Group Pacesetter Management Group Jump to: navigation, search Name Pacesetter Management Group Place Stanley, Wisconsin Product Wisconsin based Pacesetter manages construction and operation of ethanol plants, as well as marketing the ethanol produced at the plant. Coordinates 44.958844°, -90.937009° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":44.958844,"lon":-90.937009,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

403

California Groundwater Management Plans | Open Energy Information  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: California Groundwater Management PlansLegal Published NA Year Signed or Took Effect 2014...

404

Property:SurfaceManager | Open Energy Information  

Open Energy Info (EERE)

SurfaceManager SurfaceManager Jump to: navigation, search Property Name SurfaceManager Property Type Page Pages using the property "SurfaceManager" Showing 25 pages using this property. (previous 25) (next 25) A AZA-009168 + COCONINO NF + AZA-009169 + COCONINO NF + AZA-009170 + COCONINO NF + AZA-009171 + FOREST SERVICE + AZA-009172 + FOREST SERVICE + AZA-009173 + FOREST SERVICE + AZA-009174 + FOREST SERVICE + AZA-009175 + COCONINO NF + AZA-009176 + BUREAU OF LAND MGMT + AZA-009177 + FOREST SERVICE + AZA-009178 + FOREST SERVICE + AZA-009179 + FOREST SERVICE + AZA-009180 + FOREST SERVICE + AZA-009181 + FOREST SERVICE + AZA-009182 + FOREST SERVICE + AZA-009183 + FOREST SERVICE + AZA-009184 + FOREST SERVICE + AZA-009185 + FOREST SERVICE + AZA-009186 + COCONINO NF +

405

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

406

Final Report Implementing Office of Management and Budget Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Final Report Implementing Office of Management and Budget Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) This DOE guidelines sets forth policy and procedures to ensure and maximize the quality, utility, objectivity, and integrity of the information that DOE disseminates to members of the public. DOE has prepared this final report pursuant to OMB government-wide guidelines under section 515 of the Treasury and General Government Appropriations Act for Fiscal Year 2001. 67 Fed Reg 62446: Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines More Documents & Publications

407

American Health Information Management Association Code of Ethics  

E-Print Network (OSTI)

1 American Health Information Management Association Code of Ethics Preamble The ethical should be disclosed. Ethical obligations are central to the professional's responsibility, regardless and the inherent ethical responsibilities for AHIMA members and credentialed HIM professionals include providing

Zhou, Yaoqi

408

Managing Information Flow between SysML and Modelica  

E-Print Network (OSTI)

Managing Information Flow between SysML and Modelica A Model-Based Design Project for ME6101ML and Modelica languages. Once I apply the method, I discuss the utility, limitations, and necessary future work

409

ADEQ Hazardous Waste Management website | Open Energy Information  

Open Energy Info (EERE)

OpenEI Reference LibraryAdd to library Legal Document- OtherOther: ADEQ Hazardous Waste Management websiteLegal Abstract The ADEQ provides links and information related to...

410

GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according  

E-Print Network (OSTI)

GLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used listening agent. A favored method of stealing passwords. Malware · a general term and malware in order to infiltrate, compromise, exploit and disable any device

Brinkmann, Peter

411

International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5, No. 2, August 2013 Badr Benmammar1,  

E-Print Network (OSTI)

68 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5, No. 2 and other mobile devices. Due to the emergence of application domains, such as sensor networks, smart grid

412

Roadmap: Business Management Technology Information Technology -Associate of Applied Business  

E-Print Network (OSTI)

Roadmap: Business Management Technology ­ Information Technology - Associate of Applied Business This roadmap is a recommended semester-by-semester plan of study for this major. However, courses Introduction to Management Technology 3 COMM 15000 Introduction to Human Communication 3 Fulfills Kent Core

Sheridan, Scott

413

The Information System The ideal system manager has the curiosity of a cat,  

E-Print Network (OSTI)

Chapter 2 The Information System Manager #12;The ideal system manager has the curiosity of a cat manage? As a property level information system manager, you may manage the following 3 types of computer #12;Who should manage the information system? O Patience and good communication skills O Hands

414

Information management support for international negotiations  

Science Journals Connector (OSTI)

This paper examines the information processing requirements that surround the international negotiations process. General problem-solving models and generic task taxonomies are explored to provide insight into...

Stephen J. Andriole

1993-05-01T23:59:59.000Z

415

INFORMATION SECURITY:  

Science Journals Connector (OSTI)

......of the top four risks to the UK. The...used as a form of political protest. The UK...the 650 million investment through the National...the considerable investment by the government...and development, risk analysis, policy...attacks, as a form of political protest, has become......

Cyber Security Skill Shortages

2012-01-01T23:59:59.000Z

416

How Communities Manage Forests | Open Energy Information  

Open Energy Info (EERE)

How Communities Manage Forests How Communities Manage Forests Jump to: navigation, search Tool Summary LAUNCH TOOL Name: How Communities Manage Forests Agency/Company /Organization: FORZA Sector: Land Focus Area: Forestry Topics: Background analysis Resource Type: Lessons learned/best practices Website: www.rightsandresources.org/documents/files/doc_1687.pdf Country: Bhutan, Bulgaria, Nepal, Kyrgyzstan, United Kingdom, Slovenia, Switzerland, Vietnam UN Region: Central Asia, South-Eastern Asia, "Western & Eastern Europe" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property.

417

UPC Solar Managment LLC | Open Energy Information  

Open Energy Info (EERE)

UPC Solar Managment LLC UPC Solar Managment LLC Jump to: navigation, search Name UPC Solar Managment LLC Place Chicago, Illinois Zip 60606 Sector Renewable Energy, Solar Product UPC Solar is a renewable energy development company that finances, owns and operates commercial scale PV energy projects throughout North America. Coordinates 41.88415°, -87.632409° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.88415,"lon":-87.632409,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

418

Applied Energy Management | Open Energy Information  

Open Energy Info (EERE)

Management Management Jump to: navigation, search Name Applied Energy Management Place Huntersville, North Carolina Zip 28078 Sector Efficiency, Renewable Energy Product North Carolina-based, energy efficiency and renewable energy service and construction company. Coordinates 35.409853°, -80.842716° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":35.409853,"lon":-80.842716,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

419

Planetary Emissions Management | Open Energy Information  

Open Energy Info (EERE)

Planetary Emissions Management Planetary Emissions Management Jump to: navigation, search Name Planetary Emissions Management Place Cambridge, Massachusetts Sector Carbon Product US-based, company offering measurements of carbon budgets using laser technology. Coordinates 43.003745°, -89.017499° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":43.003745,"lon":-89.017499,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

420

Vencon Management, Inc | Open Energy Information  

Open Energy Info (EERE)

Management, Inc Management, Inc Jump to: navigation, search Name Vencon Management, Inc Address 301 West 53rd Street Place New York, New York Zip 10019 Region New York Area - NY NJ CT PA Coordinates 40.7642006°, -73.9847564° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.7642006,"lon":-73.9847564,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Community Management Company | Open Energy Information  

Open Energy Info (EERE)

Management Company Management Company Jump to: navigation, search Name Community Management Company Address 1 St. Nicholas Terrace Place New York, New York Zip 10029 Region Northeast - NY NJ CT PA Area Coordinates 40.812561°, -73.952389° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.812561,"lon":-73.952389,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

422

Definition: Energy Management Device | Open Energy Information  

Open Energy Info (EERE)

Device Device Jump to: navigation, search Dictionary.png Energy Management Device A device in the customer's premise, including hardware and software, designed to control the operation of other energy devices according to customer preferences and objectives such as reducing energy costs, or maintaining comfort or convenience. Controlled devices could include, but are not limited to, thermostats, lighting, and smart appliances. Among other control inputs, an energy management device can accept energy pricing signals from a utility or third party energy services provider.[1] Related Terms energy, smart appliance References ↑ https://www.smartgrid.gov/category/technology/energy_management_device [[Ca LikeLike UnlikeLike You like this.Sign Up to see what your friends like.

423

Affiliated International Management (AIM) | Open Energy Information  

Open Energy Info (EERE)

Affiliated International Management (AIM) Affiliated International Management (AIM) Jump to: navigation, search Name Affiliated International Management (AIM) Place Newport Beach, CA Zip 92658 Coordinates 33.6392245°, -117.8647782° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":33.6392245,"lon":-117.8647782,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

424

Winslow Management Company LLC | Open Energy Information  

Open Energy Info (EERE)

Winslow Management Company LLC Winslow Management Company LLC Place Boston, Massachusetts Zip 2110 Product Boston-based, environmentally focused investment advisory firm that manages assets for institutions, corporations and non-profit institutions. Coordinates 42.358635°, -71.056699° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.358635,"lon":-71.056699,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

425

Demand Management Institute (DMI) | Open Energy Information  

Open Energy Info (EERE)

Demand Management Institute (DMI) Demand Management Institute (DMI) Jump to: navigation, search Name Demand Management Institute (DMI) Address 35 Walnut Street Place Wellesley, Massachusetts Zip 02481 Sector Buildings Product Provides analysis for buildings on reducing energy use Website http://www.dmiinc.com/ Coordinates 42.3256508°, -71.2530294° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.3256508,"lon":-71.2530294,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

426

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

427

Property:MineralManager | Open Energy Information  

Open Energy Info (EERE)

MineralManager MineralManager Jump to: navigation, search Property Name MineralManager Property Type Page Pages using the property "MineralManager" Showing 25 pages using this property. (previous 25) (next 25) B BLM-NV-WN-ES-08-01-1310, NV-020-08-01 + BLM + C CA-017-05-051 + BLM + CA-170-02-15 + BLM + CA-650-2005-086 + BLM + CA-670-2010-107 + BLM + CA-670-2010-CX + BLM + D DOE-EA-1733 + California + DOE-EA-1759 + Naknek Electric Association + DOE-EA-1849 + BLM + DOE-EIS-0298 + BLM + DOI-BLM-CA-C050-2009-0005-EA + BLM + DOI-BLM-CA-EA-2002-??? + BLM + DOI-BLM-CA-ES-2013-002+1793-EIS + BLM +, BLM + DOI-BLM-ID-220-2009-EA-3709 + BLM + DOI-BLM-ID-B010-2010-0083-CX + BLM + DOI-BLM-ID-I020-2012-0017-CX + BLM + DOI-BLM-ID-T020-2012-0003-CX + BLM + DOI-BLM-NM-L000-2012-0020-DNA + BLM +

428

Mason Energy + Management | Open Energy Information  

Open Energy Info (EERE)

+ Management + Management Jump to: navigation, search Logo: Mason Energy + Management Name Mason Energy + Management Address 790 Racquet Lane Place Boulder, Colorado Zip 80303 Sector Buildings, Efficiency, Services Product Energy Efficiency for Commercial Buildings Year founded 2009 Number of employees 1-10 Phone number 720 242-7088 Website http://www.masoneam.com Coordinates 40.002049°, -105.222508° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.002049,"lon":-105.222508,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

429

Guardian Energy Management Solutions | Open Energy Information  

Open Energy Info (EERE)

Guardian Energy Management Solutions Guardian Energy Management Solutions Jump to: navigation, search Name Guardian Energy Management Solutions Address 753 Forest Street, Suite 110 Place Marlborough, Massachusetts Zip 01752 Sector Buildings, Efficiency, Services, Vehicles Product Energy Management Solutions & Services Year founded 2003 Number of employees 51-200 Company Type For Profit Phone number 8008256460 Website [www.guardian-energy.com www.guardian-energy.com ] Coordinates 42.3199619°, -71.5926351° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.3199619,"lon":-71.5926351,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

430

Quality Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Quality Management Quality Management Quality Management The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and consistent. The Office of Quality Management also assists other Government agencies to meet the requirements contained in DOE-issued regulations concerning Restricted Data and Formerly Restricted Data. To meet these missions, the Office of Quality Management: Develops and revises DOE Regulations and Orders concerning Restricted Data, Formerly Restricted Data, Transclassified Foreign Nuclear Information, National Security Information, Unclassified Controlled Nuclear Information, and Official Use Only Responds to Mandatory Declassification Review Requests under

431

PIA - Human Resources - Personal Information Change Request ...  

Office of Environmental Management (EM)

Request - Idaho National Engineering Laboratory More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

432

Student Brand Manager and Related Vacancies Student Information  

E-Print Network (OSTI)

The Careers Service. Student Brand Manager and Related Vacancies Student Information Context and vacancy service to current students and recent graduates of the University. While recognising it also students and graduates. Students and graduates can expect to access a range of vacancy information

Stevenson, Mark

433

The Value of Information in Inventory Management  

E-Print Network (OSTI)

demand is not available, but the decision-maker receives advance information on the success. (high, low or ... of the market response at such an early stage of the product lifecycle. ...... Technical report, Massachusetts Institute of Technology,.

2008-04-08T23:59:59.000Z

434

Semantic Resources for Managing Legislative Information  

Science Journals Connector (OSTI)

The new frontier of the Semantic Web is moving more and more away from information searching of the substantial aspects of documents requiring the availability of advanced editing tools able to handle and mana...

Maria Angela Biasiotti

2011-01-01T23:59:59.000Z

435

Greenhouse Gas Management Institute (GHGMI) | Open Energy Information  

Open Energy Info (EERE)

Institute (GHGMI) Institute (GHGMI) Jump to: navigation, search Logo: Greenhouse Gas Management Institute (GHGMI) Name Greenhouse Gas Management Institute (GHGMI) Address Washington, D.C. Place Washington, District of Columbia Phone number 1-888-778-1972 Website http://ghginstitute.org/housek References http://ghginstitute.org/housekeeping/contact-us/ No information has been entered for this organization. Add Organization The Greenhouse Gas Management Institute (GHGMI) was founded in response to the growing demand for qualified greenhouse gas (GHG) professionals. Just as engineering and financial accounting rely on certified professionals, GHG emissions management requires a highly competent and ethical professional class to undertake measurement, reporting, auditing, and

436

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

437

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

438

Vencon Management Inc | Open Energy Information  

Open Energy Info (EERE)

Vencon Management Inc Vencon Management Inc Address 65 West 55th Street Place New York, New York Zip 10019 Region Northeast - NY NJ CT PA Area Product Venture capital firm investing primarily in green technology Phone number (212) 581-8787 Website http://home.att.net/~vencon/ho Coordinates 40.7627527°, -73.9774459° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.7627527,"lon":-73.9774459,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

439

Century Asset Management | Open Energy Information  

Open Energy Info (EERE)

Asset Management Asset Management Place Sydney, New South Wales, Australia Zip 2000 Sector Solar, Vehicles Product String representation "Sydney based in ... mpleted assets." is too long. Coordinates -33.869629°, 151.206955° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":-33.869629,"lon":151.206955,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

440

Climate Leaders Management | Open Energy Information  

Open Energy Info (EERE)

Climate Leaders Management Climate Leaders Management Place Boulder, Colorado Zip 80304 Product Climate Leaders Fund (CLF) is an investment vehicle in the climate change arena. CLF will invest in the massive infrastructure and manufacturing improvements. Coordinates 42.74962°, -109.714163° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.74962,"lon":-109.714163,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Help:Managing files | Open Energy Information  

Open Energy Info (EERE)

Managing files Managing files Jump to: navigation, search If file uploads are enabled, you can upload certain types of files to the wiki. This is particularly useful for uploading images, which you want to place on an article, but you can also upload other types of files. Upload a file Prepare the file for upload. Make sure the file is exactly as you want it. In the sidebar, under "toolbox", click "upload file." Click "Browse" next to the "Source filename:" to locate the file on your computer (the name of the "browse" button depends on your web browser). Change the "Destination filename:" to something descriptive, if necessary. Fill in the "Summary," if necessary. Click the "Upload file" button.

442

Office of Security Enforcement | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

443

Akeida Capital Management | Open Energy Information  

Open Energy Info (EERE)

Akeida Capital Management Akeida Capital Management Jump to: navigation, search Name Akeida Capital Management Place New York, New York Zip 10036 Region Northeast - NY NJ CT PA Area Product Financing Environmental Projects Number of employees 1-10 Year founded 2007 Phone number 212-702-7184 Website http://www.akeidacapital.com Coordinates 40.7631485°, -73.9962255° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.7631485,"lon":-73.9962255,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

444

Best Management Practice: Information and Education Programs | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Management Practice: Information and Education Programs Best Management Practice: Information and Education Programs Best Management Practice: Information and Education Programs October 7, 2013 - 3:05pm Addthis Education is essential if water efficiency technologies and methods are to be successful. It is not enough to install a retrofit or water saving technology in a facility. New operation procedures, retrofits, and replacements are most effective when employees, contractors, and the public know what the new technology or methods are and how to use them properly. An additional benefit to water efficiency is positive public opinion. If your facility is doing its part to save community resources, let the community know. Informing the public about your facility's commitment to reduce waste is good news. The news media is often interested in facilities

445

GEF-Knowledge Management Initiative | Open Energy Information  

Open Energy Info (EERE)

Knowledge Management Initiative Knowledge Management Initiative Jump to: navigation, search Name GEF Knowledge Management Initiative: Strategic Framework and Work-Plan for GEF-5 Agency/Company /Organization Global Environment Facility (GEF) Resource Type Dataset, Lessons learned/best practices Website http://www.thegef.org/gef/site Program Start 2010 References GEF Knowledge Management[1] GEF Knowledge Management Initiative: Strategic Framework and Work-Plan for GEF-5 Screenshot " In December 2010, the Secretariat launched the KMI with the goal of ensuring that GEF knowledge, information and data are identified, captured, and shared in their entirety and developed as a strategic asset in a coherent and comprehensive manner." References ↑ "GEF Knowledge Management"

446

Determining information management needs for enhanced international safeguards  

SciTech Connect

The Safeguards Information Management System initiative is a program of the Department of Energy`s (DOE) Office of Arms Control and Nonproliferation aimed at supporting the International Atomic Energy Agency`s (IAEA) efforts to strengthen safeguards through the enhancement of information management capabilities. The DOE hopes to provide the IAEA with the ability to correlate and analyze data from existing and new sources of information, including publicly available information, information on imports and exports, design information, environmental monitoring data, and non-safeguards information. The first step in this effort is to identify and define IAEA requirements. In support of this, we have created a users` requirements document based on interviews with IAEA staff that describes the information management needs of the end user projected by the IAEA, including needs for storage, retrieval, analysis, communication, and visualization of data. Also included are characteristics of the end user and attributes of the current environment. This paper describes our efforts to obtain the required information. We discuss how to accurately represent user needs and involve users for an international organization with a multi-cultural user population. We describe our approach, our experience in setting up and conducting the interviews and brainstorming sessions, and a brief discussion of what we learned.

Badalamente, R.V. [Pacific Northwest Lab., Richland, WA (United States); DeLand, S.M. [Sandia National Labs., Albuquerque, NM (United States); Whiteson, R. [Los Alamos National Lab., NM (United States); Anzelon, G. [Lawrence Livermore National Lab., CA (United States)

1994-08-01T23:59:59.000Z

447

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided in order to equip the reader with an understanding of the context for the remaining chapters. The motives for using botnets and the methods in which they are used are outlined. The methods of botnet attack are then analysed in terms of their potential impact on information security and a conclusion is drawn that botnets are indeed a threat to information security in general terms. Chapter 2 then goes on to examine the extent of the threat from the three different perspectives of governments, corporate and the general public. The threats from each perspective and their impacts are identified, and each threat type for each perspective is then categorised in terms of probability and potential impact. The extent of the threat of each botnet-related attack from each perspective is then assessed using a model recommended by ISO/IEC 27005:2008, and the conclusion is drawn that the extent of the threat that botnets pose to governments, corporates and the general public is High. In Chapter 3, we look at how law enforcement agencies investigate botnets and the criminals behind them, and establish the challenges they face in doing so. It is clear that law enforcement face an uphill struggle due to technical tricks employed by the botherders to remain untraceable, lack of resources with the necessary skillset, the legal complexity of working with multiple jurisdictions, and procedural delays working with foreign law enforcement agencies. The conclusion is drawn that botnets are here to stay and that for the time being the botherders will have the upper hand.

Claire Elliott

2010-01-01T23:59:59.000Z

448

Federal Emergency Management Information system (FEMIS) data management guide. Version 1.2  

SciTech Connect

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of FEMIS. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, how it is loaded, and how it is managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Johnson, S.M.; Loveall, R.M.; Winters, C.

1996-05-01T23:59:59.000Z

449

Office of Security Policy - Safeguards and Security Frequently Asked  

NLE Websites -- All DOE Office Websites (Extended Search)

Safeguards and Security Safeguards and Security New Frequently Asked Questions The following frequently asked questions (FAQs) are organized by the topical areas and offer answers to recurring questions or policy clarification requests. These entries represent the newest additions to the collection of S&S FAQs. 1. General 2. Program Planning and Management 3. Protection Program Operations 4. Information Security 5. Nuclear Material Control and Accountability General Q: Where can I find the national policies that may affect security programs I am responsible for? A: The national policies affecting DOE's safeguards and security programs are located on the Policy Information Resource tool at http://pir.pnl.gov. This collection is comprised of the most current version of each policy

450

Position Management and Classification (Informational Purposes Only)  

Directives, Delegations, and Requirements

This draft has been scheduled for final review before the Directives Review Board on 02/5/2015. All major comments and concerns should be provided to your DRB representative by 02/3/2015, following your organization process. If you do not know who your representative is, please see the list of DRB members. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-1014).

2015-01-26T23:59:59.000Z

451

Acquisition Career Management Program (Informational Purposes Only)  

Directives, Delegations, and Requirements

This draft has been scheduled for final review before the Directives Review Board on 12-4-2014. All major comments and concerns should be provided to your DRB representative, following your organization process. If you do not know who your representative is, please see the list of DRB members at https://www.directives.doe.gov/beta/references/directives-review-board. If your office is represented by Ingrid Kolb, Director, Office of Management, please submit your major concerns and comments to the DRB Liaison, Camille Beben (Camille.Beben@hq.doe.gov; 202-586-4014). All major comments and concerns should be submitted by COB 12-2-2014.

2014-11-21T23:59:59.000Z

452

Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0  

SciTech Connect

This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plans purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programsthe Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

Farnham, Irene; Marutzky, Sam

2014-12-01T23:59:59.000Z

453

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > Field Offices > Welcome to the Sandia Field Office > Contact Us Contact Us If you have questions about activities at the Sandia Field Office, please contact the SFO Public Affairs Director at (505) 845-5264. Our mailing address is: U. S. Department of Energy, National Nuclear Security Administration, Sandia Field Office, P.O. Box 5400, Albuquerque, NM 87185. Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About SFO Contact Us Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance

454

Procurement | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement | National Nuclear Security Administration Procurement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Procurement Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Procurement Procurement NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

455

Chapter_1_Physical_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

456

Scientific and Technical Information (STI) Managers | Scientific and  

Office of Scientific and Technical Information (OSTI)

Scientific and Technical Information (STI) Managers Scientific and Technical Information (STI) Managers Print page Print page Email page Email page The role of the STI Manager is to stay abreast of DOE's STI Program and coordinate the implementation of STIP best practices at their sites. In general, an STI Manager's responsibilities include: Providing oversight and coordination of contractor compliance with the Contractor Requirements Document of DOE Order 241.1B. - Coordinating the implementation of appropriate sensitivity reviews and release procedures. - Serving as Releasing Official or coordinating designation of Releasing Official(s), including notifying OSTI of such. - Ensuring STI and announcement notices are appropriately reviewed and marked. - Ensuring STI products and associated announcement notices are provided to

457

Waste Isolation Pilot Plant Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WIPP WIPP Transportation Security Gregory M. Sahd Security Manager Carlsbad Field Office U.S. Department of Energy Contact Information Gregory M. Sahd Security Operations Carlsbad Field Office * U.S. Department of Energy 575.234.8117 * Greg.Sahd@wipp.ws WIPP Transportation "...The (WIPP transportation) system is safer than that employed for any other hazardous material in the U.S...." - National Academy of Sciences, WIPP Panel Hanford Idaho National Engineering and Environmental Laboratory Los Alamos National Laboratory Rocky Flats Environmental Technology Site Savannah River Site Waste Isolation Pilot Plant Argonne National Laboratory - East Nevada Test Site Argonne National Laboratory - West Lawrence Livermore National Laboratory CBFO Manager Senior Management

458

Change Request Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Change Request Forms | National Nuclear Security Administration Change Request Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Change Request Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Change Request Forms Change Request Forms

459

NMMSS Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reports | National Nuclear Security Administration Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Reports Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > NMMSS Reports NMMSS Reports U.S. Department of Energy / U.S. Nuclear Regulatory Commission

460

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Action Codes Table | National Nuclear Security Administration Action Codes Table | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Action Codes Table Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Code Tables > Action Codes Table

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Energy Management Inc EMI | Open Energy Information  

Open Energy Info (EERE)

EMI EMI Jump to: navigation, search Name Energy Management Inc (EMI) Place Boston, Massachusetts Zip 21160 Sector Wind energy Product Independent project developer and parent of Cape Wind Associates, which is developing the 468MW wind project proposed for the waters off Massachusetts. Coordinates 42.358635°, -71.056699° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.358635,"lon":-71.056699,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

462

Requirements for security signalling  

SciTech Connect

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

463

Waste management facilities cost information for transuranic waste  

SciTech Connect

This report contains preconceptual designs and planning level life-cycle cost estimates for managing transuranic waste. The report`s information on treatment and storage modules can be integrated to develop total life-cycle costs for various waste management options. A procedure to guide the U.S. Department of Energy and its contractor personnel in the use of cost estimation data is also summarized in this report.

Shropshire, D.; Sherick, M.; Biagi, C.

1995-06-01T23:59:59.000Z

464

Information technologies for global resources management and environmental assessment  

SciTech Connect

Recent advances in computer and communications technologies offer unprecedented opportunities to develop sophisticated information resources management systems for global resources management and environment assessment in an efficient, effective, and systematic manner. In this paper, the emerging global energy and environmental issues are identified. Since satellite-based remote sensing systems are becoming increasingly available and produce massive data collections, the utilization of imaging processing techniques and their applications for regional and global resources management and environmental studies are described. Interoperability and interconnectivity among heterogeneous computer systems are major issues in designing a totally integrated, multimedia-based, information resources management system that operates in a networking environment. Discussions of the future technology trends are focused on a number of emerging information management technologies and communications standards which will aid in achieving seamless system integration and offer user-friendly operations. It can be foreseen that advances in computer and communications technologies, increasingly sophisticated image processing techniques and Geographical Information Systems (GIS), and the development of globally comprehensive data bases will bring global visualization'' onto multimedia desktop computers before the end of this decade.

Campbell, A.P.; Wang, Hua.

1992-01-01T23:59:59.000Z

465

Information technologies for global resources management and environmental assessment  

SciTech Connect

Recent advances in computer and communications technologies offer unprecedented opportunities to develop sophisticated information resources management systems for global resources management and environment assessment in an efficient, effective, and systematic manner. In this paper, the emerging global energy and environmental issues are identified. Since satellite-based remote sensing systems are becoming increasingly available and produce massive data collections, the utilization of imaging processing techniques and their applications for regional and global resources management and environmental studies are described. Interoperability and interconnectivity among heterogeneous computer systems are major issues in designing a totally integrated, multimedia-based, information resources management system that operates in a networking environment. Discussions of the future technology trends are focused on a number of emerging information management technologies and communications standards which will aid in achieving seamless system integration and offer user-friendly operations. It can be foreseen that advances in computer and communications technologies, increasingly sophisticated image processing techniques and Geographical Information Systems (GIS), and the development of globally comprehensive data bases will bring ``global visualization`` onto multimedia desktop computers before the end of this decade.

Campbell, A.P.; Wang, Hua

1992-09-01T23:59:59.000Z

466

Lockheed Martin Idaho Technologies Company information management technology architecture  

SciTech Connect

The Information Management Technology Architecture (TA) is being driven by the business objectives of reducing costs and improving effectiveness. The strategy is to reduce the cost of computing through standardization. The Lockheed Martin Idaho Technologies Company (LMITCO) TA is a set of standards and products for use at the Idaho National Engineering Laboratory (INEL). The TA will provide direction for information management resource acquisitions, development of information systems, formulation of plans, and resolution of issues involving LMITCO computing resources. Exceptions to the preferred products may be granted by the Information Management Executive Council (IMEC). Certain implementation and deployment strategies are inherent in the design and structure of LMITCO TA. These include: migration from centralized toward distributed computing; deployment of the networks, servers, and other information technology infrastructure components necessary for a more integrated information technology support environment; increased emphasis on standards to make it easier to link systems and to share information; and improved use of the company`s investment in desktop computing resources. The intent is for the LMITCO TA to be a living document constantly being reviewed to take advantage of industry directions to reduce costs while balancing technological diversity with business flexibility.

Hughes, M.J.; Lau, P.K.S.

1996-05-01T23:59:59.000Z

467

Management Alert: DOE/IG-0906 | Department of Energy  

Office of Environmental Management (EM)

may not possess adequate controls for identifying and handling certain electric grid-related information that could pose threats to national security. Management...

468

15.568B Management Information Systems: Generating Business Value from Information Technology, Spring 2003  

E-Print Network (OSTI)

Concepts, frameworks, tools, techniques, and processes that assist management in its interaction with and direction of computer-based information systems today. Discusses the impact of the Internet, changes in the IT ...

Weill, Peter

469

A management information system model for convenience stores  

E-Print Network (OSTI)

Najor Subject: Agricultural Economics A MANAGEMENT INFORMATION SYSTEM MODEL FOR CONVENIENCE STORES A Thesfs by ERIC ARNE MOEDE Approved as to style and content by: Chairman of o ittee Dr. Willfam J. stine Head of Department Dr. Clfve R. Harston... Member Dr. Samuel M. Gillespie Mem er Dr, John I. Reynolds Member Dr. Thomas L. Sporleder December 1978 ABSTPJ CT A Management Information System I'1odel For Convenience Stores (December lg78 l Eric Arne I'loede, B. B. A. , Texas ARM University...

Moede, Eric Arne

1978-01-01T23:59:59.000Z

470

Trends in Energy Management Technology - Part 3: State of Practiceof Energy Management, Control, and Information Systems  

SciTech Connect

In this report, the third in a series, we provide an evaluation of several products that exemplify the current state of practice of Energy Management, Control, and Information Systems (EMCIS). The available features for these products are summarized and analyzed with regard to emerging trends in EMCIS and potential benefits to the federal sector. The first report [1] covered enabling technologies for emerging energy management systems. The second report [2] serves as a basic reference for building control system (BCS) networking fundamentals and includes an assessment of current approaches to open communications. Part 4 of this series will discuss applications software from a user's perspective. It is important for energy managers in the Federal sector to have a high level of knowledge and understanding of these complex energy management systems. This series of reports provides energy practitioners with some basic informational and educational tools to help make decisions relative to energy management systems design, specification, procurement, and energy savings potential.

Yee, Gaymond; Webster, Tom

2004-02-01T23:59:59.000Z

471

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

472

ACM Journal of Educational Resources in Computing, Vol. 6, No. 3, September 2006. Article 3. Teaching Context in Information Security  

E-Print Network (OSTI)

__________________________________________________________________________________________ 1. INTRODUCTION Software engineers used standard software engineering processes to develop software political science, history, as well as other humanities, to force students to apply or derive principles and Protection General Terms: Management, Security Additional Key Words and Phrases: Environment, judgment

Bishop, Matt

473

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

474

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

475

Security & Privacy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

476

Add me to your mailing list for future information about energy management courses.  

E-Print Network (OSTI)

: energy economics, metering, performance contracting and financing with demand response, measurement and products, project management, fleet operation and maintenance, verification of energy savings, and best, alternative energy supplies, energy security and energy trading. Explore reliability and risk analysis methods

California at Davis, University of

477

Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).  

SciTech Connect

Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

2004-11-01T23:59:59.000Z

478

Hallmark Project Commercialization of the Secure SCADA Communications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Commercialization of the Secure SCADA Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy infrastructure have improved system functionality, but left systems more vulnerable to cyber attack. Intruders could severely disrupt control system operation by sending fabricated information or commands to control system devices. To ensure message integrity, supervisory control and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that information has

479

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

480

Department of Management Science and Information Systems Seminar  

E-Print Network (OSTI)

Department of Management Science and Information Systems Seminar You are cordially invited, to provide a methodology for generating the conditional price-transition probabilities, as required's eBay store. We are using a model where each period there is a probability a price-transition occurs

Lin, Xiaodong

Note: This page contains sample records for the topic "information security management" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Using Utility Information to Calibrate Customer Demand Management Behavior Models  

E-Print Network (OSTI)

Using Utility Information to Calibrate Customer Demand Management Behavior Models Murat Fahrio ­ Madison Report PSerc 99­06 June 10, 1999 Abstract In times of stress customers can help a utility by means be optimized if the utility can estimate the outage or substitution costs of its customers. This report

482

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses in length. Admission to the Faculty may occur at the end of Year One. Students are required to have the following courses for  

E-Print Network (OSTI)

The Bachelor of Management degree in Management Information Systems is a minimum of 40 courses-language university. BachelorofManagement ManagementInformationSystems Name Technology Management 4090 - Management Policy and Strategy Management 4840 - Systems Analysis Management

Seldin, Jonathan P.

483

There is an increasing order in digitized technology. This increasing order requires high qualitative document management system which can be used in secure fashion especially for organization with  

E-Print Network (OSTI)

qualitative document management system which can be used in secure fashion especially for organization. The proposed framework provides the necessary options for creating an effective document management system document management system, the end product will be suitable for organization and guaranteed to satisfy

484

A Context Driven Information Retrieval for Online Urban Disaster Management System  

E-Print Network (OSTI)

A Context Driven Information Retrieval for Online Urban Disaster Management System Khaldoun ZREIK of Disaster Managing Approaches depends firmly on information and communication management system. Due to the interactive decision board, an optimised Data Base Management System, a light Geographical Information System

Paris-Sud XI, Université de

485

A method of assessing users' vs managers' perceptions of safety and security problems in public beach park settings  

E-Print Network (OSTI)

while answering this form of report, research has proven that the respondents are generally truthful and accurate in the in- formation they provide (Sheley 1979; Levine 1982). Due to the transitory nature of park users this system would...A METHOD OF ASSESSING USERS' VS MANAGERS' PERCEPTIONS OF SAFETY AND SECURITY PROBLEMS IN PUBLIC BEACH PARK SETTINGS A Thesis by ROBERT JAMES SCOTT STEELE Submitted to the Graduate College of Texas A&M University In Par ial Fulfillment...

Steele, Robert James Scott

2012-06-07T23:59:59.000Z

486

Understanding collaboration in inter-organisational information systems: Implications for supply chain management.  

E-Print Network (OSTI)

??This thesis seeks to explore how management can work together to adopt an Inter-organisational Information System (IOIS) for Supply Chain Management (SCM) at different levels (more)

Pang, Vincent Ying Kiun

2008-01-01T23:59:59.000Z

487

Nevada National Security Site 2010 Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Sites  

SciTech Connect

Environmental monitoring data were collected at and around the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada National Security Site (NNSS). These data are associated with radiation exposure, air, groundwater, meteorology, vadose zone, subsidence, and biota. This report summarizes the 2010 environmental data to provide an overall evaluation of RWMS performance and to support environmental compliance and performance assessment (PA) activities. Some of these data (e.g., radiation exposure, air, and groundwater) are presented in other reports (National Security Technologies, LLC, 2010a; 2010b; 2011). Direct radiation monitoring data indicate exposure levels at the RWMSs are within the range of background levels measured at the NNSS. Air monitoring data at the Area 3 and Area 5 RWMSs indicate that tritium concentrations are slightly above background levels. All gamma spectroscopy results for air particulates collected at the Area 3 and Area 5 RWMS were below the minimum detectable concentrations, and concentrations of americium and plutonium are only slightly above detection limits. The measured levels of radionuclides in air particulates and moisture are below derived concentration guides for these radionuclides. Groundwater monitoring data indicate that the groundwater in the uppermost aquifer beneath the Area 5 RWMS is not impacted by facility operations. The 246.9 millimeters (mm) (9.72 inches [in.]) of precipitation at the Area 3 RWMS during 2010 is 56 percent above the average of 158.7 mm (6.25 in.), and the 190.4 mm (7.50 in.) of precipitation at the Area 5 RWMS during 2010 is 50 percent above the average of 126.7 mm (4.99 in.). Soil-gas tritium monitoring at borehole GCD-05 continues to show slow subsurface migration consistent with previous results. Water balance measurements indicate that evapotranspiration from the vegetated weighing lysimeter dries the soil and prevents downward percolation of precipitation more effectively than evaporation from the bare-soil weighing lysimeter. Data from the automated vadose zone monitoring system for the operational waste pit covers show that moisture from precipitation did not percolate below 90 centimeters (cm) (3 feet [ft]) before being removed by evaporation. Moisture from precipitation did not percolate below 61 cm (2 ft) in the vegetated final mono-layer cover on the U-3ax/bl disposal unit at the Area 3 RWMS before being removed by evapotranspiration. During 2010, there was no drainage through 2.4 meters (8 ft) of soil from the Area 3 drainage lysimeters that received only natural precipitation. Water drained from both the bare-soil drainage lysimeter and the invader species drainage lysimeter that received 3 times natural precipitation. All 2010 monitoring data indicate that the Area 3 and Area 5 RWMSs are performing within expectations of the model and parameter assumptions for the facility PAs.

NSTec Environmental Management

2011-06-01T23:59:59.000Z

488

Office of Resource Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Resource Management Resource Management Home Sub Offices › Business Operations › Information Management › Human Resources and Administration Mission and Functions HSS Standard Operating Practices (For Internal Users Only) HSS Subject Matter Experts and Functional Points of Contacts Contact Us HSS Logo Office of Resource Management Direct Report to the Chief Health, Safety and Security Officer Mission and Functions Mission The Office of Resource Management supports the infrastructure of the Office of Health, Safety and Security (HSS) by providing balanced, unbiased, technically competent, and customer focused services in the areas of: (1) Financial Management, including budget formulation and execution; (2) Procurement Management, including contract and credit card programs; (3) Information Management, including technology-based solutions and programs; (4) Quality Assurance; (5) Human Resources, including recruitment and retention programs; (6) Administrative Services, including property management, travel, and work space management; and; (7) Strategic and Program Planning including performance and efficiency measures.

489

Countering Nuclear Terrorism | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Countering Nuclear Terrorism | National Nuclear Security Administration Countering Nuclear Terrorism | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Countering Nuclear Terrorism Home > Our Mission > Countering Nuclear Terrorism Countering Nuclear Terrorism NNSA provides expertise, practical tools, and technically informed policy

490

Corrective Action Management Units and Temporary Units. RCRA Information Brief  

SciTech Connect

On February 16, 1993 the EPA published a final rule that allows either the EPA Regional Administrator or the authorized State to designate areas as corrective action management units (CAMUs) at hazardous waste management facilities for the specific purpose of managing remediation waste that has been generated as part of the facility`s corrective action activities. According to the rule, placement of remediation wastes into or within a CAMU does not constitute land disposal of hazardous waste and is not subject to RCRA land disposal restrictions. In addition, waste disposal units located within CAMUs are not required to be designed in accordance with RCRA minimum technological requirements applicable to land disposal units. This Information Brief explains the advantages of a CAMU designation, defines a Temporary Unit (TU) and explains the advantages of a TU designation. The process for initiating a CAMU or TU designation is described for DOE sites and interim status facilities.

Not Available

1994-03-01T23:59:59.000Z

491

Architecture for management and fusion of context information  

Science Journals Connector (OSTI)

Abstract Information in a context-aware system has diverse natures. Raw data coming from sensors are aggregated and filtered to create more abstract information, which can be processed by context-aware application components to decide what actions should be performed. This process involves several activities: finding the available sources of information and their types, gathering the data from these sources, facilitating the fusion (aggregation and interpretation) of the different pieces of data, and updating the representation of the context to be used by applications. The reverse path also appears in context-aware systems, from changes in the context representation to trigger actions in certain actuators. FAERIE (Framework for AmI: Extensible Resources for Intelligent Environments) is a framework that facilitates management and fusion of context information at different levels. It is implemented as a distributed blackboard model. Each node of the system has a private blackboard to manage pieces of information that can be accessed by observer components, either locally or remotely (from other nodes) in a transparent way. The use of the framework is illustrated with a case study of an application for guiding people to meetings in a university building.

Jos M. Fernndez-de-Alba; Rubn Fuentes-Fernndez; Juan Pavn

2015-01-01T23:59:59.000Z

492

Federal Emergency Management Information System (FEMIS) Data Management Guide Version 1.3  

SciTech Connect

FEMIS is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. FEMIS is designed to help civilian emergency management personnel to plan for and support their responses to a chemical-releasing event at a military chemical stockpile. This guide provides the background as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the datafiles and database. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, loaded, and managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Hoza, M.; Johnson, S.M.; Loveall, R.M.; Millard, W.D.; Winters, C.; Wood, B.M.

1996-12-01T23:59:59.000Z

493

Managing environmental information in the age of outsourcing.  

SciTech Connect

As more data gathering, analysis, and tracking tasks are outsourced the need for multiple contractors and military personnel to input, update, access, store, and track Mormation is becoming critical to efficient functioning and managing of environmental projects and programs at military installations. This paper presents two case studies detailing the way two organizations--the Rocky Mountain Arsenal (RMA) in Colorado, and the 611th Air Support Group (611 ASG) in Alaska--are managing complex data using web-based technology. RMA is involved in one of the largest environmental cleanup programs in the Department of Defense. As such, large volumes of environmental data and documents must be generates stored, and tracked. Often these documents are prepared by multiple contractors and are reviewed by several parties or groups. To manage environmental information and to ensure that it meets compliance requirements more efficiently, RMA has developed an electronic document tracking and distribution system. This system allows access to up-to-date information, including a detailed review of all pertinent regulatory and other requirements at RMA. The dynamic system includes milestones, review deadlines, submission deadlines, and other requirements for managing the environmental program. The 611 ASG manages more than 30 remote installations in Alaska, many of which are operated by contractor personnel. These installations contain hundreds of buildings that are constantly being modified because of exposure to harsh arctic climates; some of them have been determined to be eligible for the National Register of Historic Places. To meet regulatory requirements for cultural resources management as well as engineering requirements for upkeep of buildings, a database was developed to store and analyze building data. The database has a web-based interface that allows anyone with the correct access codes to input new data, modify existing data, or query the database using a number of standard reports. This system allows the 611 ASG to centrally manage its building information while also permitting installation contractors to update and use data through the Internet from their remote locations.

Perkins, S.; Smith, K.; Whorton, M.; Williams, G.

1999-03-08T23:59:59.000Z

494

Office of Security Assistance  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

495

A Secure Web Service-based Platform for Wireless Sensor Network Management and  

E-Print Network (OSTI)

military applications to civilian ones, for security, home automation and health care... Up to now, most tracking and surveillance to civilian applications in home automation (smart home), agriculture, intrusion

Paris-Sud XI, Université de

496

Quantifiably secure power grid operation, management, and evolution : a study of uncertainties affecting the grid integration of renewables.  

SciTech Connect

This report summarizes findings and results of the Quantifiably Secure Power Grid Operation, Management, and Evolution LDRD. The focus of the LDRD was to develop decisionsupport technologies to enable rational and quantifiable risk management for two key grid operational timescales: scheduling (day-ahead) and planning (month-to-year-ahead). Risk or resiliency metrics are foundational in this effort. The 2003 Northeast Blackout investigative report stressed the criticality of enforceable metrics for system resiliency - the grid's ability to satisfy demands subject to perturbation. However, we neither have well-defined risk metrics for addressing the pervasive uncertainties in a renewable energy era, nor decision-support tools for their enforcement, which severely impacts efforts to rationally improve grid security. For day-ahead unit commitment, decision-support tools must account for topological security constraints, loss-of-load (economic) costs, and supply and demand variability - especially given high renewables penetration. For long-term planning, transmission and generation expansion must ensure realized demand is satisfied for various projected technological, climate, and growth scenarios. The decision-support tools investigated in this project paid particular attention to tailoriented risk metrics for explicitly addressing high-consequence events. Historically, decisionsupport tools for the grid consider expected cost minimization, largely ignoring risk and instead penalizing loss-of-load through artificial parameters. The technical focus of this work was the development of scalable solvers for enforcing risk metrics. Advanced stochastic programming solvers were developed to address generation and transmission expansion and unit commitment, minimizing cost subject to pre-specified risk thresholds. Particular attention was paid to renewables where security critically depends on production and demand prediction accuracy. To address this concern, powerful filtering techniques for spatio-temporal measurement assimilation were used to develop short-term predictive stochastic models. To achieve uncertaintytolerant solutions, very large numbers of scenarios must be simultaneously considered. One focus of this work was investigating ways of reasonably reducing this number.

Gray, Genetha Anne; Watson, Jean-Paul [Sandia National Laboratories, Albuquerque, NM; Silva Monroy, Cesar Augusto [Sandia National Laboratories, Albuquerque, NM; Gramacy, Robert B. [University of Chicago, Chicago, IL

2013-09-01T23:59:59.000Z

497

Enhancing Seismic Calibration Research Through Software Automation and Scientific Information Management  

SciTech Connect

The National Nuclear Security Administration (NNSA) Ground-Based Nuclear Explosion Monitoring Research and Development (GNEMRD) Program at LLNL continues to make significant progress enhancing the process of deriving seismic calibrations and performing scientific integration, analysis, and information management with software automation tools. Our tool efforts address the problematic issues of very large datasets and varied formats encountered during seismic calibration research. New information management and analysis tools have resulted in demonstrated gains in efficiency of producing scientific data products and improved accuracy of derived seismic calibrations. In contrast to previous years, software development work this past year has emphasized development of automation at the data ingestion level. This change reflects a gradually-changing emphasis in our program from processing a few large data sets that result in a single integrated delivery, to processing many different data sets from a variety of sources. The increase in the number of sources had resulted in a large increase in the amount of metadata relative to the final volume of research products. Software developed this year addresses the problems of: (1) Efficient metadata ingestion and conflict resolution; (2) Automated ingestion of bulletin information; (3) Automated ingestion of waveform information from global data centers; and (4) Site Metadata and Response transformation required for certain products. This year, we also made a significant step forward in meeting a long-standing goal of developing and using a waveform correlation framework. Our objective for such a framework is to extract additional calibration data (e.g. mining blasts) and to study the extent to which correlated seismicity can be found in global and regional scale environments.

Ruppert, S D; Dodge, D A; Ganzberger, M D; Harris, D B; Hauk, T F

2009-07-07T23:59:59.000Z

498

Microsoft Word - LLNL Security Clearances Final 121108a _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Clearances at Lawrence Livermore National Laboratory and Sandia National Laboratory-California INS-O-09-01 December 2008 U.S. Department of Energy Office of Inspector General Office of Inspections and Special Inquiries Inspection Report Department of Energy Washington, DC 2 0 5 8 5 December 11, 2008 MEMORAliDUM FOR ADMINISTRATQR, NATIONAL NUCLEAR SECURITY ADMINISTRATION CHIEF HEALTH: SAFETY AbD, SECURITY OFFICER FROM: Christopher R. Sharpley . Deputy hlspector General for investigations and h~spections - , . - " SUBJECT: INFORMATION: inspection Report on "Security Clearances at Lawrence Livemore National Laboratory and Sandia National Laboratory-California" BACKGROUND Department of Energy facilities, including those managed by the National Nuclear Security

499

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

500

Infor mation Management Governance Council  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infor Infor mation Management Governance Council On December 7, 2009, the Deputy Secretary of Energy directed the creation of a new cyber security governance structure for the Department, including the establishment of the Cyber Security Governance Council (CSGC or Council). The Council's primary objectives include ensuring that cyber security for the DOE enterprise is aligned with Departmental missions, and ensuring that cyber security program and policy elements are created and managed with involvement and input from the field. Information Management Governance Council (IMGC) Formerly called the Cyber Security Governance Council (CSGC), was announced in Deputy Secretary Daniel Poneman's memorandum of December 7, 2009, titled, Cyber Security Management. The Governance Council was formed to reflect the shared responsibility for cyber