National Library of Energy BETA

Sample records for information security officer

  1. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  2. OFFICE of the CHIEF INFORMATION SECURITY OFFICER

    E-Print Network [OSTI]

    Matrajt, Graciela

    OFFICE of the CHIEF INFORMATION SECURITY OFFICER 2013 Information Security and Privacy Annual conversation,The Office of the Chief Information Security Officer (CISO) invites readers to email ciso@uw.edu by May 1st, 2014 with privacy-themed cap- tions for the cartoon on the right.Winning captions

  3. OFFICE of the CHIEF INFORMATION SECURITY OFFICER

    E-Print Network [OSTI]

    Matrajt, Graciela

    security and privacy. Services are designed to help UW units understand risks by analyzing and forecasting Chief Information Security Officer In reflecting back on all our hard work during 2012, I would like of Contents Asset-Based Risk Management

  4. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  5. Information Security Office Risk Management

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Information Security Office Risk Management Exception Template #12;Risk Management Exception or Approved) 6/01/2013 CISO Jason Pufahl, CISO Approved 6/01/2013 RMAC Risk Management Advisory Council Reviewed #12;Risk Management Exception Template 2 | P a g e Please check one of the following: Requester

  6. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Walker, Lawrence R.

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsmLE OFFICE(S): ORIGINALLY ISSUED: ApPROVALS: VICE PROVOST FOR INFORMATION TECHNOLOGY OFFICE OF THE VICE PROVOST FOR INFORMATION TECHNOLOGY ApPROVED BY: ~ Date ~ts-tl2- Date li/rO/I?... I I Date REVISION DATE

  7. J. Douglas Streit, Information Security Officer Office of Computing and Communications Services

    E-Print Network [OSTI]

    J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated February 6, 2012 Old Dominion University Information Technology Security Program #12;J. Douglas Streit, Information Security Officer Office of Computing and Communications Services Last updated

  8. Electronic DOE Information Security System (eDISS) PIA, Office...

    Energy Savers [EERE]

    Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and...

  9. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  10. Banner Job Installation Security Form Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Job Installation Security Form Office of Information Technology 424 Roy S. Nicks Hall, Box: ______________________________ Job Description: ______________________________ Section 3. Security Information Banner Module 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu Section 1. Requestor Information

  11. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  12. Responsible University Officer Chief Information Officer

    E-Print Network [OSTI]

    Whitton, Mary C.

    Responsible University Officer Chief Information Officer Responsible Office Information Technology Services Information Security Liaison Policy Policy Statement Given the risks associated with information and Department Heads be aware of information security issues and of their responsibilities for mitigating

  13. Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information prepared by the Office of Security and Public

    E-Print Network [OSTI]

    Collins, Gary S.

    of Security and Public Safety. Information prepared by the Office of Security and Public Safety at WSU Spokane and Security Department Information 3 Reporting, Access and Programs 3-5 Policies and Procedures 6Printed copies of the WSU Spokane Annual Security/Fire Safety Report can be obtained at the Office

  14. Responsible University Officer Chief Information Officer

    E-Print Network [OSTI]

    Whitton, Mary C.

    Responsible University Officer Chief Information Officer Responsible Office Information Technology at Chapel Hill that manages its own or subcontracts its information technology must: Establish and maintain Management Plan, contact the Information Security Office (ISO) at 919-445-9393 or security@unc.edu. Designate

  15. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  18. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  19. Information System Security Officer (ISSO) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation StandardsEnergyDepartmentOwner (ISO)Officer (ISSO)

  20. UMass Office of Information Technologies Office of Information Technologies

    E-Print Network [OSTI]

    Mountziaris, T. J.

    UMass Office of Information Technologies Office of Information Technologies A218 Lederle GRC University of Massachusetts Amherst http://www.oit.umass.edu/ The Instructor's Guide to Information Security 1. Student Information at UMass Amherst What is FERPA anyway

  1. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  2. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Jornsten, Rebecka

    . The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

  3. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  5. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  6. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  8. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  9. INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment

    SciTech Connect (OSTI)

    None

    2009-05-01

    The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  11. Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    Overview of Key Roles and Responsibilities in Information Security Liaison Model Responsibilities Chief Information Security-Privacy Officers Divisional Information Security-Privacy Liaison Departmental Information Security-Privacy Liaison Planning Plan and conduct annual risk assessment Develop a prioritized

  12. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  13. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  14. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful financial institutions or e-commerce organizations. On December 6, SEAS' Information Security Office held some basic security awareness information. More information on how to remain secure during the busy

  15. Standard for IT Security Roles and Responsibilities Version 1.0 Office of Information Technology University of Maryland College Park Page 1

    E-Print Network [OSTI]

    Yorke, James

    Standard for IT Security Roles and Responsibilities ­ Version 1.0 Office of Information Technology University of Maryland ­ College Park Page 1 Information Technology Standard Document Title: Standard The Board of Regents' Information Technology policy and Section 12-112 of the Education article

  16. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access technology security incident. A standard Universitywide approach to information security is important the Information Technology Services Office has completed its investigation and authorizes such activity. 3

  17. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  18. The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO.

    E-Print Network [OSTI]

    1 The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO. This directive Information Technology Appropriate Use Policy · Colorado School of Mines Administrative Data Policy Mines

  19. Chief Information Officer

    Broader source: Energy.gov [DOE]

    The Federal Energy Regulatory Commission is looking for an experienced senior level executive to serve as the Chief Information Officer (CIO). The Chief Information Officer (CIO) reports directly...

  20. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  1. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, As we write the summer issue, with the hire of Indir Advagic, SEAS is launching an Office of Information Security. Besides assessing the general state of information security at SEAS, one of Indir's first tasks will be to revive the cross

  2. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision requirements for the protection of that information on the University. The University has had security of the University. The Information Technology Security Office has created this Incident Response Plan to assist

  3. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  4. Washington and Lee University Guidance on Information Security

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidance on Information Security This guidance addresses common issues that have come up during information security discussions with offices and departments across, Information Security Program Committee Chair (sdittman@wlu.edu) or Dean Tallman, Information Security Officer

  5. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  6. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

    E-Print Network [OSTI]

    Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

    2010-01-01

    -Government and Cyber Security: The Role of Cyber Security Exercises. Proceedings of the 39th Hawaii International Conference on System Sciences. Kauai, Hawaii. January 4–7, 2006. IBM Center for The Business of Government8 CYBERSECURITY MANAGEMENT IN THE STATES...

  7. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  8. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  9. Information System Security Critical Elements Please note that prior to including this language in the performance plans of employees covered by

    E-Print Network [OSTI]

    Information System Security Critical Elements Please note that prior to including this language fulfilled. Stand-Alone Critical Elements Senior Agency Information Security Officer/Chief Information Security Officer/ Information Technology Security Officer Critical Element and Objective · Senior Agency

  10. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  11. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  12. Electronic DOE Information Security System (eDISS) PIA, Office of Health

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice ofof EnergyPlants"OE is laying the framework forSafety

  13. Office of Heath, Safety and Security Now Two New Offices

    Office of Energy Efficiency and Renewable Energy (EERE)

    To serve you better, DOE has structured the former HSS into to new organizations: the Office Independent Enterprise Assessment (IEA); and Office of Environment, Health, Safety and Security (EHSS).

  14. Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)

    E-Print Network [OSTI]

    1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS, Acting Chief, Computer Security Division, Information Technology Laboratory (ITL), NIST 9 Data Using Encryption Matthew Scholl, Computer Security Division, Information Technology Laboratory

  15. Office of the CISO, February 2011 Information Security and Privacy Risk Advisory

    E-Print Network [OSTI]

    or the safe browsing feature when available in your web browser. · Keep an eye on the web browser address bar address. · Exercise caution if a message sounds or a website looks suspicious, is out of the ordinary of the message. · Don't use email to send personal or financial information, and delete any emails that ask you

  16. Secretarial Office: National Nuclear Security Administration

    Office of Environmental Management (EM)

    )Report Number: NA--LASO-LANL-WASTEMGT-2014-0006 After 2003 Redesign Secretarial Office: National Nuclear Security Administration LabSiteOrg: Los Alamos National Laboratory...

  17. Alternate Watch Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Alternate Watch Office | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  19. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  20. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  1. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Energy Savers [EERE]

    Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

  2. Office of Health, Safety and Security Report to the Secretary...

    Energy Savers [EERE]

    Office of Health, Safety and Security Report to the Secretary of Energy - February 2011 Office of Health, Safety and Security Report to the Secretary of Energy - February 2011...

  3. Physical and Information Security Policy Category: Campus Life

    E-Print Network [OSTI]

    Physical and Information Security Policy Category: Campus Life Facilities Information Management 1. The Security Office (Bentley Campus) will provide information to assist staff and students in protecting Manager. 2.7 Information security University information must be protected in a manner that is appropriate

  4. A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING Daria Stepanova, Simon E.K. dasha stepanova@list.ru, s.e.parkin@ncl.ac.uk, aad.vanmoorsel@ncl.ac.uk Keywords: Information security Information Security Officer (CISO) within an organisation to ensure that such information is adequately

  5. Page 1 of 2 Policy Name: Information Technology (IT) Security

    E-Print Network [OSTI]

    Carleton University

    Page 1 of 2 Policy Name: Information Technology (IT) Security Originating/Responsible Department Information Officer (CIO) Policy: Information Technology (IT) Security Purpose: The purpose of this Policy is to outline Carleton University's approach to campus- wide IT security for networks, enterprise information

  6. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  7. From: Office of Information Technology Sent: Thursday, April 23, 2015 4:31 PM

    E-Print Network [OSTI]

    Sun, Yi

    From: Office of Information Technology Sent: Thursday, April 23, 2015 4 information technology works. It illuminates security vulnerabilities while offering useful tips and resources Technology Security Workshop topics · CUNY Information Security policy overview · What is Non

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  9. Office of Information Technology Accomplishments

    E-Print Network [OSTI]

    Yorke, James

    Office of Information Technology Accomplishments Fiscal Year 2007 #12;Office of Information'scentralinformationtechnologyserviceorganization,itismypleasuretosharewithyou theOfficeofInformationTechnology'spublication,"OITAccomplishmentsFiscalYear2007,"whichfeatures's goal is to take a quantum leap forward in the information technology environmentavailabletostudents

  10. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  11. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  12. National Nuclear Security Administration LOS ALAMOS SITE OFFICE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nuclear Security Administration LOS ALAMOS SITE OFFICE National Nuclear Security Administration CONTRACT MANAGEMENT PLAN For LOS ALAMOS NATIONAL LABORATORY CONTRACT NO....

  13. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  14. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATIONOperationsDefenseSNL SECURITY

  15. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATIONOperationsDefenseSNL SECURITY CONTACTS

  16. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    OWNERSHIP, CONTROL OR INFLUENCE (FOCI) PROGRAM It is DOE policy to obtain information that indicates whether a company that SNL will enter into a contract with is Owned,...

  17. Field Offices | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOffices | National

  18. Policy Name: Information Security Policy Originating/Responsible Departments: Computing and Communication Services (CCS)

    E-Print Network [OSTI]

    Carleton University

    Policy Name: Information Security Policy Originating/Responsible Departments: Computing: Chief Information Officer (CIO) Corporate Archivist and Assistant Privacy Officer Introduction Records in all formats contain information that is vital to ongoing operations - for insuring accountability

  19. Office of Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014DepartmentCouncil Meeting notes,Security Office of

  20. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861 ANNUAL|Facility Operations

  1. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  2. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  3. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 17, Headquarters Security Officer Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program Describes the requirement for all HQ elements to appoint a Headquarters Security Officer (HSO) and Alternate HSO to perform certain security functions in behalf of the element’s employees and contractors. This chapter also describes HSO duties, training requirements, and resources.

  5. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  6. Office of Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster SessionPrograms | NationalSecurityOffice

  7. Director, Information Technology Services Office

    Broader source: Energy.gov [DOE]

    The mission of the information Technologies Services Office is to provide effective corporate management leadership to proactively identify and manage business system efficiency improvements and to...

  8. Office of Security Assessments | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in the subsurfaceSecurity AssessmentsManagementScience

  9. Office of Security Enforcement | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in the subsurfaceSecurity

  10. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  11. National Nuclear Security Administration Los Alamos Site Office

    Office of Environmental Management (EM)

    National Nuclear Security Administration Los Alamos Site Office Los Alamos, New Mexico 87544 mrsm Mr. Ralph L. Phelps Chairman Northem New Mexico Citizens Advisory Board...

  12. Office of Secure Transportation History | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSEHowScientific andComplexOffice ofOffice

  13. Office of Secure Transportation | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSEHowScientific andComplexOffice ofOffice| National

  14. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    Radack, Editor Computer Security Division Information Technology Laboratory National Institute-35, Guide to Information Technology Security Ser vices, Recommendations of the National InstituteJune 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley

  15. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  16. The University of Texas at Austin Management of UTnet Wireless Access Policy Office of the Chief Information Officer Written By: Information Technology Services

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The University of Texas at Austin Management of UTnet Wireless Access Policy Office of the Chief Information Officer Written By: Information Technology Services ­ Networking;Information Security Office Document Version: Approved Last Edited: 3/4/2011 1 Management of UTnet Wireless Access Policy 1

  17. Wireless Security in the Home and Office Environment

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Wireless Security in the Home and Office Environment Michel Barbeau School of Computer Science, 2010 Abstract The ubiquity of wireless communications, in the home and office environment, introduces, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related

  18. Nevada Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics Nevada Field Office Nevada Field Office FY15 Semi Annual Report FY14 Year End...

  19. Sandia Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics Sandia Field Office Sandia Field Office FY15 Semi Annual Report FY14 Year End...

  20. Livermore Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics Livermore Field Office Livermore Field Office FY15 Semi Annual Report FY14 Year...

  1. Pantex Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics Pantex Field Office Pantex Field Office FY12 Semi Annual Report FY11 Year End...

  2. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    is directed to develop cyber security standards, guidelines, and associated methods and techniques. ITLNISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew

  3. Office of the Chief Information Officer DOERM@hq.doe.gov Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of the Chief Information Officer DOERM@hq.doe.gov Office of IT Planning, Architecture and E-government Records Management Division (IM-23) Employee Separation:...

  4. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  5. UNLV OFFICE OF INFORMATION TECHNOLOGY PASSWORD POLICY

    E-Print Network [OSTI]

    Walker, Lawrence R.

    UNLV OFFICE OF INFORMATION TECHNOLOGY PASSWORD POLICY RESPONSIBLE ADMINISTRATOR: VICE PROVOST FOR INFORMATION TECHNOLOGY RESPONSIBLE OFFICE(S): OFFICE OF THE VICE PROVOST FOR INFORMAnON TECHNOLOGY ORIGINALLY to the Office of Information Technology's Policies and Procedures web page at http

  6. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  7. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  8. Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts

    E-Print Network [OSTI]

    Queitsch, Christine

    Information Security and Privacy Laws and Regulations, and UW Subject Matter Experts Page 1 of 16 Document Name: Information Security and Privacy Laws Version #: vF Created By: Ann Nagel, Associate Chief Information Security Officer Date Created: June 2, 2009 Updated By: Melissa Albin-Wurzer, Education

  9. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  10. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  11. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  12. Prepared by Office of Vice President for Information Technology & CIO, the Office of Vice President for Legal Affairs and University

    E-Print Network [OSTI]

    Wang, Yuqing

    Prepared by Office of Vice President for Information Technology & CIO, the Office of Vice President - ADMINISTRATION April 2012 Page 1 of 18 E2.214 Security and Protection of Sensitive Information I. Philosophy The University of Hawai`i makes substantial use of personal and confidential information in achieving its mission

  13. Office of Information Resources

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailableHighOffice of Indian Energy Policy andSubpart

  14. Assistant Deputy Administrator for the Office of Secure Transportation

    Broader source: Energy.gov [DOE]

    **This is a re-advertisement for the position of Assistant Deputy Administrator for the Office of Secure Transportation. Those applicants that previously applied to NA-15-ES-003 MUST RE-APPLY to...

  15. FORM FOR PAYMENT OF SALARY CASUAL SECURITY OFFICERS

    E-Print Network [OSTI]

    Fleming, Andrew J.

    FORM FOR PAYMENT OF SALARY CASUAL SECURITY OFFICERS This form can be completed online prior: SP10 = Weekday Shift SP20 = Weekend Shift SP30 = Weekend Afternoon/Night Shift Salary = Day Shift

  16. UNLV OFFICE OF INFORMATION TECHNOLOGY RESPONSIBLE ADMINISTRATOR

    E-Print Network [OSTI]

    Walker, Lawrence R.

    UNLV OFFICE OF INFORMATION TECHNOLOGY RESPONSIBLE ADMINISTRATOR: RESPONSIBLE OFFICE(S): ORIGINALLY IsSUED: APPROVALS: VICE PROVOST FOR'INFORMATION TECHNOLOGY -.·..-; - OFFICE OF THE VICE PR~OST FOR INFORMATION TECHNOLOGY COMPUTER MANAGEMENT POLICY ApPROVED BY: j1/1q/;~ ~I Date REVISION DATE: NA STATEMENT

  17. Fuel Cell Technologies Office Information Resources | Department...

    Energy Savers [EERE]

    Information Resources Fuel Cell Technologies Office Information Resources Learn about hydrogen and fuel cells, find publications and technical information, view and download...

  18. Information Security Policy Manual Latest Revision: May 16, 2012

    E-Print Network [OSTI]

    Alpay, S. Pamir

    1 Information Security Policy Manual Latest Revision: May 16, 2012 #12;2 Table of Contents Information Security Policy Manual...............................................................................................................................................17 Information Security Glossary

  19. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

  20. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all

  1. Information Security Specialist | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security Specialist Information Security Specialist Submitted by admin on Sun, 2015-09-13 00:15 Job Summary Organization Name Department Of Energy Agency SubElement...

  2. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Pedersen, Tom

    Privacy and Security Protecting Personal Information Kim Hart and Bill Trott #12;Privacy Video http and security and apply the principles to your work situation; · Overview of Freedom of Information records with confidential and highly confidential information; · Faculty and staff may have privacy/security

  3. Information Technology Security for Small Business

    E-Print Network [OSTI]

    Magee, Joseph W.

    Information Technology Security for Small Business (video script) Descriptive Text for the Visually symbolic of information technology security and cyber crime. Narration: "No matter how well you protect, "Information Technology Security for Small Business" and "It's not just good business. It's essential business

  4. Secured Information Flow for Asynchronous Sequential Processes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Secured Information Flow for Asynchronous Sequential Processes Isabelle Attali, Denis Caromel for unauthorized information flows. As a final result, all authorized communication paths are secure: no disclosure a new issue in data confidentiality: authorization of secured information flow transiting (by the mean

  5. 06 DEC 2013 1 Information Security Guideline

    E-Print Network [OSTI]

    Queitsch, Christine

    06 DEC 2013 1 Information Security Guideline Definitions can be found in Administrative Policy Statement 2.4, Information Security and Privacy Roles, Responsibilities, and Definitions. 1 Purpose Administrative Policy Statement (APS) 2.6, Information Security Controls and Operational Practices, states

  6. Information Security 26:198:643:01

    E-Print Network [OSTI]

    Lin, Xiaodong

    Information Security 26:198:643:01 Spring 2012 Rutgers University M 2:30-5:20pm, 1WP-534 Panagiotis and interconnecting networks, raising demands for security measures to protect the information and relevant systems, students will learn the theoretical advancements in information security, state-of-the- art techniques

  7. Start your information security planning here!

    E-Print Network [OSTI]

    Magee, Joseph W.

    Start your information security planning here! Save the Date July 15, 2008 8:30 am ­ 12:30 pm-technology crimes. For additional information, visit http://csrc.nist.gov/secure iz/b or contact: securebiz developed a workshop to help the small business owner increase information system security. Learn how

  8. Formalizing Information Security Knowledge Stefan Fenz

    E-Print Network [OSTI]

    Formalizing Information Security Knowledge Stefan Fenz Vienna University of Technology Vienna ontology which provides an on- tological structure for information security domain knowl- edge. Besides of the considered organization is incorporated. An evaluation conducted by an information security expert team has

  9. Office of Global Material Security | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  10. Let The People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    E-Print Network [OSTI]

    2006-01-01

    Acting Director of the Information Security Oversight OfficeActing Director, Information Security Oversight Office,Chemical Safety Information, Site Security and Fuels

  11. UNLV OFFICE OF INFORMATION TECHNOLOGY WIRELESS NETWORK (Wi-Fi) POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    : Data and Information Security, Sections 2.1 and 3.3 http://system.nevada.edu/tasks/sites/Nshe/assets/File/BoardOfRegents/Procedures/P& GM%20CH14%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf CONTACTS Refer to the Office of InformationUNLV OFFICE OF INFORMATION TECHNOLOGY WIRELESS NETWORK (Wi-Fi) POLICY RESPONsmLE ADMINISTRATOR

  12. The Department of Energy's National Security Information Fundamental...

    Energy Savers [EERE]

    The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental...

  13. National Nuclear Security Administration Kansas City Field Office

    National Nuclear Security Administration (NNSA)

    City Field Office 14520 Botts Road Kansas City, Missouri 64147 Kansas City Plant Related Web Pages Kansas City Plant Home Page - Provides background information and related news on...

  14. AT&TSecurity Consulting Information Assurance Federal Information Security

    E-Print Network [OSTI]

    Fisher, Kathleen

    AT&TSecurity Consulting Information Assurance ­ Federal Information Security Management Act (FISMA requirements under the Federal Information Security Management Act of 2002, of general support systems the security controls for the information system. The AT&T Consulting methodology is based on National

  15. Third Annual Cyber Security and Information

    E-Print Network [OSTI]

    Krings, Axel W.

    Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

  16. 29.01.03.M1.28 Information Resources Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    by the Associate Vice President for Information Technology & Chief Information Officer to review AVST installations for Information Technology & Chief Information Officer, Networking and Information Security, University P ol i ce is to provide recommendations to the Associate Vice President for Information Technology & Chief Information

  17. Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13, 2014)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2014 Evaluation (IG-15-004, November 13) identified for this year's Federal Information Security Management Act (FISMA) review; however, the Agency Administrator, provides the Office of Inspector General's (OIG) independent assessment of NASA's information

  18. A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp

    E-Print Network [OSTI]

    George, Edward I.

    Page 1 I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103 and Responsibility Information Systems and Computing is responsible for the operation of Penn's data networks (Penn-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer

  19. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  20. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  1. Security on Campus The Security Office and lost

    E-Print Network [OSTI]

    Teaching building (building 104). · Call 9553 7333 (24 hour hotline). Security call buttons are located are located in the Gym. Contact the Student Centre for access. Travel Smart Maps · Travel Smart maps or top up Smart Riders from the Rockingham train station or most newsagents. Maps and timetables

  2. Nevada Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|

  3. GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor

    E-Print Network [OSTI]

    to improve their overall security. The Information Technology Laboratory of the National Institute-115, Technical Guide to Information Security Testing and Assessment: Recommendations of the National InstituteGUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security

  4. U. S. Department of Energy Office of Health, Safety and Security...

    Office of Environmental Management (EM)

    Policy, Guidance & Reports Security U. S. Department of Energy Office of Health, Safety and Security Q & A's on DOE Drug Testing Policy U. S. Department of Energy Office of...

  5. Independent Oversight Review, Nevada Site Office and National Security Technologies, LLC- November 2011

    Broader source: Energy.gov [DOE]

    Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment

  6. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access toOctober 1996 - SeptemberDepartment ofSafety andOffice of

  7. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  8. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. OFFICE OF THE CHIEF INFORMATION OFFICER (OCIO)

    Energy Savers [EERE]

    was detailed from the U.S. Department of Agriculture under a reimbursable interagency agreement to serve as the IT Project Manager for the transformation of information...

  10. National Nuclear Security Administration Nevada Field Office

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19,To

  11. Livermore Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclearH-canyon |I 14/%2A1/%2AField|

  12. livermore field office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en46Afedkcp |field office | National

  13. University of Connecticut / Jason Pufahl, CISSP, CISM 1 INFORMATION SECURITY STRATEGIC

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 INFORMATION SECURITY STRATEGIC PLAN, CISSP, CISM 2 2 MISSION STATEMENT The mission of the Information Security Office (ISO) is to design ­ IMPLEMENTATION CYCLE #12;University of Connecticut / Jason Pufahl, CISSP, CISM 3 3 GOVERNANCE In recognition

  14. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information...

  15. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information...

  16. Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE

    E-Print Network [OSTI]

    Martin, Jeff

    Professional, Applied & Continuing Education INFORMATION ASSURANCE & SECURITY CERTIFICATE Demand for technical security and information assurance professionals has risen dramatically in recent years OPPORTUNITIES: TUITION: Required Courses (78 Hours): · Information Assurance and Security Level 1: Information

  17. USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY

    E-Print Network [OSTI]

    USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY Shirley about the security of information systems for the decision makers of organizations. When organizations to strengthen the overall security of their information and their information systems. Organizations

  18. Office of Security and Emergency Operations Office of Safeguards...

    National Nuclear Security Administration (NNSA)

    Orlando, Florida-May 23-25, 2006 Sponsored by the U.S. Department of Energy & the U.S. Nuclear Regulatory Commission NM M SS NM M SS NM M SS NM M SS Federal Information System...

  19. The Handbook of Information Security 25. Routers and Switches The Handbook of Information Security

    E-Print Network [OSTI]

    Dommel, Hans-Peter

    The Handbook of Information Security 25. Routers and Switches 1 The Handbook of Information Security John Wiley & Sons Chapter 25. Routers and Switches Mar 31, 2005 - FINAL VERSION - #12;The Handbook of Information Security 25. Routers and Switches 2 OUTLINE INTRODUCTION Principles of Routing and Switching

  20. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    E-Print Network [OSTI]

    Thaw, David Bernard

    2011-01-01

    assets. Current information security law in the Unitedimplications for information security professionalism inbeing abundant in the information security community: Yes,

  1. Securing the information infrastructure for EV charging

    E-Print Network [OSTI]

    Poll, Erik

    Securing the information infrastructure for EV charging Fabian van den Broek1 , Erik Poll1 , and B for the information exchanges in the infrastructure for EV charging being tri- alled in the Netherlands, which. Key words: EV charging, congestion management, end-to-end security, smart grids 1 Introduction

  2. CMAD IV 11/14/96 Information Security

    E-Print Network [OSTI]

    California at Davis, University of

    CMAD IV 11/14/96 Information Security and the Electric Power Industry Ab Kader Ron Skelton Electric;CMAD IV 11/14/96 EPRI Security Initiatives · Information Security Workshop ­ Utility Security Survey (MIS Training) · Information Security Applications ­ Power System Security (LANL) ­ Residential

  3. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en NNSA sitesInformation/%2ARLUOB

  4. Information Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence of TopologicalISTI

  5. Order Code RL33494 Security Classified and Controlled Information

    E-Print Network [OSTI]

    Laughlin, Robert B.

    Order Code RL33494 Security Classified and Controlled Information: History, Status, and Emerging Government and Finance Division #12;Security Classified and Controlled Information: History, Status in the creation, management, and declassification of national security information followed over the succeeding

  6. University of Warwick Information Security Policy 1. Introduction

    E-Print Network [OSTI]

    Davies, Christopher

    University of Warwick Information Security Policy 1. Introduction The University recognises's strategic objectives. Information security is important to the protection of the University's reputation implications for individuals and is subject to legal obligations. The consequences of information security

  7. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  8. 29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE

    E-Print Network [OSTI]

    Technology & Chief Information Officer. 2. RESPONSIBILITIES 2.1 The Associate Vice President for Information Technology & Chief Information Officer, or designee, is responsible for administering the provisions29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE 29.01.03.M1

  9. Office of the Chief Information Officer | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSEHowScientific andComplexOffice ofOffice|Office

  10. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Broader source: Energy.gov (indexed) [DOE]

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE More Documents & Publications PIA - INL Education Programs...

  11. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  12. Office of Test and Evaluation | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSEHowScientific andComplexOffice ofOffice| OfficeTest

  13. Information Access and Privacy Protection Office

    E-Print Network [OSTI]

    deYoung, Brad

    Information Access and Privacy Protection Office I A P P Guidelines for Using Personal Information in Email and Faxes Memorial University employees are required to protect personal information (defined personal information ­ your own or someone else's. Email and faxes, in particular, pose challenges

  14. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Approved POLICY TITLE: Information Technology Security Policy POLICY PURPOSE: The purpose of this Information Technology Security Policy is to ensure and describe the steps necessary to secure information

  15. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    o471.6AdminChg2-Certified.pdf -- PDF Document, 665 KB Writer: Carl Piechowski Subjects: Administration Information Technology Security ID: DOE O 471.6 Admin Chg 2 Type:...

  16. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision management issue for all organizations, including the University of Connecticut. Furthermore, as more or framework within which University of Connecticut incident handlers can work to ensure a complete

  17. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  18. Office of Information Technology -Strategic Plan FY 2015 2020 1 of 12 Office of Information Technology (OIT)

    E-Print Network [OSTI]

    Barrash, Warren

    Office of Information Technology - Strategic Plan FY 2015 ­ 2020 1 of 12 Office of Information Technology (OIT) Strategic Plan FY 2015 ­ 2020 Office of Information Technology - Vision, Mission, Pillars, and Values Vision

  19. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery for Homeland Security Information Management and Knowledge Discovery Authors Tamara Kolda, Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  20. ISMS for Microsoft's Cloud Infrastructure 1 Information Security Management System

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    ISMS for Microsoft's Cloud Infrastructure 1 Information Security Management System for Microsoft's Cloud Infrastructure Online Services Security and Compliance Executive summary This paper describes the Microsoft Cloud Infrastructure and Operations (MCIO) Information Security Management System (ISMS) program

  1. President Office Vice President Office

    E-Print Network [OSTI]

    Wu, Yih-Min

    Affairs Division Computer Information Management Division Media Instruction and Production Center Division Campus Security Supplies Office Office of Research and Development Planning Section and Waste Control Division Radiation Protection Division Biological Pollution Control Division #12

  2. Office of Secure Transportation Celebrates 40th Anniversary | National

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster SessionPrograms | NationalSecurityOfficeNuclear

  3. Office of Cyber and Security Assessments | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in the subsurfaceSecurity Assessments is responsible for the

  4. 08 NOV 2010 Chief Information Officer

    E-Print Network [OSTI]

    Baker, Chris I.

    08 NOV 2010 Chief Information Officer National Institutes of Health Department of Health and Human Services Guide for Identifying and Handling Sensitive Information at the NIH November 08, 2010 #12;GUIDE FOR HANDLING SENSITIVE INFORMATION AT THE NIH Page 2 Change History Version Date of Issue Author(s) Description

  5. US statutes of general interest to safeguards and security officers. Revision 12/95

    SciTech Connect (OSTI)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. This document, BNL 52202, it titled, ``US Statutes of General Interest to Safeguards and Security Officers``, and is intended for use by officers.

  6. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  7. Vehicle Technologies Office: Information Resources

    Broader source: Energy.gov [DOE]

    From here you can access additional information on advanced transportation technologies; view programmatic publications and technical information; learn the basics of hybrid vehicle technology;...

  8. Smart Grid Information Security (IS) Functional Requirement

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01

    It is important to implement safe smart grid environment to enhance people's lives and livelihoods. This paper provides information on smart grid IS functional requirement by illustrating some discussion points to the sixteen identified requirements. This paper introduces the smart grid potential hazards that can be referred as a triggering factor to improve the system and security of the entire grid. The background of smart information infrastructure and the needs for smart grid IS is described with the adoption of hermeneutic circle as methodology. Grid information technology and security-s session discusses that grid provides the chance of a simple and transparent access to different information sources. In addition, the transformation between traditional versus smart grid networking trend and the IS importance on the communication field reflects the criticality of grid IS functional requirement identification is introduces. The smart grid IS functional requirements described in this paper are general and ...

  9. Cloud Computing Security in Business Information Systems

    E-Print Network [OSTI]

    Ristov, Sasko; Kostoska, Magdalena

    2012-01-01

    Cloud computing providers' and customers' services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analyze main international and industrial standards targeting information security and their conformity with cloud computing security challenges. We evaluate that almost all main cloud service providers (CSPs) are ISO 27001:2005 certified, at minimum. As a result, we propose an extension to the ISO 27001:2005 standard with new control objective about virtualization, to retain generic, regardless of company's type, size and nature, that is, to be applicable for cloud systems, as well, where virtualization is its baseline. We also define a quantitative metric and evaluate the importance factor of ISO 27001:2005 control objecti...

  10. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  11. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  12. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  13. When security meets software engineering: A case of modelling secure information systems

    E-Print Network [OSTI]

    When security meets software engineering: A case of modelling secure information systems Engineering: towards the Modeling of Secure Information Systems" paper presented at the 15th International. This is mainly because private information is stored in computer systems and without security, organisations (and

  14. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

    E-Print Network [OSTI]

    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems for information systems. Traditionally, security is considered after the definition of the system. However the health sector to military. As the use of Information Systems arises, the demand to secure those systems

  15. Information Security and Quantum Mechanics: Security of Quantum Protocols

    E-Print Network [OSTI]

    P. Oscar Boykin

    2002-10-28

    The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases). A one-to-one correspondence between certain unitary bases and mutually unbiased bases is found. Finally, a new protocol for making anonymous classical broadcasts is given along with a security proof. An experimental procedure to implement this protocol is also given. In order to prove these new results, some new bounds for accessible information of quantum sources are obtained.

  16. Ontological Mapping of Information Security Best-Practice Guidelines

    E-Print Network [OSTI]

    Ontological Mapping of Information Security Best-Practice Guidelines Stefan Fenz, Thomas Pruckner security knowl- edge. While information security ontologies already exist, no methods have been proposed. Therefore, this paper presents a method for mapping the information security knowledge of the French EBIOS

  17. The Center for Information Systems Security Studies and

    E-Print Network [OSTI]

    The Center for Information Systems Security Studies and Research (CISR) has created the ISSE) and the Department of Homeland Security (DHS) have designated NPS as a Center of Academic Excellence in Information developments where cyber security is a concern. Information Systems Security Engineering (ISSE) Certificate

  18. Fiscal Year 2009 Office of Information Technology

    E-Print Network [OSTI]

    Yorke, James

    UN I VERSITY O F M A RY L A N D 18 56 Fiscal Year 2009 Office of Information Technology of Information Technology: Providing Computing and Communications Resources to the University of Maryland the University's Technology Environment ..... 8 OIT Supports Research at Maryland and Beyond

  19. Thomas J. Schlagel Chief Information Officer, BNL

    E-Print Network [OSTI]

    Homes, Christopher C.

    of information technology and management activities · Held IT roles at Jupiter Media Metrix and NSLIJ from 2000 role of Chief Information Officer ­ senior manager accountable for cyber protections · Resident · Research Library · Business systems to support HR, Finance, Procurement, Facilities, ES&H · Centralized

  20. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS of Standards and Technology The management of risks to information technology (IT) systems is a fundamental component of every organization's information security program. An effective risk management process enables

  1. Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY

    E-Print Network [OSTI]

    Policy 3505 ­ Information Technology Security 1 OLD DOMINION UNIVERSITY University Policy Policy #3505 INFORMATION TECHNOLOGY SECURITY POLICY Responsible Oversight Executive: Vice President of this policy is to state the codes of practice with which the University aligns its information technology

  2. Senior Advisor, Chief Information Security Officer | Department...

    Energy Savers [EERE]

    May Apply ALL U.S. CITIZENS Work Schedule FULL-TIME Work Type PERMANENT Series 2210 Salary Basis Per Year Grade 0000 Salary Min 121,956.00 Salary Max 183,300.00 Start Date...

  3. Teaching Aggressive Information Security Labs

    E-Print Network [OSTI]

    information platforms used by organizations to conduct business and share information and data. 3. I and unlawful ways. 4. I will not "hack" the NPGS domain. _______________________ Print your name and are relevant to the discussion... 8 #12;So Why Do They Hack? · Script Kiddies: ­ According to Sarah Gordon

  4. NA GC - Office of General Counsel | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Blog Home About Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA GC - Office of General Counsel NA GC - Office of General Counsel...

  5. Savannah River Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics Savannah River Field Office Savannah River Field Office FY15 Semi Annual Report...

  6. Kansas City Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics Kansas City Field Office Kansas City Field Office FY15 Semi Annual Report FY14...

  7. Los Alamos Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics Los Alamos Field Office Los Alamos Field Office FY15 Semi Annual Report FY14 Year...

  8. Secure Information and Resource Sharing in Cloud Institute for Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Secure Information and Resource Sharing in Cloud Yun Zhang Institute for Cyber Security Univ Institute for Cyber Security Univ of Texas at San Antonio San Antonio, TX 78249 Ravi.Sandhu@utsa.edu ABSTRACT The significant threats from information security breaches in cyber world is one of the most

  9. DOE Issues Request for Information for Richland Operations Office...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office Richland Acquisitions - Post Fiscal Year 2018 Contract(s) Acquisition Planning DOE Issues Request for Information for Richland Operations Office Richland...

  10. Final Report Implementing Office of Management and Budget Information...

    Energy Savers [EERE]

    Final Report Implementing Office of Management and Budget Information Dissemination Quality Guidelines (67 Fed Reg 62446) Final Report Implementing Office of Management and Budget...

  11. ESRCThe economics of information security ESRC Seminar Series

    E-Print Network [OSTI]

    Pym, David J.

    by the Economic and Social Research Council (ESRC), the Cyber Security Knowledge Transfer Network (KTNThe economics of information security Cyber Security KTN The Cyber Security Knowledge Transfer Network (KTN) under the Directorship of Nigel A Jones provides a single focal point for UK Cyber Security

  12. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  13. UNLV OFFICE OF INFORMATION TECHNOLOGY NETWORK ACCESS COMPLIANCE POLICY

    E-Print Network [OSTI]

    Walker, Lawrence R.

    UNLV OFFICE OF INFORMATION TECHNOLOGY NETWORK ACCESS COMPLIANCE POLICY RESPONSIBLE ADMINISTRATOR: RESPONSIBLE OFFICE(S): ORIGINALLY IsSUED: APPROVALS: VICE PROVOST FOR INFORMATION TECHNOLOGY OFFICE OF THE VICE PROVOST FOR INFORMATION TECHNOLOGY, JULY 2012 APPROVED BY: -1 \\ '5\\ \\ \\.2- \\ Vice Provostfor

  14. Savannah River Site Team Wins Carolina Challenge at 2012 DOE Security Protection Officer Competition

    Broader source: Energy.gov [DOE]

    Savannah River Site, Aiken, S.C. – Security Protection Officers from Savannah River Site’s (SRS) security contractor WSI-SRS, today won the Department of Energy (DOE) Secretary’s Trophy as the top DOE team in the 2012 Security Protection Officer Team Competition (SPOTC)- 2012 Carolina Challenge, held here, April 22-26. It was the 40th anniversary of the SPOTC competition.

  15. Quantum non-locality and information security Muhammad Nadeem

    E-Print Network [OSTI]

    1 Quantum non-locality and information security Muhammad Nadeem Department of Basic Sciences-locality, as discussed here, is sufficient to achieve unconditional information security without requiring advanced, integrity, authenticity and availability of information to legitimate users. These information security

  16. Building an Information Technology Security Awareness

    E-Print Network [OSTI]

    by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests of technical, physical, administrative, and management standards and guidelines for the cost-effective security Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899

  17. Office of Information Resources | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in the subsurfaceSecurity Assessments is TheNational

  18. Computer Account Request Form ETSU Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Computer Account Request Form ETSU Office of Information Technology 424 Roy S. Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu This section for use by the Office _____________________________ ETSU Phone Number _____________________________ Department / Office

  19. The Promotion of Access to and Protection of National Security Information in South Africa

    E-Print Network [OSTI]

    Klaaren, Jonathan E.

    2003-01-01

    broadly, a military information security policy has beenfor secrecy and therefore information security measures in asection describes the information security implementation

  20. PUBLIC INFORMATION OFFICE JET PROPULSION LABORATORY

    E-Print Network [OSTI]

    Christian, Eric

    PUBLIC INFORMATION OFFICE JET PROPULSION LABORATORY CALIFORNIA INSTITUTE OF TECHNOLOGY NATIONAL are above the current sheet, they detect magnetic fields directed outward from the sun. When spacecraft observing magnetic field lines pointing inward only," Marsden said. A pair of magnetometers, each able

  1. National Nuclear Security Administration Office of Civil Rights

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19,ToINFORMAL

  2. NNSA Field Office Manager Moves | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving BasicSecurity Complex DeliversField

  3. Office of Information Technology Accomplishments Fiscal Year 2008

    E-Print Network [OSTI]

    Yorke, James

    Office of Information Technology Accomplishments Fiscal Year 2008 UN IVERSITY O F M A RY L A ND 18 56 #12;Office of Information Technology: Providing Computing and Communications Resources and Chief Information Officer Infiscalyear2008,theOfficeofInformationTechnology(OIT)completed10years

  4. Office of Nuclear Threat Science | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSEHowScientific andComplexOffice of

  5. NNSA Office of General Counsel | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy MovingAdministration Dec 1, 2008 TheOffice of

  6. Gerry McCartney Vice President for Information

    E-Print Network [OSTI]

    Hedrick, Chief Information Security Officer, Interim IT Security and Policy Identity & Access Management Information Security Policy & Compliance Information Security Services Brent Drake Chief Data Officer, OfficeGerry McCartney Vice President for Information Technology and System Chief Information Officer

  7. Constructivist Approach To Information Security Awareness In The Middle East

    E-Print Network [OSTI]

    Wang, Yongge

    Constructivist Approach To Information Security Awareness In The Middle East Mohammed Boujettif the application of an approach to en- hance information security awareness amongst employees within middle- eastern companies, in effort to improve information security. We aim at surveying the current attitudes

  8. The Complexity of Synchronous Notions of Information Flow Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Complexity of Synchronous Notions of Information Flow Security Franck Cassez1, , Ron van der flow security is concerned with the ability for agents in a system to deduce information about an information flow security policy has proved to be a subtle matter. A substantial literature has developed

  9. SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS

    E-Print Network [OSTI]

    Williamson, John

    SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS Maryam Al-Awadi University This paper will explore and identify success factors related to the implementation of information security was to identify those factors required to ensure successful implementation of information security, particularly

  10. A Comprehensive and Comparative Metric for Information Security

    E-Print Network [OSTI]

    Breu, Ruth

    A Comprehensive and Comparative Metric for Information Security Steffen Weiß1 , Oliver Weissmann2 security GmbH, Germany Abstract Measurement of information security is important for organizations , Falko Dressler1* 1 Dept. of Computer Science 7, University of Erlangen, Germany 2 atsec information

  11. A Survey of Interdependent Information Security Games ARON LASZKA1

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    A A Survey of Interdependent Information Security Games ARON LASZKA1 , MARK FELEGYHAZI1 , LEVENTE by the security-related decisions of others. This interdependence between information system operators and users Information security has traditionally been considered a strategic cat-and-mouse game between the defending

  12. Information Security and Computer Systems: An Integrated Approach

    E-Print Network [OSTI]

    Holliday, Mark A.

    Information Security and Computer Systems: An Integrated Approach Mark A. Holliday Dept in information security that build upon concepts the students will already have seen in their computer systems this integrated approach to information security and computer systems. Categories and Subject Descriptors D.4

  13. Center for Cyber-Security, Information Privacy, and Trust

    E-Print Network [OSTI]

    Lee, Dongwon

    Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

  14. Appendix III to OMB Circular No. A-130 -Security of Federal Automated Information Resources

    E-Print Network [OSTI]

    Appendix III to OMB Circular No. A-130 - Security of Federal Automated Information Resources A automated information security programs; assigns Federal agency responsibilities for the security of automated information; and links agency automated information security programs and agency management

  15. Secure Information Sharing and Dissemination in the Context of Public Security

    E-Print Network [OSTI]

    Secure Information Sharing and Dissemination in the Context of Public Security Professor Nabil R. Adam Director, The Center for Information Management Integration & Connectivity (CIMIC) Executive://cimic.rutgers.edu/~adam/ Abstract In the context of homeland security, one of the key challenges in such environment is achieving

  16. The Office Of Health Safety And Security Is Proud To Announce...

    Broader source: Energy.gov (indexed) [DOE]

    The Office Of Health Safety And Security Is Proud To Announce The Winners Of The 2012 Greenbuy Program. The GreenBuy Program recognizes DOE sites for purchasing products that save...

  17. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy,

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access, and University policy and procedures regarding use, privacy and confidentiality of information. University data University (University) functions that are: a) stored on University information systems, b) maintained

  18. Find It. Delete It. Protect It. Information Technology Security Strategy

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Find It. Delete It. Protect It. Information Technology Security Strategy Executive Summary The general proposed strategy is to optimize risk management for information security incrementally and over that security will be a process rather than project. Achievement of the goal, optimized risk management

  19. The Promotion of Access to and Protection of National Security Information in South Africa

    E-Print Network [OSTI]

    Klaaren, Jonathan E.

    2003-01-01

    to and Protection of National Security Information in Southmost relevant to national security information have similarbeen extended. 2 The national security ground of refusal to

  20. The office of the Chief Information Officer is responsible for...

    Energy Savers [EERE]

    security policies and are now institutionalizing them, to include incident reporting and wireless technology use. The e-Government team at the Department of Energy has laid the...

  1. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security

    E-Print Network [OSTI]

    Gering, Jon C.

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security STATUS: Approved POLICY of the requesting department to send pricing requests to Information Technology Services, have funds available the requesting department should coordinate with Information Technology Services to ensure dependencies

  2. TCEQ Regional Offices | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing CapacityVectren)Model forTechnologies95Symerton,E C CenterRegional Offices

  3. Office of Secure Transportation Activities | Department of Energy

    Office of Environmental Management (EM)

    Activities Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct...

  4. Office of Test and Evaluation | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    weapons stockpile are safe, secure, and reliable by: Providing for development of engineering tools and manufacturing capabilities to support the life cycle of a nuclear weapon...

  5. Natjonal Nuclespr Security Adm/nistration PANTEX SITE OFFICE

    Broader source: Energy.gov (indexed) [DOE]

    Agreements and evaluates and verifies the effectiveness of the M&O Contractor's safety Software Quality Assurance (SQA). Pantex Site Office Contract Management Plan February 4,...

  6. ORO Office Safeguards and Security Clearance Tracking System...

    Energy Savers [EERE]

    System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking...

  7. U-200: Red Hat Directory Server Information Disclosure Security...

    Broader source: Energy.gov (indexed) [DOE]

    A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat...

  8. List of Major Information Systems,National Nuclear Security Administra...

    Broader source: Energy.gov (indexed) [DOE]

    emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

  9. NISTIR 7621 Small Business Information Security

    E-Print Network [OSTI]

    . .......................................8 3.3 Security concerns about popup windows and other hacker tricks

  10. Selection of Model in Developing Information Security Criteria for Smart Grid Security System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai

    2011-01-01

    At present, the "Smart Grid" has emerged as one of the best advanced energy supply chains. This paper looks into the security system of smart grid via the smart planet system. The scope focused on information security criteria that impact on consumer trust and satisfaction. The importance of information security criteria is perceived as the main aspect to impact on customer trust throughout the entire smart grid system. On one hand, this paper also focuses on the selection of the model for developing information security criteria on a smart grid.

  11. ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION AND INFORMATION SYSTEM VIEW Shirley Radack, Editor Computer Security Division Information Technology Laboratory. Managing information security risk is an essential element of the organization's overall risk management

  12. Bounds on Information and the Security of Quantum Cryptography

    E-Print Network [OSTI]

    E. Biahm; T. Mor

    1997-01-08

    Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed states, and we find bounds on the information leaked to an eavesdropper. Our result suggests that quantum cryptography is ultimately secure.

  13. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  14. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  15. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  16. NA IM- Associate Administrator for Information Management & Chief...

    National Nuclear Security Administration (NNSA)

    IM- Associate Administrator for Information Management & Chief Information Officer | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

  17. Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction This document contains the information security control requirements for Dartmouth College. The Dartmouth Information Security Commitee (DISC) developed these controls based on industry best practice, using Dartmouth

  18. Washington and Lee University Guidelines for Responding to Information Security Breaches

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidelines for Responding to Information Security Breaches Notifications 1. As further detailed in the university's Guidelines for Reporting Information Security Breaches regarding an actual or suspected data breach should contact: i. the university's Information Security

  19. Information Technology Security Training Requirements Appendix E --Training Cross Reference E-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX E Appendix E -- Training Cross Reference E-1 #12;Information Technology Security Training Requirements Appendix E -- Training Cross Reference E-2 #12;Information Technology Security Training Requirements APPENDIX E -- JOB FUNCTION

  20. Office of the Chief Information Officer | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014DepartmentCouncilOffice of the Chief Financial

  1. Hobsons Information Security Introduction and Purpose

    E-Print Network [OSTI]

    Aickelin, Uwe

    . Among the foreseeable risks are external hacks, unauthorised access, thefts, inadvertent destruction of access by employees, students or business associates. The Data Security Coordinator, along with other

  2. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Health, Safety and Security Status: Archive Approved Date: Jun 20, 2011 CRD: Yes DNFSB: No Related History Exemptions Standards Related to: Request to Make Administrative...

  3. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Health, Safety and Security Status: Archive Approved Date: Jun 20, 2011 CRD: Yes DNFSB: No Related History Exemptions Standards Related to: Delegation of Authority - Acting...

  4. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Operations Acquisition and Project Management Major Contract Solicitation National Security Campus Management and...

  5. Technical Qualification Program Self-Assessment Report- Office of Health, Safety and Security- 2014

    Broader source: Energy.gov [DOE]

    Beginning in April 2014, a self-assessment of the Technical Qualification Program (TQP) was performed in the Office of Health, Safety and Security (HSS). The assessment was led by the HSS TQP Manager who is assigned the responsibility for maintaining and implementing the programs.

  6. Information Security: Coordination of Federal Cyber Security Research and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11,SecurityHomeRemarksEnergyConfigurationsEGS

  7. Privacy and Security Protecting Personal Information

    E-Print Network [OSTI]

    Victoria, University of

    key privacy and security concepts specific to academic units; · Integrate the knowledge through/security questions; · External Review recommended wider education and training at the university #12;Why Are You Here principles · Proactive · Better practices #12;University's commitment Protection of Privacy Policy

  8. Emergency Procedures for Security Personnel Procedural Steps for Emergency Response

    E-Print Network [OSTI]

    Olsen, Stephen L.

    for Security personnel for information, direction, and primary on-sight authoritative representation. b) Information. Security Officers must obtain as much pertinent information as possible in an expeditious manner notification process. Security Officer discretion in reacting to and disseminating information is critical

  9. Office of the Chief Information Officer | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of rare Kaonforsupernovae model (JournalHearingsHuman Capital Officer

  10. Office of Defense Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster SessionPrograms | National Nuclear Security

  11. Kansas City Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclearH-canyon |I 14/%2A en DOE/NNSAby|

  12. Los Alamos Field Office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclearH-canyon |I 14/%2A1/%2AField||

  13. los alamos field office | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en46Afedkcp |field office |los alamos

  14. Welcome to the NNSA Production Office | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking WithTelecentricN AProjectAdministration NNSA Production Office |

  15. Welcome to the Nevada Field Office | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking WithTelecentricN AProjectAdministration NNSA Production Office

  16. Security Procedures for Golden Laboratories and Administration Offices |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque| StanfordOfficeImplementation andCommodity Team |NREL

  17. ISM6328 -Boca Raton Campus-Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT

    E-Print Network [OSTI]

    Richman, Fred

    ISM6328 - Boca Raton Campus- Fall 2011-MB1 ISM 6328: INFORMATION SECURITY MANAGEMENT FALL 2011 security. Emphasis is on the management of information security efforts as well as progression in adopting, regularity and policy aspects of Information Security Management. We will examine security management

  18. Ninth Annual Cyber and Information Security Research Conference...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ninth Annual Cyber and Information Security Research Conference Apr 08 2014 04-08-2014 08:30 AM - 04-10-2014 04:00 PM Multiple speakers, multiple disciplines, multiple affiliations...

  19. The Benefits of Student Research in Information Systems Security Education

    E-Print Network [OSTI]

    for Information Systems Security Studies and Research Code CSIc Naval Postgraduate School Monterey, CA 93943 for the younger students. For example, in fourth grade I painted some cardboard boxes to look like houses

  20. Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf

    E-Print Network [OSTI]

    Xia, Yu "Brandon"

    1 Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf it must collect, store and use Sensitive Information relating to its students, employees and individuals Information properly and securely. Reason for Policy / Implication Statement Boston University is committed

  1. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  2. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST PROCEDURE SELECTION LIST/2014 Testing based on criteria in 45 CFR Part 170, Health Information Technology: Standards, Implementation to the Permanent Certification Program for Health Information Technology; Final Rule (September 4, 2012). Complete

  3. Banner HR Account Request Form ETSU Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner HR Account Request Form ETSU Office of Information Technology 424 Roy Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu This section for use by the Office _______________________________________________________________________________________ [ last ] [ first ] [ middle ] ETSU Domain Name _____________________________ School / College

  4. Banner Student Account Request ETSU Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Student Account Request Form ETSU Office of Information Technology 424 Roy Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu This section for use by the Office ______________________________________________________________________________________ [last] [first] [middle] ETSU Domain Name ____________________@etsu.edu School / College

  5. U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF ENVIRONMENTAL INFORMATION

    E-Print Network [OSTI]

    U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF ENVIRONMENTAL INFORMATION Fiscal Year 2013 Tribal..........................................................................................................................................................16 ACRONYMS AIEO American Indian Environmental Office ANV Alaska Native Village BIA Bureau of Indian Affairs EPA U.S. Environmental Protection Agency EPCRA Emergency Planning and Community Right-to-Know Act

  6. DEAN'S OFFICE CONTACT INFORMATION University of Connecticut School of Medicine

    E-Print Network [OSTI]

    Page 8 DEAN'S OFFICE CONTACT INFORMATION University of Connecticut School of Medicine 263@uchc.edu ______________________________________________________________________________ University of Connecticut School of Medicine 263 Farmington Avenue, AG050 Farmington, CT 06030-1912 Phone

  7. Copyright Office of Information Technology, University of Maryland Campus Pack

    E-Print Network [OSTI]

    Yorke, James

    Copyright © Office of Information Technology, University of Maryland Campus Pack Blogs of Maryland College Park Spring 2015 #12;#12;1 Contents Introduction to Campus Pack Blogs Blog, Wiki, or Journal to an ELMS Course Space......................................... 3

  8. Banner Database Clone Request Form ETSU Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Database Clone Request Form ETSU Office of Information Technology 424 Roy S. Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu Section 1. Requestor Information ] [ first ] [ middle ] ETSU Phone Number ETSU e-mail address Section 2. Clone Information Clone Source

  9. The University of Texas at Austin ITS Copyright Notice Office of the Chief Information Officer Written By: Information Technology Services

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The University of Texas at Austin ITS Copyright Notice Office of the Chief Information Officer (url)], with permission from ITS, The University of Texas at Austin, Austin, Texas 78712 from ITS, The University of Texas at Austin, Austin, Texas 78712-1110. Express permission to "mirror

  10. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  11. Stay protected when connected Visit security.duke.edu for more information.

    E-Print Network [OSTI]

    McShea, Daniel W.

    Stay protected when connected Visit security.duke.edu for more information. Follow these guidelines Visit security.duke.edu for more information. Follow these tips for securing mobile devices: iOS 6/software/. Windows Mac Another free option: Microsoft Security Essentials: http://windows.microsoft.com/en- US/windows/products/security

  12. BLM Field Offices | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to: navigation,OpenOffices

  13. BLM Nevada State Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:Four RiversMontanaOffice

  14. BLM Oregon State Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:FourOregon State Office

  15. BLM Utah State Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office JumpUtah State Office Jump to:

  16. BLM Washington Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office JumpUtah State Office Jump

  17. BLM Wyoming State Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office JumpUtah State Office

  18. Office of Civil Rights | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSEHowScientific andComplex Oak125 October

  19. More About NNSA's Naval Reactors Office | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework uses concrete7ModificationsMonitoringAdministration About Us / Our

  20. More About NNSA's Naval Reactors Office | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework uses concrete7ModificationsMonitoringAdministration About Us /

  1. Information theoretic security by the laws of classical physics

    E-Print Network [OSTI]

    Mingesz, R; Gingl, Z; Granqvist, C G; Wen, H; Peper, F; Eubank, T; Schmera, G

    2013-01-01

    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.

  2. Mutual information, bit error rate and security in Wójcik's scheme

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-21

    In this paper the correct calculations of the mutual information of the whole transmission, the quantum bit error rate (QBER) are presented. Mistakes of the general conclusions relative to the mutual information, the quantum bit error rate (QBER) and the security in W\\'{o}jcik's paper [Phys. Rev. Lett. {\\bf 90}, 157901(2003)] have been pointed out.

  3. Anne Margulies University Chief Information Officer

    E-Print Network [OSTI]

    Chou, James

    Colin Murtaugh Bill Knox Jim Waldo Chief Technology Officer Susan Walsh Communications Technologies Chin Harry Levinson Geoff Maness Shannon Rice Artie Barrett Bill Barthelmy Jazahn Clevenger Brandon, contractors, interns, temporary staff, LHTs, or student employees Peg Davis Imani Gibson Edyta Lehmann Dror

  4. First Analysis Securities Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport Jump to: navigation, searchSecurities Corporation Jump

  5. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)

    E-Print Network [OSTI]

    Proceedings of the Third International Symposium on Human Aspects of Information Security the scope of remediation, is a pervasive feature of Information Technology Security Management (ITSM of Information Security & Assurance (HAISA 2009) 120 which is security incident response. We extend those results

  6. Office of Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014DepartmentCouncil Meeting notes, November 14, 2007 Office

  7. Security Forms and Information | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES Pursuant to the contract clauseProgramSecurity Forms and

  8. The University of Texas at Austin ITS Rate Change Policies Office of the Chief Information Officer Written By: David Bistline

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The University of Texas at Austin ITS Rate Change Policies Office of the Chief Information Officer: Draft/Community Input/Endorsed/Approved 2 The University of Texas at Austin 1.1. Direct labor costs

  9. BLM Elko District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLC Jump to:Greece: EnergyMontana)District Office Jump to:

  10. Golden Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View New Pages RecentPlantMagma Energy GroupDOE Golden Field Office) Jump

  11. BLM Colorado State Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to: navigation, search

  12. BLM Eastern States Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to: navigation,

  13. BLM Montana State Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:Four RiversMontana State

  14. BLM Pocatello Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:FourOregon State

  15. BLM Prineville District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:FourOregon

  16. BLM Stillwater Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:FourOregonBLMStillwater

  17. BLM Ukiah Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump

  18. Colorado Energy Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePower Ventures Jump to: navigation,EnergyColorado Department ofDivisionOffice

  19. The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute at The Johns Hopkins University (JHUISI) is planning for substantial multi-year growth in the area of

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    The Information Security Tenure Track Faculty in Computer ScienceThe Information Security Institute of Information Security and Cryptography. Our administration is committed at the highest level to substantially: Applicants in Information Security would also be associated with: · The Information Security Institute

  20. 2011 WSU SPOKANE ANNUAL Security/Fire Safety

    E-Print Network [OSTI]

    Collins, Gary S.

    Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information Information and Preparation of Statistics 1 Director's Letter 2 Mission Statement and Security Department INFORMATION The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (also

  1. 2012 WSU SPOKANE ANNUAL Security/Fire Safety

    E-Print Network [OSTI]

    Collins, Gary S.

    Security/Fire Safety Report can be obtained at the Office of Security and Public Safety. Information Information and Preparation of Statistics 1 Director's Letter 2 Mission Statement and Security Department INFORMATION The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (also

  2. Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code: CS4520

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    students to take an active role in the design, planning, evaluation and management of secure information -- Ability to analyse security risks and deliver a fit-for-purpose information security management system security * Professional/Subject-Specific Skills -- Ability identify risks in software programs, computer

  3. UNLV OFFICE OF INFORMATION TECHNOLOGY WIRELESS NETWORK (Wi-Fi) POLICY

    E-Print Network [OSTI]

    Walker, Lawrence R.

    UNLV OFFICE OF INFORMATION TECHNOLOGY WIRELESS NETWORK (Wi-Fi) POLICY RESPONsmLE ADMINISTRATOR: VICE PROVOST FOR INFORMATION TECHNOLOGY RESPONsmLE OFFICE(S): OFFICE OF THE VICE PROVOST FOR INFORMATION TECHNOLOGY ORIGINALLY IsSUED: OCTOBER 2012 APPROVALS: APPROVEDBY: \\

  4. The original of this document contains information which is subject...

    Energy Savers [EERE]

    behalf in connection with that employment. During the ensuing investigation, the local security office (LSO) obtained information about the individual that raised security...

  5. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Well, what are the manifestations of insecurities?insecurities? Virus/WormsVirus/Worms Denial of serviceIt''s all about the softwares all about the software ""Behind every computer security problem andBehind every computer security problem and malicious attack lies a common enemymalicious attack lies a common

  6. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    9 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009 A Secured Service Level Negotiation In Ubiquitous Environments Mohamed Aymen Chalouf1 make the concerned communications vulnerable to security attacks because of the open medium on which

  7. Short collusion-secure ngerprint codes against three pirates Research Center for Information Security (RCIS), National Institute of Advanced Industrial

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 1Short collusion-secure #12;ngerprint codes against three pirates Koji Nuida Research Center a new construction of probabilistic collusion-secure #12;ngerprint codes against up to three pirates

  8. Short collusion-secure fingerprint codes against three pirates Research Center for Information Security (RCIS), National Institute of Advanced Industrial

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 1Short collusion-secure fingerprint codes against three pirates Koji Nuida Research Center a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates

  9. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE and expanded its catalog of security controls to help organizations protect their information and information, the revised catalog brings together, for the first time, comprehensive information about security controls

  10. Roadmap: Computer Science Information Security -Bachelor of Science

    E-Print Network [OSTI]

    Sheridan, Scott

    Roadmap: Computer Science ­ Information Security -Bachelor of Science [AS-BS-CS-INSE] College of Arts and Sciences Department of Computer Science Catalog Year: 2012­2013 Page 1 of 2 | Last Updated: 3 Major GPA Important Notes Semester One: [16 Credit Hours] CS 13001 Computer Science I: Programming

  11. Information Uncertainty to Compare Qualitative Reasoning Security Risk Assessment Results

    SciTech Connect (OSTI)

    Chavez, Gregory M [Los Alamos National Laboratory; Key, Brian P [Los Alamos National Laboratory; Zerkle, David K [Los Alamos National Laboratory; Shevitz, Daniel W [Los Alamos National Laboratory

    2009-01-01

    The security risk associated with malevolent acts such as those of terrorism are often void of the historical data required for a traditional PRA. Most information available to conduct security risk assessments for these malevolent acts is obtained from subject matter experts as subjective judgements. Qualitative reasoning approaches such as approximate reasoning and evidential reasoning are useful for modeling the predicted risk from information provided by subject matter experts. Absent from these approaches is a consistent means to compare the security risk assessment results. Associated with each predicted risk reasoning result is a quantifiable amount of information uncertainty which can be measured and used to compare the results. This paper explores using entropy measures to quantify the information uncertainty associated with conflict and non-specificity in the predicted reasoning results. The measured quantities of conflict and non-specificity can ultimately be used to compare qualitative reasoning results which are important in triage studies and ultimately resource allocation. Straight forward extensions of previous entropy measures are presented here to quantify the non-specificity and conflict associated with security risk assessment results obtained from qualitative reasoning models.

  12. A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    E-Print Network [OSTI]

    Xu, Haiping

    333 A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage Daniel F. Fitch, however, with data security, reliability, and availability in the cloud. In this paper, we address these concerns by proposing a novel security mechanism for secure and fault-tolerant cloud-based information

  13. Allan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003.

    E-Print Network [OSTI]

    Camp, L. Jean

    With the increased concern over national security there has been increased debate over reliability and securityAllan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003. Making Security Manifest Security and Autonomy for End Users

  14. Informational Materials | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy,ImpactScientificInfluence ofMedia on LightingInformational

  15. The Need for Effective Information Security Awareness

    E-Print Network [OSTI]

    Aloul, Fadi

    hacking methods that can be used to steal money and information from the general public. Furthermore to conduct business in the Middle East and allowed many existing sectors, such as education, health, airline incidents in the Middle East. Local media occasionally report incidents of online fraud, attempts to hack

  16. Required IT Security Practices and Guidelines

    E-Print Network [OSTI]

    Required IT Security Practices and Guidelines Responsible Administrative Unit: Computing, Communications & Information Technologies Policy Contact: Chief Information Officer Issued: March, 2014 Revised", or "the Institution") information and technology (IT) systems, networks, and data are critical

  17. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Supersedes DOE 5639.8.

  18. ITCS Year In Review Chief Information Officer

    E-Print Network [OSTI]

    Gopalakrishnan, K.

    . Furthermore, the growth and improvements in ECU's technology programs are testimony to their importance December 2009. Information technology has matured significantly at ECU in the last ten years, growing advanced teams in the UNC system. That growth is no small part attributable to our talented and visionary

  19. Technology Strategic Plan 2013 2016 Office of Information Technology

    E-Print Network [OSTI]

    Sun, Yi

    Technology Strategic Plan 2013 ­ 2016 Office of Information Technology June 2013 #12;2 T A B L E O This document presents the Technology Strategic Plan for The City College of New York (CCNY). The purpose services that support the strategic mission and goals of The City College of New York. This planning

  20. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  1. Los Angeles Mayors Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History ViewInformationWindsCompressedListguided

  2. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity Date Version Author Comments

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management Information Security Policy 2004 09/2008 D01 Duncan Woodhouse Adaption and consolidation of best practices Registrar for Information Security, Risk Management and Business Continuity 2 University of Warwick

  3. Stateful UML Design with Security Constraints for Information Assurance The design of software applications using UML embodies

    E-Print Network [OSTI]

    Demurjian, Steven A.

    Stateful UML Design with Security Constraints for Information Assurance Abstract The design design state containing security constraints and insures that information assurance with respect. Keywords: RBAC, MAC, UML, access control, information assurance, secure software design. 1. Introduction

  4. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en NNSA sitesInformation | National

  5. Contact Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National NuclearaCSGFNuclearCongressmen tourInformation

  6. Site Information | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation ofAlbuquerque|Sensitive Species3 Outlook forSimulations YieldRichardInformation

  7. Audit Report on "The Office of Science's Management of Information Technology Resources"

    SciTech Connect (OSTI)

    None

    2009-11-01

    The Department of Energy's Office of Science (Science) and its facility contractors are aggressive users of information technology (IT) to support fundamental research in areas such as energy, environmental remediation and computational sciences. Of its $4 billion Fiscal Year 2008 budget, Science spent about $287 million to manage its IT program. This included cyber security activities, acquisition of hardware and software, and support service costs used to maintain the operating environments necessary to support the missions of the program. Prior Office of Inspector General reports have identified various issues with Science's management of its IT programs and resources. For instance, our report on Facility Contractor Acquisition and Management of Information Technology Hardware (DOE/IG-0768, June 2007) noted that the Science sites reviewed spent more than necessary when acquiring IT hardware. In another example, our review of The Department's Efforts to Implement Common Information Technology Services at Headquarters (DOE/IG-0763, March 2007) disclosed that Science's reluctance to adopt the Department of Energy Common Operating Environment (DOE-COE) at Headquarters contributed to the Department's inability to fully realize potential cost savings through consolidation and economies of scale. In light of the magnitude of the Office of Science IT program and previously identified program weaknesses, we initiated this audit to determine whether Science adequately managed its IT resources. Science had taken a number of actions to improve its cyber security posture and align its program to Federal requirements. Yet, our review disclosed that it had not taken some basic steps to enhance security and reduce costs. In particular, we found that: (1) For their non-scientific computing environments, all seven of the field sites reviewed (two Federal, five contractor) had implemented security configurations that were less stringent than those included in the Federal Desktop Core Configuration. This configuration was designed by the National Institute of Standards and Technology and its use was mandated by the Office of Management and Budget; (2) Although we previously highlighted weaknesses and recommended corrective actions, Science still had not fully established or enforced IT hardware standards for acquiring hardware such as desktop and laptop computers or related peripherals, contributing to significant unnecessary expenditures; and (3) While we have noted in a series of past reports that significant savings could be realized from aggregating demand for IT services and products across the enterprise, Science had not implemented a common infrastructure for users at its Federal sites and continued to maintain an IT environment independent of the Department's Common IT Operating Environment. The weaknesses identified were attributable, at least in part, to a lack of adequate policies and procedures for ensuring effective cyber security and hardware acquisition practices. In addition, Science had not effectively monitored the performance of its field sites to ensure that previously reported internal control weaknesses were addressed and had not implemented an appropriate mechanism to track its IT-related costs. Without improvements, Science may be unable to realize the benefits of improved security over its information systems, reduce costs associated with hardware acquisition, and lower IT support costs through consolidation of services. In particular, we determined that Science could potentially realize savings of more than $3.3 million over the next three years by better controlling hardware costs and implementing standards for certain equipment. Furthermore, Science could continue to pay for duplicative IT support services and fail to take advantage of opportunities to lower costs and apply potential savings to mission-related work. During the course of our audit work, we learned from Science officials that they had initiated the process of revising the Program Cyber Security Plan to better clarify its policy for implementing

  8. BLM Bishop Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformation BKNStateMountain

  9. BLM Boise District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformation BKNStateMountainBoise

  10. BLM Burns District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformation BKNStateMountainBoiseBurns

  11. BLM Idaho State Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformationColor CountryIM 2011-003

  12. BLM Vale District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformationColor40 -Open EnergyROW

  13. BLM Winnemucca District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformationColor40 -Open

  14. USDOE, Office of Scientific and Technical Information

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministrationTechnicalTechnicalScience.gov App Find science information and research

  15. DOE Geothermal Technologies Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePower VenturesInformation9) Wind Farm JumpAlum|CycloneOpenDHDNVGeothermal

  16. Burley Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin:PontiacInformationAssessmentExplorationButte Jump to:Field

  17. USDOE, Office of Scientific and Technical Information

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield MunicipalTechnicalInformation4563 LLNL Small-scale Friction Sensitivity (BAM) Test .ll11Directors

  18. A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng

    E-Print Network [OSTI]

    Zheng, Yuliang

    A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage,chandag,yuliangg@fcit.monash.edu.au Abstract Information security is based on access control models and cryptographic techniques of comprehensive information security within organizations. There is a need to study upper level issues

  19. Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr.

    E-Print Network [OSTI]

    Lee, Ruby B.

    Information Sharing and Security in Dynamic Coalitions Charles E. Phillips, Jr. Computer Science in one crisis and adversaries in another, raising difficult security issues with respect to information on the information sharing and security risks when coalitions are formed in response to a crisis. This paper defines

  20. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series FISMA AND TECHNOLOGY 5 FISMA Strategic Vision We are building a solid foundation of information security across one of the largest information technology infrastructures in the world based on comprehensive security standards

  1. Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20, 2013)

    E-Print Network [OSTI]

    Waliser, Duane E.

    Federal Information Security Management Act: Fiscal Year 2013 Evaluation (IG-14-004, November 20 year (FY) 2013 reporting requirements for the Federal Information Security Management Act (FISMA is steadily working to improve its overall information technology (IT) security posture. Nevertheless

  2. Master of Science in Information SecurityFlexible, Applied, Master's Degrees.

    E-Print Network [OSTI]

    Snider, Barry B.

    GPS ONLINE Master of Science in Information SecurityFlexible, Applied, Master's Degrees. Join our professionals in both the private and public sectors. The Master of Science in Information Security provides its risks to the security of proprietary information in an organization. Understand the technical

  3. 1 8th of january 2014 CNRS Information System Security Charter

    E-Print Network [OSTI]

    Jeanjean, Louis

    1 8th of january 2014 CNRS Information System Security Charter This charter, annexed or availability. Any breach of rules governing information systems security is indeed likely to have significant or the scientific and technical potential). The User makes a contribution to information system security. As such

  4. Guideline for Identifying an Information System as a National Security System

    E-Print Network [OSTI]

    Guideline for Identifying an Information System as a National Security System NIST Special Publication 800-59 Guideline for Identifying an Information System as a National Security System William C;Guideline for Identifying an Information System as a National Security System Reports on Computer Systems

  5. Information Technology Security Training Requirements Appendix A --Learning Continuum A-1

    E-Print Network [OSTI]

    Information Technology Security Training Requirements APPENDIX A Appendix A -- Learning Continuum A-1 #12;Information Technology Security Training Requirements Appendix A -- Learning Continuum A-2 #12;Information Technology Security Training Requirements APPENDIX A -- LEARNING CONTINUUM T R A I N I N G E D U

  6. Office of the CISO, December 2010 Information Security Risk Advisory

    E-Print Network [OSTI]

    criminals frequently attack web browsers to take control of computers, delete files, steal personally to be tracked, configure your browser to delete cookies ­ either periodically or when closing the browser that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber

  7. Electronic DOE Information Security System (eDISS) PIA, Office...

    Broader source: Energy.gov (indexed) [DOE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Injury & Illness System...

  8. MN Office of Energy Security | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource HistoryScenarios Towards 2050Enermar <OMISPowerTurbine forMHK HomeTugboat/MMAMN

  9. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  10. Training & Technology Solutions Queens College ~ Office of Information Technology ~ Training & Technology Solutions

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    Training & Technology Solutions Queens College ~ Office of Information Technology ~ Training & Technology Solutions 718-997-4875 ~ training@qc.cuny.edu ~ I-Bldg 214 Faculty Center Verification & Technology Solutions Queens College ~ Office of Information Technology ~ Training & Technology Solutions 718

  11. 2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN- CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION

    Broader source: Energy.gov [DOE]

    2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

  12. 2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID#: ____________________

    E-Print Network [OSTI]

    Mountziaris, T. J.

    2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID YYYY My correct Social Security Number is: ________ - _____ - _________ B. SIGNATURE- For corrections to date of birth. · Signed Social Security card or passport- For corrections to social security

  13. Office of Personnel Management (OPM) Billing System PIA, Office...

    Energy Savers [EERE]

    Personnel Management (OPM) Billing System PIA, Office of Health, Safety and Security Office of Personnel Management (OPM) Billing System PIA, Office of Health, Safety and Security...

  14. Limited Personal Use of Government Office Equipment including Information Technology

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-01-07

    The Order establishes requirements and assigns responsibilities for employees' limited personal use of Government resources (office equipment and other resources including information technology) within DOE, including NNSA. The Order is required to provide guidance on appropriate and inappropriate uses of Government resources. This Order was certified 04/23/2009 as accurate and continues to be relevant and appropriate for use by the Department. Certified 4-23-09. No cancellation.

  15. Texas A&M AgriLife Research Procedures 29.01.03.A0.01 Information Resource Procedures

    E-Print Network [OSTI]

    information resources security and management guidelines for all Texas A&M AgriLife Research (Agri of these procedures. The Director (or a designee, usually the Information Security Officer), Information Technology shall coordinate exceptions of security controls with the Information Security Officer. D. Determine

  16. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect (OSTI)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  17. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  18. An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA Postdoctoral Program Office

    E-Print Network [OSTI]

    An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA Postdoctoral Program Office P.O. Box 1663, Mail Stop M719 Los Alamos, New Mexico 87545 505-665-5306/Fax 505-667-1319 Dear Prospective Postdocs, On behalf of the Los Alamos Postdoctoral Association (LAPA), we would like

  19. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1: it is bad code. This perspective on computer security education informs the design of our new approach, computer security education is often relegated to a secondary role in undergraduate curricula. Exposure

  20. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Ray, Indrakshi

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how}@cs.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  1. A Virtual Environment for Interactive Visualization of Power System Economic and Security Information

    E-Print Network [OSTI]

    visualization of power system economic and security information. Keywords: Power System Economics, SecurityA Virtual Environment for Interactive Visualization of Power System Economic and Security Information Thomas J. Overbye Raymond P. Klump Jamie D. Weber Senior Member Member Student Member University

  2. Published in IET Information Security Received on 10th December 2009

    E-Print Network [OSTI]

    Ansari, Nirwan

    Published in IET Information Security Received on 10th December 2009 Revised on 19th March 2010 doi: 10.1049/iet-ifs.2009.0261 Special Issue on Multi-Agent & Distributed Information Security ISSN 1751-8709 Survey of security services on group communications P. Sakarindr N. Ansari Advanced Networking Laboratory

  3. Using Trust-Based Information Aggregation for Predicting Security Level of Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb1 level of a security solution using information sources who are trusted to varying degrees. We show how.colostate.edu Abstract. Sometimes developers must design innovative security solutions that have a rapid development

  4. Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare

    E-Print Network [OSTI]

    Smith, Sean W.

    Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare Joseph A. Cooleyand USA {jac,sws}@cs.dartmouth.edu Abstract "Jekyll and Hyde" embodies how information security af- fects today's healthcare ecosystem. When security works, it promotes patient health and a smooth operating

  5. Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum, MD 21090

    E-Print Network [OSTI]

    Lee, Ruby B.

    1 Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum security of the Global Information Grid (GIG). The context for "hardening" this infrastructure also describes the Department of Defense (DoD) activities aimed toward defining security requirements

  6. UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY

    E-Print Network [OSTI]

    Suri, Manil

    UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

  7. Data Security Task Force Attendees 2015 David Lewis (co-chair) Vice President for IT and CIO Office of the Provost

    E-Print Network [OSTI]

    Portman, Douglas

    , Enterprise Applications University Information Technology Mike Pinch Chief Information Director University Audit John Barden Chief Technology Officer and Sr. Associate CIO University Information Technology Pat Beato Chief Privacy Officer URMC

  8. Secure Retrieval of FFTF Testing, Design, and Operating Information

    SciTech Connect (OSTI)

    Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

    2009-10-01

    One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.

  9. Office of Legacy Management. Information and Records Management. Transition Guidance

    SciTech Connect (OSTI)

    none,

    2004-03-01

    The Office of Legacy Management (LM) is an integral part of the U.S. Department of Energy’s (DOE’s) strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. LM will work with each site using an integrated team approach to ensure a successful transition. Part of this process will include transition of Government records and information. The Office of Legacy Management Information and Records Management Transition Guidance focuses on LM’s goal to preserve and protect legacy records and information. This guidance document establishes a framework for the transfer of records management responsibilities for sites transferring to LM. It describes the requirements, responsibilities, and procedures for the efficient and cost-effective transfer of custody, ownership, and management of records and other information products from the transfer site to LM. Records management practices are critical to the functions of Federal agencies because records provide information about, or evidence of, the organization, functions, policies, decisions, procedures, operations, or other activities. Therefore, the information generated by an agency is created, maintained, and dispositioned through records management processes that ensure the appropriate preservation and retrieval of essential information. Because of their intrinsic value, best practices to preserve information and records should be utilized when records are transferred from one organization to another. As the transfer program completes cleanup activities at closure sites, a transitional process will facilitate the transparent shift in the management of site records activities to LM. The roles and responsibilities of the transfer site and/or program and LM described in this document are a necessary foundation for cooperation and coordination and are essential to the successful transition of records and information responsibilities. The DOE Office of the Chief Information Officer (OCIO) has a central role in DOE records management by providing guidance, expertise, and coordination to all DOE offices and organizations and coordination with the National Archives and Records Administration (NARA). LM and the transfer site will complete an integrated transition plan which will integrate all transition elements including information and records. As part of the overall transition plan, an Information and Records Transition Plan will be developed consistent with the integrated transition plan for the site transfer and included as an attachment. The Information and Records Management Transition Plan will be developed to assist both organizations in organizing the tasks; establishing a timetable and milestones for their completion; and identifying manpower, funding and other resources that will be needed to complete the ownership transfer. In addition, the plan will provide a valuable exchange of institutional knowledge that will assist LM in meeting the obligations of responsibly managing legacy records. Guidance for the development of the plan is included in this document. Records management concerns that may arise during site closure, such as management support, contract language and agreements, interactions with the OCIO and NARA, resource and budget considerations, and procedures to safeguard records are addressed. Guidelines and criteria for records management transition activities are also provided. These include LM expectations for the inventory, scheduling, and disposition of records; the management and transfer of electronic files, including databases and software; records finding aids, indices, and recordkeeping systems; and the process for the transfer of hard copy and electronic records to LM.

  10. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  11. Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code: CS3190

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    -- Operation and limitations of common information safeguards -- Current leading technologies and standards information from unstructured sources at a level sufficient to keep up to date and communicate with computing of information security. Legal, ethical and human aspects of security. Module Delivery Methods of Delivery

  12. 29.01.03. M1.19 Information Resources Security Awareness Training Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    and require acknowledgement as determined by the department. 2.3 Departmental information technology personnel For interpretation or clarification, contact Information Technology Risk Management. OFFICE OF RESPONSIBILITY: Associate Vice President for Information Technology & Chief Information Officer #12;

  13. Utah Office of Energy Development | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin, New York:PowerNewPumaty Jump to:UACPresentationOffice of Energy

  14. Utah Public Lands Policy Coordination Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin, New York:PowerNewPumaty Jump to:UACPresentationOffice ofLands

  15. Utah State Historic Preservation Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin, New York:PowerNewPumaty JumpRules ofOffice Jump to: navigation,

  16. Nevada State Historic Preservation Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPI Ventures Ltd JumpNesjavellirInformationCertified Tank HandlerOffice Jump

  17. BLM Color Country District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAandAmminex AAustria GeothermalInformationColor Country District Office

  18. New Jersey Office of Clean Energy | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsourceII Jump to: navigation,National MarineUSAIDCanaan,InformationTexas:EnergyOffice

  19. A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS

    E-Print Network [OSTI]

    Baras, John S.

    A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS several information security goals, such as authentication, integrity and secrecy, have often been and the Institute for Systems Research, University of Maryland, College Park, MD, 20742 ABSTRACT Most information

  20. 6/17/13 (v1.2) Information Security Exit Process

    E-Print Network [OSTI]

    Kay, Mark A.

    6/17/13 (v1.2) Information Security Exit Process All Stanford related PHI, and other Restricted and Prohibited information (see http://dataclass.stanford.edu for details) must be securely may be held liable in the future. Once the applicable Stanford information has been removed

  1. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  2. Toward a Security Domain Model for Static Analysis and Verification of Information Systems

    E-Print Network [OSTI]

    Toward a Security Domain Model for Static Analysis and Verification of Information Systems Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Tim Levin Computer Science Department Naval Postgraduate School

  3. Making Collusion-Secure Codes (More) Robust against Bit Erasure Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AISTMaking Collusion-Secure Codes (More) Robust against Bit Erasure Koji Nuida Research Center.nuida@aist.go.jp Abstract A collusion-secure code is called robust if it is secure against erasure of a limited number

  4. SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01

    SMB Information Security Seminar (2013) Exercise 4 Actions taken to maintain awareness of threats note of the data security issues covered in these publications. Ask yourself "Is my business vulnerable network with your peers, talk about cyber security issues. Give and get advice, hints, tips, etc. 4. Make

  5. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon Institute for Cyber Security World-Leading Research with Real Ravi Sandhu, Khalid Zaman Bijon Institute for Cyber Security University of Texas at San Antonio Oct. 15, 2011 International

  6. RT-Based Administrative Models for Community Cyber Security Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

  7. ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION

    E-Print Network [OSTI]

    Lazos, Loukas

    ENERGY-AWARE SECURE MULTICAST COMMUNICATION IN AD-HOC NETWORKS USING GEOGRAPHIC LOCATION INFORMATION Loukas Lazos, Radha Poovendran Network Security and Cryptography Laboratory University by NSF grant ANI-0093187 and ARO grant DAAD-190210242 ABSTRACT The problem of securing multicast

  8. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    ­ Software 1 Testing (Security Levels 1 to 3) 17CMS2 = Cryptographic Modules ­ Software 2 Testing (Security of this document. 17/CMS1 Cryptographic Modules ­ Software 1 Testing (Security Levels 1 to 3) 17CMS1/01 All testCMS2 Cryptographic Modules ­ Software 2 Testing (Security Levels 4

  9. Social Security Administration Information Phone:(706)5422900Fax:(706)5830123Web:international.uga.edu Email:issis@uga.edu

    E-Print Network [OSTI]

    Arnold, Jonathan

    Social Security Administration Information Phone:(706)5422900Fax:(706)5830123Web number. For additional information you may visit the Social Security Administration's (SSA) website Security Administration (SSA) Social Security Administration Federal Building 1650 Prince Avenue, Athens

  10. Office of Quality Management

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

  11. Information resources for assessing health effects from chemical exposure: Office of pesticides programs

    SciTech Connect (OSTI)

    Fenner-Crisp, P.

    1990-12-31

    The US Environmental Protection Agency (EPA) Office of Pesticide Programs is trying to develop a complete picture of a chemical`s toxicity and exposure profile. It is also important to share information in the office`s files because of pesticides, particularly as a consequence of agricultural use, find their way into places not necessarily intended.

  12. Accommodation Office Information Centre, Market Square Alcuin A and B Block A4

    E-Print Network [OSTI]

    Mitchener, Paul

    Accommodation Office · Information Centre, Market Square Alcuin A and B Block · A4 Alcuin C Block Services · Market Square Careers · Careers Building V8 Cash and Fees Office · Market Square Catalyst) Design Solutions · 5a Main Street D4 Development and Alumni Relations Office · Alumni House D4 Disability

  13. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2002

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2002 Section 5.8 Information Security Revised: May 2011 Policy 5.8.1 Information Security Function Responsibility: Chief Information Security Officer Page 1 of 1 INFORMATION SECURITY FUNCTION

  14. Security Awareness Programs During orientation in September, students are informed of services offered by the University

    E-Print Network [OSTI]

    Escher, Christine

    Security Awareness Programs During orientation in September, students are informed of services. Video and slide presentations outline ways to maintain personal safety and residence hall security. Students are told about crime on campus and in surrounding neighborhoods. Similar information is presented

  15. CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT

    E-Print Network [OSTI]

    CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley and environments. The risks associated with these changing situations can be managed through an integrated programs based on the management of risk. Information Security Continuous Monitoring and the Risk

  16. ITL BULLETIN FOR NOVEMBER 2010 THE EXCHANGE OF HEALTH INFORMATION: DESIGNING A SECURITY

    E-Print Network [OSTI]

    ARCHITECTURE TO PROVIDE INFORMATION SECURITY AND PRIVACY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce Improved, more effective healthcare is a high priority in the United States today. While the U

  17. NUMBER: IT 3.00 SECTION: Information Technology

    E-Print Network [OSTI]

    Almor, Amit

    NUMBER: IT 3.00 SECTION: Information Technology SUBJECT: Information Security DATE: September 2: William F. Hogue Issued by: Office of Information Technology I. Policy The University of South Carolina data and information technology assets. The University Information Security Office is therefore

  18. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  19. Implementing Information Security and Its Technology: A LineManagement...

    Office of Scientific and Technical Information (OSTI)

    Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat...

  20. 29.01.03.M1.28 Information Resources Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.28 Information Resources ­ Security Surveillance Page 1 of 4 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.28 Information Resources ­ Security Surveillance Approved April 13, 2010 Revised by the University Police Department #12;29.01.03.M1.28 Information Resources ­ Security Surveillance Page 2 of 4

  1. Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12-002, October 17, 2011)

    E-Print Network [OSTI]

    Christian, Eric

    Annual Report, "Federal Information Security Management Act: Fiscal Year 2011 Evaluation" (IG-12's information technology (IT) security posture. For FY 2011, we adopted a risk-based approach in which we required areas of review for FY 2011 Federal Information Security Management Act (FISMA) reporting: · Risk

  2. 29.01.03. M1.18 Information Resources Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03. M1.18 Information Resources ­ Security Monitoring Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.18 Information Resources ­ Security Monitoring Approved July 18, 2005 Revised April 27, etc. Reason for SAP The purpose of the security monitoring policy is to ensure that information

  3. SMB Information Security Seminar (2013) Exercise 2 Estimated costs from bad things happening to your

    E-Print Network [OSTI]

    Magee, Joseph W.

    2013-01-01

    SMB Information Security Seminar (2013) Exercise 2 ­ Estimated costs from bad things happening to your important information. First, think about the information used in/by your organization. Second, enter into the table below your top two highest priority information types. Third, enter estimated costs

  4. EERE Information Center Contact, PIA, The Office of Energy Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Office of Energy Efficiency and Renewable Energy (EERE) Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant...

  5. Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1

    E-Print Network [OSTI]

    Chen, Li-Chiou

    Economic Incentives of Providing Network Security Services Journal of Information Technology Management 1 THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li in the economic incentives inherent in providing the defenses as well as uncertainty in current defenses. We

  6. An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions

    E-Print Network [OSTI]

    Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

    2006-01-01

    This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions...

  7. Restricting information flow in security APIs via typing 

    E-Print Network [OSTI]

    Keighren, Gavin

    2014-06-27

    Security APIs are designed to enable the storage and processing of confidential data without that data becoming known to individuals who are not permitted to obtain it, and are central to the operation of Automated Teller ...

  8. 29.01.03.M1.16 Information Resources-Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.16 Information Resources- Portable Devices: Information Security Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.16 Information Resources ­ Portable Devices: Information Security Approved on the responsibilities of information resource owners to adequately protect data residing on portable devices

  9. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  10. The Office of Independent Enterprise Assessments' Office of Enforcemen...

    Office of Environmental Management (EM)

    The Office of Independent Enterprise Assessments' Office of Enforcement convened the 2014 DOE Safety and Security Enforcement Workshop May 13 and 14, 2014 The Office of Independent...

  11. MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

    E-Print Network [OSTI]

    MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY Shirley Radack, Editor U.S. Department of Commerce Organizations have to make frequent changes to their information systems result in adjustments being made to the configuration of information systems; these activities could have

  12. Proceedings of the 13th Colloquium for Information Systems Security Education

    E-Print Network [OSTI]

    O'Leary, Michael

    Proceedings of the 13th Colloquium for Information Systems Security Education Seattle, WA June 1 Zenebe: Department of Management Information Systems,Bowie State University,14000 Jericho Park Road - 3, 2009 ISBN 1-933510-96-7/$15.00 2009 CISSE Abstract ­ The Maryland Alliance for Information

  13. On The Security of Mobile Cockpit Information Systems Devin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast,

    E-Print Network [OSTI]

    Snoeren, Alex

    expanded to include live data such as weather and traffic information that is used to make flight decisions, information kiosks, home automation controls, and so on--our expectations of security and reliability information services supported by the receiver, the display may also include a graphical weather overlay (FIS

  14. HR System Access Request Form Security Administration, Human Resources (HR) For additional instructions and information, log onto http://hr.vanderbilt.edu/security/

    E-Print Network [OSTI]

    Simaan, Nabil

    instructions and information, log onto http://hr.vanderbilt.edu/security/ Home Department VUnet IDHR EmployeeHR System Access Request Form Security Administration, Human Resources (HR) For additional ID Name Email AddressWork Phone Home Dept Name Effective Date of Access Operator Information I

  15. Training & Technology Solutions Queens College ~ Office of Information Technology ~ Training & Technology Solutions

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    Training & Technology Solutions Queens College ~ Office of Information Technology ~ Training & Technology Solutions 718-997-4875 ~ training@qc.cuny.edu ~ I-Bldg 214 Student Center 1. Logging the period between for first and last name. #12;Training & Technology Solutions Queens College ~ Office

  16. GoldLink Finance Account Request ETSU Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    GoldLink Finance Account Request Form ETSU Office of Information Technology 424 Roy Nicks Hall, Box 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu This section for use by the Office _______________________________________________________________________________________ [ last ] [ first ] [ middle ] ETSU Domain Name ____________________@etsu.edu School / College

  17. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W. Hamlen and Murat Kantarcioglu

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W to the cloud kernel software, OS/hypervisor, VM, or cloud file system, SilverLine automatically in-lines secure information flow security for Hadoop clouds with easy maintainability (through modularity) and low overhead

  18. National Information Assurance Education and Training Program (NIETP) National Security Agency ~ 9800 Savage Road ~ Ft. Meade, MD 20755-6744 ~ ATTN: I083, Suite 6744

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    National Information Assurance Education and Training Program (NIETP) National Security Agency University courseware meets all of the elements of the Committee on National Security Systems (CNSS) National Training Standards for: Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011 System

  19. OFFICE,

    Office of Legacy Management (LM)

    OFFICE, . . . . . ..-... --.-... .-..I... ..-... bUmME. wArl&l ' rrsldu*. in the dw6lopmQt pmgrwh : Be ostiamts Uuat not man lf+ .b%'o,Qds. cik'e%ah of the...

  20. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003 Section 5.8 Information Security Revised: January 2012 Policy 5.8.13 Security Monitoring Responsibility: Chief Information Security Officer Page 1 of 2 SECURITY MONITORING Policy

  1. Private Information Advisory Protecting the personal private information of our students, faculty and staff is of

    E-Print Network [OSTI]

    Qiu, Weigang

    . Similar risks can be illustrated if information is stolen or hacked from presumably secure computers. The CUNY Information Security Management Office has published direct links of major Internet search engines on how to prevent the search engines from collecting your information. Please refer to security

  2. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment ofOffice|in theLegislativeIComplaints - Golden Field Office PIA

  3. ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security,

    E-Print Network [OSTI]

    Gering, Jon C.

    connection. 3. Dual (split) tunneling is not permitted; only one network connection is allowed. 4. All VPN gateways or concentrators on the Truman network will be installed and managed by ITS. 5. All computers, etc. - IPSec ­ A secure network protocol used for VPN sessions. - VPN Gateway/Concentrator - A device

  4. An Efficient Approach to Support Querying Secure Outsourced XML Information

    E-Print Network [OSTI]

    Ng, Wilfred Siu Hung

    and Technology {yini, wilfred, lauhl, csjames}@cs.ust.hk Abstract. Data security is well-recognized a vital issue encrypted XML. XQEnc is based on two important techniques of vectorization and skele- ton compression. Essentially, vectorization, which is a generalization of columns of a relational table, makes use the basic

  5. The University of Texas at Austin Enhancing Large Software Purchases Office of the Chief Information Officer Written By: Information Technology Services

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The University of Texas at Austin Enhancing Large Software Purchases Office of the Chief for the implementation of UTS 140 at The University of Texas at Austin. Information Technology Services (ITS) strongly benefit not only the university, but all UT System components and other public agencies in Texas. #12

  6. BLM Four Rivers Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:Four Rivers Field Office

  7. BLM West Desert District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office JumpUtah State Office JumpWest

  8. FTCP Site Specific Information - Oak Ridge Office | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111, 2015Energy Nevada Field OfficeOffice FTCP

  9. FTCP Site Specific Information - Office of Environment, Health, Safety &

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111, 2015Energy Nevada Field OfficeOffice

  10. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    SciTech Connect (OSTI)

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  11. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  12. FIA-12-0045- In the Matter of National Security Archive

    Office of Energy Efficiency and Renewable Energy (EERE)

    Office of Hearings and Appeals (OHA) issued a decision denying an appeal (Appeal) from a Freedom of Information Act (FOIA) determination issued by the Department of Energy’s Richland Operations Office (ROO). The National Security Archive, the Appellant, requested copies of a specific report dealing with a methodology for the production of plutonium from Department’s Office of Information Resources (OIR).

  13. Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2

    E-Print Network [OSTI]

    Hwang, Kai

    Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1 and optimize energy usage to meet sustainability goals. Managing the energy information lifecycle ­ from, feedback, and query/response interactions, which are transmitted across a widely distributed infrastructure

  14. Securing Tags to Control Information Flows within the Internet of Things

    E-Print Network [OSTI]

    Cambridge, University of

    Securing Tags to Control Information Flows within the Internet of Things Jatinder Singh, Thomas F.lastname@cl.cam.ac.uk Abstract--To realise the full potential of the Internet of Things (IoT), IoT architectures are moving. INTRODUCTION Information sharing underpins the broad vision of the "Internet of Things" (IoT). Io

  15. Report on follow-up inspection of the double funding of security for special nuclear material at the Richland Operations Office

    SciTech Connect (OSTI)

    NONE

    1995-08-28

    In a June 3, 1993, Office of Inspections Letter Report, the Office of Inspector General notified the Department`s Acting Chief Financial Officer that the Department had requested and received $60 million, double the funds needed, for the safeguard and security of special nuclear material at the Department`s Richland Operations Office in Fiscal Year 1993. In response to the Letter Report, in a June 28, 1993, memorandum, the Acting Chief Financial Officer advised the Office of Inspector General that the extra $30 million received by the Office of Environmental Management would either be: (1) applied to unanticipated requirements in Fiscal Year 1993; (2) applied to the anticipated Congressional reduction to the Department`s Fiscal Year 1994 budget request; or (3) used as an offset to the Fiscal Year 1995 budget request. The purpose of this follow-up inspection was to review the circumstances surrounding the Fiscal Year 1993 double funding for the security of special nuclear material at Richland. The principal objectives of this inspection were to: (1) identify contributing factors to the double funding and corrective actions needed to prevent the double funding from reoccurring; and (2) review Departmental Managers` response to the double funding issue.

  16. Office of Information Technology UC Irvine IT Update

    E-Print Network [OSTI]

    Grossman, Emily

    of IT service operations outlined in ITIL (Information Technology Infrastructure Library). Ø Research

  17. U.S. Environmental Protection Agency Office of the Chief Information Officer

    E-Print Network [OSTI]

    Information Resources Management Strategic Plan February 27, 2015 #12;EPA FY 2015-2018 Information Resource Management Strategic Plan In accordance with OMB Circular A-130, EPA 's FY 2015-2018 IRM Strategic Plan ................................................................................................................................................... 4 2.0 EPA's Strategic Information Management Framework

  18. 29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE

    E-Print Network [OSTI]

    29.01.03.M1 Security of Electronic Information Resources Page 1 of 3 UNIVERSITY RULE 29.01.03.M1 Security of Electronic Information Resources Approved May 27, 2002 Revised May 28, 2009 Revised October 15&M) electronic information resources are vital academic and administrative assets which require appropriate

  19. 3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University

    E-Print Network [OSTI]

    Keil, David M.

    3. Security and privacy David Keil Information Technology and Society 5/13 David M. Keil, Framingham State University CSCI 135 Information Technology and Society 3. Security and privacy 1. Crime, law protections David Keil Information Technology and Society 5/13 1 Readings: Baase, Chapters 2 and 5 David Keil

  20. Caisson: A Hardware Description Language for Secure Information Flow

    E-Print Network [OSTI]

    Sherwood, Tim

    : Unclassified Secret Top Secret. An important information flow policy based on such lattices is non to higher elements in the lattice (e.g., Secret information can flow to Top Secret, but not vice on information flow. Policies may target confidentiality, so that secret Permission to make digital or hard

  1. Training & Technology Solutions Queens College ~ Office of Information Technology ~ Training & Technology Solutions

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    Training & Technology Solutions Queens College ~ Office of Information Technology ~ Training & Technology Solutions 718-997-4875 ~ training@qc.cuny.edu ~ I-Bldg 214 Faculty Center My Textbooks Navigation information for a class, the Textbook Details section needs to be filled out. Please be as precise as possible

  2. DRAFT April 9, 2007 Prepared by Information Technology Services and the Office of General Counsel

    E-Print Network [OSTI]

    DRAFT April 9, 2007 Prepared by Information Technology Services and the Office of General Counsel" such as "what is the name of your favorite pet?" · Confidential information subject to attorney-client privilege processing (e.g., payroll or student tax reporting) or other uses consistent with State and Federal law

  3. FTCP Site Specific Information - Nuclear Energy Oak Ridge Site Office |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111, 2015Energy Nevada Field Office FTCP

  4. FTCP Site Specific Information - Oak Ridge Office of Environmental

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111, 2015Energy Nevada Field Office

  5. Release of Information Deliver to: Registrar's Office, Administration Building Room 110, 1910 University Drive, Boise, ID 83725-1365

    E-Print Network [OSTI]

    Barrash, Warren

    Release of Information Deliver to: Registrar's Office, Administration Building will not release any information to any private individual and most agencies without your written permission--unless legally required. This Release of Information form

  6. Office of the Chief Information Officer DOERM@hq.doe.gov

    Energy Savers [EERE]

    including approving RM planning and investment proposals and information architecture plans Ensuring RM efforts are coordinated with HQ and Field sites, including...

  7. Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRDEnergy Copyrights A copyright is a federal rightSecurity and

  8. Secure Program Execution Via Dynamic Information Flow Tracking

    E-Print Network [OSTI]

    Suh, G. Edward

    2003-07-21

    We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...

  9. May 21, 2012, Office of Health, Safety and Security (HSS) Focus Group Training Work Group Charter

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOE Safetyof Energy ThisSitesStorage CenterEngineOnFinal21-12 Office

  10. Iowa Office of Energy Independence | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8, 13Renewable PowerMismatch |InvesCounty,ElectricOffice of

  11. Property:Building/FloorAreaOffices | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to: navigation, search This is a

  12. New Mexico State Land Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPI Ventures LtdNeville, Ohio:Archaeological Permits WebpageforLand Office Jump

  13. BLM Carson City District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLC Jump to:Greece: EnergyMontana)District Office Jump to: navigation,

  14. BLM Idaho Falls District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLC Jump to:Greece: EnergyMontana)District Office Jump to:Falls

  15. BLM Twin Falls District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLC Jump to:Greece: EnergyMontana)District Office Jump to:FallsFalls

  16. BLM Fire and Aviation Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:

  17. BLM Humboldt River Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:Four Rivers FieldRiver

  18. BLM Las Cruces District Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:Four Rivers

  19. BLM Sierra Front Field Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: EnergyYorkColorado State Office Jump to:FourOregonBLM

  20. Recommender Information | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thIWalter H.4 »Programming ChallengesOffice ofRecommender

  1. Recommender Information | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thIWalter H.4 »Programming ChallengesOffice

  2. Recommender Information | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thIWalter H.4 »Programming ChallengesOfficeRecommender

  3. FTCP Site Specific Information - Nevada Field Office | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111, 2015Energy Nevada Field Office FTCP Site

  4. Office of Information and Business Management | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    comprised of meaningful portfolio management support, enterprise compliance, and an agile information technology suite of tools. This includes the following: Conducting assessments...

  5. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: June 2003 Section 5.8 Information Security Revised: September 2014 Policy 5.8.10 Information Resources Acceptable Use and Security Policy Responsibility: Chief Information Security Officer Page 1 of 6

  6. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: November 2007

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    Effective: November 2007 Section 5.8 Information Security Revised: January 2012 Policy 5.8.29 Web Application Security Responsibility: Chief Information Security Officer Page 1 of 3 WEB APPLICATION SECURITY Overview The Health Science Center's Internet web applications reflect the University's reputation

  7. Secure communication of static information by electronic means

    DOE Patents [OSTI]

    Gritton, Dale G. (Pleasanton, CA)

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  8. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  9. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  10. Queens College ~ Office of Information Technology ~ Training & Technology Solutions 718-997-4875 ~ training@qc.cuny.edu ~ I-Bldg 214

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    Queens College ~ Office of Information Technology ~ Training & Technology Solutions 718;Queens College ~ Office of Information Technology ~ Training & Technology Solutions 718 & Technology Solutions By clicking on any class link, you will see extra information about that course. You

  11. AccomplishmentsFiscal Year 2013 Office of Information Technology: Providing Computing and Communications Resources to the University of MarylandAccomplishment Highlights --Fiscal Year 2013

    E-Print Network [OSTI]

    Yorke, James

    AccomplishmentsFiscal Year 2013 #12;Office of Information Technology: Providing Computing;Office of Information Technology: Providing Computing and Communications Resources to the University, the Division of Information Technology has been partnering with the university community to achieve milestones

  12. Colorado Energy Office - Hydropower Website | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open Energy InformationInformation Policy

  13. Colorado Governor s Energy Office | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open Energy InformationInformationCenter

  14. CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations

    E-Print Network [OSTI]

    Locasto, Michael E.

    permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

  15. 11World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing

    E-Print Network [OSTI]

    Sandhu, Ravi

    11World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing client © Ravi Sandhu World-Leading Research with Real-World Impact! Goal: Share but protect Policy-Centric Collaboration © Ravi Sandhu World-Leading Research with Real-World Impact! Collaboration Group Individual

  16. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES ScienceInformation Company NamenewEmail ListsLaboratoryEmergency

  17. Colorado Energy Office, Small Hydropower Handbook | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open Energy InformationInformation PolicyColorado

  18. Finance, IT Operations& InformationSecurity Dear Colleagues,

    E-Print Network [OSTI]

    Chen, Yiling

    section of this newsletter. In this issue, we also want to inform the community about the various audits through which SEAS goes on a regular basis and what to expect if your lab is selected for an audit important guidelines on the distinction between gifts and grants, receiving awards from the European Union

  19. Transcript: NUIT Information Security News Podcast, May 24, 2012

    E-Print Network [OSTI]

    Ottino, Julio M.

    . Anyway what we're talking about with Facebook is a story that I read that came out actually just before by Northwestern University Information Technology. We'll start today's news with the Facebook. And Facebook has people thought, and now there's already a lawsuit--welcome to the to the world Facebook, boy what a bad

  20. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...